25.01.2015 Views

Download Full Issue in PDF - Academy Publisher

Download Full Issue in PDF - Academy Publisher

Download Full Issue in PDF - Academy Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Journal of Computers<br />

ISSN 1796-203X<br />

Volume 8, Number 6, June 2013<br />

Contents<br />

REGULAR PAPERS<br />

Functional Networks Analysis from Multi Neuronal Spike Tra<strong>in</strong>s on Prefrontal Cortex of Rat dur<strong>in</strong>g<br />

Work<strong>in</strong>g Memory Task and Neuronal Network Simulation<br />

Dexuan Qi and X<strong>in</strong> Tian<br />

A Novel Heuristic Usage of Helpful Actions for Conformant-FF System<br />

Wei Wei, Dantong Ouyang, T<strong>in</strong>gt<strong>in</strong>g Zou, and Shuai Lu<br />

Assess<strong>in</strong>g Land Ecological Security Based on BP Neural Network: a Case Study of Hangzhou, Ch<strong>in</strong>a<br />

Heyuan You<br />

Magellan: Technical Description of a New System for Robot-Assisted Nerve Blocks<br />

Joshua Morse, Mohamad Wehbe, Riccardo Taddei, Shantale Cyr, and Thomas M. Hemmerl<strong>in</strong>g<br />

State Assignment for F<strong>in</strong>ite State Mach<strong>in</strong>e Synthesis<br />

Meng Yang<br />

A Rotation-based Data Buffer<strong>in</strong>g Architecture for Convolution Filter<strong>in</strong>g <strong>in</strong> a Field Programmable<br />

Gate Array<br />

Zhijian Lu, Yanxia Wu, Zhenhua Guo, and Guochang Gu<br />

AT-M<strong>in</strong>e: An Efficient Algorithm of Frequent Itemset M<strong>in</strong><strong>in</strong>g on Uncerta<strong>in</strong> Dataset<br />

Le Wang, L<strong>in</strong> Feng, and M<strong>in</strong>gfei Wu<br />

A Solution for Privacy-Preserv<strong>in</strong>g Data Manipulation and Query on NoSQL Database<br />

Yub<strong>in</strong> Guo , Liankuan Zhang, Fengren L<strong>in</strong>, and Xim<strong>in</strong>g Li<br />

Predicate Formal System based on 1-level Universal AND Operator and its Soundness<br />

Y<strong>in</strong>gcang Ma and Huacan He<br />

Analysis of Boolean Networks us<strong>in</strong>g An Optimized Algorithm of Structure Matrix based on Semi-<br />

Tensor Product<br />

J<strong>in</strong>yu Zhan, Shan Lu, and Guowu Yang<br />

Adaptive Chaotic Prediction Algorithm of RBF Neural Network Filter<strong>in</strong>g Model based on Phase<br />

Space Reconstruction<br />

Lisheng Y<strong>in</strong>, Yigang He, Xuep<strong>in</strong>g Dong, and Zhaoquan Lu<br />

Intrusion Detection Based on Improved SOM with Optimized GA<br />

Jian-Hua Zhao and Wei-Hua Li<br />

Fault Diagnosis System for NPC Inverter based on Multi-Layer Pr<strong>in</strong>cipal Component Neural Network<br />

Danjiang Chen, Y<strong>in</strong>zhong Ye, and Rong Hua<br />

Pulse Wave K Value Averag<strong>in</strong>g Computation and Pathological Diagnosis<br />

Li Yang, J<strong>in</strong>xue Sui, and Yunan Hu<br />

1377<br />

1385<br />

1394<br />

1401<br />

1406<br />

1411<br />

1417<br />

1427<br />

1433<br />

1441<br />

1449<br />

1456<br />

1464<br />

1472


Multi-Step Prediction Algorithm of Traffic Flow Chaotic Time Series based on Volterra Neural<br />

Network<br />

Lisheng Y<strong>in</strong>, Yigang He, Xuep<strong>in</strong>g Dong, and Zhaoquan Lu<br />

Adaptive Track<strong>in</strong>g Control for Nonaff<strong>in</strong>e Nonl<strong>in</strong>ear Systems with Zero Dynamics<br />

Hui Hu and Peng Guo<br />

Improved Feasible SQP Algorithm for Nonl<strong>in</strong>ear Programs with Equality Constra<strong>in</strong>ed Sub-Problems<br />

Zhijun Luo, Guohua Chen, Simei Luo, and Zhib<strong>in</strong> Zhu<br />

F<strong>in</strong>ite Element Analysis Based Design of Mobile Robot for Remov<strong>in</strong>g Plug Oil Well<br />

Xiaojie Tian, Yonghong Liu, Rongju L<strong>in</strong>, Baop<strong>in</strong>g Cai, Zengkai Liu, and Rui Zhang<br />

Contour Error Coupled-Control Strategy based on L<strong>in</strong>e Interpolation and Curve Interpolation<br />

Guoyong Zhao, Hongj<strong>in</strong>g An, and Q<strong>in</strong>gzhi Zhao<br />

Research of Leaf Quality Based on Snowflake Theory<br />

Lihui Zhou, Jiajia Sun, Juanjuan An, and Jun Long<br />

Oscillation Criteria for Second Order Nonl<strong>in</strong>ear Neutral Perturbed Dynamic Equations on Time<br />

Scales<br />

Xiup<strong>in</strong>g Yu, Hua Du, and Hongyu Yang<br />

Improved Quantum Ant Colony Algorithm based on Bloch Coord<strong>in</strong>ates<br />

Xiaofeng Chen, X<strong>in</strong>gyou Xia, and Ruiyun Yu<br />

Image Fusion Method Based on Directional Contrast-Inspired Unit-L<strong>in</strong>k<strong>in</strong>g Pulse Coupled Neural<br />

Networks <strong>in</strong> Contourlet Doma<strong>in</strong><br />

Xi Cai, Guang Han, and J<strong>in</strong>kuan Wang<br />

The Critical Legal Contention under the Challenge of Information Age and the Predom<strong>in</strong>ant Social<br />

Interests Concern for Develop<strong>in</strong>g Intelligent Vehicle Telematics <strong>in</strong> the United States<br />

Fa-Chang Cheng and Wen-Hs<strong>in</strong>g Lai<br />

MPC Controller Performance Evaluation and Tun<strong>in</strong>g of S<strong>in</strong>gle Inverted Pendulum Device<br />

Chao Cheng, Zhong Zhao, and Haixia Li<br />

A Metadata-driven Cloud Comput<strong>in</strong>g Application Virtualization Model<br />

Yunpeng Xiao, Guangxia Xu, Yanb<strong>in</strong>g Liu, and Bai Wang<br />

Robust Portfolio Optimization with Options under VE Constra<strong>in</strong>t us<strong>in</strong>g Monte Carlo<br />

X<strong>in</strong>g Yu<br />

A Novel Water Quality Assessment Method Based on Comb<strong>in</strong>ation BP Neural Network Model and<br />

Fuzzy System<br />

M<strong>in</strong>g Xue<br />

An Isolated Dual-Input Converter for Grid/PV Hybrid Power Systems<br />

Yu-L<strong>in</strong> Juan, Hs<strong>in</strong>-Y<strong>in</strong>g Yang, and Peng-Lai Chen<br />

Deformed Kernel Based Extreme Learn<strong>in</strong>g Mach<strong>in</strong>e<br />

Chen Zhang, Shixiong Xia, and B<strong>in</strong>g Liu<br />

Optimal Sleep Schedul<strong>in</strong>g Scheme for Wireless Sensor networks Based on Balanced Energy<br />

Consumption<br />

Shan-shan Ma, Jian-sheng Qian, and Yan-j<strong>in</strong>g Sun<br />

Identity Based Proxy Re-encryption From BB1 IBE<br />

J<strong>in</strong>dan Zhang, Xu An Wang, and Xiaoyuan Yang<br />

1480<br />

1488<br />

1496<br />

1504<br />

1512<br />

1520<br />

1528<br />

1536<br />

1544<br />

1552<br />

1560<br />

1571<br />

1580<br />

1587<br />

1594<br />

1602<br />

1610<br />

1618


Corn Moisture Measurement us<strong>in</strong>g a Capacitive Sensor<br />

Hongxia Zhang, Wei Liu, Boxue Tan, and Wenl<strong>in</strong>g Lu<br />

1627


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1377<br />

Functional Networks Analysis from Multi<br />

Neuronal Spike Tra<strong>in</strong>s on Prefrontal Cortex of<br />

Rat dur<strong>in</strong>g Work<strong>in</strong>g Memory Task and<br />

Neuronal Network Simulation<br />

Dexuan Qi<br />

Tianj<strong>in</strong> Research Centre of Basic Medical Science, Tianj<strong>in</strong> Medical University, Tianj<strong>in</strong> 300070, Ch<strong>in</strong>a<br />

Email: dxqi@tju.edu.cn<br />

X<strong>in</strong> Tian*<br />

Tianj<strong>in</strong> Research Centre of Basic Medical Science, Tianj<strong>in</strong> Medical University, Tianj<strong>in</strong> 300070, Ch<strong>in</strong>a<br />

Email: tianx@tijmu.edu.cn<br />

Abstract—Functional connectivity networks on prefrontal<br />

cortex of rat dur<strong>in</strong>g work<strong>in</strong>g memory task <strong>in</strong> vivo are<br />

analyzed. Neural ensemble entropy cod<strong>in</strong>g is applied to f<strong>in</strong>d<br />

the time <strong>in</strong>terval of work<strong>in</strong>g memory event occurrence. The<br />

analysis of functional connectivity networks is carried out<br />

though the method of cross-covariance. And functional<br />

networks of the occurrence work<strong>in</strong>g memory event and<br />

rest<strong>in</strong>g state are obta<strong>in</strong>ed. The complex network topology<br />

parameters are calculated, the two networks satisfy the<br />

small-world network property as the cluster<strong>in</strong>g coefficients<br />

of them are larger than their correspond<strong>in</strong>g random<br />

networks and their characteristic path lengths are<br />

approximately equal to their correspond<strong>in</strong>g random<br />

networks. F<strong>in</strong>ally, the simulations of spik<strong>in</strong>g neuronal<br />

networks of work<strong>in</strong>g memory event occurrence and rest<strong>in</strong>g<br />

state are presented. H<strong>in</strong>dmarsh-Rose neuron model is<br />

chosen as s<strong>in</strong>gle neuron of prefrontal cortex that connected<br />

by functional network of work<strong>in</strong>g memory event occurrence<br />

and rest<strong>in</strong>g state, receptivity. The simulation results are<br />

agreed with experiment data <strong>in</strong> rat prefrontal cortex dur<strong>in</strong>g<br />

a work<strong>in</strong>g memory task.<br />

Index Terms—functional connectivity, neuronal entropy<br />

cod<strong>in</strong>g, spike tra<strong>in</strong>s, work<strong>in</strong>g memory, small-world network,<br />

neuronal network simulation<br />

I. INTRODUCTION<br />

Work<strong>in</strong>g memory is short-term memory, which is one<br />

of the most important research doma<strong>in</strong> of cognitive<br />

science, refers to a complex cognitive tasks <strong>in</strong> the bra<strong>in</strong><br />

which can provide temporary storage and process<strong>in</strong>g of<br />

the necessary <strong>in</strong>formation, such as learn<strong>in</strong>g and<br />

reason<strong>in</strong>g[1]-[2]. Physiological studies have found the<br />

neural activity of the prefrontal cortex changes <strong>in</strong> the<br />

Manuscript received March 7, 2012; revised September 27, 2012;<br />

The work was supported by grants (No. 91132722 and No.<br />

61074131) from the National Natural Science Foundation of Ch<strong>in</strong>a.<br />

*correspond<strong>in</strong>g author. Tel.:+86 022 23542744<br />

process of new learn<strong>in</strong>g task, suggest<strong>in</strong>g that work<strong>in</strong>g<br />

memory is mediated by cont<strong>in</strong>uous activities of prefrontal<br />

cortex neurons[3]-[8]. Therefore, understand<strong>in</strong>g the<br />

<strong>in</strong>formation of neural activity is important to grasp the<br />

basic pr<strong>in</strong>ciple of bra<strong>in</strong> function computations.<br />

In addition, many theories such as rate cod<strong>in</strong>g, time<br />

cod<strong>in</strong>g, and nonl<strong>in</strong>ear cod<strong>in</strong>g have laid the foundation for<br />

further studies of neural activities[9]-[10]. Entropy is a<br />

measurement of uncerta<strong>in</strong>ty or the amount of <strong>in</strong>formation,<br />

which can quantify the <strong>in</strong>formation and can describe the<br />

characteristics of neural activity[9]-[11]. Moreover, the<br />

nonl<strong>in</strong>ear entropy can make up for the deficiency of<br />

traditional l<strong>in</strong>ear cod<strong>in</strong>g methods and show the<br />

differences between two spike tra<strong>in</strong>s which have the same<br />

fir<strong>in</strong>g rates but different temporal structures. In the<br />

present paper, entropy cod<strong>in</strong>g is applied to study local<br />

spatiotemporal pattern of neuronal activity <strong>in</strong> the process<br />

of work<strong>in</strong>g memory task and to f<strong>in</strong>d the period of<br />

work<strong>in</strong>g memory event occurrence.<br />

The concept of bra<strong>in</strong> functional connectivity first<br />

appeared <strong>in</strong> the electroencephalogram (EEG) study,<br />

which measures the statistical dependencies of the<br />

correlation and functional activities on the spatial<br />

separation of time between different bra<strong>in</strong> regions.<br />

Functional network is the network obta<strong>in</strong>ed from<br />

deviation of statistical <strong>in</strong>dependence, <strong>in</strong>clud<strong>in</strong>g<br />

measur<strong>in</strong>g their correlation, covariance, coherent<br />

spectrum and phase synchronization between different<br />

bra<strong>in</strong> regions or neurons[12]. In the early 1990s, Friston<br />

KJ et al first proposed functional connectivity analysis on<br />

functional magnetic resonance imag<strong>in</strong>g (fMRI) data[13],<br />

s<strong>in</strong>ce then the complexity of bra<strong>in</strong> networks based on<br />

functional connectivity imag<strong>in</strong>g of EEG,<br />

Magnetoencephalography (MEG) or fMRI data has<br />

become an important research direction. For example,<br />

Eguiluz VM et al (2005)[14] applied the correlation<br />

coefficient method to measure functional connectivity of<br />

fMRI data, found that the human bra<strong>in</strong>s are small-world<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1377-1384


1378 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

networks; Achard S and Bullmore E (2007)[15] applied<br />

correlation, partial correlation and partial coherence<br />

measurement method to study the functional connectivity<br />

networks between different bra<strong>in</strong> regions, the results<br />

consistently <strong>in</strong>dicate that the human bra<strong>in</strong>s are efficient<br />

small-world networks.<br />

Traditional EEG, MEG, fMRI, and other macro<br />

technology, can directly measure the <strong>in</strong>tegrated electrical<br />

activity of neuronal population, but the measurement<br />

results cannot be acquired with high time resolution<br />

(millisecond) and spatial resolution (millimeter) at the<br />

same time. At the micro level, <strong>in</strong>dividual neuron is the<br />

basic functional unit of the activity <strong>in</strong> the bra<strong>in</strong>, its neural<br />

<strong>in</strong>formation transmission and storage is very complex and<br />

highly dynamic.<br />

Multi-channel neural discharge record<strong>in</strong>g technology,<br />

developed <strong>in</strong> recent years, is the use of electrophysiology<br />

- the extracellular record<strong>in</strong>g method to record the activity<br />

of neurons <strong>in</strong> the discharge. This new technology can also<br />

record the fir<strong>in</strong>g activity of neuronal populations of the<br />

different parts of a bra<strong>in</strong> region or multiple bra<strong>in</strong> regions.<br />

Therefore, the functional connectivity analysis from<br />

neuronal fir<strong>in</strong>g data of the multi-channel record<strong>in</strong>g<br />

technology is an effective method of access to the<br />

functional activity of neurons, and to achieve high<br />

temporal resolution and spatial resolution. Yu S et al<br />

(2008)[17] studied the functional networks of visual<br />

cortex neurons; Correlation analysis method was used to<br />

calculate the functional connectivity matrix; The visual<br />

responses data were simultaneously recorded from 24<br />

nerve cells <strong>in</strong> visual cortex of anesthetized cats; The<br />

functional networks had small-world properties. In<br />

addition, many statistical method has been used for<br />

establish<strong>in</strong>g statistical associations or causality between<br />

neurons, f<strong>in</strong>d<strong>in</strong>g spatiotemporal correlations, or study<strong>in</strong>g<br />

the functional connectivity <strong>in</strong> neuronal networks[18]-[24].<br />

The standard method of analysis functional connectivity<br />

from multi spike tra<strong>in</strong>s is cross-correlation method[16].<br />

A variety of neural network models have been<br />

proposed to simulate the spike potentials of neural<br />

population. For <strong>in</strong>stance, Xiao ZG and Tian X(2010) [25]<br />

built small-world neural network model of hippocampal<br />

CA3 based on the characteristics of the hippocampal CA3<br />

neurons, simulated the response spike tra<strong>in</strong>s of neuronal<br />

population under three types of stimulus, and studied the<br />

respective neural ensemble encod<strong>in</strong>g of three types of<br />

stimulus. Meeter M(2003)[26] built a neural nucleus<br />

model of hippocampus, which composed by CA1, CA3,<br />

dentate gyrus, and entorh<strong>in</strong>al cortex nucleus; The model<br />

was based on the neural <strong>in</strong>formation connection relation<br />

of hippocampus. Atallah HE and et al (2004)[27] used a<br />

computational neural network model to <strong>in</strong>vestigate how<br />

the hippocampus with together neocortex and basal<br />

ganglia operate, which can susta<strong>in</strong> cognitive and<br />

behavioral function <strong>in</strong> the bra<strong>in</strong>.<br />

In the present paper, we aim to provide functional<br />

connectivity networks analysis on prefrontal cortex of rat<br />

<strong>in</strong> the process of work<strong>in</strong>g memory task <strong>in</strong> vivo, dur<strong>in</strong>g the<br />

period of work<strong>in</strong>g memory event occurrence and the<br />

period of rest<strong>in</strong>g state. Neural ensemble entropy cod<strong>in</strong>g<br />

can be applied to f<strong>in</strong>d the period of work<strong>in</strong>g memory<br />

event occurrence and the period of rest<strong>in</strong>g state. The<br />

analysis of functional connectivity networks carried out<br />

though the method of cross-covariance. The complex<br />

network topology parameters are calculated. F<strong>in</strong>ally, the<br />

simulations of spik<strong>in</strong>g neuronal networks of work<strong>in</strong>g<br />

memory event occurrence and rest<strong>in</strong>g state are presented.<br />

H<strong>in</strong>dmarsh-Rose (HR) neuron model is chosen as s<strong>in</strong>gle<br />

neuron that is connected by functional network of<br />

work<strong>in</strong>g memory event occurrence and rest<strong>in</strong>g state,<br />

receptivity.<br />

II. METHODS<br />

A. Experimental Data Acquired on Prefrontal Cortex of<br />

Rats dur<strong>in</strong>g Work<strong>in</strong>g Memory Task <strong>in</strong> Vivo<br />

Experimental data were conducted with the approval<br />

from Animal Care and Use Committee of Tianj<strong>in</strong><br />

Medical University and were <strong>in</strong> conformity to the Guide<br />

for the Care and Use of Laboratory Animals. 16-channel<br />

micro-wire electrodes were planted <strong>in</strong> rat prefrontal<br />

cortex and neural activities were recorded while the rats<br />

performed a work<strong>in</strong>g memory task <strong>in</strong> Y-maze. Effective<br />

period of 7 seconds were selected, which is deemed to be<br />

enough to represent the entire work<strong>in</strong>g memory process.<br />

B. Neural Ensemble Entropy Cod<strong>in</strong>g for Work<strong>in</strong>g<br />

Memory <strong>in</strong> Rats Prefrontal Cortex<br />

Entropy, especially Shannon entropy <strong>in</strong> this paper, is<br />

computed from <strong>in</strong>ter-spike <strong>in</strong>tervals (ISIs), which are<br />

generally regarded as an important carrier of encoded<br />

<strong>in</strong>formation. Assume there is an N-element <strong>in</strong>formation<br />

source sequence{ z 1<br />

, z<br />

2<br />

, ..., z n<br />

}; Shannon entropy is<br />

def<strong>in</strong>ed as the follow<strong>in</strong>g (1) (Shannon CE, 1948)[28]:<br />

n<br />

E =− p log p , (1)<br />

i=<br />

1<br />

i<br />

where p<br />

i<br />

, ( i =1, 2, ..., n ), is the occurrence probability<br />

of each element of <strong>in</strong>formation source sequence. The<br />

algorithms of Shannon entropy for spike tra<strong>in</strong> from s<strong>in</strong>gle<br />

neuron estimation are described as the follow<strong>in</strong>gs: The<br />

Inter Spike Interval (ISI) sequence of the neural fir<strong>in</strong>g<br />

was measured and the ISI histogram was estimated; The<br />

ISI histogram was separated with appropriate b<strong>in</strong> base on<br />

the def<strong>in</strong>ed b<strong>in</strong> length and the characteristics of the spike<br />

tra<strong>in</strong>s; The spikes number Si<br />

<strong>in</strong> each b<strong>in</strong> i ( i =1, 2, ...,<br />

n ) was counted; The fir<strong>in</strong>g probability p i<br />

of b<strong>in</strong> i was<br />

calculated based on the equation of<br />

2<br />

i<br />

p = S / S ;<br />

n<br />

i i i<br />

i=<br />

1<br />

From (1) the entropy E of the fir<strong>in</strong>g sequence was<br />

calculated.<br />

Above entropy estimation method can be used to<br />

present nonl<strong>in</strong>earity of neural population activity. The<br />

steps of Neural ensemble entropy cod<strong>in</strong>g are summarized<br />

as: An appropriate w<strong>in</strong>dow length L was selected and<br />

Shannon entropy was calculated for the <strong>in</strong>dividual<br />

neuron k , ( k =1, 2, ... , L ) <strong>in</strong> the w<strong>in</strong>dow; The w<strong>in</strong>dow<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1379<br />

along the time till the end of spike tra<strong>in</strong>s was slid with a<br />

mov<strong>in</strong>g step; The entropy values <strong>in</strong> each w<strong>in</strong>dow were<br />

estimated; All the entropy values were normalized and<br />

the dynamical map can be represented the neural<br />

ensemble activity as a response to the event.<br />

C. Functional Network from Neuronal Spike Tra<strong>in</strong> Data<br />

The method to determ<strong>in</strong>e directed network is to<br />

calculate the covariance between neurons, which is used<br />

to analyze the <strong>in</strong>fluences between pairs of spike tra<strong>in</strong>s.<br />

Spike tra<strong>in</strong>s are b<strong>in</strong>ned <strong>in</strong> w<strong>in</strong>dow of 1 millisecond, and<br />

then 10 milliseconds time-step is applied to count the<br />

number of spikes of each spike tra<strong>in</strong>, the correspond<strong>in</strong>g<br />

vectors are obta<strong>in</strong>ed. To measure whether there is an<br />

<strong>in</strong>fluence from a reference neuron (vector y ) to a target<br />

neuron (vector x ), (2) is applied to calculate covariance<br />

between neurons,<br />

C<br />

N−| d|<br />

N N<br />

1 1 <br />

( n+<br />

d)<br />

i n i<br />

n 1 N<br />

<br />

i 1 N<br />

<br />

= = i=<br />

1 <br />

xy<br />

( d)<br />

= N−| d|<br />

N N<br />

<br />

<br />

<br />

x − x y − y d ≥0<br />

, (2)<br />

1 1 <br />

y − y x − x d < 0<br />

<br />

<br />

( n−d)<br />

i n i<br />

n= 1 N i= 1 N i=<br />

1<br />

where C ( d ) is covariance between reference neuron<br />

xy<br />

(vector y ) and target neuron (vector x ), d is time lag<br />

between reference neuron (vector y ) and target neuron<br />

(vector x ), x and y are length N vectors obta<strong>in</strong>ed from<br />

correspond<strong>in</strong>g spike tra<strong>in</strong>s of neuron. The Cxy<br />

( d ) will<br />

show a peak if there is some consistent pattern between<br />

vector y and vector x with a time lag d . When a peak<br />

occurs at a time lag d ≥ 0 <strong>in</strong> lag w<strong>in</strong>dow of 50<br />

milliseconds, there is an effect from reference neuron<br />

(vector y ) to target neuron (vector x ) with target neuron<br />

delay d , the <strong>in</strong>fluence strength is the value of peak. If the<br />

peak exceeded a threshold, we can obta<strong>in</strong> a connection<br />

from reference neuron to target neuron with connectivity<br />

weigh of peak value. Each neuron is considered with no<br />

connectivity to itself, <strong>in</strong> other words, the ma<strong>in</strong> diagonal<br />

elements of functional connectivity matrix are zero.<br />

D. Complex Network Topology Parameters<br />

Small-world networks theory is presented by Watts DJ<br />

and Strogatz SH(1998)[29]. Usually two parameters are<br />

used to characterize the complex network characteristics.<br />

One is cluster<strong>in</strong>g coefficient ( CC ), and another is<br />

characteristic path length ( CPL ). Suppose there are k<br />

edges connected to one node; there are at most<br />

kk− ( 1)/2 probable exist edges among k neighbor<br />

nodes which are connected to k edges. The CC of one<br />

node is the number of actual exist edges divide by the<br />

number of at most probable exist edges. The CC of the<br />

network is def<strong>in</strong>ed as the average value of all nodes, as<br />

the follow<strong>in</strong>gs (3).<br />

N<br />

2ei<br />

CC = , (3)<br />

k ( k −1)<br />

i=<br />

1 i i<br />

where N is the nodes number of the network, e i<br />

is the<br />

number of actual exist edges among k<br />

i<br />

nodes. Arbitrarily<br />

select two nodes <strong>in</strong> a complex network, connect<strong>in</strong>g these<br />

two nodes with the m<strong>in</strong>imum number of edges, which is<br />

def<strong>in</strong>ed as the shortest path length of these two nodes.<br />

The CPL of the network is def<strong>in</strong>ed as the average value<br />

of all shortest path length between node pairs, as the<br />

follow<strong>in</strong>gs (4),<br />

N<br />

2<br />

CPL = dij<br />

. (4)<br />

nn ( + 1) i=<br />

1<br />

where d<br />

ij<br />

is the shortest path length between the two<br />

nodes i and j <strong>in</strong> the complex network, N is the nodes<br />

number of the network.<br />

Characteristics of small-world network are high CC<br />

and shorter CPL . Meanwhile the two parameters are<br />

high <strong>in</strong> regular networks and low <strong>in</strong> correspond<strong>in</strong>g<br />

random networks[30].<br />

E. Spik<strong>in</strong>g Neuronal Network Simulation of<br />

Prefrontal Cortex<br />

S<strong>in</strong>gle spik<strong>in</strong>g neuron model is the basis computational<br />

model of the neural physiological activity study. The<br />

H<strong>in</strong>dmarsh-Rose (HR) model was proposed by<br />

H<strong>in</strong>dmarsh J and Rose RM (1984)[32]. Used HR neuron<br />

model, the action potential can be simulated. HR model<br />

can be used to study s<strong>in</strong>gle neuron spik<strong>in</strong>g characteristics<br />

as well as the basic unit of the large-scale network. HR<br />

neuron model is used as network nodes <strong>in</strong> our neural<br />

population model. The equations of HR neuron model are<br />

shown <strong>in</strong> (5), (6) and (7),<br />

dX 3 2<br />

= Y − aX + bX − Z + I<br />

stim<br />

, (5)<br />

dt<br />

dY<br />

2<br />

c dX Y<br />

dt = − − , (6)<br />

dZ<br />

1<br />

r( X ( Z- g))<br />

dt = − 4<br />

, (7)<br />

where X is the membrane potential of neuron, Y<br />

represents the fast recovery currents, Z represents slow<br />

adaptive currents, I stim<br />

is an external stimulus <strong>in</strong>put<br />

currents, a , b , c , d , r and g are constant parameters.<br />

The values of these parameters are set accord<strong>in</strong>g to [33].<br />

In HR neuron model, the parameter r is related to the<br />

concentration of calcium ions. By adjust<strong>in</strong>g the value of<br />

the parameter r , the neuron can be shown a different<br />

discharge mode.<br />

The prefrontal cortex neurons are ma<strong>in</strong>ly divided <strong>in</strong>to<br />

two categories: excitatory neurons and <strong>in</strong>hibitory neurons;<br />

The anatomical sampl<strong>in</strong>g of the neurons <strong>in</strong> the prefrontal<br />

cortex has shown that about 80% of the neurons are<br />

excitatory neurons and the rest 20% are <strong>in</strong>hibitory<br />

© 2013 ACADEMY PUBLISHER


1380 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

neurons[31]. Excitatory neurons are pyramidal cells <strong>in</strong><br />

morphology. The fir<strong>in</strong>g characteristics of excitatory<br />

neurons are regular spik<strong>in</strong>g (RS) neurons, which present<br />

rapid and evident fir<strong>in</strong>g frequency adaptation respond<strong>in</strong>g<br />

to a cont<strong>in</strong>uous depolariz<strong>in</strong>g current <strong>in</strong>jection. Inhibitory<br />

neurons are <strong>in</strong>terneuron cells. The fir<strong>in</strong>g characteristics of<br />

excitatory neurons are fast spik<strong>in</strong>g (FS) neurons, which<br />

respond to long depolariz<strong>in</strong>g current stimulus with higher<br />

fir<strong>in</strong>g rate and less prom<strong>in</strong>ent spike frequency adaptation<br />

than RS neurons.<br />

In our Spik<strong>in</strong>g neuronal network simulation of<br />

prefrontal cortex, all HR neurons are coupled by<br />

functional connectivity. The equations of network model<br />

are shown as (8), (9), and (10):<br />

dX<br />

d<br />

N<br />

i<br />

3 2<br />

Yi aXi bXi Zi Istim<br />

w AijX<br />

j<br />

t j=<br />

1<br />

= − + − + + , (8)<br />

dYi<br />

dt<br />

= c−dX − Y , (9)<br />

2<br />

i<br />

dZi<br />

1<br />

= r( Xi<br />

− ( Zi<br />

- g))<br />

, (10)<br />

dt<br />

4<br />

where the subscript i represents the neuron number, N<br />

is the number of neurons. In our simulation we use<br />

N equals to the neuron number <strong>in</strong> work<strong>in</strong>g memory<br />

experiment <strong>in</strong> rat prefrontal cortex.<br />

i<br />

w<br />

N<br />

<br />

j=<br />

1<br />

A X<br />

ij<br />

j<br />

is the<br />

coupl<strong>in</strong>g term of the neural network model, where w is<br />

the coupl<strong>in</strong>g strength of connectivity from neuron j to<br />

neuron i . Aij<br />

is an N × N martix, which represents the<br />

coupl<strong>in</strong>g matrix of the neurons when a connection exists<br />

between neurons i and j .<br />

III. RESULTS<br />

A. Neural Ensemble Cod<strong>in</strong>g from Experimental Data<br />

After us<strong>in</strong>g software of spike sort<strong>in</strong>g (off-l<strong>in</strong>e sorter,<br />

Plexon, TX, USA) to separate s<strong>in</strong>gle neuron data from<br />

16-channel data, we obta<strong>in</strong> 34 neurons and correspond<strong>in</strong>g<br />

spike tra<strong>in</strong>s. Neuronal population spatiotemporal<br />

activities <strong>in</strong> rat prefrontal cortex dur<strong>in</strong>g the performance<br />

of work<strong>in</strong>g memory task <strong>in</strong> vivo are shown <strong>in</strong> Fig. 1.<br />

In Fig. 1, effective period of 7 seconds is selected to<br />

represent the whole work<strong>in</strong>g memory process. The<br />

dynamic entropy cod<strong>in</strong>g method was applied to<br />

characterize activity of neural population response to the<br />

work<strong>in</strong>g memory event. We calculated the entropy values<br />

of population fir<strong>in</strong>g dur<strong>in</strong>g work<strong>in</strong>g memory task. The<br />

neural fir<strong>in</strong>g entropy matrix is obta<strong>in</strong>ed <strong>in</strong> slid<strong>in</strong>g w<strong>in</strong>dow<br />

of 200 milliseconds with 50 milliseconds overlapp<strong>in</strong>g,<br />

represent<strong>in</strong>g the local entropy for each neuron. And<br />

neural ensemble entropy cod<strong>in</strong>g is shown <strong>in</strong> Fig. 2.<br />

Spike raster<br />

(neuron# 1-34)<br />

Figure 1. Neuronal population spatiotemporal activities <strong>in</strong> rat prefrontal<br />

cortex dur<strong>in</strong>g a work<strong>in</strong>g memory task <strong>in</strong> vivo. The triangle " "<br />

<strong>in</strong>dicates the time stamp.<br />

Entropy<br />

(neuron# 1-34)<br />

Normalized entropy<br />

Figure 2. Neural ensemble entropy cod<strong>in</strong>g <strong>in</strong> rat prefrontal cortex<br />

dur<strong>in</strong>g a work<strong>in</strong>g memory task <strong>in</strong> vivo. The triangle " " <strong>in</strong>dicates the<br />

time stamp.<br />

In Fig. 2, Normalization is achieved by divid<strong>in</strong>g spike<br />

tra<strong>in</strong>s by the maximum entropy values over the time<br />

period. Simultaneous <strong>in</strong>crease of fir<strong>in</strong>g rate and entropy<br />

demonstrate the occurrence of work<strong>in</strong>g memory event.<br />

Neuron 12, 13, 14, 15, 16, 17, 18 and 19 form a neural<br />

ensemble dur<strong>in</strong>g the occurrence of work<strong>in</strong>g memory<br />

event. The triangle " " <strong>in</strong>dicates the time stamp.<br />

B. Functional Connectivity Network<br />

The analyses of functional connectivity networks were<br />

carried out dur<strong>in</strong>g the occurrence of work<strong>in</strong>g memory<br />

event (time <strong>in</strong>terval [2.818s, 4.818s], before time stamp)<br />

and the period of rest<strong>in</strong>g state (time <strong>in</strong>terval [5.000s,<br />

7.000s], i.e. the period of 2s after time stamp). The<br />

method of cross-covariance between pairs of neurons has<br />

been used to determ<strong>in</strong>e directed connectivity edges. For<br />

34 neurons, N( N − 1)/2, or 561 pairs of neuron have<br />

been calculated. And at most there are 1122 crosscovariance<br />

peaks greater than zero. To determ<strong>in</strong>e the<br />

threshold of the connectivity, the peaks sorted by their<br />

values are shown <strong>in</strong> Fig. 3. If the threshold is too low, the<br />

result network is a fully connected graph. However, if the<br />

threshold is too high, the graph has several edges. Here,<br />

threshold was determ<strong>in</strong>ed with the value when the mean<br />

degree K ≈ ln( N)<br />

[34].<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1381<br />

14<br />

12<br />

Work<strong>in</strong>g memory event occurrence<br />

Rest<strong>in</strong>g state<br />

Cross-covariance peaks<br />

10<br />

8<br />

6<br />

4<br />

Target neuron #<br />

2<br />

Threshold<br />

0<br />

0 200 400 600 800 1000 1200<br />

Pair <strong>in</strong>dex<br />

Figure 3. Cross-covariance peaks between neuronal pairs<br />

In Fig. 3, the threshold=2.0 at the po<strong>in</strong>t where the<br />

<strong>in</strong>crement of the curve changes notably. If the peak<br />

exceeds the threshold, a directed edge of functional<br />

connectivity network could be obta<strong>in</strong>ed from the<br />

reference neuron to the target neuron with the<br />

connectivity weight of peak value. Via the analysis of<br />

two time <strong>in</strong>tervals (the occurrence of work<strong>in</strong>g memory<br />

event <strong>in</strong> the time <strong>in</strong>terval before time stamp; period of<br />

rest<strong>in</strong>g state <strong>in</strong> the time <strong>in</strong>terval after time stamp), two<br />

correspond<strong>in</strong>g functional connectivity networks were<br />

obta<strong>in</strong>ed and their connectivity matrix are shown <strong>in</strong> Fig. 4<br />

and Fig. 5, respectively.<br />

In Fig. 4 and Fig. 5, each column of the matrix<br />

<strong>in</strong>dicates whether there is a direct connection from the<br />

reference neuron to the target neurons, where the neuron<br />

number corresponds to the column number is a reference<br />

neuron. The nonzero elements of the matrix <strong>in</strong>dicate that<br />

there is a functional connection from the reference to the<br />

target neuron and the color shows the strength of the<br />

connection. Compar<strong>in</strong>g the Functional connectivity<br />

matrix of work<strong>in</strong>g memory event occurrence network<br />

(Fig. 4) with rest<strong>in</strong>g state network (Fig. 5), the number of<br />

edges of work<strong>in</strong>g memory event occurrence network is<br />

more than the number of the latter network. And the<br />

mean connectivity strength shows the same, as shown <strong>in</strong><br />

Table 1.<br />

TABLE 1<br />

CONNECTION NUMBER AND MEAN CONNECTIVITY<br />

STRENGTH OF TWO NETWORKS<br />

Connection<br />

number<br />

Mean connectivity<br />

strength<br />

Work<strong>in</strong>g memory event<br />

occurrence network<br />

402 3.93 ± 1.93<br />

Rest<strong>in</strong>g state network 67 2.55 ± 0.51<br />

Figure 4. Functional connectivity matrix of neurons dur<strong>in</strong>g the<br />

occurrence of work<strong>in</strong>g memory event <strong>in</strong> vivo (time <strong>in</strong>terval [2.818s,<br />

4.818s], before time stamp)<br />

Target neuron #<br />

Figure 5. Functional connectivity matrix of neurons dur<strong>in</strong>g the period<br />

of rest<strong>in</strong>g state <strong>in</strong> vivo (time <strong>in</strong>terval [5.000s, 7.000s], i.e. the period of<br />

2s after time stamp).<br />

In work<strong>in</strong>g memory event occurrence network, the<br />

high strength and dense connection concentrates on<br />

several neurons (especially on neuron 12, 13, 14, 15, 16,<br />

17, 18 and 19). And this phenomenon was not found <strong>in</strong><br />

the latter network. It agrees with neural ensemble cod<strong>in</strong>g<br />

form experimental data that neuron 12, 13, 14, 15, 16, 17,<br />

18 and 19 form a neural ensemble dur<strong>in</strong>g the period of<br />

work<strong>in</strong>g memory event occurrence.<br />

Fig. 6 and Fig. 7 show the topological graphs of<br />

work<strong>in</strong>g memory event occurrence network and rest<strong>in</strong>g<br />

state network, respectively. The color of the edges<br />

reflects the connection strength from the reference<br />

neurons to the target neurons, with magenta be<strong>in</strong>g largest<br />

and blue be<strong>in</strong>g smallest.<br />

© 2013 ACADEMY PUBLISHER


1382 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 6. Connectivity graph of work<strong>in</strong>g memory event occurrence<br />

network <strong>in</strong> vivo (dur<strong>in</strong>g time <strong>in</strong>terval [2.818s, 4.818s], before time<br />

stamp)<br />

C. Results of Simulation<br />

The neuronal spik<strong>in</strong>g networks of work<strong>in</strong>g memory<br />

event occurrence and rest<strong>in</strong>g state were simulated. Our<br />

simulation model is composed of 34 neurons, of which<br />

the simulation time is 2000 milliseconds, respectively. In<br />

our Spik<strong>in</strong>g neuronal network simulation of prefrontal<br />

cortex, all HR neurons are coupled by two functional<br />

connectivity networks as show<strong>in</strong>g <strong>in</strong> Fig. 4 and Fig. 5.<br />

The Spike raster of neuronal network model simulation of<br />

work<strong>in</strong>g memory event occurrence and rest<strong>in</strong>g state are<br />

shown <strong>in</strong> Fig. 8 (a)(b), respectively. And we calculate<br />

neural ensemble entropy cod<strong>in</strong>g of the two simulation<br />

results as shown <strong>in</strong> Fig. 9 (a) (b), respectively. In Fig. 9<br />

(a)(b), normalization is achieved by divid<strong>in</strong>g by the<br />

maximum entropy values from spike tra<strong>in</strong>s over the time<br />

period.<br />

In Fig. 8(a) and Fig. 9(a), Several neurons <strong>in</strong>creases<br />

simultaneously <strong>in</strong> fir<strong>in</strong>g rate and <strong>in</strong>creases <strong>in</strong> Entropy,<br />

and Neuron 10, 12, 13, 14, 15, 16 and 17 form a neural<br />

ensemble dur<strong>in</strong>g the simulation of work<strong>in</strong>g memory event<br />

occurrence. In Fig. 8(b) and Fig. 9(b), there is no neural<br />

ensemble formed. The simulation results are agreed with<br />

experiment data <strong>in</strong> rat prefrontal cortex dur<strong>in</strong>g a work<strong>in</strong>g<br />

memory task <strong>in</strong> vivo.<br />

(a)<br />

(b)<br />

Figure 7. Connectivity graph of rest<strong>in</strong>g state network <strong>in</strong> vivo (dur<strong>in</strong>g<br />

time <strong>in</strong>terval [5.000s, 7.000s], i.e. the period of 2s after time stamp)<br />

To compare characteristics of different networks, the<br />

CC and CPL were calculated. The CPL of the<br />

work<strong>in</strong>g memory event occurrence network is 1.678, and<br />

its equivalent random network is 1.657; the CC of the<br />

work<strong>in</strong>g memory event occurrence network is 0.604, and<br />

its equivalent random network is 0.356. The CPL of the<br />

rest<strong>in</strong>g state network is 3.045, and its equivalent random<br />

network is 3.683; the CC of the work<strong>in</strong>g memory event<br />

occurrence network is 0.098, and its equivalent random<br />

network is 0.066. The two networks satisfy the smallworld<br />

network property as the cluster<strong>in</strong>g coefficients of<br />

them are larger than their correspond<strong>in</strong>g random<br />

networks and their characteristic path lengths are<br />

approximately equal to their correspond<strong>in</strong>g random<br />

networks.<br />

1 second 1 second<br />

Figure 8. Spike raster of neuronal network model simulation. (a)<br />

Neuronal network model of neurons spik<strong>in</strong>g of work<strong>in</strong>g memory event<br />

occurrence. (b) Neuronal network model of neurons spik<strong>in</strong>g of rest<strong>in</strong>g<br />

state.<br />

(a)<br />

Entropy<br />

(neuron# 1-34)<br />

(b)<br />

Entropy<br />

(neuron# 1-34)<br />

Normalized entropy<br />

Figure 9. Neural ensemble entropy cod<strong>in</strong>g of neuronal network model<br />

simulation. (a) Neural ensemble entropy cod<strong>in</strong>g of neurons spik<strong>in</strong>g of<br />

work<strong>in</strong>g memory event occurrence simulation. (b) Neural ensemble<br />

entropy cod<strong>in</strong>g of rest<strong>in</strong>g state simulation.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1383<br />

IV. CONCLUSIONS<br />

In the present paper, functional connectivity networks<br />

on prefrontal cortex of rat dur<strong>in</strong>g work<strong>in</strong>g memory task <strong>in</strong><br />

vivo are analyzed. Neural ensemble entropy cod<strong>in</strong>g is<br />

applied to f<strong>in</strong>d the time <strong>in</strong>terval of work<strong>in</strong>g memory<br />

event occurrence. The neural fir<strong>in</strong>g entropy matrix is<br />

obta<strong>in</strong>ed <strong>in</strong> slid<strong>in</strong>g w<strong>in</strong>dow of 200 milliseconds with 50<br />

milliseconds overlapp<strong>in</strong>g, represent<strong>in</strong>g the local entropy<br />

for each neuron. Simultaneous <strong>in</strong>crease of fir<strong>in</strong>g rate and<br />

entropy demonstrate the occurrence of work<strong>in</strong>g memory<br />

event (time <strong>in</strong>terval [2.818s, 4.818s]). Neuron 12, 13, 14,<br />

15, 16, 17, 18 and 19 form a neural ensemble dur<strong>in</strong>g the<br />

occurrence of work<strong>in</strong>g memory event. The analysis of<br />

functional connectivity networks carried out though the<br />

method of cross-covariance The analyses of functional<br />

connectivity networks were carried out dur<strong>in</strong>g the<br />

occurrence of work<strong>in</strong>g memory event (time <strong>in</strong>terval<br />

[2.818s, 4.818s], before time stamp) and the period of<br />

rest<strong>in</strong>g state (time <strong>in</strong>terval [5.000s, 7.000s], i.e. the period<br />

of 2s after time stamp). The complex network topology<br />

parameters are calculated. The number of edges of<br />

work<strong>in</strong>g memory event occurrence network is more than<br />

the number of the latter network. And the mean<br />

connectivity strength shows the same. In work<strong>in</strong>g<br />

memory event occurrence network, the high strength and<br />

dense connection concentrates on several neurons<br />

(especially on neuron 12, 13, 14, 15, 16, 17, 18 and 19).<br />

And this phenomenon was not found <strong>in</strong> the latter network.<br />

It agrees with neural ensemble cod<strong>in</strong>g form experimental<br />

data that neuron 12, 13, 14, 15, 16, 17, 18 and 19 form a<br />

neural ensemble dur<strong>in</strong>g the period of work<strong>in</strong>g memory<br />

event occurrence. The two networks satisfy the smallworld<br />

network property as the cluster<strong>in</strong>g coefficients of<br />

them are larger than their correspond<strong>in</strong>g random<br />

networks and their characteristic path lengths are<br />

approximately equal to their correspond<strong>in</strong>g random<br />

networks. F<strong>in</strong>ally, the simulations of spik<strong>in</strong>g neuronal<br />

network of work<strong>in</strong>g memory event occurrence and rest<strong>in</strong>g<br />

state are presented. H<strong>in</strong>dmarsh-Rose (HR) neuron model<br />

is chosen as s<strong>in</strong>gle neuron that connected by functional<br />

network of work<strong>in</strong>g memory event occurrence and rest<strong>in</strong>g<br />

state, receptivity. The two simulation models are<br />

composed of 34 neurons, of which the simulation time is<br />

2000 milliseconds, respectively. Several neurons<br />

<strong>in</strong>creases simultaneously <strong>in</strong> fir<strong>in</strong>g rate and <strong>in</strong>creases <strong>in</strong><br />

Entropy, and Neuron 10, 12, 13, 14, 15, 16 and 17 form a<br />

neural ensemble dur<strong>in</strong>g the simulation of work<strong>in</strong>g<br />

memory event occurrence. There is no neural ensemble<br />

formed dur<strong>in</strong>g the simulation of rest<strong>in</strong>g state. The<br />

simulation results are agreed with experiment data <strong>in</strong> rat<br />

prefrontal cortex dur<strong>in</strong>g a work<strong>in</strong>g memory task.<br />

ACKNOWLEDGEMENTS<br />

This work was supported by grants (No. 91132722 and<br />

No. 61074131) from the National Natural Science<br />

Foundation of Ch<strong>in</strong>a.<br />

REFERENCES<br />

[1] A. Baddeley, "Work<strong>in</strong>g memory: look<strong>in</strong>g back and look<strong>in</strong>g<br />

forward", Nat. Rev. Neurosci., vol. 4, pp.829-839, 2003.<br />

[2] A. Baddeley, "Work<strong>in</strong>g memory", Science, vol. 255, no.<br />

5044, pp.556-556, 1992.<br />

[3] P.S. Goldman-Rakic, "Cellular basis of work<strong>in</strong>g memory",<br />

Neuron, vol.14, pp.477-485, 1995.<br />

[4] J.M. Fuster, and G.E. Alexander, "Neuron activity related<br />

to short-term memory", Science, vol. 173, pp.652-654,<br />

1971.<br />

[5] S. Funahashi, "Neuronal mechanisms of executive control<br />

by the prefrontal cortex", Neurosci. Res., vol. 39, pp.147-<br />

165, 2001.<br />

[6] E.K. Miller, and J.D. Cohen, "An <strong>in</strong>tegrative theory of<br />

prefrontal cortex function", Annu. Rev. Neurosci., vol.24,<br />

pp.167-202, 2001.<br />

[7] X.J. Wang, "Synaptic reverberation underly<strong>in</strong>g mnemonic<br />

persistent activity", Trends. Neurosci., vol. 24, pp.455-463,<br />

2001.<br />

[8] E.H. Baeg, Y.B. Kim, K. Huh, and et al. "Dynamics of<br />

Population Code for Work<strong>in</strong>g Memory <strong>in</strong> the Prefrontal<br />

Cortex", Neuron, vol. 40, pp.177-188, 2000.<br />

[9] G.S. Bhumbra, A.N. Inyushk<strong>in</strong>, M. Syrimi, and R.E. Dybll,<br />

"Spike cod<strong>in</strong>g dur<strong>in</strong>g osmotic stimulation of the rat<br />

supraoptic nucleus", J. Physiol., vol. 569, pp.257-274,<br />

2005.<br />

[10] G.S. Bhumbra, and R.E. Dyball, "Spike cod<strong>in</strong>g from the<br />

perspective of a neuron", Cogn. Process., vol. 6, pp.157-<br />

176, 2005.<br />

[11] E.T. Jaynes, Probability Theory: The Logic of Science, UK:<br />

Cambridge University Press, Cambridge, 2003.<br />

[12] C.J. Stam, and EA de Bru<strong>in</strong>, "Scale-free dynamics of<br />

global functional connectivity <strong>in</strong> the human bra<strong>in</strong>", Hum.<br />

Bra<strong>in</strong> Mapp., vol. 22, pp.97-109, 2004.<br />

[13] K.J. Friston, G. Tononi, G.N. Reeke and et al. "Valuedependent<br />

selection <strong>in</strong> the bra<strong>in</strong>: simulation <strong>in</strong> a synthetic<br />

neural model", Neuroscience, vol. 59, no. 2, pp.229-243,<br />

1994.<br />

[14] V.M. Eguiluz, D.R. Chialvo, G.A. Cecchi and et al. "Scalefree<br />

bra<strong>in</strong> functional networks", Phys. Rev. Lett., vol. 94,<br />

pp.018102-018102, 2005.<br />

[15] S. Achard, and E. Bullmore, "Efficiency and cost of<br />

economical bra<strong>in</strong> functional networks", PLoS Comput.<br />

Biol., vol.3, pp.174-183, 2007.<br />

[16] D.H. Perkel, G.L. Gerste<strong>in</strong> and G.P. Moore, "Neuronal<br />

spike tra<strong>in</strong>s and stochastic po<strong>in</strong>t pro-cesses II.<br />

Simultaneous spike tra<strong>in</strong>s", Biophys. J., vol. 7, pp.419-440,<br />

1967.<br />

[17] S. Yu, D. Huang, W. S<strong>in</strong>ger, and D. Nikolic, "A Small<br />

World of Neuronal Synchrony", Cereb. Cortex, vol. 18,<br />

no.2, pp.2891-2891, 2008.<br />

[18] E. Chornoboy, L. Schramm, and A. Karr, "Maximum<br />

likelihood identication of neural po<strong>in</strong>t process systems",<br />

Biol. Cybern., vol. 59, pp.265-275, 1988.<br />

[19] D.R. Brill<strong>in</strong>ger, and E.P. Villa, "Assess<strong>in</strong>g connections <strong>in</strong><br />

networks of biological neurons", <strong>in</strong> The Practice of Data<br />

Analysis: Essays <strong>in</strong> Honor of John W. Turkey. Pr<strong>in</strong>ceton,<br />

NJ: Pr<strong>in</strong>ceton Univ. Press, 1997, pp.77-92.<br />

[20] K.J. Utikal, "A new method for detect<strong>in</strong>g neural<br />

<strong>in</strong>terconnectivity", Biol. Cybern., vol. 76, pp. 459-470,<br />

1997.<br />

[21] M. Okatan, M.A. Wilson, and E.N. Brown, "Analyz<strong>in</strong>g<br />

functional con-nectivity us<strong>in</strong>g a network likelihood model<br />

of ensemble neural spik<strong>in</strong>g activity", Neural Computat.,<br />

vol. 17, pp. 1927-1961, 2005.<br />

© 2013 ACADEMY PUBLISHER


1384 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

[22] D. Nykamp, "A mathematical framework for <strong>in</strong>ferr<strong>in</strong>g<br />

connectivity <strong>in</strong> probabilistic neuronal networks", Math.<br />

Biosci., vol. 205, pp. 204-251, 2007.<br />

[23] I.H. Stevenson, J.M. Rebesco, L.E. Miller, and K.P.<br />

Kord<strong>in</strong>g, "Inferr<strong>in</strong>g functional connections between<br />

neurons", Curr. Op<strong>in</strong>. Neurobiol., vol. 18, pp. 582-588,<br />

2008.<br />

[24] S. Eldawlatly, R. J<strong>in</strong>, and K. Oweiss, "Identify<strong>in</strong>g<br />

functional connectivity <strong>in</strong> large scale neural ensemble<br />

record<strong>in</strong>gs: A multiscale data m<strong>in</strong><strong>in</strong>g approach", Neural<br />

Computat., vol. 21, pp. 450-477, 2009.<br />

[25] Z.G. Xiao, and X. Tian, "Neuronal Ensemble Cod<strong>in</strong>g of<br />

Spike Tra<strong>in</strong>s <strong>in</strong> the Hippocampus CA3 via Small-world<br />

Network", J. computers, vol. 5, no. 3, pp. 448-455, 2010.<br />

[26] M. Meeter, "Long-term memory disorders: Measurement<br />

and model<strong>in</strong>g", Amsterdam University, 2003.<br />

[27] H.E. Atallah, M.J. Frank, and R.C. O'Reilly,<br />

"Hippocampus, cortex, and basal ganglia: <strong>in</strong>sights from<br />

computational models of complementary learn<strong>in</strong>g systems",<br />

Neurobiol. Learn. Mem., vol.82, pp.253-267, 2004.<br />

[28] C.E. Shannon, "A mathematical theory of communication",<br />

Bell System Tech. J., vol. 27, 379-423, pp. 623-656, 1948.<br />

[29] D.J. Watts, and S.H. Strogatz, "Collective dynamics of<br />

'smallworld' networks", Nature, vol. 393, no.4, pp.440-442,<br />

1998.<br />

[30] T.I. Netoff, R. Clewley, S. Arno, T. Keck, and J.A. White,<br />

"Epilepsy <strong>in</strong> Small-World Networks", J. Neurosci., vol. 24,<br />

pp.8075-8083, 2004.<br />

[31] M. Abeles, (1991). Corticonics-Neural circuits of the<br />

cerebral cortex, New York: Cambridge University Press,<br />

pp.49-59.<br />

[32] J. H<strong>in</strong>dmarsh, and R,M. Rose , "A model of neuronal<br />

burst<strong>in</strong>g us<strong>in</strong>g three coupled first order differential<br />

equations", T. Roy. Soc. London B, vol. 221, pp. 87-102,<br />

1984.<br />

[33] Y. Suemitsu, and S. Nara, "A solution for two-dimensional<br />

mazes with use of chaotic dynamics <strong>in</strong> a recurrent neural<br />

network model", Neural Comput., vol.16, pp. 1943-1957,<br />

2004.<br />

[34] S. Achard, R. Salvador, B. Whitcher, J. Suckl<strong>in</strong>g, and E.<br />

Bullmore, "A resilient, low-frequency, small-world human<br />

bra<strong>in</strong> functional network with highly connected association<br />

cortical hubs", J. Neurosci., vol. 26, no. 1, pp.63-63, 2006.<br />

Dexuan Qi was born <strong>in</strong> Tianj<strong>in</strong>, Ch<strong>in</strong>a, <strong>in</strong> 1983. She<br />

received the Bachelor's degree <strong>in</strong> Mechanics Eng<strong>in</strong>eer<strong>in</strong>g <strong>in</strong><br />

2006, from Tianj<strong>in</strong> University, Tianj<strong>in</strong>, Ch<strong>in</strong>a. She received the<br />

Master's degree and Doctor's degree <strong>in</strong> 2010, from Tianj<strong>in</strong><br />

University, Tianj<strong>in</strong>, Ch<strong>in</strong>a.<br />

She is work<strong>in</strong>g as post-doctor <strong>in</strong> Tianj<strong>in</strong> Research Centre of<br />

Basic Medical Science, Tianj<strong>in</strong> Medical University. Her<br />

research <strong>in</strong>terests <strong>in</strong>clude neuronal network model, simulation<br />

of cortex spik<strong>in</strong>g model, and functional connectivity network.<br />

X<strong>in</strong> Tian was born <strong>in</strong> Shanghai, Ch<strong>in</strong>a, <strong>in</strong> 1946. She<br />

obta<strong>in</strong>ed the Bachelor's degree <strong>in</strong> 1968, from Ts<strong>in</strong>ghua<br />

University, Beij<strong>in</strong>g, Ch<strong>in</strong>a. She received the Master's degree <strong>in</strong><br />

1982, from Tianj<strong>in</strong> University, Tianj<strong>in</strong>, Ch<strong>in</strong>a. She received the<br />

Doctor's degree <strong>in</strong> 1991, from University of New South Wales,<br />

Australia.<br />

She is currently a professor of school of Biomedical<br />

Eng<strong>in</strong>eer<strong>in</strong>g, Tianj<strong>in</strong> Medical University. Her research <strong>in</strong>terests<br />

<strong>in</strong>clude neural <strong>in</strong>formation process<strong>in</strong>g, encod<strong>in</strong>g, nonl<strong>in</strong>ear<br />

systems and neural computation.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1385<br />

A Novel Heuristic Usage of Helpful Actions for<br />

Conformant-FF System<br />

Wei Wei, Dantong Ouyang, T<strong>in</strong>gt<strong>in</strong>g Zou and Shuai Lu<br />

College of Computer Science and Technology, Jil<strong>in</strong> University, Changchun, Ch<strong>in</strong>a<br />

Key Laboratory of Symbolic Computation and Knowledge Eng<strong>in</strong>eer<strong>in</strong>g of M<strong>in</strong>istry of Education, Jil<strong>in</strong> University,<br />

Changchun, Ch<strong>in</strong>a<br />

Email: wei_wei10@mails.jlu.edu.cn, ouyd@jlu.edu.cn, zout<strong>in</strong>gt@163.com, lus@jlu.edu.cn<br />

Abstract—Conformant plann<strong>in</strong>g is usually transformed <strong>in</strong>to<br />

a search problem <strong>in</strong> the space of belief states, where the<br />

comb<strong>in</strong>atorial explosion of search space has been one of the<br />

most <strong>in</strong>tractable problems. In this paper, we present a novel<br />

usage of the helpful action prun<strong>in</strong>g technique <strong>in</strong> the<br />

Conformant-FF planner. The key idea is to change the way<br />

it deals with helpful actions and first consider actions from<br />

the so-called implication path which was used by<br />

Conformant-FF for conclud<strong>in</strong>g which subgoal would be<br />

considered known to be true <strong>in</strong> the relaxed plann<strong>in</strong>g graph.<br />

We first po<strong>in</strong>t out the semantics of solv<strong>in</strong>g by cases,<br />

<strong>in</strong>dicated by the implication paths of the relaxed plann<strong>in</strong>g<br />

process. In l<strong>in</strong>e with the semantics, we then propose our<br />

heuristic idea of us<strong>in</strong>g these implication paths further by<br />

attempt<strong>in</strong>g to collect certa<strong>in</strong> groups of helpful actions such<br />

that execut<strong>in</strong>g all actions with<strong>in</strong> a group can achieve some<br />

subgoal while execut<strong>in</strong>g an <strong>in</strong>dividual action <strong>in</strong> the group<br />

cannot due to <strong>in</strong>complete <strong>in</strong>formation. This technique<br />

usually leads to the goal faster and cuts down the search<br />

space dramatically. We evaluate the idea experimentally. In<br />

a number of conformant benchmarks, our heuristic<br />

prun<strong>in</strong>g technique outperforms helpful actions prun<strong>in</strong>g <strong>in</strong><br />

both plann<strong>in</strong>g efficiency and the size of search space.<br />

Index Terms—Helpful actions, Conformant-FF, Heuristic<br />

Prun<strong>in</strong>g, Belief state<br />

I. INTRODUCTION<br />

Plann<strong>in</strong>g is an area of Artificial Intelligence that<br />

studies choos<strong>in</strong>g and organiz<strong>in</strong>g actions to achieve some<br />

objectives. Over the last few years we have seen a<br />

significant <strong>in</strong>crease of the efficiency of plann<strong>in</strong>g systems<br />

[1, 2]. There are several promis<strong>in</strong>g approaches <strong>in</strong> plan<br />

generation <strong>in</strong>clud<strong>in</strong>g plann<strong>in</strong>g graph analysis [3, 4],<br />

plann<strong>in</strong>g as satisfiability [5] and heuristic search<br />

plann<strong>in</strong>g [6, 7, 8]. Classical plann<strong>in</strong>g refers to plann<strong>in</strong>g<br />

under a restricted model which is determ<strong>in</strong>istic, static,<br />

f<strong>in</strong>ite and fully observable with restricted goals and<br />

implicit time. However, these assumptions are often<br />

unrealistic when model<strong>in</strong>g real-world tasks. For <strong>in</strong>stance,<br />

the <strong>in</strong>itial state may be <strong>in</strong>completely specified, actions<br />

may have non-determ<strong>in</strong>istic effects or the environment<br />

Manuscript received July 1, 2012; revised October 6, 2012; accepted<br />

October 11, 2012.<br />

Correspond<strong>in</strong>g author: Dantong Ouyang<br />

may be only partially observable. Several <strong>in</strong>terest<strong>in</strong>g<br />

models are obta<strong>in</strong>ed by relax<strong>in</strong>g some of the restrictive<br />

assumptions. Conformant plann<strong>in</strong>g is the problem of<br />

f<strong>in</strong>d<strong>in</strong>g a plan that guarantees goal achievement given<br />

nondeterm<strong>in</strong>istic <strong>in</strong>itial state or action effects, and no<br />

<strong>in</strong>formation can be observed at run time. A conformant<br />

plan is a sequence of actions that should be successful to<br />

achieve the goal regardless of uncerta<strong>in</strong>ty about the<br />

<strong>in</strong>itial state and action effects. Therefore, conformant<br />

plann<strong>in</strong>g turns out to be considerably harder than<br />

classical plann<strong>in</strong>g [9]. Effective approaches for<br />

conformant plann<strong>in</strong>g <strong>in</strong>clude heuristic guidance [10, 11],<br />

translation <strong>in</strong> to classical ones [12], approximation-based<br />

plann<strong>in</strong>g and so on [13].<br />

Heuristic search is one of the strongest trends <strong>in</strong> the<br />

plann<strong>in</strong>g community. We focus on the formulation that<br />

transfers a conformant plann<strong>in</strong>g task <strong>in</strong>to a search<br />

problem <strong>in</strong> the belief state space. In this way, uncerta<strong>in</strong>ty<br />

about the true current world state is modeled via a belief<br />

state, i.e., the set of world states that we consider<br />

possible at this time. Then a heuristic function is derived<br />

from the specification of the plann<strong>in</strong>g <strong>in</strong>stance and used<br />

for guid<strong>in</strong>g the search through the search space. FF’s<br />

heuristic function based on a relaxation of the plann<strong>in</strong>g<br />

task turns out to be the most successful idea <strong>in</strong> classical<br />

plann<strong>in</strong>g. Hoffmann and Brafman extended this<br />

technique to conformant plann<strong>in</strong>g and implemented the<br />

well known planner Conformant-FF [14]. In a number of<br />

benchmarks, Conformant-FF can provide very<br />

<strong>in</strong>formative heuristic values and shows f<strong>in</strong>e scalability.<br />

Conformant-FF uses the same overall search<br />

arrangement as FF, with reasonable modifications for<br />

conformant sett<strong>in</strong>g. In Conformant-FF, belief states are<br />

represented by an implicit approach where the truth<br />

values of all the propositions <strong>in</strong> a belief state are<br />

determ<strong>in</strong>ed us<strong>in</strong>g a CNF reason<strong>in</strong>g. FF’s relaxed<br />

plann<strong>in</strong>g process is also extended to handle conformant<br />

problems. For each action effect the relaxation is to<br />

ignore the effect’s delete list as well as all but one<br />

proposition of the effect’s condition. After build<strong>in</strong>g the<br />

relaxed plann<strong>in</strong>g graph successfully, a relaxed plan is<br />

extracted and the length of the relaxed plan is used to<br />

provide the heuristic value of the belief state. When<br />

solv<strong>in</strong>g the relaxed plann<strong>in</strong>g task for a belief state,<br />

implication relation is ma<strong>in</strong>ta<strong>in</strong>ed simultaneously to<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1385-1393


1386 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

capture constra<strong>in</strong>ts between propositions at adjacent time<br />

steps. Implication paths <strong>in</strong> this mach<strong>in</strong>ery can be used to<br />

check the truth value of uncerta<strong>in</strong> propositions when<br />

build<strong>in</strong>g the relaxed plann<strong>in</strong>g graph and to determ<strong>in</strong>e<br />

actions that must be <strong>in</strong>serted to the solution dur<strong>in</strong>g<br />

relaxed plan extraction. Besides the estimate of goal<br />

distance, Conformant-FF uses a prun<strong>in</strong>g technique of<br />

helpful actions select<strong>in</strong>g a set of promis<strong>in</strong>g successors to<br />

each search node.<br />

In conformant sett<strong>in</strong>g, we observe that some branches<br />

of the search tree are usually non-<strong>in</strong>dependent with each<br />

other when expand<strong>in</strong>g a belief state. All the actions on<br />

these branches will be <strong>in</strong>volved <strong>in</strong>to the f<strong>in</strong>al plan <strong>in</strong><br />

different search iterations. In this paper, we recognize<br />

such branches and consider them as a group. With that<br />

we propose a powerful prun<strong>in</strong>g technique suggested by<br />

implication paths when solv<strong>in</strong>g the relaxed plann<strong>in</strong>g task.<br />

Briefly, those actions which are <strong>in</strong>serted <strong>in</strong>to the relaxed<br />

plan by implication paths at the first time step concern<br />

the unknown propositions of the current belief state and<br />

thus permit to remove the uncerta<strong>in</strong>ty. We execute these<br />

actions <strong>in</strong> sequence with higher priority than other<br />

regular helpful action provided by Conformant-FF.<br />

Our novel usage of helpful actions is useful <strong>in</strong><br />

reduc<strong>in</strong>g the degree of uncerta<strong>in</strong>ty about the current<br />

belief state and get closer to the goal quickly. We run<br />

experiments to evaluate our idea. In a number of<br />

conformant benchmarks, the experimental results show<br />

that our prun<strong>in</strong>g technique can get a much smaller search<br />

space than before and improves the orig<strong>in</strong>al<br />

Conformant-FF system <strong>in</strong> both plann<strong>in</strong>g efficiency and<br />

the size of search space.<br />

The paper is organized as follows. In Section 2 we<br />

briefly describe the conformant plann<strong>in</strong>g framework we<br />

consider and give an overview of Conformant-FF’s<br />

architecture. In Section 3 we characterize the semantics<br />

of the implication paths <strong>in</strong> Conformant-FF firstly. Then<br />

we propose our idea of prun<strong>in</strong>g based on the usage of<br />

helpful actions, and illustrate the enforced hill-climb<strong>in</strong>g<br />

procedure adopt<strong>in</strong>g this prun<strong>in</strong>g technique. Section 4<br />

gives the experimental results and our analysis. We<br />

conclude the paper <strong>in</strong> Section 5.<br />

II. BACKGROUND<br />

A. Conformant plann<strong>in</strong>g problem<br />

The conformant plann<strong>in</strong>g problem considered <strong>in</strong> this<br />

paper extends a subset of the ADL language with<br />

uncerta<strong>in</strong>ty about the <strong>in</strong>itial state. The extensions to<br />

handle uncerta<strong>in</strong>ty about effects are conceptually<br />

straightforward by tak<strong>in</strong>g account of the<br />

non-determ<strong>in</strong>istic effects when comput<strong>in</strong>g state<br />

transitions.<br />

Def<strong>in</strong>ition 1 (Conformant plann<strong>in</strong>g problem)<br />

A conformant plann<strong>in</strong>g problem P is a triple (A, I, G)<br />

where A corresponds the action set, I is a propositional<br />

CNF formula denot<strong>in</strong>g the possible <strong>in</strong>itial world states<br />

and G is an non-empty set of propositions def<strong>in</strong><strong>in</strong>g the<br />

goal conditions.<br />

The <strong>in</strong>itial situation is a belief state represented by a<br />

propositional CNF formula I. Any world state that<br />

satisfies this formula is a possible <strong>in</strong>itial state. We use S I<br />

to denote the <strong>in</strong>itial belief state. An action a is a pair of<br />

(pre(a), E(a)) where pre(a) is a set of propositions<br />

represent<strong>in</strong>g the preconditions and E(a) is a set of<br />

conditional effects. A conditional effect e is a triple<br />

(con(e), add(e), del(e)) that correspond to e’s condition,<br />

add list and delete list respectively. An action a is<br />

applicable <strong>in</strong> a world state w if pre(a) w, i.e., all of a’s<br />

preconditions are satisfied <strong>in</strong> w. If action a is applicable<br />

<strong>in</strong> w, then all conditional effects eE(a) that satisfies<br />

con(e) w get executed. Execut<strong>in</strong>g a conditional effect e<br />

results <strong>in</strong> the world state w- del(e)∪add(e).<br />

Def<strong>in</strong>ition 2 (Conformant plan)<br />

An action sequence actA* is a conformant plan for<br />

problem P if, no matter what <strong>in</strong>itial world state one starts<br />

from, all actions <strong>in</strong> act are applicable at their po<strong>in</strong>t of<br />

execution and the associate run results <strong>in</strong> a goal state.<br />

B. Conformant-FF system<br />

Conformant-FF system transforms a conformant<br />

plann<strong>in</strong>g problem <strong>in</strong>to a search problem <strong>in</strong> belief state<br />

space. A belief state S is represented by the <strong>in</strong>itial belief<br />

state formula together with the action sequence that leads<br />

to S. For each belief state encountered dur<strong>in</strong>g search, the<br />

sets of known, negatively known and unknown<br />

proposition are computed. Given a conformant plann<strong>in</strong>g<br />

problem, a belief state S reached by an action sequence<br />

act and a proposition p, p is known <strong>in</strong> S if p is conta<strong>in</strong>ed<br />

<strong>in</strong> the <strong>in</strong>tersection of the worlds <strong>in</strong> S, i.e., p is always true<br />

after execut<strong>in</strong>g act and equally p is negatively known <strong>in</strong><br />

S if p is always false after execut<strong>in</strong>g act. A proposition p<br />

is unknown <strong>in</strong> S if it is neither known nor negatively<br />

known. The truth value of a proposition <strong>in</strong> a belief state<br />

can be computed by a SAT solver check<strong>in</strong>g the CNF<br />

formula that captures the semantics of the respective<br />

action sequence.<br />

Conformant-FF’s overall architecture is identical to<br />

FF system, illustrated <strong>in</strong> Fig. 1. The basic search<br />

algorithm is enforced hill-climb<strong>in</strong>g which comb<strong>in</strong>es local<br />

and systematic search. Start<strong>in</strong>g from current search state<br />

S, enforced hill-climb<strong>in</strong>g algorithm performs a<br />

breadth-first search for a better state S such that h(S) <<br />

Belief state S<br />

Conformant<br />

Plann<strong>in</strong>g problem<br />

Enforced hill-climb<strong>in</strong>g<br />

Relaxed plann<strong>in</strong>g task<br />

Plan/“Fail”<br />

Heuristic value h(S)<br />

Helpful actions H(S)<br />

Figure 1. Conformant-FF’s architecture<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1387<br />

h(S). Here, h(S) denotes the heuristic value, and H(S)<br />

denotes the helpful actions, which are the considered<br />

actions when expand<strong>in</strong>g S. If a state with lower heuristic<br />

value was reached, then S= S, else the hill-climb<strong>in</strong>g fails,<br />

a complete best-first search is <strong>in</strong>voked to solve the<br />

problem from scratch.<br />

III. THE HEURISTIC TECHNIQUE OF HELPFUL ACTIONS<br />

Dur<strong>in</strong>g search, the considered successors of a search<br />

state are generated by the helpful actions <strong>in</strong> H(S). In<br />

classical plann<strong>in</strong>g, H(S) is the set of actions at the first<br />

level of the relaxed plann<strong>in</strong>g graph that add a subgoal of<br />

this level. In the conformant sett<strong>in</strong>g, H(S) is the set of<br />

such actions at the first level of the relaxed plann<strong>in</strong>g<br />

graph, plus those actions that are selected for an<br />

implication path dur<strong>in</strong>g relaxed plan extraction.<br />

In this section, we propose our heuristic idea of<br />

helpful actions prun<strong>in</strong>g, which can be used to reduce the<br />

search space further <strong>in</strong> the enforced hill-climb<strong>in</strong>g<br />

procedure of Conformant-FF. The idea is derived<br />

accord<strong>in</strong>g to the semantics of the relaxed plann<strong>in</strong>g graph<br />

and the implication paths. For the purpose of exposition,<br />

we first po<strong>in</strong>t out the relation between the implication<br />

paths of the relaxed plan and the uncerta<strong>in</strong> aspect of the<br />

estimated belief state.<br />

A. Semantics of implication paths<br />

Consider a simplified example from the Blockworld<br />

doma<strong>in</strong>.<br />

Example 1 There are four blocks, b1, b2, b3 and b4.<br />

Initially b2, b3 and b4 are on the table and b1 is on b2 or<br />

b3. The <strong>in</strong>itial situation of b1 is not known, modeled as<br />

oneof((on b1 b2), (on b1 b3)). The goal is (on b1 table)<br />

and (on b4 b1). We have a simple (move b from to)<br />

action that can change the location of the blocks. The<br />

graphical sketch of this example is given <strong>in</strong> Fig. 2.<br />

To get the heuristic value, the relaxed task start<strong>in</strong>g<br />

from the <strong>in</strong>itial belief state is solved. In Fig. 3 we give<br />

the conformant relaxed plann<strong>in</strong>g graph built for Example<br />

1. Proposition layers P(t) and action layers A(t) are built<br />

alternatively. Propositions on the dashed area are<br />

unknown at their respective layers. Dashed l<strong>in</strong>es denote<br />

implication edges between two adjacent proposition<br />

layers and empty actions are represented by dots.<br />

We f<strong>in</strong>d that A(0) only <strong>in</strong>cludes actions given by<br />

implication edges plus some empty actions NOOP. The<br />

implication edges yielded by A(0) are:<br />

(move b1 b2 table): (on b1 b2)(0)→(on b1 table)(1)<br />

(move b1 b3 table): (on b1 b3)(0)→(on b1 table)(1)<br />

(move b1 b2 b4): (on b1 b2)(0)→(on b1 b4)(1)<br />

(move b1 b3 b4): (on b1 b3)(0)→(on b1 b4)(1)<br />

NOOP: (on b1 b2)(0)→(on b1 b2)(1)<br />

NOOP: (on b1 b3)(0)→(on b1 b3)(1).<br />

Here, timed implication edges represent that the truth<br />

values of some propositions at layer t are uncerta<strong>in</strong> and<br />

usually depend on their truth values at layer t-1.<br />

b1 b1<br />

b2 b3 b4<br />

table<br />

b4<br />

b1<br />

Initial situation<br />

b2<br />

Goal<br />

b3<br />

table<br />

Figure 2. An example of Blockworld<br />

Relaxed plan extraction starts with G 2 (S I )={(on b1<br />

table), (on b4 b1)}. The subgoal (on b1 table) is <strong>in</strong>serted<br />

at layer 1 of its first appearance. (on b1 b4) is not a<br />

subgoal s<strong>in</strong>ce it does not contribute to achieve the goal.<br />

However, there is no action <strong>in</strong> A(0) that can guarantee<br />

achievement of (on b1 table). Accord<strong>in</strong>g to implication<br />

edges, to make (on b1 table) true at layer 1, we have to<br />

check the truth value of (on b1 b2) or (on b1 b3) at layer<br />

0. In Conformant-FF, the implication edges of subgoal<br />

g(t) form an Imp tree <strong>in</strong> the relaxed plann<strong>in</strong>g graph<br />

between the lowest layer and layer t. For the subgoal g(t)<br />

that is not proved to be true at t, it is checked if the<br />

current state formula implies the disjunction of the leafs<br />

<strong>in</strong> the Imp tree, where the leafs are all the propositions <strong>in</strong><br />

the current belief state whose truth values determ<strong>in</strong>e the<br />

truth value of g at layer t. Impleafs(g(t)) is the set of such<br />

proposition leafs that are reachable from g(t) and then<br />

m<strong>in</strong>_Impleafs(g(t)) is computed to be the m<strong>in</strong>imal subset<br />

of Impleafs(g(t)). For this example, we get m<strong>in</strong>_Impleafs<br />

((on b1 table)(1))={(on b1 b2)(0), (on b1 b3)(0)} whose<br />

disjunction is obviously implied by the <strong>in</strong>itial state<br />

formula. Then we know that (on b1 table) can be<br />

achieved by (move b1 b2 table) or (move b1 b3 table).<br />

These two actions form the implication paths from<br />

m<strong>in</strong>_Impleafs ((on b1 table)(1)) to (on b1 table)(1). To<br />

guarantee (on b1 table) become true at layer 1, both of<br />

the two actions are selected <strong>in</strong>to the relaxed plan. Also<br />

these are collected as helpful actions. S<strong>in</strong>ce (on b1 b4) is<br />

not a necessary subgoal at layer 1, other actions of A(0)<br />

are not considered as helpful.<br />

For a subgoal g at layer t, sometimes there does not<br />

exists any support<strong>in</strong>g action that guarantees to always<br />

achieve g, i.e., any action with an effect that adds g and<br />

whose condition is known to hold at layer t-1. This<br />

complicated situation should trace back to the uncerta<strong>in</strong><br />

<strong>in</strong>itial state. Intuitively, g has been shown that at least<br />

one possible world state could make it true. To achieve g,<br />

implication paths for g are determ<strong>in</strong>ed from layer t go<strong>in</strong>g<br />

downwards to layer 0. All the actions that are responsible<br />

for the implication paths are selected at the respective<br />

times. m<strong>in</strong>_Impleafs(g(t)) is computed by a back<br />

cha<strong>in</strong><strong>in</strong>g loop over the implication edges end<strong>in</strong>g <strong>in</strong> g(t)<br />

and it must be a subset of unknown propositions at layer<br />

0, which corresponds to the uncerta<strong>in</strong> aspect of the<br />

estimated belief state. Check<strong>in</strong>g out the disjunction of the<br />

© 2013 ACADEMY PUBLISHER


1388 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

P(0)<br />

A(0)<br />

P(1)<br />

A(1)<br />

P(2)<br />

…<br />

…<br />

(on b2 table)<br />

(on b3 table)<br />

(on b4 table)<br />

(on b1 b2)<br />

(on b1 b3)<br />

(move b1 b2 table)<br />

(move b1 b3 table)<br />

(move b1 b2 b4)<br />

(move b1 b3 b4)<br />

(on b1 table)<br />

(on b2 table)<br />

(on b3 table)<br />

(on b4 table)<br />

(on b1 b2)<br />

(on b1 b3)<br />

(on b1 b4)<br />

(move b4 table b1)<br />

(on b4 b1)<br />

(on b1 table)<br />

(on b2 table)<br />

(on b3 table)<br />

(on b4 table)<br />

(on b1 b2)<br />

(on b1 b3)<br />

(on b1 b4)<br />

Figure 3. The relaxed plann<strong>in</strong>g graph for the <strong>in</strong>itial belief state<br />

m<strong>in</strong>_Impleafs(g(t)) aga<strong>in</strong>st the current state formula, g<br />

can be proved to be always true at layer t <strong>in</strong> the relaxed<br />

plann<strong>in</strong>g procedure. Each implication path from g(t) to<br />

one of its leaf corresponds to an action sequence that is<br />

executable <strong>in</strong> a particular current world state. Try<strong>in</strong>g out<br />

all these actions <strong>in</strong> the current belief state is the only way<br />

to make g to be true <strong>in</strong> despite of the uncerta<strong>in</strong>ty arisen<br />

from <strong>in</strong>itial state. This way, we remark that implication<br />

paths capture a form of solv<strong>in</strong>g by cases.<br />

In Example 1, as the situation of b1 is unknown,<br />

implication paths <strong>in</strong> the relaxed plan <strong>in</strong>dicate that action<br />

(move b1 b2 table) achieves (on b1 table) if (on b1 b2) is<br />

true <strong>in</strong> the <strong>in</strong>itial world state, otherwise action (move b1<br />

b3 table) achieves (on b1 table). S<strong>in</strong>ce b1 is only at one<br />

of the two locations, execut<strong>in</strong>g these two actions one by<br />

one could guarantee to make (on b1 table) true. Namely,<br />

given uncerta<strong>in</strong>ty about the <strong>in</strong>itial state, to solve the task,<br />

a plan must be able to solve each possible <strong>in</strong>itial world<br />

state.<br />

B. Prun<strong>in</strong>g of helpful implication paths<br />

In l<strong>in</strong>e with our analysis of implication paths, we give<br />

our chang<strong>in</strong>g on the usage of helpful actions dur<strong>in</strong>g<br />

search. To illustrate the algorithm, let us reconsider<br />

Example 1. After solv<strong>in</strong>g the relaxed plann<strong>in</strong>g task, we<br />

get the heuristic value supplied by the relaxed plan and<br />

collect the helpful actions. This <strong>in</strong>formation helps to lead<br />

the search procedure. The helpful actions here are (move<br />

b1 b2 table) and (move b1 b3 table), given by<br />

implication paths at the lowest level of the relaxed plan.<br />

These are the restricted choices to expand the estimated<br />

belief state. We get two successors by expand<strong>in</strong>g the<br />

belief state with these actions. Enforced hill-climb<strong>in</strong>g<br />

will perform an exhaustive search to select a better<br />

successor. In this example we f<strong>in</strong>d out that both<br />

successors generated by these two actions can give better<br />

heuristic evaluations. Thus to reach the subgoal (on b1<br />

table) for sure, search is iterated start<strong>in</strong>g from the<br />

<strong>in</strong>termediate state and the other action is also <strong>in</strong>volved<br />

<strong>in</strong>to the f<strong>in</strong>al plan.<br />

Based on the solv<strong>in</strong>g by cases semantics of<br />

implication paths, we pursue the idea of consider<strong>in</strong>g<br />

implication paths for some subgoal as a group of actions.<br />

The observation that forms our basic idea is obta<strong>in</strong>ed<br />

from the back cha<strong>in</strong><strong>in</strong>g process to determ<strong>in</strong>e implication<br />

paths dur<strong>in</strong>g the extraction of relaxed plan. Actually the<br />

implication paths <strong>in</strong> the relaxed plan are back cha<strong>in</strong>ed<br />

exactly to the uncerta<strong>in</strong> part of the estimated belief state<br />

and branches of the implication edges are used to deal<br />

with different possible world states <strong>in</strong> current belief state.<br />

To construct a conformant plan, all the actions that refer<br />

to uncerta<strong>in</strong>ty about the current belief state are necessary.<br />

Like helpful actions, we restrict to actions that are part<br />

of the implication paths and are at the lowest layer, i.e.,<br />

those that could be select to start the relaxed plan.<br />

Def<strong>in</strong>ition 3 Given the current belief state S, suppose<br />

rplan is the extracted relaxed plan, H(S) is the set of<br />

helpful actions and m<strong>in</strong>_Impleafs(g(t)) is the determ<strong>in</strong>ed<br />

m<strong>in</strong>imal subset of leafs for subgoal g of step t, the set of<br />

implication helpful actions achiev<strong>in</strong>g subgoal g(t) is<br />

def<strong>in</strong>ed as follows:<br />

imp_H(g(t), S)={a | aH(S) and one conditional effect<br />

of a is responsible for an edge <strong>in</strong> rplan from<br />

m<strong>in</strong>_Impleafs(g(t)) to g(t)}.<br />

We call actions from imp_H(g(t), S) to be<br />

responsible to achieve the subgoal g(t). Selection of<br />

imp_H(g(t), S) is done as a set union operation to avoid<br />

any superfluous action. We <strong>in</strong>tegrate these actions <strong>in</strong>to<br />

an action sequence <strong>in</strong> an arbitrary order and use this<br />

sequence to expand the current search state. However,<br />

before mak<strong>in</strong>g the action sequence, we have to address<br />

the problem of the <strong>in</strong>terference between actions. In<br />

relaxed plann<strong>in</strong>g graph, delete effects of actions are<br />

ignored and the <strong>in</strong>terference situation is not visible. Here<br />

we focus on the situation that the effect on an edge of the<br />

implication path may delete preconditions of action that<br />

has an effect on another edge. Entailment of an action<br />

precondition is checked aga<strong>in</strong>st the known propositions,<br />

so delet<strong>in</strong>g of one precondition would cause that the<br />

action does not work at its po<strong>in</strong>t of the sequence. We<br />

observe that conditional effects on the implication edges<br />

of the first layer refer to different world state. These<br />

effects do not <strong>in</strong>terfere with each other generally s<strong>in</strong>ce<br />

the possible current states are usually mutually exclusive.<br />

We call imp_H(g(t), S) to be executable if it can be made<br />

<strong>in</strong>to a sequence and each action is executable at the<br />

respective time. As imp_H(g(t), S) is selected from<br />

implication paths for subgoal g, to dist<strong>in</strong>guish from the<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1389<br />

regular helpful actions, we call them helpful implication<br />

paths for g(t).<br />

Def<strong>in</strong>ition 4 Given the belief state S, the set of helpful<br />

implication paths to S is def<strong>in</strong>ed as follows:<br />

HIP(S)={ imp_H(g(t), S) | g is a subgoal at time step<br />

t of the extracted relaxed plan and imp_H(g(t), S) is<br />

executable}.<br />

What we do <strong>in</strong> pr<strong>in</strong>ciple is to recognize and pick a<br />

group of actions that contribute to achieve a subgoal out<br />

of helpful actions. The notion of helpful implication<br />

paths shares some similarities with helpful actions. In a<br />

nutshell, action sequences <strong>in</strong> the set of helpful<br />

implication paths are usually made up of several helpful<br />

actions, which are deemed to have more potential for<br />

reach<strong>in</strong>g a state with a much lower heuristic value. Thus<br />

helpful implication paths take precedence over other<br />

helpful actions dur<strong>in</strong>g expand<strong>in</strong>g. The enforced<br />

hill-climb<strong>in</strong>g procedure that adopts the prun<strong>in</strong>g<br />

technique is specified <strong>in</strong> Fig. 4. The <strong>in</strong>put of the<br />

procedure is the plann<strong>in</strong>g problem . The<br />

procedure outputs the plan if the goal is achieved<br />

successfully, otherwise it returns “Fail” if the enforced<br />

hill-climb<strong>in</strong>g can not get any better state before the goal<br />

state.<br />

The search procedure starts out <strong>in</strong> the <strong>in</strong>itial belief<br />

state. Fac<strong>in</strong>g an <strong>in</strong>termediate search state S, the<br />

Search_for_better_state() procedure is <strong>in</strong>voked. Dur<strong>in</strong>g<br />

search, states are kept <strong>in</strong> a queue. In each iteration<br />

process, the first state is removed from the queue and<br />

evaluated. If the evaluation is lower than the current<br />

heuristic value, the iteration gets a better state. Otherwise,<br />

the removed state is expanded. Our implementation puts<br />

the successors generated by HIP(S) <strong>in</strong> the queue with<br />

higher priority beside the usual successors obta<strong>in</strong>ed by<br />

other regular helpful actions.<br />

Procedure EhcSearch-HIP(, plan)<br />

1 Initialize S to be the <strong>in</strong>itial belief state;<br />

2 Initialize the search queue U to be empty<br />

3 plan= ;<br />

4 while h(S) != 0 do<br />

5 Put S <strong>in</strong> the queue U;<br />

6 if (Search_for_better_state(S, h(S), S, h(S ))) then<br />

7 add the path from S to S at the end of plan;<br />

8 S = S ;<br />

9 reset U to be empty;<br />

10 else<br />

11 output “Fail”, stop;<br />

12 endif<br />

13 endwhile<br />

Procedure Search_for_better_state(S, h(S), S, h(S ))<br />

14 while (true) do<br />

15 Remove the first node S <strong>in</strong> the queue;<br />

16 if h(S ) < h(S) then<br />

17 return true;<br />

18 endif<br />

19 Collect HIP(S)<br />

20 for each action sequence p <strong>in</strong> HIP(S)<br />

21 put the state generated through p to the end of U;<br />

22 for each of other regular helpful action a<br />

23 put the successor generated by a to the end of U;<br />

24 endwhile<br />

Figure 4. Enforced hill-climb<strong>in</strong>g with helpful implication paths<br />

prun<strong>in</strong>g<br />

Our implementation cuts down the branch<strong>in</strong>g factor<br />

further. Usually an action sequence from helpful<br />

implication paths could reach a search state a few steps<br />

away with a strictly better heuristic evaluation, which<br />

would be reached <strong>in</strong> several iterations when us<strong>in</strong>g<br />

helpful actions only. Thus, helpful implication paths<br />

offer some short cuts to better states. This way, the<br />

number of evaluated states is also reduced because only<br />

the two states that are at the beg<strong>in</strong>n<strong>in</strong>g and end po<strong>in</strong>t of<br />

the action sequence need to get evaluated and all the<br />

<strong>in</strong>termediate states on this path are ignored. To take<br />

everyth<strong>in</strong>g considered, we just leave other helpful<br />

actions beh<strong>in</strong>d and <strong>in</strong> this way our idea appears to be a<br />

tie break<strong>in</strong>g preference for the search procedure.<br />

In the above example, the two actions (move b1 b2<br />

table) and (move b1 b3 table) come from helpful<br />

implication paths for the subgoal (on b1 table)(1) of the<br />

relaxed plan. Fig. 5 illustrates our implementation of<br />

expand<strong>in</strong>g process. Grayed parts are computations that<br />

are saved by our prun<strong>in</strong>g. The two helpful actions are<br />

<strong>in</strong>tegrated <strong>in</strong>to an action sequence to expand the <strong>in</strong>itial<br />

belief state S I . A better belief state S 3 is generated<br />

immediately by this sequence. Our prun<strong>in</strong>g cuts down<br />

the branch<strong>in</strong>g factor from two to one and reaches the<br />

subgoal (on b1 table) with<strong>in</strong> one search iteration, which<br />

will be accomplished by the normal helpful actions <strong>in</strong><br />

two iterations. Moreover, the state evaluation of S 1 is<br />

avoided.<br />

As our specific implementation collects helpful<br />

implication paths amongst the helpful actions, we can get<br />

the helpful implication paths totally for free, as another<br />

important side effect of the basic heuristic method, more<br />

strictly, as a side effect of the helpful actions for<br />

conformant sett<strong>in</strong>g. Moreover, just like helpful actions,<br />

helpful implication paths prun<strong>in</strong>g do not preserve<br />

completeness as well, so the prun<strong>in</strong>g technique is only<br />

(move b1 b2 table)<br />

(move b1 b3 table)<br />

F: (on b2 table)<br />

(on b3 table)<br />

(on b4 table)<br />

U: (on b1 b3)<br />

(on b1 table)<br />

F: (on b1 table)<br />

(on b2 table)<br />

(on b3 table)<br />

(on b4 table)<br />

F: (on b2 table)<br />

(on b3 table)<br />

(on b4 table)<br />

U: (on b1 b2)<br />

(on b1 b3)<br />

S 1<br />

h(S 1 )=2<br />

S 3<br />

h(S 3 )=1<br />

S I<br />

h(S I )=3<br />

(move b1 b3 table)<br />

F: (on b2 table)<br />

(on b3 table)<br />

(on b4 table)<br />

U: (on b1 b2)<br />

(on b1 table)<br />

Figure 5. The expand<strong>in</strong>g procedure for the <strong>in</strong>itial belief state<br />

S 2<br />

© 2013 ACADEMY PUBLISHER


1390 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

adopted <strong>in</strong> the enforced hill-climb<strong>in</strong>g search, which is<br />

not complete anyway, and the complete best-first search<br />

procedure is unchanged. In all of our test doma<strong>in</strong>s, the<br />

tasks can be solved successfully <strong>in</strong> the enforced<br />

hill-climb<strong>in</strong>g procedure with our new prun<strong>in</strong>g technique.<br />

IV. EXPERIMENTAL RESULTS<br />

We implemented the heuristic prun<strong>in</strong>g technique<br />

presented <strong>in</strong> the previous sections and evaluated it on a<br />

number of conformant plann<strong>in</strong>g benchmarks. The<br />

experiments were run on a PC runn<strong>in</strong>g Ubuntu 8.0 at<br />

1.90 GHz with 1 GB ma<strong>in</strong> memory. There are three<br />

heuristic setups <strong>in</strong> Conformant-FF and most of the time<br />

they yield similar performance. We select to use the<br />

state-formula heuristic function which gives the most<br />

precise comput<strong>in</strong>g. It is enough to evaluate the power of<br />

the prun<strong>in</strong>g technique under one heuristic function setup.<br />

The <strong>in</strong>dividual doma<strong>in</strong>s are described below respectively.<br />

For each problem we provide the runtime <strong>in</strong> seconds, the<br />

number of evaluated states dur<strong>in</strong>g search and the length<br />

of the found plan of the plann<strong>in</strong>g system that adopts our<br />

helpful implication paths prun<strong>in</strong>g and the orig<strong>in</strong>al helpful<br />

actions prun<strong>in</strong>g, respectively.<br />

A. The Uts doma<strong>in</strong><br />

The Uts doma<strong>in</strong> describes a series of tasks of universal<br />

transversal sequences. In this doma<strong>in</strong>, one is <strong>in</strong>itially<br />

located at any node on a graph with n nodes. Some nodes<br />

on the graph are connected by edges. One can execute<br />

the action “start” to switch to a “started” phase and make<br />

the current node visited. After started, one can “travel”<br />

through edges to change the locations and visit other<br />

nodes. The goal is to visit all the nodes with the <strong>in</strong>itial<br />

location uncerta<strong>in</strong>. There are three different test suites,<br />

k-n, l-n, r-n, correspond<strong>in</strong>g to tasks with different extents<br />

to which the graph is connected, where the number of<br />

nodes <strong>in</strong> 2n. Tab. 1 provides our experimental results <strong>in</strong><br />

the Uts doma<strong>in</strong>. “US” <strong>in</strong>dicates that the problem is<br />

unsolvable.<br />

From a quick glance, our idea improves the helpful<br />

actions prun<strong>in</strong>g significantly. To make every node<br />

visited eventually, a subgoal that gets to a “started”<br />

phase is required at first. S<strong>in</strong>ce the <strong>in</strong>itial location is<br />

unknown, one should apply a start action to each<br />

possible <strong>in</strong>itial location. Intuitively, the number of the<br />

required start actions is equal to the number of nodes <strong>in</strong> a<br />

task. Conformant-FF recognizes these helpful actions<br />

and to assure the “started” subgoal, these actions are<br />

applied one after another until all of them are <strong>in</strong>cluded<br />

<strong>in</strong>to the plan. For a task with 2n nodes, the subgoal<br />

becomes true after 2n search iterations. In our<br />

implementation, all these actions form helpful<br />

implication paths for the “started” subgoal. Us<strong>in</strong>g helpful<br />

implication path prun<strong>in</strong>g technique to expand the <strong>in</strong>itial<br />

belief state, the subgoal becomes true <strong>in</strong> the second<br />

search iteration <strong>in</strong> despite of the number of nodes <strong>in</strong> the<br />

task.<br />

Our prun<strong>in</strong>g technique of helpful implication paths<br />

leads to a decrease of evaluated states which refers to the<br />

TABLE I.<br />

RESULTS IN THE UTS DOMAIN<br />

Helpful implication paths Helpful actions<br />

T (s) S L T (s) S L<br />

k-01 0.00 2 4 0.01 4 4<br />

k-02 0.00 4 10 0.01 10 10<br />

k-03 0.01 6 16 0.04 16 16<br />

k-04 0.01 8 22 0.22 22 22<br />

k-05 0.02 10 28 0.83 28 28<br />

k-06 0.02 12 34 1.81 34 34<br />

k-07 0.04 14 40 4.45 40 40<br />

k-08 0.07 16 46 10.25 46 46<br />

k-09 0.12 18 52 23.58 52 52<br />

k-10 0.20 20 58 45.95 58 58<br />

l-01 0.00 2 4 0.00 4 4<br />

l-02 0.01 7 12 0.02 14 11<br />

l-03 0.01 17 24 0.03 28 22<br />

l-04 0.03 26 35 0.11 41 34<br />

l-05 0.08 40 51 0.39 56 48<br />

l-06 0.20 57 66 1.23 73 64<br />

l-07 0.42 76 86 3.03 92 82<br />

l-08 1.25 104 105 6.29 113 102<br />

l-09 2.48 129 129 16.95 136 124<br />

l-10 4.04 171 152 41.28 161 148<br />

r-01 0.00 1 US 0.00 1 US<br />

r-02 0.00 1 US 0.00 1 US<br />

r-03 0.00 8 8 0.02 17 16<br />

r-04 0.01 20 32 0.14 34 25<br />

r-05 0.04 29 37 3.23 1021 37<br />

r-06 0.08 28 47 18.18 4071 41<br />

r-07 0.26 52 53 2.63 74 45<br />

r-08 0.27 36 55 7.24 83 50<br />

r-09 0.17 40 56 13.59 112 58<br />

r-10 0.78 64 72 40.18 156 69<br />

size of search space. Most strik<strong>in</strong>gly, the number of<br />

evaluated states is even a lot smaller than the plan length<br />

<strong>in</strong> some problems. This means that helpful implication<br />

paths contribute to f<strong>in</strong>d a fragment of the plan with<strong>in</strong> one<br />

search iteration and don’t have to compute the heuristic<br />

values for all the states that are along the search path<br />

correspond<strong>in</strong>g to the plan. With the number of evaluated<br />

states decreased, the efficiency is improved dramatically.<br />

Regard<strong>in</strong>g runtime, our implementation is much superior<br />

and scales up more easily. We f<strong>in</strong>d that sometimes the<br />

plan length of our idea is a little longer due to the order<br />

of actions <strong>in</strong> the plan sequence. This, however, does not<br />

affect the plan quality seriously, s<strong>in</strong>ce Conformant-FF<br />

does not guarantee to f<strong>in</strong>d an optimal plan anyway.<br />

B. The Safe doma<strong>in</strong><br />

In the Safe doma<strong>in</strong>, there are several possible<br />

comb<strong>in</strong>ations for a safe. The right comb<strong>in</strong>ation is one out<br />

of these comb<strong>in</strong>ations which is <strong>in</strong>itially unknown. The<br />

goal is to get the safe door open. To assure the goal, one<br />

must “try” all comb<strong>in</strong>ations exhaustively. Tab. 2 and Tab.<br />

3 provides the experimental results for <strong>in</strong>stances with n<br />

possible comb<strong>in</strong>ations. “-” <strong>in</strong>dicates time-out, with a<br />

runtime cutoff 1200s.<br />

The plan for any problem <strong>in</strong> this doma<strong>in</strong> is to try all<br />

comb<strong>in</strong>ations <strong>in</strong> some order. In Conformant-FF’s<br />

implementation, the number of evaluated states is equal<br />

to the plan length, i.e., the number of possible<br />

comb<strong>in</strong>ations <strong>in</strong> the task. For each visited state, the goal<br />

proposition safe-open appears at the first layer of the<br />

relaxed plann<strong>in</strong>g graph, provid<strong>in</strong>g all the try actions at<br />

first layer that have not been applied as helpful actions.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1391<br />

TABLE II.<br />

RESULTS IN THE SAFE DOMAIN-1<br />

Helpful implication paths<br />

Helpful actions<br />

T (s) S L T (s) S L<br />

s5 0.00 1 5 0.00 5 5<br />

s10 0.01 1 10 0.03 10 10<br />

s30 0.14 1 30 3.87 30 30<br />

s50 1.34 1 50 72.87 50 50<br />

s70 6.06 1 70 368.74 70 70<br />

s100 28.22 1 100 - - -<br />

TABLE III.<br />

RESULTS IN THE SAFE DOMAIN-2<br />

Helpful implication paths Helpful actions -D<br />

T (s) S L T (s) S L<br />

s5 0.00 1 5 0.00 5 5<br />

s10 0.01 1 10 0.01 10 10<br />

s30 0.14 1 30 0.22 30 30<br />

s50 1.34 1 50 2.18 50 50<br />

s70 6.06 1 70 8.92 70 70<br />

s100 28.22 1 100 35.01 100 100<br />

Execut<strong>in</strong>g one of these helpful actions will get to a<br />

state closer to the goal. Such iterations are repeated until<br />

the goal is reached. Us<strong>in</strong>g our prun<strong>in</strong>g technique, all the<br />

try actions are selected as helpful implication paths <strong>in</strong> the<br />

first search iteration. After execut<strong>in</strong>g the helpful<br />

implication paths <strong>in</strong> the <strong>in</strong>itial belief state, the goal<br />

becomes known <strong>in</strong> the second iteration and the task is<br />

solved successfully. For tasks <strong>in</strong> different sizes, our idea<br />

can f<strong>in</strong>d plans by evaluat<strong>in</strong>g only one state.<br />

Regard<strong>in</strong>g runtime, our implementation behaves much<br />

faster. The poor runtime performance of Conformant-FF<br />

is also due to the special structure of the Safe doma<strong>in</strong><br />

that no proposition becomes known until the task is<br />

solved. As the number of possible comb<strong>in</strong>ations<br />

<strong>in</strong>creases, Conformant-FF gets <strong>in</strong> trouble with repeated<br />

states check<strong>in</strong>g. Helpful actions -D refers to the option<br />

that turns the repeated states check<strong>in</strong>g off, at this time the<br />

orig<strong>in</strong>al planner can solve the tasks quickly. Generally,<br />

our prun<strong>in</strong>g technique is still competitive <strong>in</strong> this doma<strong>in</strong><br />

with the helpful actions of Conformant-FF without<br />

repeated states check<strong>in</strong>g.<br />

C. The Dispose doma<strong>in</strong><br />

The Dispose doma<strong>in</strong> is a variation of Grid family,<br />

which is about pick<strong>in</strong>g objects and dropp<strong>in</strong>g them <strong>in</strong>to a<br />

trash. Initially the locations of all the objects are<br />

uncerta<strong>in</strong> and the location of the trash is given. One starts<br />

from a given location and can “move” between two<br />

adjacent locations. One can “pickup” an object with a<br />

condition that the object is at the current location. One<br />

can also “drop” an object <strong>in</strong>to a trash if the trash is at the<br />

current location. The goal is to get all the objects<br />

disposed of <strong>in</strong> the trash. Tab. 4 shows our results <strong>in</strong> the<br />

Dispose doma<strong>in</strong>.<br />

Once aga<strong>in</strong>, the old helpful action prun<strong>in</strong>g technique<br />

evaluates much more states and performs a lot worse. To<br />

drop an object <strong>in</strong>to a trash, one has to guarantee that the<br />

object is held <strong>in</strong> hand. Given that the <strong>in</strong>itial locations of<br />

the objects are unknown, a conformant plan should<br />

execute a pickup action for each object at all the possible<br />

TABLE IV.<br />

RESULTS IN THE DISPOSE DOMAIN<br />

Helpful implication paths Helpful actions<br />

T (s) S L T (s) S L<br />

2-1 0.00 9 9 0.00 11 9<br />

2-2 0.00 10 14 0.01 16 14<br />

2-3 0.01 11 19 0.02 21 19<br />

2-4 0.01 12 24 0.03 26 24<br />

2-5 0.02 13 29 0.04 31 29<br />

2-6 0.02 14 34 0.08 36 34<br />

2-7 0.04 15 39 0.13 41 39<br />

2-8 0.07 16 44 0.23 46 44<br />

2-9 0.10 17 49 0.32 51 49<br />

2-10 0.13 18 54 0.49 56 54<br />

3-1 0.00 25 20 0.01 36 24<br />

3-2 0.04 26 30 0.07 46 34<br />

3-3 0.15 27 40 0.30 56 44<br />

3-4 0.41 28 50 0.80 66 54<br />

3-5 0.66 29 60 1.84 76 64<br />

3-6 1.15 30 70 2.55 86 74<br />

3-7 2.11 31 80 5.53 96 84<br />

3-8 3.26 32 90 10.98 106 94<br />

3-9 5.17 33 100 18.11 116 104<br />

3-10 8.77 34 110 32.24 126 114<br />

4-1 0.06 61 43 0.07 61 39<br />

4-2 0.78 62 60 0.79 78 56<br />

4-3 1.94 63 77 2.37 95 73<br />

4-4 5.59 64 94 7.94 112 90<br />

4-5 18.09 65 111 27.82 129 107<br />

4-6 25.84 66 128 46.22 146 124<br />

4-7 47.63 67 145 93.87 163 140<br />

4-8 73.42 68 162 156.43 180 158<br />

4-9 189.02 69 179 462.63 197 175<br />

4-10 207.30 72 183 508.43 202 180<br />

locations. We observed that our prun<strong>in</strong>g technique<br />

explores a much smaller search space. As the size of the<br />

problem <strong>in</strong>creases, heuristic evaluation becomes more<br />

costly and the runtime spent mostly goes <strong>in</strong>to the<br />

computation of heuristic estimations, thus the reduction<br />

of search space is quite significant. Regard<strong>in</strong>g plan<br />

length, our implementation is somewhat longer <strong>in</strong> a few<br />

cases. But still the quality of the found plan is satisfy<strong>in</strong>g.<br />

D. The Logistics doma<strong>in</strong><br />

Logistics we consider <strong>in</strong> this section is a classical<br />

plann<strong>in</strong>g doma<strong>in</strong> enriched with uncerta<strong>in</strong>ty. A package<br />

can be loaded onto a truck if the package is at the same<br />

location as the truck. Packages are transported by trucks<br />

between different positions of a city. Airplanes fly<br />

between different cities. Instances <strong>in</strong> Tab. 5 are<br />

generated by choos<strong>in</strong>g the <strong>in</strong>itial positions of the trucks<br />

and airplanes, the <strong>in</strong>itial positions and goal positions of<br />

packages randomly. The uncerta<strong>in</strong>ty lies <strong>in</strong> the <strong>in</strong>itial<br />

position of each package with<strong>in</strong> its orig<strong>in</strong> city.<br />

Results from Tab. 4 show that the prun<strong>in</strong>g of helpful<br />

implication paths is generally competitive or faster,<br />

compared to helpful actions. Our prun<strong>in</strong>g technique<br />

avoids the computation of heuristic values for some<br />

search states which helps to save the runtime<br />

considerably. In the relatively small cases, the behavior<br />

of helpful implication path prun<strong>in</strong>g is not obvious that<br />

much. Large cases with 10 packages, cities, trucks and<br />

airplanes reveal the power of the prun<strong>in</strong>g strategy and<br />

show that our implementation scales better to large<br />

<strong>in</strong>stances. With respect to the plan quality, our technique<br />

© 2013 ACADEMY PUBLISHER


1392 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

TABLE V.<br />

RESULTS IN THE LOGISTICS DOMAIN<br />

Helpful implication paths<br />

Helpful actions<br />

T (s) S L T (s) S L<br />

2-2-2 0.00 16 16 0.00 23 16<br />

2-2-4 0.00 23 26 0.00 34 26<br />

2-3-2 0.01 19 17 0.00 37 17<br />

2-3-3 0.01 36 24 0.01 46 24<br />

2-10-10 0.89 211 83 3.59 324 83<br />

3-2-2 0.01 23 20 0.01 29 20<br />

3-2-4 0.01 29 33 0.02 36 33<br />

3-3-2 0.01 36 28 0.02 55 28<br />

3-3-3 0.01 32 32 0.07 72 34<br />

3-10-10 3.09 427 112 10.95 435 108<br />

4-2-2 0.00 15 19 0.01 19 19<br />

4-2-4 0.01 36 40 0.08 59 40<br />

4-3-2 0.00 24 23 0.01 31 23<br />

4-3-3 0.02 48 37 0.07 70 37<br />

4-10-10 2.51 281 127 11.45 356 121<br />

is a little longer only <strong>in</strong> two problems. In most of the<br />

time, our prun<strong>in</strong>g of helpful implication paths f<strong>in</strong>ds<br />

exactly the same conformant plan as the situation of<br />

helpful actions prun<strong>in</strong>g.<br />

All <strong>in</strong> all, from the experimental results above, we<br />

conclude that our prun<strong>in</strong>g technique has the potential to<br />

reduce the size of search space and consequently<br />

improve the runtime efficiency. In this aspect we<br />

consider that our idea is clearly superior to helpful<br />

actions technique.<br />

V. CONCLUSION<br />

In this paper, we addressed the Conformant-FF<br />

planner which solves conformant plann<strong>in</strong>g problem by<br />

belief state space search. The size of search space has<br />

been a bottleneck to this method which could be<br />

ameliorated by us<strong>in</strong>g heuristic function and prun<strong>in</strong>g.<br />

Based on our analysis of the implication paths <strong>in</strong> the<br />

relaxed plann<strong>in</strong>g heuristic function, we proposed the<br />

prun<strong>in</strong>g technique of helpful implications paths to reduce<br />

the search space further. We run a number of conformant<br />

benchmarks to evaluate our idea and the experimental<br />

results <strong>in</strong>dicate that our heuristic technique has two<br />

advantages:<br />

1) An action sequence that <strong>in</strong>tegrates several helpful<br />

action branches together usually cuts down the branch<strong>in</strong>g<br />

factor of a search state. At the same time, consider<strong>in</strong>g<br />

helpful implication paths over other branches often f<strong>in</strong>ds<br />

a better state faster.<br />

2) Execut<strong>in</strong>g a helpful implication path can get to a<br />

better state a few steps away with<strong>in</strong> one search iteration,<br />

which relates with recent tread on obta<strong>in</strong><strong>in</strong>g long<br />

sequence of actions <strong>in</strong>stead of apply<strong>in</strong>g one by one. Thus<br />

the evaluations of <strong>in</strong>termediate states on the helpful<br />

implication path are avoided, which leads to a<br />

considerable improvement of runtime efficiency.<br />

The planner Conformant-FF still has <strong>in</strong>herent<br />

limitations due to its implicit representation of belief<br />

states and <strong>in</strong>complete <strong>in</strong>formation add<strong>in</strong>g to the<br />

relaxation. These make the planner provide <strong>in</strong>accurate<br />

heuristic sometimes and get trouble <strong>in</strong> situations where<br />

an action may conta<strong>in</strong> many conditional effects or takes<br />

more complicated forms. It will be significant to propose<br />

promis<strong>in</strong>g ideas to overcome those disadvantages.<br />

In future, we will treat nondeterm<strong>in</strong>istic action effects<br />

and explore to use a similar prun<strong>in</strong>g idea to solve the<br />

more general sett<strong>in</strong>g of cont<strong>in</strong>gent plann<strong>in</strong>g, i.e. to<br />

handle partially observable plann<strong>in</strong>g problems. We also<br />

plan to <strong>in</strong>vestigate the search spaces of other<br />

non-classical plann<strong>in</strong>g sett<strong>in</strong>gs that can be formalized as<br />

search problems, <strong>in</strong> particular probabilistic plann<strong>in</strong>g and<br />

temporal plann<strong>in</strong>g.<br />

ACKNOWLEDGMENT<br />

The authors wish to thank Professor Dantong Ouyang<br />

for her comments, which was helpful to improve the<br />

paper. This work was Supported by the National Natural<br />

Science Foundation of Ch<strong>in</strong>a under Grant No.<br />

61272208,61133011,60973089,61003101,61170092;<br />

Jil<strong>in</strong> Prov<strong>in</strong>ce Science and Technology Development<br />

Plan under Grant No. 20101501,20100185,201101039;<br />

Doctoral Fund of M<strong>in</strong>istry of Education of Ch<strong>in</strong>a under<br />

Grant No.20100061110031;<br />

REFERENCES<br />

[1] P. Bertoli, M. Pistore, P. Traverso, “Automated<br />

Composition of Web Services via Plann<strong>in</strong>g <strong>in</strong><br />

Asynchronous Doma<strong>in</strong>s,” Artificial Intelligence, vol. 174,<br />

pp. 316-361, 2010, doi: 10.1016/j.art<strong>in</strong>t.2009.12.002.<br />

[2] A. E. Gerev<strong>in</strong>i, P. Haslum, D. Long, A. Saetti, Y.<br />

Dimopoulos, “Determ<strong>in</strong>istic Plann<strong>in</strong>g <strong>in</strong> the Fifth<br />

International Plann<strong>in</strong>g Competition: PDDL3 and<br />

Experimental Evaluation of the Planners,” Artificial<br />

Intelligence, vol. 173, pp. 619-668, 2009,<br />

doi:10.1016/j.art<strong>in</strong>t.2008.10.012.<br />

[3] A. L. Blum, M. L. Furst, “Fast Plann<strong>in</strong>g through Plann<strong>in</strong>g<br />

Graph Analysis,” Artificial Intelligence, vol. 90, pp.<br />

279-298, 1997, doi: 10.1016/S0004-3702(96)00047-1.<br />

[4] D. Bryce, W. Cush<strong>in</strong>g, S. Kambhampati, “State Agnostic<br />

Plann<strong>in</strong>g Graphs: Determ<strong>in</strong>istic, Non-determ<strong>in</strong>istic, and<br />

Probabilistic Plann<strong>in</strong>g,” Artificial Intelligence, vol. 175,<br />

pp. 848-889, 2011, doi:10.1016/j.art<strong>in</strong>t.2010.12.002.<br />

[5] Y. Chen, R. Huang, Z. X<strong>in</strong>g, W. Zhang, “Long-distance<br />

mutual exclusion for plann<strong>in</strong>g,” Artificial Intelligence, vol.<br />

173, pp. 365-391, 2009, doi: 10.1016/j.art<strong>in</strong>t.2008.11.004.<br />

[6] N. Meuleau, E. Benazera, R. I. Brafman, E. A. Hansen,<br />

Mausam, “A Heuristic Search Approach to Plann<strong>in</strong>g with<br />

Cont<strong>in</strong>uous Resources <strong>in</strong> Stochastic Doma<strong>in</strong>s,” Journal of<br />

Artificial Intelligence Research, vol. 34, pp. 27-59, 2009,<br />

doi: 10.1613/jair.2529.<br />

[7] T. De la Rosa, S. Jimenez, R. Fuentetaja, D. Borrajo,<br />

“Scal<strong>in</strong>g up Heuristic Plann<strong>in</strong>g with Relational Decision<br />

Trees,” Journal of Artificial Intelligence Research, vol. 40,<br />

pp. 767-813, 2011, doi: 10.1613/jair.3231.<br />

[8] J. Hoffmann, B. Nebel, “The FF Plann<strong>in</strong>g System: Fast<br />

Plan Generation through Heuristic Search,” Journal of<br />

Artificial Intelligent Research, vol. 14, pp. 253-302, 2001,<br />

doi: 10.1613/jair.855.<br />

[9] B. Bonet, “Conformant Plans and Beyond: Pr<strong>in</strong>ciples and<br />

Complexity,” Artificial Intelligence, vol. 174, pp. 245-269,<br />

2010, doi: 10.1016/j.art<strong>in</strong>t.2009.11.001.<br />

[10] D. Bryce, S. Kambhampati, D. E. Smith, “Plann<strong>in</strong>g Graph<br />

Heuristics for Belief Space Search,” Journal of Artificial<br />

Intelligence Research, vol. 26, pp. 35-99, 2006, doi:<br />

10.1613/jair.1869.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1393<br />

[11] A. Albore, M. Ramirez, H. Geffner, “Effective Heuristics<br />

and Belief Track<strong>in</strong>g for Plann<strong>in</strong>g with Incomplete<br />

Information,” <strong>in</strong> AAAI, F. Bacchus, C. Domshlak, S.<br />

Edelkamp, M. Helmert, Eds. 21st International<br />

Conference on Automated Plann<strong>in</strong>g and Schedul<strong>in</strong>g, 2011,<br />

pp. 2-9.<br />

[12] H. Palacios, H. Geffner, “Compil<strong>in</strong>g Uncerta<strong>in</strong>ty Away <strong>in</strong><br />

Conformant Plann<strong>in</strong>g Problems with Bounded Width,”<br />

Journal of Artificial Intelligence, vol. 35, pp. 623-675,<br />

2009, doi: 10.1613/jair.2708.<br />

[13] D. Tran, H. Nguyen, E. Pontelli, T. C. Son, “Improv<strong>in</strong>g<br />

performance of conformant planners: Static analysis of<br />

declarative plann<strong>in</strong>g doma<strong>in</strong> specification,” <strong>in</strong> Spr<strong>in</strong>ger,<br />

Practical Aspects of Declarative Languages, 11th<br />

International Symposium, 2009, pp. 239-253, doi:<br />

10.1007/978-3-540-92995-6_17.<br />

[14] J. Hoffmann, R. Brafman, “Conformant Plann<strong>in</strong>g via<br />

Heuristic Forward Search: A New Approach,” Artificial<br />

Intelligence, vol. 170, pp. 507-541, 2006, doi:<br />

10.1016/j.art<strong>in</strong>t.2006.01.003.<br />

Wei Wei was born Dec. 28, 1984, <strong>in</strong> Jil<strong>in</strong>,<br />

Ch<strong>in</strong>a. She received the Master degree at<br />

College of Computer Science and<br />

Technology of Jil<strong>in</strong> University, Ch<strong>in</strong>a, <strong>in</strong><br />

2007.<br />

She is a Ph.D candidate at College of<br />

Computer Science and Technology of Jil<strong>in</strong><br />

University. Her ma<strong>in</strong> research <strong>in</strong>terests <strong>in</strong>clude automated<br />

plann<strong>in</strong>g and reason<strong>in</strong>g.<br />

Dantong Ouyang was born <strong>in</strong> 1968, Jil<strong>in</strong>, Ch<strong>in</strong>a. She received<br />

the Ph. D degree at College of Computer Science and<br />

Technology of Jil<strong>in</strong> University, Ch<strong>in</strong>a, <strong>in</strong> 1998.<br />

She is Professor, Ph.D. supervisor, Deputy Dean of College<br />

of Computer Science and Technology of Jil<strong>in</strong> University. Her<br />

ma<strong>in</strong> field of expertise is model-based diagnosis and automated<br />

reason<strong>in</strong>g.<br />

T<strong>in</strong>gt<strong>in</strong>g Zou was born Nov. 24, 1984, <strong>in</strong> Jil<strong>in</strong>, Ch<strong>in</strong>a. She<br />

received the Master degree at School of Computer Science and<br />

Information Technology of North East Normal University,<br />

Ch<strong>in</strong>a, <strong>in</strong> 2007.<br />

She is a Ph.D candidate at College of Computer Science and<br />

Technology of Jil<strong>in</strong> University. Her ma<strong>in</strong> research <strong>in</strong>terest is<br />

description logic.<br />

Shuai LU was born Jul. 11, 1981, <strong>in</strong> Jil<strong>in</strong>, Ch<strong>in</strong>a. He received<br />

the Ph.D degree at College of Computer Science and<br />

Technology of Jil<strong>in</strong> University, Ch<strong>in</strong>a, <strong>in</strong> 2010.<br />

He is a lecturer at College of Computer Science and<br />

Technology of Jil<strong>in</strong> University. Her ma<strong>in</strong> research <strong>in</strong>terests<br />

<strong>in</strong>clude automated plann<strong>in</strong>g and reason<strong>in</strong>g.<br />

© 2013 ACADEMY PUBLISHER


1394 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Assess<strong>in</strong>g Land Ecological Security Based on BP<br />

Neural Network: a Case Study of Hangzhou,<br />

Ch<strong>in</strong>a<br />

Heyuan You<br />

College of Bus<strong>in</strong>ess Adm<strong>in</strong>istration, Zhejiang University of F<strong>in</strong>ance and Economics, Hangzhou, Ch<strong>in</strong>a<br />

Email: youheyuan@gmail.com<br />

Abstract— Due to the <strong>in</strong>creas<strong>in</strong>g stress on the land ecology,<br />

the land eco-security suffers damage. In this paper, the BP<br />

neural network and PSR framework were adopted to<br />

establish the model for assessment of land eco-security, and<br />

an empirical study of assess<strong>in</strong>g land eco-security <strong>in</strong><br />

Hangzhou was done. The results show that the city center<br />

district is at serious land eco-security risk; Xiaoshan district<br />

and Yuhang district are at high land eco-security risk; and<br />

others counties (cities) are at low risk or <strong>in</strong>termediate risk.<br />

In Hangzhou, although some measures are adopted to<br />

control the risk of land eco-security, the economic growth<br />

still has negative impact on the land ecology. The rapid<br />

<strong>in</strong>dustrialization and urbanization <strong>in</strong>crease the risk of land<br />

eco-security. Therefore the policy constitutors should do<br />

someth<strong>in</strong>g to strengthen the land ecology protection.<br />

Index Terms—land ecological security, pressure-state-response<br />

framework, BP neural network, Hangzhou<br />

I. INTRODUCTION<br />

As an essential resource for susta<strong>in</strong>able development,<br />

the land keeps human supplied with basic material and<br />

liv<strong>in</strong>g space. In Ch<strong>in</strong>a, land use is regulated strictly by<br />

government s<strong>in</strong>ce the socialist public ownership of land.<br />

However, <strong>in</strong> order to accelerate the economic growth, the<br />

local governments <strong>in</strong> Ch<strong>in</strong>a excessively exploit and<br />

utilize land resource [1], and the susta<strong>in</strong>able use of land<br />

resources is always neglected <strong>in</strong> many regions. Some<br />

serious problems such as soil loss, over-conversion of<br />

farmland to construction land, land contam<strong>in</strong>ation and<br />

deforestation threat the susta<strong>in</strong>able land use [2, 3, 4, 5].<br />

The scarcity of enough protection for land leads to<br />

<strong>in</strong>creased risk of land ecological security (eco-security)<br />

[6]. Consequently, the assessment of land eco-security<br />

necessarily is done to ascerta<strong>in</strong> ecological state of land<br />

use system. And the characteristic analysis of land<br />

eco-security can reveal important <strong>in</strong>formation for<br />

adopt<strong>in</strong>g measures to improve the land ecology.<br />

The current literature that related to land eco-security<br />

mostly focused on the susta<strong>in</strong>able use of land resources.<br />

The ecological susta<strong>in</strong>ability is considered as a vital<br />

Manuscript received July 5, 2012; revised October 21, 2012;<br />

accepted October 27, 2012.<br />

Project number: 70973047.<br />

Correspond<strong>in</strong>g author: Heyuan You.<br />

feature of susta<strong>in</strong>able land use [7]. The <strong>in</strong>dicator systems<br />

which were applied to assess the susta<strong>in</strong>able use of land<br />

resources <strong>in</strong>cluded some <strong>in</strong>dicators reflected land<br />

eco-security such as soil loss/formation ratio [8], forest<br />

cover [9], population density [10], and species loss [11].<br />

Ow<strong>in</strong>g to the defects <strong>in</strong> the accurate analysis of land<br />

ecology, the assessment of land ecological security<br />

aroused researchers’ attention [6, 12].<br />

Back-Propagation (BP) neural network, a method of<br />

tra<strong>in</strong><strong>in</strong>g a multi-layer feed-forward artificial neural<br />

network with the BP algorithm can approximate any<br />

nonl<strong>in</strong>ear function [13]. Due to its robust and<br />

fault-tolerance, the BP neural network is widely applied<br />

<strong>in</strong> predictor, optimization and classification [14, 15, 16].<br />

Given the subjectivity <strong>in</strong> the assessment of land<br />

eco-security, especially determ<strong>in</strong><strong>in</strong>g the weights of<br />

<strong>in</strong>dicators, and the fuzzy relationship among <strong>in</strong>dicators,<br />

the BP neural network whose advantage is suitable can be<br />

applied to establish model for assess<strong>in</strong>g land ecosecurity.<br />

The rest of this paper proceeds as follows: Section 2<br />

describes a survey of study area; Section 3 establishes the<br />

model for assessment of land eco-security based on BP<br />

neural network; Section 4 obta<strong>in</strong>s the orig<strong>in</strong>al data and<br />

pretreats the orig<strong>in</strong>al date; Section 5 shows the results of<br />

the assessment of land eco-security of 8 districts<br />

(county-level cities, counties) <strong>in</strong> Hangzhou; Section 6<br />

summarizes the discussion and conclusion.<br />

II. STUDY AREA<br />

Hangzhou which is adm<strong>in</strong>istered as a sub-prov<strong>in</strong>cial<br />

city, with a registered population of 6.8912 million as of<br />

2010, is the capital and largest city of Zhejiang prov<strong>in</strong>ce.<br />

Located <strong>in</strong> Eastern Ch<strong>in</strong>a, Hangzhou sits on the south<br />

edge of the Yangtze River Delta economic zone (Figure<br />

1). Hangzhou is the economic, political and cultural<br />

center of Zhejiang prov<strong>in</strong>ce. It is an <strong>in</strong>dustrial city, and is<br />

considered as an important manufactur<strong>in</strong>g base <strong>in</strong> coastal<br />

area of Ch<strong>in</strong>a. The Qiantang River passes through the<br />

northeast to the southwest of Hangzhou, and Hangzhou<br />

Bay ends at Hangzhou which lies south of Shanghai.<br />

Hangzhou extends to the border of the hilly-country<br />

Anhui Prov<strong>in</strong>ce on its west and the flat-land Hangzhou<br />

Bay on its east. The vast majority of land <strong>in</strong> Hangzhou is<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1394-1400


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1395<br />

hill and mounta<strong>in</strong>.<br />

Hangzhou city is composed of 8 districts, 3<br />

county-level cities and 2 counties. The city center of<br />

Hangzhou is composed of Shangcheng district, Xiacheng<br />

district, Jianggan district, Gongshu district, Xihu district<br />

and B<strong>in</strong>jiang district. And Xiaoshan district, Yuhang<br />

district, Tonglu county, Chun'an county, Jiande city,<br />

Fuyang city and L<strong>in</strong>'an city compose the suburban and<br />

rural area of Hangzhou. In empirical study, I assumed that<br />

the six central urban districts were one <strong>in</strong>tegrated region<br />

s<strong>in</strong>ce the six central urban districts were small districts<br />

and pr<strong>in</strong>cipal affairs of districts were adm<strong>in</strong>istered<br />

<strong>in</strong>dependently of suburban and rural area of Hangzhou<br />

by Hangzhou city people’s government.<br />

S<strong>in</strong>ce the rapid economic growth and large population,<br />

risk to land ecology <strong>in</strong> Hangzhou cont<strong>in</strong>ual <strong>in</strong>creases.<br />

Consideration of land eco-security <strong>in</strong> Hangzhou is<br />

required to preserve the land and to draw up measures<br />

whose purpose is susta<strong>in</strong>able utilization of land.<br />

Figure 1.<br />

Location of study area<br />

III. METHODS<br />

A. Indicator System for Assessment<br />

The pressure-state-response (PSR) framework has been<br />

widely used to describe and quantify the environment [17,<br />

18]. It was accepted to determ<strong>in</strong>e <strong>in</strong>dicator to understand<br />

complex realities about ecology [6, 19]. In this paper, I<br />

focus on the pressures on the land eco-security, the<br />

condition of land eco-security which results from these<br />

pressures and the actions taken to prevent negative land<br />

eco-security impacts. It is apparent that PSR framework<br />

can be chosen as a basis for select<strong>in</strong>g the <strong>in</strong>dicators that<br />

compose the <strong>in</strong>dicator system for assess<strong>in</strong>g land<br />

ecological security. Complied with the pr<strong>in</strong>ciples <strong>in</strong><br />

select<strong>in</strong>g <strong>in</strong>dicators that <strong>in</strong>clude substantive, simplicity,<br />

universality, consistency and availability, and learnt<br />

experience from previous literature, the <strong>in</strong>itial set of 12<br />

<strong>in</strong>dicators was selected. Then <strong>in</strong>dicators were adjusted<br />

based on experts’ op<strong>in</strong>ions who <strong>in</strong>vited to evaluate the<br />

suitability of <strong>in</strong>itial set. Some <strong>in</strong>dicators <strong>in</strong> <strong>in</strong>itial set<br />

were not selected by experts. The reasons for the experts’<br />

decision were as follows. (1) Soil erosion modulus was<br />

not the representative factor which affected the land<br />

eco-security <strong>in</strong> Hangzhou s<strong>in</strong>ce the geographical<br />

condition of Hangzhou. (2) Natural population growth<br />

rate was important <strong>in</strong>dicator of the land eco-security,<br />

however the cultivated land area per capita and water<br />

resources per capita implied the impact of natural<br />

population growth rate on the land eco-security. (3) The<br />

orig<strong>in</strong>al data of energy consumption per unit of GDP<br />

could not be obta<strong>in</strong>ed. The <strong>in</strong>dicator system applied <strong>in</strong><br />

study area <strong>in</strong> this paper is presented <strong>in</strong> Table 1.<br />

B. Grade Criterion<br />

It is important to grade the land eco-security and<br />

determ<strong>in</strong>e the grade criterion which used to assess the<br />

state of land eco-security <strong>in</strong> Hangzhou. However, there<br />

was no widely accepted grade criterion of land<br />

eco-security [6]. The land eco-security should be<br />

classified to correspond to local conditions. In this paper,<br />

the grade criterion of land eco-security was classified <strong>in</strong>to<br />

five grades. The range of land eco-security value was<br />

assumed [0, 1], and it can be divided <strong>in</strong>to five grades as<br />

no land eco-security risk (0.8, 1], low land eco-security<br />

risk (0.6, 0.8], <strong>in</strong>termediate land eco-security risk (0.4,<br />

0.6], high land eco-security risk (0.2, 0.4] and serious<br />

land eco-security risk (0, 0.2].<br />

The land eco-security was relative. The assessment<br />

standards of eco-security <strong>in</strong> the literature were<br />

classified <strong>in</strong>to four grades [12]. The numbers rang<strong>in</strong>g<br />

from 1 to 4 were assigned to “<strong>in</strong>secure”, “relatively<br />

<strong>in</strong>secure”, “relatively secure” and “secure”. Two grade<br />

criterions of land eco-security were similar <strong>in</strong> the method<br />

© 2013 ACADEMY PUBLISHER


1396 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

TABLE I.<br />

INDICATOR SYSTEM FOR ASSESSING LAND ECO-SECURITY AND GRADE CRITERION OF LAND ECO-SECURITY<br />

Element Indicators Grade criterion of land eco-security<br />

(0.8, 1] a (0.6, 0.8] (0.4, 0.6] (0.2, 0.4] [0, 0.2]<br />

Pressure<br />

b<br />

Cultivated land area per capita(mu/person)x 1<br />

>1.4 0.8-1.4 0.7-0.8 0.6-0.7 0.6-0.5&2500 2000-2500 1500-2000 1000-1500 500-1000&12 10-12 8-10 6-8 5-6&30 25-30 20-25 15-20 10-15&25°proportion (%)x 7 4.0<br />

Population density(person/km 2 ) x 8 650<br />

Area of stable yields despite drought or excessive ra<strong>in</strong><br />

Response proportion (%)x 9<br />

>65 50-65 40-50 30-40 20-30&70 60-70 50-60 40-50 30-40&30 25-30 20-25 15-20 10-15&5 4-5 3-4 2-3 1-2&


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1397<br />

Where w ij (k+1) is the new vector of weight and bias,<br />

w ij (k) is the current vector of weight and bias, D(k) is the<br />

negative gradient of wij(k) at time k, D(k–1) is the<br />

negative gradient of wij(k) at time k–1, η is the learn<strong>in</strong>g<br />

rate, β is the momentum constant which is a number<br />

between 0 and 1.The learn<strong>in</strong>g rate usually is trialed with<br />

a range of 0.1 to 0.3, if the learn<strong>in</strong>g rate is too high, the<br />

algorithm may oscillate and becomes unstable. And the<br />

momentum constant usually is trialed with a range of 0.9<br />

to 1 s<strong>in</strong>ce the low momentum may prevent the network<br />

from learn<strong>in</strong>g. In empirical study, the values of η and β<br />

were selected as 0.3 and 0.94, respectively.<br />

The performance measure adopted <strong>in</strong> empirical study<br />

was mean-squared error (MSE) function. The MSE<br />

function is as follows:<br />

1<br />

MSE = q t −s t<br />

n<br />

2<br />

∑ ( ( ) ( ))<br />

(5)<br />

k<br />

k<br />

n t = 1<br />

Where MSE is net error. q k (t) is kth network node<br />

desired output of tth tra<strong>in</strong><strong>in</strong>g pattern and s k (t) is kth<br />

network node actual output of tth tra<strong>in</strong><strong>in</strong>g pattern.<br />

orig<strong>in</strong>al grade criterion of land eco-security presented<br />

Table Ⅰ were normalized between 0 and 1. The land<br />

eco-security grade is determ<strong>in</strong>ed by the particular<br />

comb<strong>in</strong>ation of <strong>in</strong>dicator values. Therefore the BP neural<br />

network should be tra<strong>in</strong>ed to learn the nonl<strong>in</strong>ear<br />

relationship from the learn samples. The endpo<strong>in</strong>ts of the<br />

<strong>in</strong>terval of land eco-security and <strong>in</strong>dicator values whose<br />

correspondence relationship was showed <strong>in</strong> Table Ⅲ<br />

were selected. Although the range of land eco-security<br />

values is assumed [0, 1], the values of land eco-security<br />

<strong>in</strong> Hangzhou that will be assessed by BP neural network<br />

may greater than 1 or less than 0. So as to prevent the<br />

assessment values of land eco-security to break the<br />

limitation of an <strong>in</strong>terval and enhance the<br />

dist<strong>in</strong>guishability of assessment values of land<br />

eco-security, some proper endpo<strong>in</strong>ts were selected to<br />

reflect the correspondence relationship between the<br />

<strong>in</strong>dicator values and land eco-security whose value was 0.<br />

There are a variety of methods for normalization. In<br />

this empirical study, the equation for normalization is as<br />

follows:<br />

S ′ = ( S −m<strong>in</strong> )/(max − m<strong>in</strong> ) (6)<br />

n n n. value n. value n.<br />

value<br />

Where max n.value is maximal value <strong>in</strong> <strong>in</strong>put vector n,<br />

and m<strong>in</strong> n.value is m<strong>in</strong>imal value <strong>in</strong> <strong>in</strong>put vector n. S n is the<br />

orig<strong>in</strong>al <strong>in</strong>put <strong>in</strong> <strong>in</strong>put vector n. S n′ is the normalized<br />

value of the orig<strong>in</strong>al <strong>in</strong> <strong>in</strong>put vector n.<br />

TABLE II.<br />

DESCRIPTIVE STATISTICS OF ORIGINAL DATA IN HANGZHOU<br />

M<strong>in</strong>. Max. Mean Std.Deviation<br />

x 1 0.05 0.82 0.61 0.25<br />

x 2 527.04 14001.76 4426.24 4454.91<br />

x 3 10.37 45.29 25.59 11.29<br />

Figure 2.<br />

Topological structure of BP neural network for<br />

assessment<br />

IV. ORIGINAL DATA AND PRETREATMENT<br />

The orig<strong>in</strong>al <strong>in</strong>dicator values of 8 districts<br />

(county-level cities, counties) applied to assess the land<br />

eco-security of Hangzhou were obta<strong>in</strong>ed from the<br />

statistical yearbooks and local municipal bureau of land<br />

and resources. The descriptive statistics of orig<strong>in</strong>al<br />

<strong>in</strong>dicator values is showed <strong>in</strong> Table Ⅱ.<br />

In order to improve the convergence rates and enhance<br />

the estimation accuracies s<strong>in</strong>ce the feature of logsig<br />

transfer function. The orig<strong>in</strong>al <strong>in</strong>dicator values and<br />

x 4 117.55 554.03 338.03 149.02<br />

x 5 3.89 38.31 16.01 11.54<br />

x 6 14.69 76.86 51.39 26.79<br />

x 7 0.04 5.47 2.18 2.01<br />

x 8 103.00 3209.00 730.25 1037.25<br />

x 9 6.79 87.43 49.02 26.13<br />

x 10 30.58 63.27 38.04 10.73<br />

x 11 1.69 190.31 34.87 64.00<br />

x 12 1.29 8.56 3.76 2.20<br />

© 2013 ACADEMY PUBLISHER


1398 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

TABLE III.<br />

ENDPOINTS OF THE INTERVAL OF LAND ECO-SECURITY AND CORRESPONDING INDICATOR VALUES<br />

x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 x 10 x 11 x 12 values of land eco-security<br />

1.4 2500 5.00 220 12 30 1.0 450 65 70 30 5 0.8<br />

0.8 2000 15.00 300 10 25 1.5 500 50 60 25 4 0.6<br />

0.7 1500 20.00 400 8 20 2.0 550 40 50 20 3 0.4<br />

0.6 1000 25.00 500 6 15 2.5 600 30 40 15 2 0.2<br />

0.5 500 30.00 600 5 10 4.0 650 20 30 10 1 0.0<br />

V. RESULTS<br />

The BP neural network that was established to assess<br />

the land eco-security was performed under MATLAB<br />

version 7.0 by us<strong>in</strong>g Neural Network Toolbox [20, 21]. In<br />

the empirical study, performance goal of the BP neural<br />

network was set to 0.001 or if number of epoch reaches<br />

2000. The learn samples which were normalized were<br />

<strong>in</strong>put, and the Figure 3 showed that the tra<strong>in</strong><strong>in</strong>g error falls<br />

down to 0.001 with<strong>in</strong> 62 epochs. Therefore the BP neural<br />

network was accepted, and applied to assess of land<br />

eco-security <strong>in</strong> Hangzhou.<br />

The normalized <strong>in</strong>dicator values of city center district,<br />

Xiaoshan district, Yuhang district, Tonglu county,<br />

Chun'an county, Jiande city, Fuyang city and L<strong>in</strong>'an city<br />

were put <strong>in</strong>to the BP neural network which had been<br />

tra<strong>in</strong>ed, then the values of land eco-security of 8 districts<br />

(county-level cities, counties) were calculated by the BP<br />

neural network. The result of assessment was showed <strong>in</strong><br />

Table Ⅵ, and the spatial distribution of land eco-security<br />

of Hangzhou was presented <strong>in</strong> Figure 4.<br />

Figure 4.<br />

Spatial distribution of land eco-security of Hangzhou<br />

Figure 3.<br />

Tra<strong>in</strong><strong>in</strong>g error trend of BP neural network<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1399<br />

City center<br />

district<br />

TABLE IV.<br />

NORMALIZED INDICATOR VALUES AND THE LAND ECO-SECURITY OF DISTRICTS IN HANGZHOU<br />

x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 x 10 x 11 x 12<br />

values of land<br />

eco-security<br />

0.000 0.002 0.133 0.216 0.202 0.070 0.000 1.000 0.000 0.832 1.000 0.072 0.070<br />

Xiaoshan 0.456 0.014 1.000 0.905 1.000 0.094 0.000 0.245 0.943 0.112 0.170 0.283 0.274<br />

Yuhang 0.423 0.042 0.507 0.525 0.731 0.265 0.122 0.193 1.000 0.249 0.147 0.411 0.382<br />

Tonglu 0.555 0.313 0.544 0.305 0.228 0.914 0.503 0.038 0.436 0.015 0.025 0.839 0.599<br />

Chun'an 0.383 1.000 0.139 0.000 0.000 0.892 1.000 0.000 0.373 0.224 0.000 0.566 0.708<br />

Jiande 0.535 0.404 0.509 0.677 0.217 0.873 0.497 0.038 0.447 0.064 0.009 0.778 0.612<br />

Fuyang 0.390 0.167 0.610 0.271 0.286 0.844 0.236 0.082 0.595 0.061 0.047 0.689 0.574<br />

L<strong>in</strong>'an 0.570 0.384 0.645 0.757 0.155 1.000 0.791 0.021 0.396 0.053 0.009 1.890 0.601<br />

serious land<br />

eco-security risk<br />

high land<br />

eco-security risk<br />

high land<br />

eco-security risk<br />

<strong>in</strong>termediate land<br />

eco-security risk<br />

low land<br />

eco-security risk<br />

low land<br />

eco-security risk<br />

<strong>in</strong>termediate land<br />

eco-security risk<br />

low land<br />

eco-security risk<br />

VI. DISCUSSION AND CONCLUSIONS<br />

Districts whose land eco-security values are above 0.4<br />

and below 0.8 account for 60% of the entire region. It<br />

<strong>in</strong>dicates that the land ecology of districts <strong>in</strong> Hangzhou<br />

suffers damage, whereas the risk of land eco-security <strong>in</strong><br />

Hangzhou is <strong>in</strong> control. Actually the local government<br />

adopts some measures to adm<strong>in</strong>ister the land use and land<br />

ecology s<strong>in</strong>ce the ecological consciousness. These<br />

measures pr<strong>in</strong>cipally refer to farmland protection,<br />

<strong>in</strong>tensive and economical utilization of construction land,<br />

forests land preservation, contam<strong>in</strong>ation emission control,<br />

family plann<strong>in</strong>g, ect. Therefore the condition of land<br />

eco-security <strong>in</strong> Tonglu county, Chun'an county, Jiande<br />

city, Fuyang city and L<strong>in</strong>'an city is at low risk or<br />

<strong>in</strong>termediate risk.<br />

The economic growth has negative impact on the land<br />

ecology of the land ecology <strong>in</strong> Hangzhou. The city center<br />

district has a population of 226.74 million which<br />

accounts for 33% of the total population of Hangzhou,<br />

and the city center district produces largest GDP of<br />

Hangzhou which accounts for over 85% of Hangzhou<br />

GDP. A great deal of service <strong>in</strong>dustry and manufactur<strong>in</strong>g<br />

centralize the city center district. For example, biological<br />

medic<strong>in</strong>e <strong>in</strong>dustry, mechanical manufactur<strong>in</strong>g <strong>in</strong>dustry<br />

and food and beverage <strong>in</strong>dustry is geographically<br />

concentrated Hangzhou Economic & Technological<br />

Development Zone whose purpose is to attract the global<br />

<strong>in</strong>vestment. The local governments currently consider<br />

GDP as a most important <strong>in</strong>dicator of economic progress,<br />

however the improvement of land ecology dose not<br />

directly tied to the growth of GDP. Much farmland is<br />

converted to construction land for <strong>in</strong>dustrial and<br />

residential uses, and high population density <strong>in</strong>creases the<br />

ecological frangibility.<br />

Xiaoshan district and Yuhang district locate <strong>in</strong> the<br />

surround<strong>in</strong>g area fr<strong>in</strong>ged city center district of Hangzhou.<br />

The development plan of Hanghzhou proposes that<br />

concentrated distribution area of heavy <strong>in</strong>dustry locate <strong>in</strong><br />

Xiaoshan district and Yuhang district. Rapid<br />

<strong>in</strong>dustrialization and urbanization <strong>in</strong>crease the stress on<br />

the land ecology, <strong>in</strong> spite of the fact that orig<strong>in</strong>al<br />

ecological condition of land <strong>in</strong> Xiaoshan district and<br />

Yuhang district is appropriate to ma<strong>in</strong>ta<strong>in</strong> the relatively<br />

security of land ecology s<strong>in</strong>ce the large cultivated land<br />

area per capital, large proportion of cultivated land,<br />

low population density, ect.<br />

One goal of this paper is to provide a method to assess<br />

the land eco-security. The BP neural network and PSR<br />

framework were adopted to establish the model for<br />

assessment of land eco-security. Then the orig<strong>in</strong>al date<br />

was pretreated, and the tra<strong>in</strong><strong>in</strong>g error of BP neural<br />

network was acceptable. The values of land eco-security<br />

of 8 districts (county-level cities, counties) <strong>in</strong> Hangzhou<br />

were evaluated by the BP neural network which was<br />

tra<strong>in</strong>ed. The results showed that the city center district<br />

was at serious land eco-security risk; Xiaoshan district<br />

and Yuhang district were at high land eco-security risk;<br />

Tonglu county and Fuyang city were at <strong>in</strong>termediate land<br />

eco-security risk; Chun'an county, Jiande city and L<strong>in</strong>'an<br />

city were at low land eco-security risk. This phenomenon<br />

reveals that although some measures are adopted to<br />

control the risk of land eco-security, the economic<br />

growth still has negative impact on the land ecology <strong>in</strong><br />

Hangzhou, and the rapid <strong>in</strong>dustrialization and<br />

urbanization <strong>in</strong>crease the risk of land eco-security.<br />

Therefore the policy constitutor should do someth<strong>in</strong>g<br />

to strengthen the land ecology protection.<br />

The method for assess<strong>in</strong>g land eco-security <strong>in</strong> this<br />

paper is flexible enough to be modified to applied <strong>in</strong><br />

other areas accord<strong>in</strong>g to the local factors. The purpose of<br />

assessment of land eco-security is not only obta<strong>in</strong><strong>in</strong>g the<br />

state of the land eco-security but also understand<strong>in</strong>g of<br />

the factors affect the land eco-security. Consequently<br />

© 2013 ACADEMY PUBLISHER


1400 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

the similar research about land ecology <strong>in</strong> the areas<br />

where the land ecology may suffer damage should be<br />

done.<br />

ACKNOWLEDGMENT<br />

The author wishes to thank Hangzhou municipal<br />

bureau of land and resources for provid<strong>in</strong>g the orig<strong>in</strong> data.<br />

This work was supported <strong>in</strong> part by a grant from National<br />

Natural Science Foundation of Ch<strong>in</strong>a (No.70973047).<br />

REFERENCES<br />

[1] K. S. Rogers, “Ecological security and mult<strong>in</strong>ational<br />

corporations,” Environmental Change and Security Project<br />

(ECSP) Report, 1997.<br />

[2] X. Wang, Z. Li, C. Cai, Z. Shi, Q. Xu, Z. Fu, and Z. Guo,<br />

“Effects of rock fragment cover on hydrological response<br />

and soilloss from Regosols <strong>in</strong> a semi-humid environment<br />

<strong>in</strong> South-West Ch<strong>in</strong>a,” Geomorphology, pp. 234–242, vol.<br />

151–152, May 2012.<br />

[3] R. Tan, F. Qu, N. Heer<strong>in</strong>k, and E. Mettepenn<strong>in</strong>gen “Rural<br />

to Urban Land Conversion <strong>in</strong> Ch<strong>in</strong>a-How Large is the<br />

Over-conversion and What are its Welfare Implications,”<br />

Ch<strong>in</strong>a Economic Review, vol.22, pp. 474–484, December<br />

2011.<br />

[4] J. Sorvari, R. Antika<strong>in</strong>en, M. Kosola, P. Hokkanen, and T.<br />

Haavisto, “Eco-efficiency <strong>in</strong> contam<strong>in</strong>ated land<br />

management <strong>in</strong> F<strong>in</strong>land – Barriers and development needs”,<br />

Journal of Environmental Management, vol.90, pp.<br />

1715–172, April 2009.<br />

[5] J. S. Brandt, T. Kuemmerle, H. Li, G. Ren, J. Zhu, and V.<br />

C. Radeloff, “Us<strong>in</strong>g Landsat imagery to map forest change<br />

<strong>in</strong> southwest Ch<strong>in</strong>a <strong>in</strong> response to the national logg<strong>in</strong>g ban<br />

and ecotourism development,” Remote Sens<strong>in</strong>g of<br />

Environment, vol. 121, , pp. 358–369, June 2012.<br />

[6] S. Su, X. Chen, S. D. DeGloria, and J. Wu, “Integrative<br />

fuzzy set pair model for land ecological security<br />

assessment: a case study of Xiaolangdi Reservoir Region,<br />

Ch<strong>in</strong>a,” Stochastic Environment Research and Risk<br />

Assessment, vol. 24, pp. 639–647, May 2010.<br />

[7] J. J. Ewel, “Natural systems as models for the design of<br />

susta<strong>in</strong>able systems of land use,” Agroforestry Systems, vol.<br />

45, pp.1-21, January 1999.<br />

[8] C. Walter and H. Stützel, “A new method for assess<strong>in</strong>g the<br />

susta<strong>in</strong>ability of land-use systems (II): Evaluat<strong>in</strong>g impact<br />

<strong>in</strong>dicators,” Ecological Indicators, Ecological Economics,<br />

vol. 68, pp. 1288–1300, March 2009.<br />

[9] Y. Y. YIN; and J. T. PIERCE, “Integrated resource<br />

assessment and susta<strong>in</strong>able land-use,” Environmental<br />

Management, vol. 17, pp. 319–327, May-Jun 1993.<br />

[10] V. H. D. Zuazo, C. R. R. Pleguezuelo, D. Flanagan, I. G.<br />

Tejero, and J. L. M. Fernández, “Susta<strong>in</strong>able land use and<br />

agricultural soil,” Alternative Farm<strong>in</strong>g Systems,<br />

Biotechnology, Drought Stress and Ecological Fertilisation<br />

Susta<strong>in</strong>able Agriculture Reviews, vol. 6, pp.107-192, 2011.<br />

[11] A. Cooper, T. Sh<strong>in</strong>e, T. McCann, and D.A. Tidane, “An<br />

ecological basis for susta<strong>in</strong>able land use of Eastern<br />

Mauritanian wetlands,” Journal of Arid Environments, vol.<br />

67, pp. 116–141 October 2006.<br />

[12] S. Su, D. Li, X. Yu, Z. Zhang, Q. Zhang, R. Xiao, J.<br />

Zhi, and J. Wu, “Assess<strong>in</strong>g land ecological security <strong>in</strong><br />

Shanghai (Ch<strong>in</strong>a) based on catastrophe theory,” Stochastic<br />

Environment Research and Risk Assessment, vol. 25, pp.<br />

737–746, June 2011.<br />

[13] D. Svozil, V. Kvasnicka, and J. Pospichal, “Introduction to<br />

multi-layer feed-forward neural networks,” Chemometrics<br />

and Intelligent Laboratory Systems, vol. 39, pp.43–62,<br />

November 1997.<br />

[14] J. He; Z.He, ; D.Zou, and Y. Xia, “A BP neural network<br />

method for RNA secondary structure prediction based on<br />

ENSSEL labels,” Journal of Computers, vol. 6, pp.<br />

569-576, April 2009.<br />

[15] F. Zhang, P. Li, Z. Hou, Z. Lu, Y. Chen, Q. Li, and M. Tan<br />

a “sEMG-based cont<strong>in</strong>uous estimation of jo<strong>in</strong>t angles of<br />

human legs by us<strong>in</strong>g BP neural network,” Neurocomput<strong>in</strong>g,<br />

vol. 78, pp.139–148, February 2012.<br />

[16] W. Xiang, Y. Gu, and D. Ge, “Test<strong>in</strong>g of rounded corner<br />

for micro-drill on hybrid of BP neural network and<br />

adaptive particle swarm optimization,” Journal of<br />

Computers, vol. 7, pp. 1116-1121, May 2012.<br />

[17] OECD, Environmental <strong>in</strong>dicators. OECD core set,<br />

Organization for Economic Co-operation and Development,<br />

Paris, 1994.<br />

[18] B. Wolfslehner and H. Vacik, “Evaluat<strong>in</strong>g susta<strong>in</strong>able<br />

forest management strategies with the Analytic Network<br />

Process <strong>in</strong> a Pressure-State-Response framework,” Journal<br />

of Environmental Management, vol. 88, pp.1–10, July<br />

2008.<br />

[19] A. J. J. Lynch, “The usefulness of a threat and disturbance<br />

categorization developed for Queensland Wetlands to<br />

environmental management, monitor<strong>in</strong>g, and evaluation,”<br />

Environmental Management, Vol. 47, pp.40-55, January<br />

2011.<br />

[20] D. Howard and M. Beale, Neural Network Toolbox for Use<br />

with MATLAB, User’s Guide, version 4. The Math Works,<br />

Inc., Natick, MA, 2000.<br />

[21] H. Demuth and M. Beale, Neural Network Toolbox: For<br />

Use with Matlab. Mathworks, Inc., Natick, MA ,2003.<br />

Heyuan You, he was born <strong>in</strong> Wenzhou<br />

City, Zhejiang Prov<strong>in</strong>ce of Ch<strong>in</strong>a <strong>in</strong> 1983.<br />

He received the PhD degree <strong>in</strong> land<br />

resource management from Institute of<br />

Land Science and Property Management,<br />

Zhejiang University <strong>in</strong> 2012.<br />

He is currently work<strong>in</strong>g as a lecturer <strong>in</strong> the<br />

College of Bus<strong>in</strong>ess Adm<strong>in</strong>istration,<br />

Zhejiang University of F<strong>in</strong>ance and<br />

Economics, Zhejiang, Ch<strong>in</strong>a. His research area centers on land<br />

use simulation and land ecology management.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1401<br />

Magellan: Technical Description of a New<br />

System for Robot-Assisted Nerve Blocks<br />

Joshua Morse ∗ , Mohamad Wehbe ‡ , Riccardo Taddei † , Shantale Cyr § , and Thomas M. Hemmerl<strong>in</strong>g §<br />

∗ Department of Electrical and Computer Eng<strong>in</strong>eer<strong>in</strong>g, McGill University, Montreal, QC, Canada<br />

email: joshua.morse@mail.mcgill.ca<br />

‡ Department of Experimental Surgery, McGill University, Montreal, QC, Canada<br />

† Department of Anesthesiology, University of Pisa, Pisa, Italy<br />

§ Department of Anesthesia, McGill University, Montreal, QC, Canada<br />

Institute of Biomedical Eng<strong>in</strong>eer<strong>in</strong>g, University of Montreal, Montreal, QC, Canada<br />

email: thomas.hemmerl<strong>in</strong>g@mcgill.ca<br />

1<br />

Abstract—Nerve blocks are common procedures used to<br />

remove sensation from a specific region of the body via<br />

<strong>in</strong>jection of local anesthetic. Ultrasound-guided nerve blocks<br />

are common-place <strong>in</strong> anesthesia, but require specialized<br />

tra<strong>in</strong><strong>in</strong>g and advanced bi-manual dexterity. This paper describes<br />

a system designed to robotically assist <strong>in</strong> ultrasoundguided<br />

nerve blocks. Robot-assisted nerve blocks could allow<br />

for more precise needle placement, and therefore a higher<br />

efficacy of blocks. This system is the first step <strong>in</strong> develop<strong>in</strong>g a<br />

completely automated nerve block system, which would also<br />

require the <strong>in</strong>corporation of ultrasound image recognition<br />

of nerves and other physiological markers.<br />

Index Terms—Regional anesthesia, nerve blocks, robotic<br />

anesthesia.<br />

I. INTRODUCTION<br />

NERVE blocks are a procedure of regional anesthesia<br />

used to remove the sensitivity from an area of the<br />

body via the <strong>in</strong>jection of an anesthetic drug <strong>in</strong>to the nerve<br />

<strong>in</strong>nervat<strong>in</strong>g the target area. Nerve blocks were first used<br />

<strong>in</strong> surgery <strong>in</strong> 1885 [1] and are now a common procedure<br />

performed rout<strong>in</strong>ely around the world.<br />

Perform<strong>in</strong>g regional nerve blocks requires special tra<strong>in</strong><strong>in</strong>g.<br />

Anesthesiologists perform<strong>in</strong>g regional nerve blocks<br />

only on an occasional basis have a significant failure rate,<br />

as high as 45% [2]. Most regional blocks are performed<br />

us<strong>in</strong>g ultrasound guidance; this necessitates careful bimanual<br />

operation of the ultrasound probe and the nerve<br />

block needle. Precise movement of the needle is important<br />

for successful blocks. One centimeter movement <strong>in</strong> any<br />

direction can make the difference between a failed and a<br />

successful block.<br />

Mechanical robots have been used <strong>in</strong> surgery for more<br />

than 10 years, the da V<strong>in</strong>ci Surgical System (Intuitive<br />

Surgical, Inc., Sunnyvale, CA) be<strong>in</strong>g the latest. These<br />

mechanical robots are shown to <strong>in</strong>crease precision of<br />

movements and improve outcome [3]. Recently, Tighe et<br />

al. have used the da V<strong>in</strong>ci Surgical System to perform<br />

successful nerve blocks <strong>in</strong> an ultrasound phantom [4]. We<br />

present the first robotic system, called Magellan, designed<br />

specifically to perform rout<strong>in</strong>e nerve blocks.<br />

II. MATERIALS AND METHODS<br />

The Magellan system is designed to perform robotassisted,<br />

ultrasound-guided nerve blocks. The system has<br />

4 primary components: a standard nerve block needle<br />

and syr<strong>in</strong>ge mounted via a custom clamp to a robotic<br />

arm (JACO robotic arm, K<strong>in</strong>ova, Montreal, QC, Canada),<br />

an ultrasound mach<strong>in</strong>e, a joystick (ThrustMaster T.Flight<br />

Hotas X, Guillemot Inc., New York, NY, USA), and a<br />

software control system. The system is designed to work<br />

with any ultrasound mach<strong>in</strong>e with a video output. The ultrasound<br />

video signal is captured via a USB video capture<br />

device (Dazzle DVC100, P<strong>in</strong>nacle Systems, Mounta<strong>in</strong><br />

View, CA, USA).<br />

The software system is designed on a client/server model<br />

so that nerve blocks can be performed remotely. Both<br />

the client and server programs were written <strong>in</strong> C# and<br />

communicate us<strong>in</strong>g UDP/IP. The client software <strong>in</strong>terfaces<br />

with the ultrasound mach<strong>in</strong>e, robotic arm, and a<br />

webcam (Lifecam HD, Microsoft Corporation, Redmond,<br />

WA, USA). The ultrasound and webcam video feeds are<br />

streamed from the client to the server, where they are<br />

displayed <strong>in</strong> a graphical user <strong>in</strong>terface (GUI) created<br />

<strong>in</strong> LabView (National Instruments, Aust<strong>in</strong>, TX, USA).<br />

The webcam is positioned <strong>in</strong> order to provide a direct<br />

view of the target nerve <strong>in</strong>sertion area and the ultrasound<br />

probe. The server software <strong>in</strong>terfaces with the joystick and<br />

transmits the joystick commands to the client over the IP<br />

network. The client and server, as well as their software<br />

subsystems, are detailed <strong>in</strong> Fig. 1. Further explanation<br />

of the <strong>in</strong>dividual subsystems of both applications are<br />

presented below.<br />

A. Software Control System<br />

1) Server Application: The Controller Subsystem implements<br />

an <strong>in</strong>terface that decouples the precise controller’s<br />

driver from the system, allow<strong>in</strong>g for the controller<br />

to be easily changed. This subsystem reads the state of<br />

the controller and provides it to the Server Network<strong>in</strong>g<br />

Subsystem.<br />

The Server Network<strong>in</strong>g Subsystem is responsible for<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1401-1405


1402 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

2<br />

Client<br />

Robotic Arm API<br />

Safety Input Filter<br />

Client<br />

Network<strong>in</strong>g<br />

Subsystem<br />

Data Logg<strong>in</strong>g<br />

Subsystem<br />

Video Stream<strong>in</strong>g<br />

Software<br />

Server<br />

Joystick Controller<br />

Subsystem<br />

Server Network<strong>in</strong>g<br />

Subsystem<br />

GUI<br />

Fig. 1.<br />

Logical View of the Magellan system detail<strong>in</strong>g the <strong>in</strong>dividual software subsystems of both the client and server applications.<br />

Fig. 2. GUI of the Magellan system. Left: Ultrasound video feed. Right: Webcam video show<strong>in</strong>g ultrasound probe and <strong>in</strong>sertion area. The arm<br />

speed and network latency are displayed beneath the ultrasound video.<br />

transmitt<strong>in</strong>g the controller data to the client over the<br />

network. Furthermore, this subsystem encrypts all packets<br />

to be sent to the client and decrypts those received from<br />

the client. This subsystem also works with the client to<br />

monitor the latency of the network. The latency <strong>in</strong>formation<br />

is displayed prom<strong>in</strong>ently on the GUI <strong>in</strong> order to<br />

allow the user to estimate the lag between the commands<br />

they send us<strong>in</strong>g the joystick and the result<strong>in</strong>g movement<br />

on the video displays. The latency display is color-coded<br />

to provide a clear, visual <strong>in</strong>dication of the latency status:<br />

grey for latencies less than 200 ms, yellow for latencies<br />

between 201 and 400 ms, and red for latencies greater<br />

than 400 ms.<br />

The GUI is detailed <strong>in</strong> Fig. 2. The GUI prom<strong>in</strong>ently displays<br />

the ultrasound video feed and the view of the target<br />

area, as well as the network latency and current arm speed.<br />

The arm speed can be toggled between three different<br />

modes: high, used to place the needle <strong>in</strong>itially <strong>in</strong> position<br />

above the target area; medium, used to descend the needle<br />

towards the <strong>in</strong>sertion po<strong>in</strong>t; and low, used to drive the<br />

needle through the sk<strong>in</strong> and to the nerve sheath. The arm<br />

speed display is also color-coded, with green, yellow, and<br />

red denot<strong>in</strong>g low, medium, and high speeds, respectively.<br />

The arm moves .15 m/s, 0.075 m/s, and 0.0425 m/s for<br />

high, medium, and low speeds, respectively.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1403<br />

3<br />

2) Client Application: The Robotic Arm API subsystem<br />

is responsible for transmitt<strong>in</strong>g commands to the<br />

robotic arm. This subsystem also provides details on the<br />

location and status of the arm to the Client Network<strong>in</strong>g<br />

Subsystem.<br />

The purpose of the Safety Input Filter subsystem is to<br />

prevent unsafe commands from be<strong>in</strong>g sent to the robotic<br />

arm: by press<strong>in</strong>g a specific button on the joystick, the<br />

operator puts the system <strong>in</strong>to a needle <strong>in</strong>sertion mode that<br />

limits the depth that the needle can move; these limitations<br />

are dependent on the target nerve. For example, for the<br />

popliteal nerve, maximum depth is set to 4 cm. This<br />

feature prevents the needle from descend<strong>in</strong>g below the<br />

maximum depth of the target nerve. This subsystem also<br />

scales the magnitude of movement speeds to allow for<br />

small and precise changes <strong>in</strong> the orientation of the needle<br />

<strong>in</strong> order to provide the anesthesiologist with f<strong>in</strong>e control.<br />

Additionally, this subsystem implements the control<br />

scheme for the system as it is responsible for translat<strong>in</strong>g<br />

controller commands received over the network <strong>in</strong>to <strong>in</strong>dividual<br />

commands to be sent to the robotic arm.<br />

The Client Network<strong>in</strong>g Subsystem is responsible for<br />

handl<strong>in</strong>g all communications with the server application.<br />

This communication <strong>in</strong>cludes the reception of controller<br />

packets from the server, the monitor<strong>in</strong>g of latency <strong>in</strong> the<br />

network, and updates about the status of the robotic arm.<br />

Additionally, this subsystem handles the encryption of all<br />

data be<strong>in</strong>g transmitted to the server and the decryption of<br />

all data received from the server.<br />

The Data Logg<strong>in</strong>g Subsystem records all data that is<br />

received by the client from the server. Additionally, it<br />

records the output of the Safety Input Filter so that all<br />

commands that are transmitted to the robotic arm are<br />

logged.<br />

The Video Stream<strong>in</strong>g Software subsystem streams the<br />

local ultrasound and webcam video feeds to the server.<br />

B. Safety Features<br />

There are two safety classifications of medical robots:<br />

fail-safe and fault-tolerant [5]. A fail-safe robot is one<br />

which enters a safe state when an error occurs; a faulttolerant<br />

robot is one which cont<strong>in</strong>ues to operate <strong>in</strong> the<br />

presence of errors [5]. This system is fail-safe as it will<br />

enter a state that poses no risks to the patient if any errors<br />

occur.<br />

In the event of a disconnection of any critical device (i.e.,<br />

the joystick is disconnected from the server PC or the<br />

JACO arm is disconnected from the client PC), the robotic<br />

arm will immediately stop mov<strong>in</strong>g and rema<strong>in</strong> stationary<br />

until a connection can be re-established. The motors of the<br />

robotic arm cannot be manually moved while powered on.<br />

This same protocol is followed if a network connection<br />

is lost between the client and server PCs. Similarly, the<br />

robotic arm will also stop all movement if any critical<br />

exceptions occur <strong>in</strong> the client or server applications.<br />

A second important safety consideration of a medical<br />

robot is the magnitude <strong>in</strong> error between the actual, measured<br />

position of the motors of the robot and the position<br />

that motors were commanded to go [5]. The JACO robotic<br />

arm has a relative position tolerance of 1.6 mm, mean<strong>in</strong>g<br />

that the maximum error between the commanded and<br />

actual positions of the needle will be, with<strong>in</strong> 1.6 mm of<br />

the target. Additionally, the anesthesiologist can activate a<br />

safety limitation which will prevent the needle from go<strong>in</strong>g<br />

below the maximum depth of the current target nerve.<br />

The arm features several important safety features which<br />

make it suitable for use <strong>in</strong> this application: it has redundant<br />

error checks for each jo<strong>in</strong>t and the control system, it<br />

recalculates the position of each motor every 0.01 second,<br />

recovers automatically <strong>in</strong> case of a system fault, has zero<br />

backlash on each of its six axes, and is back drivable when<br />

shutdown. The arm also has a maximum translational<br />

speed of 15 cm/s and a maximum jo<strong>in</strong>t rotation speed<br />

of 8 rpm.<br />

The arm is powered by a 24V DC power adapter and<br />

is plugged <strong>in</strong>to an un<strong>in</strong>terruptable power supply (Back<br />

UPS XS 1300, APC, W. K<strong>in</strong>gston, RI, USA) that provides<br />

power to both it and the client computer <strong>in</strong> the case of<br />

a power failure. The arm draws between 1.7 and 10 A<br />

while <strong>in</strong> use and the UPS conta<strong>in</strong>s a battery with sufficient<br />

capacity to allow for a safe reversal of the procedure<br />

should power be lost.<br />

The JACO arm is connected to the client PC us<strong>in</strong>g a<br />

standard USB cable. In the case of a computer failure, the<br />

robotic arm also has a backup joystick that can be used<br />

to directly control it, <strong>in</strong>dependent of the client PC. This<br />

joystick allows full control of the arm and will operate as<br />

long as the arm has power.<br />

C. Robotic Arm<br />

The JACO robotic arm was developed to provide<br />

mechanical assistance to wheelchair-bound people and<br />

is certified by Health Canada as a medical device. The<br />

robotic arm has 6 degrees of freedom and can support<br />

a payload of 1.5 kg or 1 kg at full extension. The<br />

arm is built of carbon fiber, mak<strong>in</strong>g it lightweight at<br />

5 kg. It has a reach of 90 cm at full extension and<br />

conta<strong>in</strong>s 6 <strong>in</strong>dependently-controlled motors. The arm can<br />

also operate <strong>in</strong> both a left-handed and right-handed mode.<br />

These features make the JACO robotic arm versatile and<br />

allow great flexibility <strong>in</strong> the placement of the robotic arm.<br />

D. Control Scheme<br />

In order to provide an <strong>in</strong>tuitive control scheme to the<br />

user, each of the six primary movements available via the<br />

robotic arm were mapped to specific buttons and/or axes<br />

of the joystick.<br />

The left/right and forward/backward movements of the<br />

primary joystick handle are mapped to the same movements<br />

of the robotic arm. Twist<strong>in</strong>g the joystick handle to<br />

the left or right will cause the robotic arm to rotate the<br />

needle <strong>in</strong> a similar fashion. The throttle control of the<br />

joystick is used to rotate the tip of the needle forward<br />

or backwards, while rotat<strong>in</strong>g a slider bar on the rear of<br />

the throttle will rotate the syr<strong>in</strong>ge about the po<strong>in</strong>t of the<br />

© 2013 ACADEMY PUBLISHER


1404 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

4<br />

needle. The hat switch is used to ascend or descend the<br />

needle. The trigger button <strong>in</strong>forms the system that the<br />

nerve block procedure is beg<strong>in</strong>n<strong>in</strong>g, and thus engages the<br />

safety limitations described <strong>in</strong> section II-B. Two buttons<br />

on the top of the joystick are used to either <strong>in</strong>crease or<br />

decrease the speed of the robotic arm.<br />

E. Operational Setup<br />

The JACO robotic arm is mounted to the rear of the<br />

operat<strong>in</strong>g table and placed <strong>in</strong> the handedness mode that<br />

would provide the easiest approach to the leg that will<br />

receive a block: left-handedness for perform<strong>in</strong>g a nerve<br />

block on the right leg, or right-handedness for perform<strong>in</strong>g<br />

a nerve block on the left leg.<br />

The ultrasound mach<strong>in</strong>e is placed so that the probe<br />

can be manipulated manually to locate and identify the<br />

target nerve. The ultrasound mach<strong>in</strong>e’s video output is<br />

connected to the client PC us<strong>in</strong>g a composite video cable<br />

and a USB video capture device. For all local tests<br />

performed with the system, the same PC was used as<br />

both the client and server. The PC and joystick were<br />

<strong>in</strong>stalled on a mobile cart which was placed close to the<br />

mannequ<strong>in</strong>. The webcam was then placed with a clear<br />

view of the <strong>in</strong>tended position and connected to the PC.<br />

III. TESTING & RESULTS<br />

The Magellan system was tested on an ultrasound<br />

nerve phantom (Blue Phantom Select Series Peripheral<br />

Nerve Block Ultrasound Tra<strong>in</strong><strong>in</strong>g Model, Blue Phantom,<br />

Redmond, WA, USA). This nerve phantom is designed to<br />

realistically mimic human tissue, both physically and <strong>in</strong><br />

an ultrasound image. These tests were made to ensure that<br />

the control scheme was easy to use and that the needle<br />

could be placed <strong>in</strong> the correct location by the robotic arm.<br />

An experiment was conducted to record and analyze the<br />

first 20 nerve blocks performed on the nerve phantom.<br />

These trials were performed by an anesthesiologist who<br />

had never previously used the Magellan nor been formally<br />

tra<strong>in</strong>ed <strong>in</strong> its control scheme. In this experiment, the<br />

anesthesiologist verbally guided an assistant to maneuver<br />

the ultrasound probe until the nerve was located and<br />

identified on the ultrasound screen and then directed the<br />

needle, us<strong>in</strong>g the joystick, from a rest<strong>in</strong>g position, to the<br />

proper <strong>in</strong>sertion position, and then directly <strong>in</strong>to the nerve.<br />

Success was def<strong>in</strong>ed as the <strong>in</strong>troduction of the tip of the 22<br />

gauge needle <strong>in</strong>to the nerve. The trial times are shown <strong>in</strong><br />

Fig. 3. The success rate for the first 20 trials on the nerve<br />

phantom was 90% with an average time of 95.2 s with a<br />

standard deviation of 49.9 s. The data was analyzed us<strong>in</strong>g<br />

l<strong>in</strong>ear regression and a trend l<strong>in</strong>e with a slope of -5.5 s<br />

was found, denot<strong>in</strong>g that the anesthesiologist was able to<br />

perform a block 5.5 seconds faster with each successive<br />

attempt that was made. The failures <strong>in</strong> these trials were<br />

identified to be due to improperly align<strong>in</strong>g the tip of the<br />

needle with the center of the ultrasound probe. Further<br />

tests performed by another anesthesiologist resulted <strong>in</strong> a<br />

100% success rate.<br />

Fig. 3. Blue: block times for first 20 phantom trials of the Magellan<br />

system. Black: trend l<strong>in</strong>e and equation.<br />

IV. CONCLUSION<br />

We present the first mechanical robotic system<br />

specifically designed to perform nerve blocks us<strong>in</strong>g a<br />

joystick and computer control center. Us<strong>in</strong>g the Magellan,<br />

a 90-100% success rate was achievable us<strong>in</strong>g a standard<br />

nerve block phantom. In addition, a rather steep learn<strong>in</strong>g<br />

curve was determ<strong>in</strong>ed <strong>in</strong>dicat<strong>in</strong>g great ease of learn<strong>in</strong>g to<br />

operate the nerve block needle us<strong>in</strong>g a joystick with rapid<br />

improvement of the operation times of the Magellan.<br />

A study of anesthesia residents study<strong>in</strong>g regional<br />

anesthesia techniques showed a success rate of 89%<br />

for ultrasound-guided nerve blocks after perform<strong>in</strong>g<br />

40 blocks on patients [6], show<strong>in</strong>g a similar success<br />

rate between the nerve phantom tests performed with<br />

Magellan and success rates by anesthesia students.<br />

Cl<strong>in</strong>ical tests will show whether the success rates<br />

achieved <strong>in</strong> dummy test<strong>in</strong>g can be confirmed <strong>in</strong> human<br />

test<strong>in</strong>g; further research needs to focus on automated<br />

nerve recognition, as well as automated nerve block<br />

performance – without human <strong>in</strong>tervention. Comb<strong>in</strong><strong>in</strong>g<br />

these two approaches, a completely automated nerve<br />

block system will be possible.<br />

ACKNOWLEDGMENT<br />

The authors would like to acknowledge the Department<br />

of Anesthesia <strong>in</strong> the Montreal General Hospital for their<br />

f<strong>in</strong>ancial support of this project.<br />

REFERENCES<br />

[1] W. S. Halsted, “Practical comments on the use and abuse of<br />

coca<strong>in</strong>e,” New York Medical Journal, vol. 42, pp. 294–299, 1885.<br />

[2] P. Marhofer and V. Chan, “Ultrasound-guided regional anesthesia:<br />

current concepts and future trends,” Anesthesia & Analgesia, vol.<br />

104, no. 5, pp. 1265–1269, 2007.<br />

[3] D. Willis, M. Gonzalgo, M. Brotzman, Z. Feng, B. Trock, and L. Su,<br />

“Comparison of outcomes between pure laparoscopic vs robotassisted<br />

laparoscopic radical prostatectomy: a study of comparative<br />

effectiveness based upon validated quality of life outcomes,” BJU<br />

<strong>in</strong>ternational, 2011.<br />

[4] P. Tighe, S. Badiyan, I. Luria, A. Boezaart, and S. Parekattil,<br />

“Robot-assisted regional anesthesia: A simulated demonstration,”<br />

Anesthesia & Analgesia, vol. 111, no. 3, pp. 813–816, 2010.<br />

[5] P. Kazanzides, “Safety design for medical robots,” <strong>in</strong> Eng<strong>in</strong>eer<strong>in</strong>g<br />

<strong>in</strong> Medic<strong>in</strong>e and Biology Society, 2009. EMBC 2009. Annual<br />

International Conference of the IEEE, Sept. 2009, pp. 7208 –7211.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1405<br />

5<br />

[6] C. Luyet, G. Schupfer, M. Wipfli, R. Greif, M. Lug<strong>in</strong>b&, U. Eichenberger<br />

et al., “Different learn<strong>in</strong>g curves for axillary brachial plexus<br />

block: Ultrasound guidance versus nerve stimulation,” Anesthesiology<br />

research and practice, vol. 2010, p. 309462, 2010.<br />

Thomas M. Hemmerl<strong>in</strong>g received the MD<br />

degree from the Faculty of Medic<strong>in</strong>e, University<br />

of Saarland, Germany, <strong>in</strong> 1990. He leads<br />

the ITAG laboratory, Department of Anesthesia,<br />

McGill University. He is currently an<br />

Associate Professor <strong>in</strong> the department of Anesthesia<br />

at McGill University and the Institute<br />

of Biomedical Eng<strong>in</strong>eer<strong>in</strong>g at the University<br />

of Montreal, Montreal, Canada. His research<br />

<strong>in</strong>terests are automated and robotic anesthesia.<br />

Joshua Morse is currently an undergraduate<br />

student <strong>in</strong> the Department of Computer Eng<strong>in</strong>eer<strong>in</strong>g<br />

at McGill University, Montréal, QC,<br />

Canada.<br />

In 2010, he jo<strong>in</strong>ed the Intelligent Technology<br />

<strong>in</strong> Anesthesia Group (ITAG) as a research<br />

assistant. His research <strong>in</strong>terests <strong>in</strong>clude robotic<br />

anesthesia, telemedic<strong>in</strong>e and bio<strong>in</strong>formatics.<br />

Mohamad Wehbe received the B.Sc. degree<br />

<strong>in</strong> biomedical eng<strong>in</strong>eer<strong>in</strong>g from the American<br />

University of Science and Technology, Beirut,<br />

Lebanon, and the M.Sc. degree <strong>in</strong> biomedical<br />

eng<strong>in</strong>eer<strong>in</strong>g from the École Polytechnique de<br />

Montréal, Montréal, QC, Canada, <strong>in</strong> 2006 and<br />

2009, respectively.<br />

In 2010, he jo<strong>in</strong>ed the department of<br />

Experimental Surgery at McGill University,<br />

Montréal, QC, where he started work<strong>in</strong>g toward<br />

the Ph.D. degree <strong>in</strong> the Intelligent Technology<br />

<strong>in</strong> Anesthesia Group (ITAG). His research <strong>in</strong>terests are focused<br />

on <strong>in</strong>telligent biomedical devices and robotic anesthesia.<br />

Riccardo Taddei received the MD degree<br />

from the Faculty of Medic<strong>in</strong>e and Surgery,<br />

University of Pisa, Pisa, Italy <strong>in</strong> 2008.<br />

Dur<strong>in</strong>g 2011, he worked as a research fellow<br />

<strong>in</strong> the Department of Anesthesia <strong>in</strong> the<br />

Montreal General Hospital, McGill University,<br />

Montreal, Canada. He is currently a third year<br />

resident <strong>in</strong> the department of Anethesiology<br />

and Intensive Care <strong>in</strong> Cisanello Hospital, University<br />

of Pisa. His research <strong>in</strong>terests <strong>in</strong>clude<br />

automation <strong>in</strong> anesthesia.<br />

Shantale Cyr holds a PhD degree from the<br />

University of Montreal, Montreal, Canada.<br />

S<strong>in</strong>ce 2007, she has worked as a research<br />

associate <strong>in</strong> the ITAG laboratory, Department<br />

of Anesthesia <strong>in</strong> the Montreal General Hospital,<br />

McGill University, Montreal, Canada. Her<br />

research <strong>in</strong>terests <strong>in</strong>clude closed-loop anesthesia,<br />

device design and user <strong>in</strong>teraction and<br />

telemedic<strong>in</strong>e.<br />

© 2013 ACADEMY PUBLISHER


1406 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

State Assignment for F<strong>in</strong>ite State Mach<strong>in</strong>e<br />

Synthesis<br />

Meng Yang<br />

State Key Lab of ASIC and Systems, Fudan University, Shanghai, Ch<strong>in</strong>a<br />

Email: mengyang@fudan.edu.cn<br />

Abstract—This paper proposes simulated anneal<strong>in</strong>g based<br />

algorithm for the synthesis of a f<strong>in</strong>ite state mach<strong>in</strong>e to<br />

determ<strong>in</strong>e the optimal state assignment with less area and<br />

power dissipation. The algorithm has two anneal<strong>in</strong>g stages.<br />

In the first rough anneal<strong>in</strong>g stage it tries to search <strong>in</strong> global<br />

scope by the proposed rough search method. In the second<br />

focus<strong>in</strong>g anneal<strong>in</strong>g stage it tries to search <strong>in</strong> local scope by<br />

us<strong>in</strong>g proposed focus<strong>in</strong>g search methods <strong>in</strong>tend<strong>in</strong>g chang<strong>in</strong>g<br />

solution slightly. In both stages, the experience of past<br />

solution is utilised by comb<strong>in</strong>g the best solution <strong>in</strong> the past<br />

and the current solution. The experiments performed on a<br />

large suite of benchmarks have established the fact that the<br />

proposed method outperforms the published GA-based<br />

algorithms. The results have shown the effectiveness of the<br />

proposed method <strong>in</strong> achiev<strong>in</strong>g optimal state assignment for<br />

f<strong>in</strong>ite state mach<strong>in</strong>e.<br />

Index Terms—state assignment, f<strong>in</strong>ite state mach<strong>in</strong>e,<br />

optimisation algorithm, simulated anneal<strong>in</strong>g algorithm<br />

I. INTRODUCTION<br />

As the mobile applications are emerg<strong>in</strong>g, the power<br />

consumption of the circuits has become a major concern.<br />

Numerous researches have been <strong>in</strong>vestigated concern<strong>in</strong>g<br />

the power issues [1-3]. F<strong>in</strong>ite state mach<strong>in</strong>e (FSM) is<br />

mathematical model of the sequential circuits with<br />

discrete <strong>in</strong>puts, <strong>in</strong>ternal states and discrete outputs. The<br />

problem of f<strong>in</strong>d<strong>in</strong>g an optimal state assignment is NPhard<br />

[4]. As a result, the synthesis of an FSM plays an<br />

important role.<br />

The genetic algorithm (GA) technique [5] has been<br />

successfully applied to a variety of computationally<br />

complex problems s<strong>in</strong>ce it has a large search space. Many<br />

<strong>in</strong>vestigations have shown that GA can f<strong>in</strong>d good state<br />

assignments. Alma<strong>in</strong>i, et al [6] have demonstrated that<br />

the GA method produced significantly simpler solutions.<br />

In [7] multi objective GA (MOGA) has been used to<br />

optimise area and power simultaneously. Xia and<br />

Alma<strong>in</strong>i [8] have used GAs to optimise both area and<br />

power with good tradeoffs. Pradhan, et al [3] report on<br />

the application of power gat<strong>in</strong>g <strong>in</strong> the higher level of<br />

system design <strong>in</strong> the form of f<strong>in</strong>ite state mach<strong>in</strong>e (FSM)<br />

synthesis. In [9] Chattopadhyay has used GAs to obta<strong>in</strong><br />

power optimised two- and multilevel FSM realisations.<br />

Chattopadhyay [10] considers D flip-flops to store the<br />

state bits and <strong>in</strong>vestigates the avenue of GAs to achieve<br />

area reduction under flip-flop and output polarity<br />

selection.<br />

Other than GA based methods, a number of heuristic<br />

algorithms have been proposed, which are based on<br />

different cost functions estimat<strong>in</strong>g the effect of state<br />

assignment on logic m<strong>in</strong>imisation. It has shown a new<br />

comprehensive method <strong>in</strong> [11] consist<strong>in</strong>g of an efficient<br />

state m<strong>in</strong>imisation and state assignment technique. Goren,<br />

et al [12] present a heuristic for state reduction of<br />

<strong>in</strong>completely specified f<strong>in</strong>ite state mach<strong>in</strong>es. The<br />

proposed heuristic is based on a branch-and-bound search<br />

technique and identification of sets of compatible states<br />

of a given <strong>in</strong>completely specified f<strong>in</strong>ite state mach<strong>in</strong>e<br />

specification. In [13], the usage of a stochastic search<br />

technique <strong>in</strong>spired by simulated anneal<strong>in</strong>g is explored to<br />

solve the state assignment problem.<br />

Generally speak<strong>in</strong>g, it is relatively easy to f<strong>in</strong>d state<br />

assignments to m<strong>in</strong>imise the area only or the power<br />

dissipation only. However, it is known that m<strong>in</strong>imisation<br />

of either the power or logic complexity could be at the<br />

expense of the other and <strong>in</strong> most cases it is hard to f<strong>in</strong>d a<br />

solution that is optimum <strong>in</strong> both doma<strong>in</strong>s. For large<br />

circuits, there are millions or possibly billions of<br />

assignments [14] and hence to f<strong>in</strong>d the state assignment<br />

for the m<strong>in</strong>imisation of power consumption and area at<br />

the same time is computationally difficult. Besides, GA<br />

selects the next generation via a rank<strong>in</strong>g system, which is<br />

not always necessary but takes significant runtime. In this<br />

paper, <strong>in</strong> order to reduce the computational time but at the<br />

same time reta<strong>in</strong> the quality if the solution, simulated<br />

anneal<strong>in</strong>g based algorithm is proposed to solve FSM<br />

problem with low-power and small-area requirements.<br />

The rema<strong>in</strong>der of the paper is organised as follows.<br />

Section II gives term<strong>in</strong>ology of state assignment of the<br />

FSM. The two anneal<strong>in</strong>g stage simulated anneal<strong>in</strong>g<br />

approach is given <strong>in</strong> Section III. Section IV discusses the<br />

comparison results <strong>in</strong> details with respect to other<br />

approaches. Conclusions are then given <strong>in</strong> Section V.<br />

II. TERMINOLOGY<br />

An FSM can be characterised by a 5-tuple (I, O, M, X,<br />

Y) where I and O are the sets of primary <strong>in</strong>puts and<br />

primary outputs, M is the <strong>in</strong>ternal states, X and Y are the<br />

output and the next state functions, respectively. An FSM<br />

with M states requires a m<strong>in</strong>imum of S state variables for<br />

the assignment, where S = ⎡log<br />

2 M ⎤ and ⎡g ⎤ is the<br />

smallest <strong>in</strong>teger equal to or greater than g. The number of<br />

logically unique assignments for an FSM N is given as<br />

follows.<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1406-1410


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1407<br />

S<br />

(2 −1)!<br />

N = (1)<br />

S<br />

(2 − M )! S!<br />

The FSM is commonly represented by a state transition<br />

table (STT). Given the <strong>in</strong>put transition probability of an<br />

FSM, its state transition probability can be computed.<br />

The state transition probability tp ij between state s i and<br />

state s j occurs <strong>in</strong> an arbitrarily long sequence and is given<br />

as follows.<br />

tp = P p<br />

(2)<br />

ij<br />

The steady state probabilities P i can be obta<strong>in</strong>ed via<br />

Gaussian elim<strong>in</strong>ation methods to solve the set of l<strong>in</strong>ear<br />

equations as <strong>in</strong> (3) and (4).<br />

i<br />

i = M 1<br />

∑ −<br />

i<br />

i=<br />

0<br />

ij<br />

P = 1<br />

(3)<br />

j = M<br />

∑ − 1<br />

Pj<br />

j=<br />

0<br />

P = p<br />

(4)<br />

i<br />

The power consumption [15] of a sequential circuit is<br />

proportional to its switch<strong>in</strong>g activity which can be<br />

represented as <strong>in</strong> (5), where C is the capacitance of the<br />

output for the node, V dd is the supply voltage, f clk is the<br />

clock frequency and E is the expected switch<strong>in</strong>g activity.<br />

ji<br />

1 2<br />

P = CVdd<br />

fclk<br />

E<br />

(5)<br />

2<br />

S<strong>in</strong>ce the register capacitance is fixed and cannot be<br />

affected, therefore the E is considered as part of the cost<br />

function <strong>in</strong> terms of power consumption.<br />

i = M<br />

∑∑<br />

− 1 j=<br />

M −1<br />

i=<br />

0 j=<br />

0<br />

E = tp ij dist i j<br />

(6)<br />

where dist i,j represents the hamm<strong>in</strong>g distance between the<br />

cod<strong>in</strong>g of state s i and state s j and tp ij is the total state<br />

transition probability from state s i and state s j as def<strong>in</strong>ed<br />

<strong>in</strong> (2).<br />

III. SIMULATED ANNEALING BASED ALGORITHM<br />

The problem of f<strong>in</strong>d<strong>in</strong>g the state assignment for the<br />

m<strong>in</strong>imisation of power consumption and area is<br />

computationally difficult. GA has been successfully<br />

applied to a variety of computationally difficult problems.<br />

It has been shown that it can produce good results <strong>in</strong> a<br />

reasonable computation time. The basic idea of GA is<br />

<strong>in</strong>itially to generate a breed<strong>in</strong>g pool of potential solutions<br />

to a problem. These solutions are encoded as<br />

chromosomes, and each chromosome is subjected to an<br />

evaluation function which assigns fitness depend<strong>in</strong>g on<br />

the quality of the solution it encodes. Exist<strong>in</strong>g solutions<br />

are recomb<strong>in</strong>ed by crossover operator. Mutation operator<br />

makes random changes <strong>in</strong> a few randomly selected<br />

chromosomes <strong>in</strong> order to prevent premature convergence<br />

by ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g the diversity of the population. The GA<br />

uses a tournament selection method via population<br />

rank<strong>in</strong>g system to reproduce new generation. As a result,<br />

,<br />

the rank<strong>in</strong>g system itself takes significant computational<br />

time. However, <strong>in</strong> most cases only the best solution at last<br />

is required, therefore the entire rank<strong>in</strong>g is not always<br />

necessary. Furthermore, if some parents are not excellent<br />

enough, these solutions have little chance to jo<strong>in</strong> the<br />

competition <strong>in</strong> GA.<br />

Simulated anneal<strong>in</strong>g (SA) algorithm on the other hand<br />

is another method to solve problems such as 3D pack<strong>in</strong>g<br />

problem [16] and s<strong>in</strong>gle conta<strong>in</strong>er load<strong>in</strong>g problem [17].<br />

It starts with high temperature. The <strong>in</strong>spiration of the<br />

algorithm demand an <strong>in</strong>terest<strong>in</strong>g feature related to the<br />

temperature variation to be embedded <strong>in</strong> the operational<br />

characteristics of the algorithm. This necessitates a<br />

gradual reduction of the temperature as the simulation<br />

proceeds. The algorithm starts <strong>in</strong>itially with a high value<br />

temperature, and then it is decreased at each step<br />

follow<strong>in</strong>g some anneal<strong>in</strong>g schedule. However there are<br />

several significant disadvantages of traditional SA, such<br />

as its slow search speed. Hence, <strong>in</strong> order to overcome the<br />

mentioned shortcom<strong>in</strong>gs, follow<strong>in</strong>g simulated anneal<strong>in</strong>g<br />

based algorithm is proposed.<br />

A. Solution Representation<br />

Let the state-code array for an M-state FSM be<br />

S 0 , S1,<br />

, S M −1<br />

, where M is the number of FSM states.<br />

The solution representation is an array of size equal to the<br />

number of states <strong>in</strong> the FSM. Each entry <strong>in</strong> the array is an<br />

<strong>in</strong>teger between 0 and M-1. Take a ten-state mach<strong>in</strong>e<br />

S 0 , S1,<br />

S 2 , S3,<br />

S 4 , S5<br />

, S 6 , S 7 , S8<br />

, S9<br />

for example. One<br />

possible representation is 9, 6, 8, 2, 3, 0, 4, 1, 5, 7, which<br />

is shown <strong>in</strong> Figure 1.<br />

Figure 1. State assignment for ten-state mach<strong>in</strong>e.<br />

B. Rough Anneal<strong>in</strong>g Stage<br />

The proposed simulated anneal<strong>in</strong>g is designed<br />

purposely <strong>in</strong>to two stages as the temperature schedules. In<br />

the rough anneal<strong>in</strong>g stage, it tends to alter the solution<br />

with bigger changes at high temperature, consequently<br />

escape local optima. The rotation swap method randomly<br />

selects the cutt<strong>in</strong>g l<strong>in</strong>e from the representation. The<br />

cutt<strong>in</strong>g l<strong>in</strong>e is treated as a mirror. Copy the state<br />

assignments <strong>in</strong> the left part of the mirror to the right part<br />

of the mirror. Similarly, the right part is copied to the left<br />

part. Figure 2 shows an example of exchange method.<br />

C. Focus<strong>in</strong>g Anneal<strong>in</strong>g Stage<br />

The focus<strong>in</strong>g anneal<strong>in</strong>g stage differs to the previous<br />

anneal<strong>in</strong>g stage, which tends to alter the solution with<br />

smaller changes at low temperature, consequently to<br />

achieve an effective convergence. In this stage, it<br />

randomly selects a state assignment and its neighbour<strong>in</strong>g<br />

state assignment from the representation and swaps these<br />

two state assignments. These two states can be close to<br />

each other, as shown <strong>in</strong> Figure 3, or apart from each other,<br />

as shown <strong>in</strong> Figure 4.<br />

© 2013 ACADEMY PUBLISHER


1408 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

new solution. State entry 9, 2, 3, and 7 from the best<br />

solution form part of new solution. State entry 8, 3, 9, 2, 4<br />

and 6 from current solution form the other part of new<br />

solution. Modification of the new solution is carried out<br />

to make sure that duplicated state entry 2, 3, and 9 do not<br />

appear <strong>in</strong> the solution. By do<strong>in</strong>g so, unassigned state<br />

entry 0, 1 and 5 are filled <strong>in</strong>.<br />

Figure 2. Exchange method.<br />

Figure 3. Swap method for two states close to each other.<br />

Figure 4. Swap method for two states apart from each other.<br />

D. Crossover<br />

Crossover operator is designed to escape the local<br />

optimum <strong>in</strong> the GA. In this paper crossover operator is<br />

adapted <strong>in</strong> the simulated anneal<strong>in</strong>g to generate a new<br />

solution by comb<strong>in</strong><strong>in</strong>g the best solution with the current<br />

solution. Consequently, some potential parts of the<br />

solution can be <strong>in</strong>herited from the previous solution.<br />

It operates as a position-based crossover [18]. An array<br />

of b<strong>in</strong>ary bits is <strong>in</strong>itialised randomly, <strong>in</strong> which the length<br />

of the array equals to the length of the representation.<br />

When 1s appear <strong>in</strong> the array, copy the states from the best<br />

solution to new solution. When 0s appear <strong>in</strong> the array,<br />

copy the states from the current solution to new solution.<br />

S<strong>in</strong>ce each entry of state assignment solution is unique,<br />

cont<strong>in</strong>uous check is required avoid<strong>in</strong>g the repetition of<br />

the same states which is not allowed. If state entry is<br />

duplicated, the first unassigned state entry is assigned.<br />

Figure 5 shows an example of relay operator to generate<br />

Figure 5. Crossover operator.<br />

E. Cost Function<br />

By m<strong>in</strong>imis<strong>in</strong>g (6), low power dissipation could be<br />

achieved. Unfortunately, this may lead to area overhead,<br />

result<strong>in</strong>g <strong>in</strong> power overhead <strong>in</strong> the comb<strong>in</strong>ational part of<br />

the circuit. Therefore, objectives of area and power<br />

should be optimised simultaneously. The total cost<br />

function is C total = γC area + (1-γ) E, where C area is area<br />

function, E is power function and γ is a parameter<br />

specify<strong>in</strong>g the tradeoff of E with respect to C area .<br />

F. Proposed Algorithm<br />

To beg<strong>in</strong> with, an <strong>in</strong>itiation solution is randomly<br />

produced. The anneal<strong>in</strong>g approach is divided <strong>in</strong>to rough<br />

anneal<strong>in</strong>g and focus<strong>in</strong>g anneal<strong>in</strong>g, which is identified by<br />

Temperature threshold T threshold . In the rough anneal<strong>in</strong>g<br />

stage the temperature is high and uses exchange method.<br />

In the focus<strong>in</strong>g anneal<strong>in</strong>g stage the temperature is low<br />

and uses swap methods. The solution is evaluated by the<br />

cost function. The solution is accepted accord<strong>in</strong>g to a<br />

probability P = exp (-∆C/T), where ∆C is the difference<br />

cost between new solution and current solution, T is the<br />

temperature. P is between 0 and 1. If the solution is<br />

improved and kept accord<strong>in</strong>g to P, the new solution will<br />

be compared with the best recorded solution to decide<br />

whether updat<strong>in</strong>g the best record is necessary. If new<br />

solution is rejected <strong>in</strong>stead, this solution is then ignored<br />

and reverses the current solution. Outer loop updates the<br />

temperature. The temperature schedules at each outer<br />

iteration. In the <strong>in</strong>ner loop it generates possible solutions<br />

at each temperature. The algorithm term<strong>in</strong>ates when<br />

reach<strong>in</strong>g the lowest temperature and the output will be the<br />

best record. The pseudo code is shown <strong>in</strong> Algorithm 1.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1409<br />

Algorithm 1: Two stage Simulated Anneal<strong>in</strong>g<br />

Inputs: Temperature coefficient α<br />

Number of state variables N<br />

Exit temperature T 0<br />

Temperature threshold T threshold<br />

Outputs: The best solution S best<br />

beg<strong>in</strong><br />

<strong>in</strong>itialise a solution S current and temperature T<br />

while (T < T 0 ) { // outer loop<br />

k = 0<br />

while (k < N 3 ) { // <strong>in</strong>ner loop<br />

if (T > T threshold ) S new = generate solution via<br />

exchange method<br />

else<br />

S new = generate solution via swap methods<br />

k= k + 1<br />

r = random (0, 1)<br />

∆C = cost (S new ) – cost (S current )<br />

if (r < exp (–∆C/T)) {<br />

S current = S new<br />

if (cost (S best ) > cost (S current ))<br />

S best = S current<br />

}<br />

} // end of <strong>in</strong>ner loop<br />

T =αT<br />

} // end of outer loop<br />

Output the best solution S best<br />

IV. EXPERIMENTAL RESULTS<br />

The algorithm has been implemented <strong>in</strong> C++ and the<br />

results have been obta<strong>in</strong>ed on a personal computer with<br />

an INTEL CPU 2.4 GHz and 4 GB RAM. A Gaussian<br />

elim<strong>in</strong>ation method is used to f<strong>in</strong>d the total transition<br />

probabilities accord<strong>in</strong>g to the STT of an FSM.<br />

ESSPRESSO is used to m<strong>in</strong>imise the circuit for each state<br />

assignment. The product terms from this m<strong>in</strong>imisation<br />

determ<strong>in</strong>e the number of cubes for that assignment.<br />

Switch<strong>in</strong>g activity is calculated by (6). T, T threshold and T 0<br />

are set to 10000, 100 and 0.1, respectively. In order to<br />

balance the required solution quality and computational<br />

time, temperature schedule coefficient α is selected to<br />

0.95 and 0.8 <strong>in</strong> the rough anneal<strong>in</strong>g stage and focus<strong>in</strong>g<br />

anneal<strong>in</strong>g stage, respectively. Based on the numerous<br />

experimental results, when γ is 0.3, it performs the best<br />

trade-off between area and power consumption.<br />

The results are given <strong>in</strong> Table I, <strong>in</strong> which the first<br />

column shows the name of the circuit, the second column<br />

shows the number of states for the given circuit <strong>in</strong> the<br />

first column. Next three columns show comparison<br />

results among GA [8], MOGA [7] and the proposed<br />

method <strong>in</strong> terms of CPU time. The proposed method can<br />

convergence quicker than results compared to GA<br />

method <strong>in</strong> [8]. MOGA m<strong>in</strong>imises the logical expressions<br />

via communication with ESSPRESSO, result<strong>in</strong>g that it<br />

takes significant more time than the proposed method.<br />

It can be seen <strong>in</strong> Table II that on average the proposed<br />

method produces results requir<strong>in</strong>g 13.2% fewer product<br />

terms and 44.1% less switch<strong>in</strong>g activity compared to<br />

results obta<strong>in</strong>ed from NOVA [19]. Methods used <strong>in</strong> [20]<br />

and [21] achieve good power reduction but pay<strong>in</strong>g<br />

penalty of area consumption. MOGA [7] and GA [8]<br />

perform well <strong>in</strong> both area and power. The proposed<br />

algorithm outperforms other methods <strong>in</strong> both area sav<strong>in</strong>g<br />

and less power consumption <strong>in</strong> the tested suite.<br />

TABLE I.<br />

RECENTLY PUBLISHED RESULTS IN TERMS OF CPU TIME<br />

Circuits States GA[8] (s) MOGA[7] Ours (s)<br />

bbara 10 0.17 0h and 8 m<strong>in</strong>s 0.12<br />

cse 16 0.59 3hs and 9 m<strong>in</strong>s 1.1<br />

donfile 24 0.77 6hs and 4 m<strong>in</strong>s 1.58<br />

keyb 19 1.61 3hs and 32 m<strong>in</strong>s 0.87<br />

modulo12 12 0.13 5hs and 56 m<strong>in</strong>s 0.15<br />

planet 48 2.75 25hs and 23 m<strong>in</strong>s 2.77<br />

s1 20 4.37 6hs and 0 m<strong>in</strong> 3.94<br />

styr 30 4.44 6hs and 5 m<strong>in</strong>s 2.57<br />

ex1 20 3.26 6hs and 7 m<strong>in</strong>s 2.68<br />

ex4 14 0.27 6hs and 1 m<strong>in</strong>s 0.38<br />

opus 10 0.21 0h and 40 m<strong>in</strong>s 0.22<br />

Total 606 18.57 69h and 5 m<strong>in</strong>s 16.38<br />

V. CONCLUSIONS<br />

In the paper, two-stage simulated anneal<strong>in</strong>g based<br />

algorithm approach to the state assignment problem is<br />

proposed with the aim of m<strong>in</strong>imis<strong>in</strong>g area and power<br />

dissipation for sequential circuits. By us<strong>in</strong>g designed twostage<br />

anneal<strong>in</strong>g approach, the algorithm is able to f<strong>in</strong>d the<br />

best assignment with fast convergence, which has<br />

reduced switch<strong>in</strong>g activity to m<strong>in</strong>imise the power<br />

dissipation and the area simultaneously. By comb<strong>in</strong>g the<br />

best and current solutions, it utilises the experience of<br />

past solutions, overcom<strong>in</strong>g the problem that rank<strong>in</strong>g<br />

system <strong>in</strong> GA selection takes significant runtime. As a<br />

result, the algorithm outperforms the exist<strong>in</strong>g GA-based<br />

FSM state-encod<strong>in</strong>g strategies achiev<strong>in</strong>g 13.2% fewer<br />

product terms and 44.1% less switch compared to NOVA<br />

and is therefore more suitable for area/power-optimised<br />

realisation of FSMs.<br />

ACKNOWLEDGMENT<br />

This work was supported by a grant (No. 11MS011)<br />

from State Key Lab of ASIC and System, Ch<strong>in</strong>a.<br />

REFERENCES<br />

[1] P. J. Wang, H. Li, “Low power mapp<strong>in</strong>g for AND/XOR<br />

circuits and its application <strong>in</strong> search<strong>in</strong>g the best mixedpolarity,”<br />

Journal of Semiconductors, vol. 32, pp. 025007-<br />

6, 2011.<br />

[2] S. N. Pradhan, M. T. Kumar, S. Chattopadhyay, “Low<br />

power f<strong>in</strong>ite state mach<strong>in</strong>e synthesis us<strong>in</strong>g power-gat<strong>in</strong>g,”<br />

Integration, the VLSI Journal, vol. 44, pp. 175-184, 2011.<br />

[3] P. J. Wang, J. G. Lu, X. Y. Zeng, “Search<strong>in</strong>g the best<br />

polarity for low power based on WAGA,” Journal of CAD<br />

& Computer Graphics, vol. 20, pp. 73-78, 2008.<br />

© 2013 ACADEMY PUBLISHER


1410 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

[4] T. Villa, T. Kam, R. Brayton, and A. Sangiovanni-<br />

V<strong>in</strong>centelli, Synthesis of FSMs: Logic Optimisation<br />

Kluwer Academic <strong>Publisher</strong>s, 1997.<br />

[5] J. H. Holland, Adaptation <strong>in</strong> Natural and Artificial Systems,<br />

University of Michigan Press, 1975.<br />

[6] A. E. A. Alma<strong>in</strong>i, J. F. Miller, P. Thomson, and S. Bill<strong>in</strong>a,<br />

“State assignment of f<strong>in</strong>ite state mach<strong>in</strong>es us<strong>in</strong>g a genetic<br />

algorithm,” IEE Proc. Comput. Digit. Tech., vol. 142, pp.<br />

279-286, 1995.<br />

[7] B. A. Al Jassani, N. Urquhart, A. E. A. Alma<strong>in</strong>i, “State<br />

assignment for sequential circuits us<strong>in</strong>g multi-objective<br />

genetic algorithm,” IET Proc Comput. Digit. Tech., vol. 5,<br />

pp. 296-305, 2011.<br />

[8] Y. Xia, and A. E. A. Alma<strong>in</strong>i, “Genetic algorithm based<br />

state assignment for power and area optimisation,” IET<br />

Proc Comput. Digit. Tech., vol. 149, pp. 128–133, 2002.<br />

[9] S. Chattopadhyay and P. Reddy, “F<strong>in</strong>ite state mach<strong>in</strong>e state<br />

assignment target<strong>in</strong>g low power consumption,” IET Proc<br />

Comput. Digit. Tech., vol. 151, pp. 61–70, 2004.<br />

[10] S. Chattopadhyay, “Area conscious state assignment with<br />

flip flop and output polarity selection for f<strong>in</strong>ite state<br />

mach<strong>in</strong>e synthesis genetic algorithm approach,” Comput. J.,<br />

vol. 48, pp. 443-450, 2005.<br />

[11] W. T. Shiue, “Novel state m<strong>in</strong>imization and state<br />

assignment <strong>in</strong> f<strong>in</strong>ite state mach<strong>in</strong>e design for low power<br />

portable devices,” Integration. VLSI J., vol. 38, pp. 549-<br />

570, 2005.<br />

[12] S. Goren and F. J. Ferguson, “On state reduction of<br />

<strong>in</strong>completely specified f<strong>in</strong>ite state mach<strong>in</strong>es,” Computer<br />

Electr. Eng., vol. 33, pp. 58-69, 2007.<br />

[13] W. M. Aly, “Solv<strong>in</strong>g the state assignment problem us<strong>in</strong>g<br />

stochastic search aided with simulated anneal<strong>in</strong>g,” America<br />

J. Eng. Appl. Sci., vol. 2, pp. 710-714, 2009.<br />

[14] T. A. Dolotta, and E.J. McCluskey, “The cod<strong>in</strong>g of <strong>in</strong>ternal<br />

states of sequential circuits,” IEEE Trans. Electron.<br />

Comput., vol. EC-13, pp. 549-562, 1964.<br />

[15] S. Chattopadhyay, and P. N. Reddy, “F<strong>in</strong>ite state mach<strong>in</strong>e<br />

state assignment target<strong>in</strong>g low power consumption,” IET<br />

Proc Comput. Digit. Tech., vol. 151, pp. 61-70, 2003.<br />

[16] Y. Q. Sheng, A. Takahashi, S. Ueno, “2-Stage Simulated<br />

Anneal<strong>in</strong>g with Crossover Operator for 3D-Pack<strong>in</strong>g<br />

Volume M<strong>in</strong>imization,” Proceed<strong>in</strong>gs of the 17th Workshop<br />

on Synthesis And System Integration of Mixed Information<br />

Technologies, pp. 227-232, 2012.<br />

[17] H. T. Wang; Z. J. Wang; J. Luo, “A simulated anneal<strong>in</strong>g<br />

algorithm for s<strong>in</strong>gle conta<strong>in</strong>er load<strong>in</strong>g problem,”<br />

Proceed<strong>in</strong>gs of the 9th Intl. Conf. on Service Systems and<br />

Service Management, pp. 551-556, 2012.<br />

[18] A. E. A. Alma<strong>in</strong>i, N. Zhuang, and F. Bourset,<br />

“M<strong>in</strong>imisation of multioutput Reed–Muller b<strong>in</strong>ary decision<br />

diagrams us<strong>in</strong>g hybrid genetic algorithm,” IEE Electron.<br />

Lett., vol. 31, pp. 1722-1723, 1995.<br />

[19] T. Villa, and A. Sangiovanni-V<strong>in</strong>centelli, “NOVA: state<br />

assignment of f<strong>in</strong>ite state mach<strong>in</strong>e for optimal two-level<br />

logic implementation,” IEEE Trans. Comput. Aided Des.<br />

Integr. Circuits Syst., vol. 9, pp. 905-924, 1990.<br />

[20] S. K. Hong, I. C. Park, S. H. Hwang, and C. M. Kyung,<br />

“State assignment <strong>in</strong> f<strong>in</strong>ite state mach<strong>in</strong>es for m<strong>in</strong>imal<br />

switch<strong>in</strong>g power consumption,” IEE Electron. Lett., vol. 30,<br />

pp. 627-629, 1994.<br />

[21] S. J. Wang, and M. D. Horng, “State assignment of f<strong>in</strong>ite<br />

state mach<strong>in</strong>es for low power applications,” IEE Electron.<br />

Lett., vol. 32, pp2323-2324, 1996.<br />

Meng Yang received Bachelor of<br />

Eng<strong>in</strong>eer<strong>in</strong>g (Honor) degree <strong>in</strong> Electrical<br />

Eng<strong>in</strong>eer<strong>in</strong>g from Shanghai University,<br />

Shanghai, Ch<strong>in</strong>a, <strong>in</strong> 1999. He received<br />

Master of Science with dist<strong>in</strong>ction <strong>in</strong><br />

Electronics and Communication<br />

Eng<strong>in</strong>eer<strong>in</strong>g and Ph.D. <strong>in</strong> Electronics from<br />

School of Eng<strong>in</strong>eer<strong>in</strong>g Ed<strong>in</strong>burgh Napier<br />

University, Ed<strong>in</strong>burgh, UK, <strong>in</strong> 2002 and 2006, respectively.<br />

Currently he is a lecturer of Department of Microelectronics,<br />

School of Information Science and Technology, Fudan<br />

University, Shanghai, Ch<strong>in</strong>a. His research <strong>in</strong>terests <strong>in</strong>clude<br />

algorithms <strong>in</strong> FPGA design automation, logic synthesis, and<br />

dynamic reconfigurable FPGA automation design. He has<br />

published more than 30 research papers.<br />

Dr. Yang is a member of IET and Chairman of Young<br />

Member Section of IET Shanghai Branch.<br />

TABLE II.<br />

EXPERIMENTAL RESULTS SHOWING POWER AND AREA IN COMPARISON<br />

Circuits<br />

NOVA[19] MOGA[7] GA[8] Hong[20] Wang[21] This paper<br />

area Power area power area Power Area power area power area Power<br />

bbara 24 0.495 22 0.49 22 0.317 26 0.295 26 0.279 22 0.277<br />

bbsse 30 1.5 28 0.663 27 0.783 31 0.856 31 0.776 27 0.758<br />

cse 46 0.604 43 0.39 43 0.355 50 0.292 48 0.239 43 0.250<br />

donfile 28 1.75 22 1.375 36 1.6 40 1.083 45 1.125 22 1.458<br />

keyb 48 1.466 46 0.98 46 0.674 52 0.647 58 0.556 46 0.533<br />

modulo12 12 1 10 0.75 12 0.583 12 0.583 12 0.5 10 0.568<br />

planet 87 2.831 81 2.49 86 2.424 101 1.153 103 0.984 81 1.680<br />

s1 80 1.698 43 1.37 66 1.48 85 1.131 91 1.175 43 1.188<br />

sand 97 1.085 94 0.585 89 0.765 110 0.604 109 0.61 92 0.666<br />

styr 94 1.278 78 1.1 88 0.943 101 0.578 99 0.553 78 0.578<br />

ex1 44 1.358 48 0.78 52 0.842 49 0.755 47 1.135 48 0.754<br />

ex4 19 1.316 13 0.568 14 0.421 16 0.495 18 0.957 13 0.476<br />

opus 16 0.812 15 0.49 15 0.556 17 0.524 17 0.712 15 0.471<br />

tra<strong>in</strong>11 9 0.619 10 0.414 10 0.339 9 0.36 10 0.714 10 0.302<br />

Total 634 17.812 553 12.445 606 12.082 699 9.356 714 10.315 550 9.959<br />

Improved% 0% 0% -13% -30% -4% -32% 10% -47% 13% -42% -13.2% -44.1%<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1411<br />

A Rotation-based Data Buffer<strong>in</strong>g Architecture for<br />

Convolution Filter<strong>in</strong>g <strong>in</strong> a Field Programmable<br />

Gate Array<br />

Zhijian Lu<br />

College of Computer Science and Technology Harb<strong>in</strong> Eng<strong>in</strong>eer<strong>in</strong>g University, Harb<strong>in</strong>, Ch<strong>in</strong>a<br />

Email: luzhijian@hrbeu.edu.cn<br />

Yanxia Wu, Zhenhua Guo, Guochang Gu<br />

College of Computer Science and Technology Harb<strong>in</strong> Eng<strong>in</strong>eer<strong>in</strong>g University, Harb<strong>in</strong>, Ch<strong>in</strong>a<br />

Email: {wuyanxia, guozhenhua, guguochang}@hrbeu.edu.cn<br />

Abstract—Convolution filter<strong>in</strong>g applications range from<br />

image recognition and video surveillance. Two observations<br />

drive the design of a new buffer<strong>in</strong>g architecture for convolution<br />

filters. First, the convolutional operations are <strong>in</strong>herently<br />

local; hence every pixel of the output feature maps is calculated<br />

by the neighbor<strong>in</strong>g pixels of the <strong>in</strong>put feature maps.<br />

Even though the operation is simple, the convolution filter<strong>in</strong>g<br />

is both computation-<strong>in</strong>tensive and memory-<strong>in</strong>tensive.<br />

For real-time applications, large amounts of on-chip memories<br />

are required to support massively parallel process<strong>in</strong>g<br />

architectures. Second, to avoid access to external memories<br />

directly, the data that are already stored <strong>in</strong> on-chip memories<br />

should be used as many times as possible. Based on these<br />

two observations, we show that for a given throughput<br />

rate and off-chip memory bandwidth, a rotation-based data<br />

buffer<strong>in</strong>g architecture provide the optimum area-utilization<br />

results for a particular design po<strong>in</strong>t, which are commonly<br />

used applications <strong>in</strong> recognition area.<br />

Index Terms—convolution filter<strong>in</strong>g, Field Programmable<br />

Gate Arrays (FPGAs), data buffer<strong>in</strong>g<br />

I. INTRODUCTION<br />

Convolution filters are the computational models that<br />

are widely used <strong>in</strong> recognition and video process<strong>in</strong>g doma<strong>in</strong>s<br />

[1][2][3][4]. The computation of convolution requires<br />

not only the high computational capability but also<br />

large memory bandwidth, especially when high-def<strong>in</strong>ition<br />

images and videos have to be processed <strong>in</strong> real-time. In<br />

these applications, convolution filter<strong>in</strong>g plays an essential<br />

role [5][6]. Generally, external memories are used to conta<strong>in</strong><br />

<strong>in</strong>put image pixels, but the memory bandwidth cannot<br />

satisfy the requirement of the optimal throughput directly.<br />

Hence <strong>in</strong>termediate buffers by means of on-chip<br />

memories are adopted to avoid access to external memories<br />

directly [7][8]. To load as many pixel values as needed<br />

to the convolution filter <strong>in</strong> one cycle, multiple memory<br />

ports are attached to <strong>in</strong>termediate data buffers. Once a<br />

pixel value is loaded, it can be reused for the correspond<strong>in</strong>g<br />

successive convolutions to avoid access<strong>in</strong>g it from<br />

off-chip memories repetitively. As a result, the requirements<br />

for off-chip memory bandwidth are reduced.<br />

Convolution architecture with a complete convolution<br />

architecture is adopted <strong>in</strong> [7], where a set of l<strong>in</strong>ear shift<br />

registers are used to move a w<strong>in</strong>dow over the <strong>in</strong>put<br />

image. The <strong>in</strong>put image is divided <strong>in</strong> rows, each with a<br />

fixed length accord<strong>in</strong>g to the <strong>in</strong>put image row length, and<br />

the height accord<strong>in</strong>g to the convolution w<strong>in</strong>dow height.<br />

Each pixel <strong>in</strong> the <strong>in</strong>put image needs to be loaded only<br />

once to the <strong>in</strong>termediate data buffer and with a fixed m<strong>in</strong>imum<br />

external memory bandwidth. In case the size of<br />

<strong>in</strong>put image or convolution w<strong>in</strong>dow become large, FPGA<br />

implementations become very expensive, which will cost<br />

a significant amount of FPGA resources [7][8].<br />

There are alternative buffer<strong>in</strong>g architectures that <strong>in</strong>ternal<br />

buffers only store a small portion of pixels [7][9].<br />

Each group of shift registers <strong>in</strong> the convolution w<strong>in</strong>dow<br />

receives the pixels belong<strong>in</strong>g to consecutive rows of <strong>in</strong>put<br />

image. Compared with the aforementioned methods, a<br />

great shift register reduction is achieved. However, multiple-dataflow<br />

is needed to feed data to the <strong>in</strong>ternal buffer.<br />

Pixels <strong>in</strong> the <strong>in</strong>put image need to be read repetitively<br />

from external memories depend<strong>in</strong>g on the size of convolution<br />

w<strong>in</strong>dow. And to keep the maximum throughput<br />

rate, this leads to a sharp <strong>in</strong>crease <strong>in</strong> terms of external<br />

memory bandwidth requirement.<br />

In this paper, we are concerned with the implementation<br />

of convolution filters <strong>in</strong> FPGA and we design a alternative<br />

buffer<strong>in</strong>g architecture for convolution filters that<br />

shows good balance between on-chip resource utilization<br />

and external memory bus bandwidth.<br />

II. ROTATION-BASED DATA BUFFERING ARCHITECTURE<br />

Yanxia Wu is the correspond<strong>in</strong>g author.<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1411-1416


1412 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 1. Conceptual view of an convolver and an image<br />

In this section, we will first <strong>in</strong>troduce the convolution<br />

filter<strong>in</strong>g implementation strategy. The advantages and<br />

disadvantages of exist<strong>in</strong>g implementation architectures<br />

will be discussed. Then we will present the rotation-based<br />

data buffer<strong>in</strong>g architecture. In Fig. 1, we show the conceptual<br />

view of a convolution filter mov<strong>in</strong>g over an<br />

<strong>in</strong>put image, which will be used <strong>in</strong> the follow<strong>in</strong>g<br />

sections.<br />

A. Convolution Filter Implementation Strategy<br />

The convolution of an image is def<strong>in</strong>ed by equation<br />

1:<br />

<br />

∑ ∑ , ∙ ,<br />

,<br />

R<br />

S<br />

Input Image<br />

/ /<br />

/ /<br />

(1)<br />

<br />

where , is the convolved pixel on the output image,<br />

, is the pixel value from the <strong>in</strong>put image, and , is<br />

the convolution kernel weight. To calculate the convolution<br />

, , each pixel , from a w<strong>in</strong>dow of <strong>in</strong>put<br />

<br />

image centered on , is multiplied by the correspond<strong>in</strong>g<br />

convolution kernel of weights, and then the<br />

products are accumulated to produce the output value.<br />

<br />

Because the two-dimensional convolution , of each<br />

pixel , requires the values of its 1 immediate<br />

neighbors before be<strong>in</strong>g able to process that pixel, more<br />

columns than needed will be read with<strong>in</strong> the same transaction.<br />

Each output pixel requires multiplyaccumulations,<br />

all of which can be performed <strong>in</strong> parallel.<br />

To accelerate the computation of convolution filter, multiple<br />

data <strong>in</strong> a convolution w<strong>in</strong>dow need to be accessed<br />

simultaneously, so the calculations can be performed <strong>in</strong><br />

parallel.<br />

B. Multiple Dataflow S<strong>in</strong>gle Convolution Architecture<br />

(MDSCA)<br />

In order to elim<strong>in</strong>ate the shift register arrays <strong>in</strong> [7],<br />

multiple dataflow s<strong>in</strong>gle convolution architectures are<br />

adopted <strong>in</strong> [8][10]. In these architectures, small portion of<br />

image pixels are loaded to the convolution filter. However,<br />

with fewer shift register arrays, the pixels can no<br />

longer be loaded to the convolution w<strong>in</strong>dow <strong>in</strong> zigzag<br />

order. Instead of that, pixels belong<strong>in</strong>g to consecutive<br />

rows are read <strong>in</strong>to the shift register simultaneously.<br />

Groups of FIFOs are <strong>in</strong>cluded to feed the pixels to the<br />

shift registers. After one column of pixels are fed <strong>in</strong>to the<br />

convolution filter, the convolution w<strong>in</strong>dow moves to a<br />

next position.<br />

Fig. 2 shows a multiple dataflow s<strong>in</strong>gle convolution<br />

architecture us<strong>in</strong>g an <strong>in</strong>put/output bus, which can completely<br />

elim<strong>in</strong>ate the shift register arrays <strong>in</strong> [7]. The convolution<br />

w<strong>in</strong>dow pixel registers receive the pixels belong<strong>in</strong>g<br />

to consecutive rows of the orig<strong>in</strong>al image through <br />

stacks. Multiple dataflow s<strong>in</strong>gle convolution architecture<br />

requires much larger bandwidth than the s<strong>in</strong>gle dataflow<br />

architecture. The shift register arrays are completely<br />

elim<strong>in</strong>ated. Extra memory bandwidth is used to reduce<br />

the number of shift registers. To compute a s<strong>in</strong>gle cycle<br />

convolution, one new pixel per row is needed at<br />

every cycle. The total of pixels transferred and one<br />

result produced means that a bandwidth of 1 bytes<br />

per cycle is needed.<br />

C. S<strong>in</strong>gle Dataflow Complete Convolution Architecture<br />

(SDCCA)<br />

To avoid directly access to external memories, FPGA<br />

on-chip memories are used as <strong>in</strong>termediate data buffers<br />

[7]. In Fig. 3, a s<strong>in</strong>gle dataflow complete convolution<br />

architecture, makes use of on-chip shift register arrays to<br />

move a w<strong>in</strong>dow over the <strong>in</strong>put image. To extract<br />

pixels from <strong>in</strong>put image, a s<strong>in</strong>gle dataflow strategy has<br />

been adopted. Pixels are fed from external memories <strong>in</strong> a<br />

zigzag order, until 1 complete l<strong>in</strong>es and the first <br />

pixels <strong>in</strong> the next l<strong>in</strong>e are conta<strong>in</strong>ed with<strong>in</strong> a series of<br />

l<strong>in</strong>ear shift registers. From that moment on, all the pixels<br />

belong<strong>in</strong>g to the first convolution w<strong>in</strong>dow are<br />

available for the process<strong>in</strong>g element. Each time a new<br />

pixel is loaded, the convolution w<strong>in</strong>dow moves to a new<br />

position until the entire image has been visited. The<br />

throughput of this architecture is one clock per pixel. In<br />

[7], 1 sets of shift registers with a length of ,<br />

are employed to keep data before mov<strong>in</strong>g them to the<br />

convolution filter, and sets of registers, each with <br />

shift registers, are used for the convolution filter. These<br />

shift registers, which enable arbitrary size convolution<br />

filter to work with a s<strong>in</strong>gle data stream, require no more<br />

than one pixel per clock external memory bandwidth.<br />

Pixels <strong>in</strong> the <strong>in</strong>put image need to be read only once. The<br />

side-effect of this architecture is that <strong>in</strong> order to make this<br />

s<strong>in</strong>gle data stream architecture work, 1 complete<br />

rows must be read from external memory first, therefore<br />

stor<strong>in</strong>g these data with<strong>in</strong> a set of shift registers would be<br />

very expensive <strong>in</strong> FPGA implementation when the size of<br />

<strong>in</strong>put image or the size of convolution filter is large.<br />

D. Rotation-based Multiple dataflow Buffer<strong>in</strong>g Architecture<br />

(RMDBA)<br />

In order to reuse data that are already stored <strong>in</strong> on-chip<br />

buffers as many times as possible, we proposed a rotation-based<br />

data buffer<strong>in</strong>g architecture. Fig.4 illustrates <br />

cont<strong>in</strong>uous convolution filter <strong>in</strong> a row-wise direction,<br />

where the two adjacent filter w<strong>in</strong>dows share 1 columns.<br />

The architecture of these slid<strong>in</strong>g w<strong>in</strong>dows <strong>in</strong>cludes<br />

R contiguous convolution filter w<strong>in</strong>dows, which share<br />

1 columns <strong>in</strong> the row-wise direction. If the calculations<br />

of these convolution kernels are performed at the<br />

same time, a much higher level of data reus<strong>in</strong>g will be<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1413<br />

F<br />

I<br />

F<br />

O<br />

S<br />

shift<br />

registers<br />

off-chip memory<br />

and FIFO<br />

.<br />

.<br />

.<br />

.<br />

.<br />

.<br />

F<br />

I<br />

F<br />

O<br />

.<br />

.<br />

.<br />

S<br />

shift<br />

registers<br />

.<br />

.<br />

.<br />

convolution filter array<br />

F<br />

I<br />

F<br />

O<br />

S<br />

shift<br />

registers<br />

Figure 2. Multiple dataflow s<strong>in</strong>gle convolution architecture<br />

off-chip memory and FIFO<br />

S<br />

shift<br />

registers<br />

(N-S) Shift registers<br />

.<br />

.<br />

.<br />

.<br />

.<br />

.<br />

.<br />

.<br />

.<br />

S<br />

shift<br />

registers<br />

.<br />

.<br />

.<br />

.<br />

.<br />

.<br />

convolution filter array<br />

(N-S) Shift registers<br />

S<br />

shift<br />

registers<br />

achieved compared with the multiple dataflow s<strong>in</strong>gle<br />

convolution architecture. Fig. 5 illustrates the rotationbased<br />

multiple dataflow architecture we proposed. The<br />

number of shift register arrays is extended to Y to hold all<br />

the pixels <strong>in</strong> the area as depicted <strong>in</strong> Fig. 4. Unlike<br />

the multiple dataflow s<strong>in</strong>gle convolution architecture and<br />

the s<strong>in</strong>gle dataflow complete convolution architecture, the<br />

pixel data <strong>in</strong> each set of shift register array are not simultaneously<br />

fed to the convolution filter w<strong>in</strong>dow, but <strong>in</strong> a<br />

serial type <strong>in</strong>stead. One register <strong>in</strong> the shift register group<br />

is useable <strong>in</strong> each cycle, and a rotationally self<strong>in</strong>crement<strong>in</strong>g<br />

counter is used to address the register <strong>in</strong> the<br />

output. Consequently, pixels <strong>in</strong> all of a same row <strong>in</strong> the<br />

<strong>in</strong>put, belong<strong>in</strong>g to adjacent w<strong>in</strong>dows <strong>in</strong> the row-wise<br />

direction, are available to the convolution filter <strong>in</strong> each<br />

cycle. After cycles, all the data <strong>in</strong> the place have<br />

Figure 3. S<strong>in</strong>gle dataflow complete convolution architecture<br />

been sent to the convolution filter, and then shift register<br />

arrays will be updated. A new row of data will be moved<br />

<strong>in</strong> from the FIFO and moves the area to next position<br />

effectively. The architecture for the convolution filter<br />

us<strong>in</strong>g rotation-based data buffer<strong>in</strong>g architecture is not the<br />

same as the aforementioned architectures. For each <br />

convolution w<strong>in</strong>dow, <strong>in</strong>put pixels are fed column-bycolumn,<br />

therefore one-column convolution l<strong>in</strong>e can be<br />

calculated, and it will take cycles to complete all the<br />

calculation for each convolution w<strong>in</strong>dow. When neighbor<strong>in</strong>g<br />

w<strong>in</strong>dows are available, entire R one-column convolution<br />

can be processed simultaneously.<br />

In order to achieve the throughput rate of 1 cycle/pixel,<br />

multiple dataflow must be loaded to update the convolution<br />

w<strong>in</strong>dow. Compared with the multiple dataflow s<strong>in</strong>gle<br />

© 2013 ACADEMY PUBLISHER


1414 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 4. R simultaneous convolution w<strong>in</strong>dows <strong>in</strong> a area<br />

off-chip memory<br />

. . . . . .<br />

F<br />

I<br />

F<br />

O<br />

F<br />

I<br />

F<br />

O<br />

column 1 column S-1 column S column Y<br />

F<br />

I<br />

F<br />

O<br />

F<br />

I<br />

F<br />

O<br />

. . .<br />

. . .<br />

R . . . 1<br />

R . . . 1<br />

R . . . 1<br />

R . . . 1<br />

. . . . . .<br />

convolution filter array<br />

Figure 5. Rotation-based data buffer<strong>in</strong>g architecture<br />

convolution architecture the w<strong>in</strong>dow <strong>in</strong> the rotation-based<br />

architecture is updated every cycle. In this case, shift<br />

registers can move every cycles. pixels <strong>in</strong> all will be<br />

loaded from off-chip memories every cycles. So the<br />

external memory bandwidth is / pixels/clock. This<br />

means that for most convolution filter applications approximately<br />

twice of the external memory bandwidth<br />

requirement is needed.<br />

III. ARCHITECTURE SELECTION<br />

In this section, we will consider an <strong>in</strong>put image size of<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1415<br />

1280720 with 8 bits/pixel and a convolution kernel size<br />

of 77 as a case study. The operation will fetch image<br />

pixels from external memories, and store back to external<br />

memories after the convolution operation. In addition to<br />

this we will use a memory bus word length of 256-bits<br />

and a burst length (BL) of 8 words (i.e. 16 pixels). In<br />

Table I, we have summarized the ma<strong>in</strong> features of the two<br />

and the proposed architectures: area-utilization measured<br />

<strong>in</strong> terms of register pixels and memory pixels. Flip-flop<br />

count was obta<strong>in</strong>ed by multiply<strong>in</strong>g the number of shift<br />

registers and memory pixels by bit per pixel;<br />

TABLE 1.<br />

FEATURES OF DIFFERENT CONVOLUTION FILTER FOR A WINDOW<br />

architecture<br />

register<br />

pixels<br />

memory pixels<br />

throughput<br />

(cycles/pixel)<br />

ff count<br />

bandwidth (pixels/cycle)<br />

MDSCA 1 5496 7<br />

SDCCA <br />

1 <br />

<br />

1 49336 1<br />

RMDBA 1 2392 1.9<br />

TABLE 2.<br />

AREA UTILIZATION OF DIFFERENT ARCHITECTURES FOR VARIOUS CONVOLUTION FILTER WINDOW SIZE<br />

filter size<br />

MDSCA SDCCA RMDBA<br />

flip-flop count flip-flop count flip-flop count<br />

33 456 16536 760<br />

55 840 32936 1512<br />

77 5496 49336 2392<br />

99 1800 65736 3400<br />

11 11 2376 82136 4536<br />

13 13 3016 98536 5800<br />

15 15 3720 114936 7192<br />

17 17 4488 131336 8712<br />

19 19 5320 147736 10360<br />

throughput, given <strong>in</strong> terms of cycles/pixel; and external<br />

memory bandwidth requirements, given <strong>in</strong> terms of pixels/cycle.<br />

We used different FPGA resources to implement<br />

FIFOs and shift registers depend<strong>in</strong>g on specific<br />

FPGA devices.<br />

For comparison, the area-utilization will be evaluated<br />

<strong>in</strong> terms of flip-flops. The last two columns of Table I<br />

show the results of flip-flop count and external memory<br />

bandwidth requirement for the case study. The SCPB<br />

architecture shows the most area-efficient feature at the<br />

cost of much more requirement of the external memory<br />

bandwidth.<br />

In order to choose the optimum architecture for a particular<br />

design po<strong>in</strong>t, a suitable metric that consists <strong>in</strong><br />

maximiz<strong>in</strong>g the throughput with respect to the amount of<br />

resources will be used. The evaluation metric was proposed<br />

<strong>in</strong> [10] that the product throughput <strong>in</strong> terms of cycles/pixel<br />

times flip-flop number is the metric. For a particular<br />

design po<strong>in</strong>t, the architecture will m<strong>in</strong>imize the<br />

metric value and maximize the degree of area efficiency.<br />

We used the same concept <strong>in</strong> our architecture. Table 2<br />

shows the correspond<strong>in</strong>g product of flip-flop count and<br />

throughput for convolution w<strong>in</strong>dow size from 3 to 19 for<br />

the three architectures. We assumed a same output<br />

memory bandwidth of 1 pixel/cycle. In Fig. 6, we show<br />

the aforementioned metric comparisons and the rema<strong>in</strong><strong>in</strong>g<br />

variable are the same described for the case study. In<br />

the bar diagram <strong>in</strong> Fig. 6, we can observe that RMDBA<br />

architecture is superior to the rest of the architecture for<br />

w<strong>in</strong>dow size 7, and for the other w<strong>in</strong>dow size MDSCA is<br />

superior. W<strong>in</strong>dow size 5 and 7 are the most frequently<br />

used convolution w<strong>in</strong>dow <strong>in</strong> practical applications. As the<br />

size of <strong>in</strong>put image gets larger, tradeoffs must be made,<br />

depend<strong>in</strong>g on different FPGA resources and available offchip<br />

memory bandwidth.<br />

IV. CONCLUSIONS<br />

In this paper, we proposed a rotation-based data buffer<strong>in</strong>g<br />

architecture for convolution filter<strong>in</strong>g <strong>in</strong> FPGA. Compared<br />

with the direct implementation of the prior-arts, the<br />

new technique requires less FPGA resources and lowers<br />

off-chip memory bandwidth and reta<strong>in</strong>s the optimum<br />

throughput for a particular design po<strong>in</strong>t, therefore it is suitable<br />

for low-cost FPGA implementation.<br />

ACKNOWLEDGEMENTS<br />

This work is supported by the National Natural Science<br />

Foundation of Ch<strong>in</strong>a No. 61003036 and the Natural<br />

Science Foundation of Heilongjiang Prov<strong>in</strong>ce of Ch<strong>in</strong>a<br />

under Grant No. QC2010049 and Fundamental Research<br />

Funds for the Central Universities (No. HEUCFT1202,<br />

No. HEUCF100606).<br />

© 2013 ACADEMY PUBLISHER


1416 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 6. Bar diagram compar<strong>in</strong>g the area efficiency metric for different architectures and for w<strong>in</strong>dow sizes from 3x3 to 19x19 us<strong>in</strong>g the parameters of<br />

the case study. The lower the bar, the more efficient.<br />

REFERENCE<br />

[1] Gonzalez, R.C. and R.E. Woods, “Digital Image Process<strong>in</strong>g,”<br />

Prentice Hall Press, 2002<br />

[2] B. S. Wu, C. C. Hsieh and C. C. Lee, “A Distance Computer<br />

Vision Assisted Yoga Learn<strong>in</strong>g System,” Journal of<br />

Computers, 11(6): pp.2382-2388, 2011<br />

[3] Z. Wang and X. Sun, “Orthogonal Maximum Marg<strong>in</strong> Projection<br />

for Face Recognition,” Journal of Computers, 2(7):<br />

pp.377-383, 2012<br />

[4] B. Zhu and W. J<strong>in</strong>, “Radar Emitter Signal Recognition<br />

Based on EMD and Neural Network,” Journal of Computers,<br />

6(7): pp.1413-1420, 2012<br />

[5] Hecht, V. and K. Ronner, “An Advanced Programmable<br />

2D-convolution Chip for Real Time Image Process<strong>in</strong>g,”<br />

IEEE International Sympoisum on Circuits and Systems,<br />

pp.1897-1900, 1991<br />

[6] Leblebici, Y., et al., “A <strong>Full</strong>y Pipel<strong>in</strong>ed Programmable Real-time<br />

(3×3) Image Filter Based on Capacitive Thresholdlogic<br />

gates,” Proceed<strong>in</strong>gs of IEEE International Symposium<br />

on Circuits and Systems, vol.3, pp. 2072-2075, 1997<br />

[7] Bosi, B., G. Bois, and Y. Savaria, “Reconfigurable Pipel<strong>in</strong>ed<br />

2-D Convolvers for Fast Digital Signal Process<strong>in</strong>g,”<br />

IEEE Transactions on Very Large Scale Integration (VLSI)<br />

Systems, 7(3): pp. 299-308, 1999<br />

[8] Liang, X., J. Jean, and K. Tomko, “Data Buffer<strong>in</strong>g and Allocation<br />

<strong>in</strong> Mapp<strong>in</strong>g Generalized Template Match<strong>in</strong>g on<br />

Reconfigurable Systems,” The Journal of Supercomput<strong>in</strong>g,<br />

19(1): pp. 77-91, 2001<br />

[9] Nakajima, M., et al., “A 40GOPS 250mw Massively Parallel<br />

Processor Based on Matrix Architecture,” IEEE International<br />

Solid-State Circuits Conference, pp.1616-1625,<br />

2006<br />

[10] Cardells-Tormo, F. and P.L. Mol<strong>in</strong>et, “Area-efficient 2-D<br />

Shift-variant Convolvers for FPGA-based Digital Image<br />

Process<strong>in</strong>g,” IEEE Workshop on Signal Process<strong>in</strong>g Systems<br />

Design and Implementation, pp. 209-213, 2005<br />

Zhijian Lu is a Ph.D. student <strong>in</strong> College of Computer Science<br />

and Technology of Harb<strong>in</strong> Eng<strong>in</strong>eer<strong>in</strong>g University, Harb<strong>in</strong>, Ch<strong>in</strong>a.<br />

His current research <strong>in</strong>terest <strong>in</strong>cludes neural network, reconfigurable<br />

comput<strong>in</strong>g and image process<strong>in</strong>g.<br />

Yanxia Wu is Associate Professor <strong>in</strong> College of Computer Science<br />

and Technology of Harb<strong>in</strong> Eng<strong>in</strong>eer<strong>in</strong>g University, Harb<strong>in</strong>,<br />

Ch<strong>in</strong>a. Her current research <strong>in</strong>terests <strong>in</strong>clude safe compiler, reconfigurable<br />

compiler and computer architecture.<br />

Zhenhua Guo is a Ph.D. student <strong>in</strong> College of Computer Science<br />

and Technology of Harb<strong>in</strong> Eng<strong>in</strong>eer<strong>in</strong>g University, Harb<strong>in</strong>, Ch<strong>in</strong>a.<br />

His current research <strong>in</strong>terest <strong>in</strong>cludes reconfigurable comput<strong>in</strong>g<br />

and embedded system.<br />

Guochang Gu is Professor <strong>in</strong> College of Computer Science and<br />

Technology of Harb<strong>in</strong> Eng<strong>in</strong>eer<strong>in</strong>g University, Harb<strong>in</strong>, Ch<strong>in</strong>a. His<br />

ma<strong>in</strong> research <strong>in</strong>terests <strong>in</strong>clude embedded systems and safe compiler.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1417<br />

AT-M<strong>in</strong>e: An Efficient Algorithm of Frequent<br />

Itemset M<strong>in</strong><strong>in</strong>g on Uncerta<strong>in</strong> Dataset<br />

Le Wang a,b ,L<strong>in</strong> Feng a,b, *, and M<strong>in</strong>gfei Wu a,b<br />

a School of Computer Science and Technology, Faculty of Electronic Information and Electrical Eng<strong>in</strong>eer<strong>in</strong>g, Dalian<br />

University of Technology, Dalian, Liaon<strong>in</strong>g, Ch<strong>in</strong>a 116024.<br />

b<br />

School of Innovation and Experiment, Dalian University of Technology, Liaon<strong>in</strong>g, Ch<strong>in</strong>a 116024.<br />

Email: lelewater@gmail.com; fengl<strong>in</strong>@dlut.edu.cn; merphy.wmf@gmail.com<br />

Abstract—Frequent itemset/pattern m<strong>in</strong><strong>in</strong>g (FIM) over<br />

uncerta<strong>in</strong> transaction dataset is a fundamental task <strong>in</strong> data<br />

m<strong>in</strong><strong>in</strong>g. In this paper, we study the problem of FIM over<br />

uncerta<strong>in</strong> datasets. There are two ma<strong>in</strong> approaches for FIM:<br />

the level-wise approach and the pattern-growth approach.<br />

The level-wise approach requires multiple scans of dataset<br />

and generates candidate itemsets. The pattern-growth<br />

approach requires a large amount of memory and<br />

computation time to process tree nodes because the current<br />

algorithms for uncerta<strong>in</strong> datasets cannot create a tree as<br />

compact as the orig<strong>in</strong>al FP-Tree. In this paper, we propose<br />

an array based tail node tree structure (namely AT-Tree) to<br />

ma<strong>in</strong>ta<strong>in</strong> transaction itemsets, and a pattern-growth based<br />

algorithm named AT-M<strong>in</strong>e for FIM over uncerta<strong>in</strong> dataset.<br />

AT-Tree is created by two scans of dataset and it is as<br />

compact as the orig<strong>in</strong>al FP-Tree. AT-M<strong>in</strong>e m<strong>in</strong>es frequent<br />

itemsets from AT-Tree without additional scan of dataset.<br />

We evaluate our algorithm us<strong>in</strong>g sparse and dense datasets;<br />

the experimental results show that our algorithm has<br />

achieved better performance than the state-of-the-art FIM<br />

algorithms on uncerta<strong>in</strong> transaction datasets, especially for<br />

small m<strong>in</strong>imum expected support number.<br />

Index Terms—data m<strong>in</strong><strong>in</strong>g, frequent itemset, frequent<br />

pattern, uncerta<strong>in</strong> dataset<br />

I. INTRODUCTION<br />

Frequent itemsets m<strong>in</strong><strong>in</strong>g (FIM) over transaction<br />

dataset is an important and common topic <strong>in</strong> data m<strong>in</strong><strong>in</strong>g.<br />

The algorithm Apriori [1] was first proposed to discover<br />

frequent itemsets from market basket data. S<strong>in</strong>ce then,<br />

FIM algorithms were constantly proposed for various<br />

application doma<strong>in</strong>s, such as those for complete frequent<br />

itemsets [1, 2, 3, 4, 5, 6, 7], for maximal frequent itemsets<br />

[8, 9, 10, 11, 12], for closed frequent itemsets [13, 14, 15]<br />

and for frequent sequential patterns [16] and high uitlity<br />

itemsets [17, 18, 19, 20]. These algorithms concern<br />

precise transaction datasets, that is, all items can be<br />

described with a certa<strong>in</strong> value. However, many real-world<br />

applications generate or require uncerta<strong>in</strong> transaction<br />

datasets <strong>in</strong> which items can only be described with an<br />

existential probability. For example, some diseases can<br />

Manuscript received January 12, 2013; revised February. 11, 2013;<br />

accepted March 1, 2011.<br />

This work was supported by National Natural Science Foundation of<br />

P.R. Ch<strong>in</strong>a (61173163, 51105052), Program for New Century Excellent<br />

Talents <strong>in</strong> University (NCET-09-0251); and Liaon<strong>in</strong>g Prov<strong>in</strong>cial<br />

Natural Science Foundation of Ch<strong>in</strong>a (Grant No. 201102037).<br />

Correspond<strong>in</strong>g Author: L<strong>in</strong> Feng; E-mail: fengl<strong>in</strong>@dlut.edu.cn.<br />

not be def<strong>in</strong>itely diagnosed by a set of symptons - they<br />

can only be ascerta<strong>in</strong>ed as a probability value; the<br />

locations of a mov<strong>in</strong>g object obta<strong>in</strong>ed through RFID or<br />

GPS devices are not precise [21, 22]; the shopp<strong>in</strong>g habits<br />

m<strong>in</strong>ed from an e-commerce website are also probability<br />

values for predict<strong>in</strong>g what a customer will buy <strong>in</strong> the<br />

future.<br />

TABLE I.<br />

AN EXAMPLE OF UNCERTAIN DATASET<br />

TID Transaction itemset<br />

T 1 (a: 0.8), (b: 0.7), (d: 0.9), (f: 0.5)<br />

T 2 (c: 0.8), (d: 0.85), (e: 0.4)<br />

T 3 (c: 0.85), (d: 0.6), (e: 0.6)<br />

T 4 (a: 0.9) , (b: 0.85), (d: 0.65)<br />

T 5 (a: 0.95), (b: 0.7), (d: 0.8) , (e: 0.7)<br />

T 6 (b: 0.7), (c: 0.65), (f: 0.45)<br />

Table 1 shows an example of uncerta<strong>in</strong> transaction<br />

dataset, each transaction of which represents that a<br />

customer might buy a certa<strong>in</strong> item with a probability. The<br />

value associated with each item is called the existential<br />

probability of the item. For <strong>in</strong>stance, the first transaction<br />

T 1 <strong>in</strong> Table 1 shows that a customer might purchase “a”,<br />

“b”, “d” and “f” with 80%, 70%, 90% and 50% chances<br />

<strong>in</strong> the future respectively.<br />

In recent years, FIM over uncerta<strong>in</strong> datasets has<br />

become an important topic <strong>in</strong> data m<strong>in</strong><strong>in</strong>g [23, 24, 25, 26,<br />

27, 28, 29, 30, 31, 32]. The exist<strong>in</strong>g algorithms can be<br />

classified <strong>in</strong>to two ma<strong>in</strong> categories: the level-wise<br />

approach and the pattern-growth approach. The<br />

algorithms U-Apriori [31], MBP [28] and IMBP [26]<br />

employ the level-wise approach, and all these algorithms<br />

generate candidates and require multiple scans of the<br />

dataset. The algorithms UH-M<strong>in</strong>e [30], UFP-Growth [30],<br />

and UF-Growth [25, 29] employ the pattern-growth<br />

approach. UH-M<strong>in</strong>e is based on the algorithm H-M<strong>in</strong>e [5];<br />

UF-Growth is based on the classical algorithm FP-<br />

Growth [2] and employs the same method as FP-Growth<br />

for m<strong>in</strong><strong>in</strong>g frequent itemsets on uncerta<strong>in</strong> transaction<br />

itemsets. Both UH-M<strong>in</strong>e and UF-Growth cannot create a<br />

tree as compact as FP-Tree for ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g transaction<br />

itemsets, thus they require a large amount of memory and<br />

computational time to process tree nodes, especially on<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1417-1426


1418 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

large datasets. UFP-Growth [30] also builds the UFP-<br />

Tree <strong>in</strong> the same manner as FP-Growth, and the UFP-<br />

Tree is as compact as the orig<strong>in</strong>al FP-Tree. However<br />

UFP-M<strong>in</strong>e generates candidates, and identifies frequent<br />

itemsets by additional scan of dataset.<br />

So our thought is to build a tree as compact as the<br />

orig<strong>in</strong>al FP-Tree and avoid generat<strong>in</strong>g candidates. To<br />

achieve this goal, we propose a tree structure named AT-<br />

Tree (Array based Tail node Tree) and a new algorithm<br />

named AT-M<strong>in</strong>e. AT-M<strong>in</strong>e needs just two scans of<br />

dataset. In the first scan, it f<strong>in</strong>ds frequent items and<br />

arranges them <strong>in</strong> descend<strong>in</strong>g order of support number. In<br />

the second scan, it constructs an AT-Tree us<strong>in</strong>g<br />

transaction itemsets like the method of FP-Growth, while<br />

ma<strong>in</strong>ta<strong>in</strong>s the probability <strong>in</strong>formation of each transaction<br />

to a tail node and an array. Then AT-M<strong>in</strong>e can directly<br />

m<strong>in</strong>e frequent itemsets from AT-Tree without additional<br />

scan of datasets. The experimental results show that AT-<br />

M<strong>in</strong>e is more efficient than the algorithms MBP, UF-<br />

Growth and CUFP-M<strong>in</strong>e.<br />

The contributions of this paper are summarized as<br />

follows:<br />

(1) We propose a new tree structure named AT-Tree<br />

(Array based Tail node Tree) for ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g<br />

important <strong>in</strong>formation related to an uncerta<strong>in</strong><br />

transaction dataset;<br />

(2) We also give an algorithm named AT-M<strong>in</strong>e for<br />

FIM over uncerta<strong>in</strong> transaction datasets based on<br />

AT-Tree;<br />

(3) Both sparse and dense datasets are used <strong>in</strong> our<br />

experiments to compare the performance of the<br />

proposed algorithm aga<strong>in</strong>st the state-of-the-art<br />

algorithms based on level-wise approach and<br />

pattern-growth approach, respectively.<br />

The rest of this paper is organized as follows: Section<br />

2 is the description of the problem and def<strong>in</strong>itions;<br />

Section 3 describes related works; Section 4 describes our<br />

algorithms AT-M<strong>in</strong>e; Section 5 shows the experimental<br />

results; and Section 6 gives the conclusion and discussion.<br />

II.<br />

PROBLEM DEFINITIONS<br />

Let D = {T 1 , T 2 , …, T n } be an uncerta<strong>in</strong> transaction<br />

dataset which conta<strong>in</strong>s n transaction itemsets and m<br />

dist<strong>in</strong>ct items, i.e. I= {i 1 , i 2 , …, i m }. Each transaction<br />

itemset is represented as {i 1 :p 1 , i 2 :p 2 , …, i v :p v }, where {i 1 ,<br />

i 2 , …, i v } is a subset of I, and p u (1≤u≤v) is the existential<br />

probability of item i u <strong>in</strong> a transaction itemset. The size of<br />

dataset D is the number of transaction itemsets and is<br />

denoted as |D|. An itemset X = {i 1 , i 2 , …, i k }, which<br />

conta<strong>in</strong>s k dist<strong>in</strong>ct items, is called a k-itemset, and k is the<br />

length of the itemset X.<br />

We adopt some def<strong>in</strong>itions similar to those presented<br />

<strong>in</strong> the previous works [1, 23, 28, 29, 30, 31, 32].<br />

Def<strong>in</strong>ition 1: The support number (SN) of an itemset X <strong>in</strong><br />

a transaction dataset is def<strong>in</strong>ed by the number of<br />

transaction itemsets conta<strong>in</strong><strong>in</strong>g X.<br />

Def<strong>in</strong>ition 2: The probability of an item i u <strong>in</strong> transaction<br />

T d is denoted as p(i u ,T d ) and is def<strong>in</strong>ed by<br />

p( i , T ) = p<br />

(1)<br />

u d u<br />

For example, <strong>in</strong> Table 1, p({a},T 1 ) = 0.8, p({b},T 1 ) =<br />

0.7, p({d},T 1 ) = 0.9, p({f},T 1 ) = 0.5.<br />

Def<strong>in</strong>ition 3: The probability of an itemset X <strong>in</strong> a<br />

transaction T d is denoted as p(X, T d ) and is def<strong>in</strong>ed by<br />

p( XT ,<br />

d) = ∏ pi ( , )<br />

iu<br />

X,<br />

X T u<br />

T<br />

∈ ⊂<br />

d<br />

d<br />

(2)<br />

For example, <strong>in</strong> Table 1, p({a, b},T 1 ) = 0.8×0.7 = 0.56,<br />

p({a, b},T 4 ) = 0.9×0.85=0.765, p({a, b},T 5 ) =<br />

0.95×0.7=0.665.<br />

Def<strong>in</strong>ition 4: The expected support number (expSN) of<br />

an itemset X <strong>in</strong> an uncerta<strong>in</strong> transaction dataset is denoted<br />

as expSN(X) and is def<strong>in</strong>ed by<br />

expSN( X ) = ∑ P( X , T )<br />

Td⊇X,<br />

T d<br />

d∈D<br />

(3)<br />

For example, expSN({a, b}) = p({a, b},T 1 ) + p({a,<br />

b},T 4 ) + p({a, b},T 5 ) = 0.56+0.765+ 0.665 = 1.99.<br />

Def<strong>in</strong>ition 5: Given a dataset D, the m<strong>in</strong>imum expected<br />

support threshold η is a predef<strong>in</strong>ed percentage of |D|;<br />

correspond<strong>in</strong>gly, the m<strong>in</strong>imum expected support number<br />

(m<strong>in</strong>ExpSN) is def<strong>in</strong>ed by<br />

m<strong>in</strong>ExpSN = | D | × η<br />

(4)<br />

In the papers [23, 25, 26, 29, 30, 31], an itemset X is<br />

called a frequent itemset if its expected support number is<br />

not less than the value m<strong>in</strong>ExpSN. M<strong>in</strong><strong>in</strong>g frequent<br />

itemsets from an uncerta<strong>in</strong> transaction dataset means<br />

discover<strong>in</strong>g all itemsets whose expected support numbers<br />

are not less than the value m<strong>in</strong>ExpSN.<br />

Def<strong>in</strong>ition 6: The m<strong>in</strong>imum support threshold λ is a<br />

predef<strong>in</strong>ed percentage of |D|; correspond<strong>in</strong>gly, the<br />

m<strong>in</strong>imum support number (m<strong>in</strong>SN) <strong>in</strong> a dataset D is<br />

def<strong>in</strong>ed by<br />

m<strong>in</strong>SN = | D | × λ<br />

(5)<br />

III. RELATED WORK<br />

Most of algorithms of FIM on uncerta<strong>in</strong> datasets can<br />

be classified <strong>in</strong>to two ma<strong>in</strong> categories: the level-wise<br />

approach and the pattern-growth approach. The ma<strong>in</strong> idea<br />

of the level-wise algorithms comes from Apriori [1]<br />

which is the first level-wise algorithm for FIM. It is to<br />

iteratively generate candidate (k+1)-itemsets from<br />

comb<strong>in</strong>ations of frequent k-itemsets (k≥1), and calculate<br />

expected support numbers of candidates by one scan of<br />

dataset. Its ma<strong>in</strong> shortcom<strong>in</strong>g is that it needs multiple<br />

scans of dataset and generates candidate itemsets.<br />

The ma<strong>in</strong> idea of the pattern-growth approach comes<br />

from the algorithm FP-Growth [2] which is the first<br />

pattern-growth algorithm. It is also an iteration approach,<br />

but it does not m<strong>in</strong>e frequent itemsets by the comb<strong>in</strong>ation<br />

method like Apriori. It f<strong>in</strong>ds all frequent items under the<br />

condition of frequent k-itemset X, and generates frequent<br />

(k+1)-itemsets by the union of each one of those frequent<br />

items and X (k≥1). It ma<strong>in</strong>ta<strong>in</strong>s all transaction itemsets to<br />

a FP-Tree [2] with two scans of dataset. It will generate a<br />

conditional tree (which is also called prefix FP-Tree or<br />

sub FP-Tree) for each frequent itemset X. Thus it will<br />

f<strong>in</strong>d all frequent items under the condition of X by<br />

scann<strong>in</strong>g this conditional tree <strong>in</strong>stead of the whole dataset.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1419<br />

FP-Tree is created by the follow<strong>in</strong>g rules: (1) transaction<br />

itemsets are rearranged <strong>in</strong> descend<strong>in</strong>g order of support<br />

numbers of items and are <strong>in</strong>serted to a FP-Tree; (2)<br />

transaction itemsets will share the same node when the<br />

correspond<strong>in</strong>g items are the same.<br />

A. Level-wise Approach<br />

In 2007, the algorithm U-Apriori was proposed for<br />

discover<strong>in</strong>g frequent itemsets from uncerta<strong>in</strong> datasets<br />

[31]. It is based on the algorithm Apriori. U-Apriori is a<br />

classical level-wise algorithm for FIM on uncerta<strong>in</strong><br />

datasets. It starts by f<strong>in</strong>d<strong>in</strong>g all frequent 1-itemsets with<br />

one scan of dataset. Then <strong>in</strong> each iteration, it first<br />

generates candidate (k+1)-itemsets us<strong>in</strong>g frequent k-<br />

itemsets (k ≥1), and then identifies real frequent itemsets<br />

from candidates with one scan of dataset. The iteration<br />

goes on until there is no new candidate. One important<br />

shortcom<strong>in</strong>g of U-Apriori is that it generates candidates<br />

and requires multiple scans of datasets; and the situation<br />

may become worse with the <strong>in</strong>crease of the number of<br />

long transaction itemsets or decrease of the m<strong>in</strong>imum<br />

expected support threshold.<br />

In 2011, Wang et al. [28] proposed the algorithm<br />

MBP for FIM on uncerta<strong>in</strong> datasets. The authors<br />

proposed one strategy to speed up the calculation of the<br />

expected support number of a candidate itemset: MBP<br />

will stop calculat<strong>in</strong>g the expected support number of a<br />

candidate itemset if the itemset can be determ<strong>in</strong>ed to be<br />

frequent or <strong>in</strong>frequent <strong>in</strong> advance. Thus it can achieve a<br />

better performance than the algorithm U-Apriori.<br />

In 2012, Sun et al. [26] modified the algorithm MBP,<br />

and gave an approximate algorithm (called IMBP) for<br />

FIM on uncerta<strong>in</strong> datasets. The performance of IMBP<br />

outperforms MBP <strong>in</strong> terms of runn<strong>in</strong>g time and memory<br />

usage. However its accuracy is not stable, and becomes<br />

lower on dense datasets.<br />

B. Pattern-growth Approach<br />

In 2007, Leung et al. [29] proposed a tree-based<br />

algorithm UF-Growth for FIM on uncerta<strong>in</strong> transaction<br />

dataset. Firstly, it also constructs a UF-Tree us<strong>in</strong>g<br />

transaction itemsets like the method of FP-Growth;<br />

secondly, it m<strong>in</strong>es frequent itemsets from the UF-Tree by<br />

the pattern-growth approach. It creates a UF-Tree by two<br />

scans of dataset. In the first scan, it f<strong>in</strong>ds all frequent 1-<br />

itemsets, arranges frequent 1-itemsets <strong>in</strong> descend<strong>in</strong>g order<br />

of support numbers and ma<strong>in</strong>ta<strong>in</strong>s them <strong>in</strong> a header table.<br />

In the second scan, removes <strong>in</strong>frequent items from each<br />

transaction itemset, re-arranges the rema<strong>in</strong><strong>in</strong>g items of<br />

each transaction itemset <strong>in</strong> order of the header table, and<br />

<strong>in</strong>serts the sorted itemset to a global UF-Tree. It only<br />

merges nodes that have the same item and the same<br />

probability when transaction itemsets are <strong>in</strong>serted to a<br />

UF-Tree. For example, for two transaction itemsets<br />

{a:0.50, b:0.70, c:0.23} and {a:0.55, b:0.80, c:0.23},<br />

they will not share the node “a” when they are <strong>in</strong>serted to<br />

a UF-Tree by lexicographic order because the<br />

probabilities of item “a” are not equal <strong>in</strong> these two<br />

itemsets. Thus UF-Growth requires a large amount of<br />

memory to store UF-Tree.<br />

Leung et al. [25] improved the algorithm UF-Growth<br />

to reduce the size of UF-Tree. The improved algorithm<br />

considers that the items with the same k-digit value after<br />

the decimal po<strong>in</strong>t have the same probability. For example,<br />

when two transaction itemsets {a:0.50, b:0.70, c:0.23}<br />

and {a:0.55, b:0.80, c:0.23} are <strong>in</strong>serted to a UF-Tree<br />

by lexicographic order, they will share the node “a” if k is<br />

set as 1 because both probability values of the two item<br />

“a” are considered to be 0.5; if k is set as 2, they will not<br />

share the node “a” because the probabilities of “a” are<br />

0.50 and 0.55 respectively. The smaller k is, the lesser<br />

memory the improved algorithm requires. However, the<br />

improved algorithm still cannot build a UF-Tree as<br />

compact as the orig<strong>in</strong>al FP-Tree; moreover, it may lose<br />

some frequent itemsets.<br />

UH-M<strong>in</strong>e [30] is a pattern-growth algorithm. The<br />

ma<strong>in</strong> difference between UH-M<strong>in</strong>e and UF-Growth is<br />

that UF-Growth adopts a prefix tree structure while UH-<br />

M<strong>in</strong>e adopts a hyperl<strong>in</strong>ked array based structure called H-<br />

struct [5] (which can also be considered as a tree). UH-<br />

M<strong>in</strong>e requires two scans of dataset for creat<strong>in</strong>g the<br />

structure H-struct: <strong>in</strong> the first scan, it creates a header<br />

table which ma<strong>in</strong>ta<strong>in</strong>s sorted frequent 1-items; <strong>in</strong> the<br />

second scan, it removes <strong>in</strong>frequent items from each<br />

transaction itemset, re-arranges the rema<strong>in</strong><strong>in</strong>g items <strong>in</strong> the<br />

order of the header table, and <strong>in</strong>serts the sorted<br />

transaction itemset <strong>in</strong>to an H-struct tree without shar<strong>in</strong>g<br />

nodes with other transaction itemsets. The header table<br />

ma<strong>in</strong>ta<strong>in</strong>s the hyperl<strong>in</strong>k of all nodes with the same item<br />

name when the itemsets are <strong>in</strong>serted <strong>in</strong>to an H-struct tree.<br />

It will achieve a good performance on small datasets.<br />

However, the H-struct does not share any node and is not<br />

a compact tree, and this will impact the performance of<br />

FIM, especially for large datasets.<br />

The authors of the paper [30] also extend the classical<br />

algorithm FP-Growth to get the algorithm UFP-Growth<br />

for FIM on uncerta<strong>in</strong> datasets. UFP-Growth firstly<br />

generates candidates by the UFP-Tree, and then identifies<br />

frequent itemsets through additional scan of datasets. Its<br />

performance is also impacted by the generation of<br />

candidate itemsets.<br />

C. The Algorithm CUFP-M<strong>in</strong>e<br />

In 2011, L<strong>in</strong> et al. [23] proposed the algorithm CUFP-<br />

M<strong>in</strong>e for FIM on uncerta<strong>in</strong> transaction datasets. CUFP-<br />

M<strong>in</strong>e creates a tree named CUFP-Tree to ma<strong>in</strong>ta<strong>in</strong><br />

transaction itemsets. A CUFP-Tree is created by two<br />

scans of dataset. In the first scan, it creates a header table<br />

for ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g sorted frequent 1-itemsets; <strong>in</strong> the second<br />

scan, when an item Z i <strong>in</strong> transaction itemset Z ({Z 1 , Z 2 ,…,<br />

Z i ,.., Z m }) is <strong>in</strong>serted <strong>in</strong>to a tree, CUFP-M<strong>in</strong>e generates all<br />

supersets of item Z i us<strong>in</strong>g items Z 1 , Z 2 ,…, Z i , and<br />

ma<strong>in</strong>ta<strong>in</strong>s all supersets and their correspond<strong>in</strong>g<br />

probabilities to a node correspond<strong>in</strong>g to Z i . CUFP-M<strong>in</strong>e<br />

only accumulates the probability of each superset if there<br />

is a correspond<strong>in</strong>g node on the tree for item Z i . The idea<br />

of CUFP-M<strong>in</strong>e is that it f<strong>in</strong>ds frequent itemsets through<br />

scann<strong>in</strong>g supersets of each node and calculat<strong>in</strong>g expected<br />

support number of each superset. CUFP-M<strong>in</strong>e generates<br />

all comb<strong>in</strong>ations of items <strong>in</strong> an itemset, and ma<strong>in</strong>ta<strong>in</strong>s<br />

these comb<strong>in</strong>ations to tree nodes. Thus CUFP-M<strong>in</strong>e<br />

requires a large amount of computation time and memory<br />

© 2013 ACADEMY PUBLISHER


1420 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

when the length of itemsets is not very short or on large<br />

datasets.<br />

IV. THE ALGORITHM AT-MINE<br />

The proposed algorithm AT-M<strong>in</strong>e ma<strong>in</strong>ly consists of<br />

two procedures: (1) creat<strong>in</strong>g an AT-Tree; (2) m<strong>in</strong><strong>in</strong>g<br />

frequent itemsets from the AT-Tree. We describe the<br />

structure of an AT-Tree <strong>in</strong> Section 4.1, give an example<br />

of the construction of an AT-Tree <strong>in</strong> Section 4.2, and<br />

elaborate the algorithm AT-M<strong>in</strong>e with an example <strong>in</strong><br />

Section 4.3.<br />

A. Structure of an AT-Tree<br />

Def<strong>in</strong>ition 9: Let itemset X = {i 1 , i 2 , i 3 , …, i u } be a sorted<br />

itemset, and the item i u is called tail-item of X. When the<br />

itemset X is <strong>in</strong>serted <strong>in</strong>to a tree T <strong>in</strong> accordance with its<br />

items’ order, the node N on the tree that represents this<br />

tail-item is def<strong>in</strong>ed as tail node of itemset X, and other<br />

nodes that represent items i 1 , i 2 , …, i u-1 are def<strong>in</strong>ed as<br />

normal nodes. The itemset X is called tail-node-itemset<br />

for node N.<br />

Def<strong>in</strong>ition 10: Let an itemset X conta<strong>in</strong> itemset Y. When<br />

itemset X is added to a prefix tree of itemset Y, the<br />

probability of itemset Y <strong>in</strong> itemset X, p(Y, X), is def<strong>in</strong>ed<br />

as the base probability of itemset X on the tree T, and is<br />

denoted as BP(X, Y):<br />

BP YX , = pYX ( , )<br />

(8)<br />

( )<br />

Figure 1. Structure of nodes on an AT-Tree<br />

The node structure on an AT-Tree is illustrated <strong>in</strong><br />

Figure 1. There are two types of nodes: one is normal<br />

node, as shown <strong>in</strong> Figure 1(a), where Name is the item<br />

name of each node; the other type is tail node, as shown<br />

<strong>in</strong> Figure 1(b), where Tail_<strong>in</strong>fo is the supplemental<br />

<strong>in</strong>formation that <strong>in</strong>cludes 4 fields: (1) bp: a list that keeps<br />

base probability values of all tail-node-itemsets; (2) len:<br />

the length of the tail-node-itemset; (3) Arr_<strong>in</strong>d: a list of<br />

<strong>in</strong>dex values of an array each element of which records<br />

probability values of items <strong>in</strong> each sorted transaction<br />

itemset (see Substep 5.2 <strong>in</strong> Section 4.2.1 and Step 5 <strong>in</strong><br />

Section 4.2.2, etc.); (4) Item_<strong>in</strong>d: a list of <strong>in</strong>dex values of<br />

an array that records probability values of each item <strong>in</strong> a<br />

sorted transaction itemset (see Substep 10.5 and 10.7 <strong>in</strong><br />

Section 4.3.2, etc., Item_<strong>in</strong>d is just used <strong>in</strong> a sub AT-<br />

Tree).<br />

B. Construction of an AT-Tree<br />

The structure of AT-Tree is designed to efficiently<br />

store the related <strong>in</strong>formation on tail nodes. It is<br />

constructed by two scans of dataset. In the first scan, a<br />

header table is created to ma<strong>in</strong>ta<strong>in</strong> sorted frequent items.<br />

In the second scan, the probability values of frequent<br />

items <strong>in</strong> each transaction itemsets are stored to a list<br />

accord<strong>in</strong>g to the order of the header table; the list is then<br />

added to an array (and its correspond<strong>in</strong>g sequence<br />

number <strong>in</strong> the array is denoted as ID); the frequent items<br />

<strong>in</strong> each transaction itemset are <strong>in</strong>serted to an AT-Tree<br />

accord<strong>in</strong>g to the order of the header table; the length of<br />

the itemset and the number ID are stored to the<br />

correspond<strong>in</strong>g tail node. When the transaction itemsets<br />

are added to an AT-Tree, they are rearranged <strong>in</strong><br />

descend<strong>in</strong>g order of support numbers of items, and share<br />

the same node/nodes if their prefix items/itemsets are<br />

identical. Thus the AT-Tree is as compact as the orig<strong>in</strong>al<br />

FP-Tree. Moreover, AT-Tree does not lose probability<br />

<strong>in</strong>formation with respect to the dist<strong>in</strong>ct probability values<br />

of the transaction itemsets.<br />

B.1 The construction algorithm of a global AT-Tree<br />

A global AT-Tree is the first AT-Tree that ma<strong>in</strong>ta<strong>in</strong>s<br />

itemset <strong>in</strong>formation of the whole dataset. The<br />

construction algorithm is described as follows:<br />

CreateTree(D, η )<br />

INPUT: An uncerta<strong>in</strong> database D consist<strong>in</strong>g of n<br />

transaction itemsets and a predef<strong>in</strong>ed m<strong>in</strong>imum expected<br />

support threshold η .<br />

OUTPUT: An AT-Tree T.<br />

Step 1: Calculate the m<strong>in</strong>imum expected support number<br />

m<strong>in</strong>ExpSN, i.e. m<strong>in</strong>ExpSN = | D | × η ; count the<br />

expected support number and support number of<br />

each item by one scan of dataset.<br />

Step 2: Put those items whose expected support numbers<br />

are not less than m<strong>in</strong>ExpSN to a header table, and<br />

sort the items <strong>in</strong> the header table accord<strong>in</strong>g to the<br />

descend<strong>in</strong>g order of their support numbers; f<strong>in</strong>ish<br />

the algorithm if the header table is null.<br />

Step 3: Initially set the root node of the AT-Tree T as null.<br />

Step 4: Remove the items that are not <strong>in</strong> the header table<br />

from each transaction itemset, and sort the<br />

rema<strong>in</strong><strong>in</strong>g items of each transaction itemset<br />

accord<strong>in</strong>g to the order of the header table, and get a<br />

sorted itemset X.<br />

Step 5: If the length of itemset X is 0, process the next<br />

transaction itemset; otherwise <strong>in</strong>sert the itemset X<br />

<strong>in</strong>to the AT-Tree T by the follow<strong>in</strong>g substeps:<br />

Substep 5.1: Store the probability value of each<br />

item <strong>in</strong> itemset X sequentially to a list; save the<br />

list to an array (which is denoted as ProArr);<br />

the correspond<strong>in</strong>g sequence number of the list<br />

<strong>in</strong> the array is denoted as ID.<br />

Substep 5.2: If there has not been a tail node for the<br />

itemset X, create a tail node N for this itemset,<br />

where N.Tail_<strong>in</strong>fo.len is the length of itemset X,<br />

and N.Tail_<strong>in</strong>fo.Arr_<strong>in</strong>d={ID}; otherwise,<br />

append the sequence number ID to<br />

N.Tail_<strong>in</strong>fo.Arr_<strong>in</strong>d.<br />

Step 6: Process the next transaction itemset.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1421<br />

Figure 2. Construction of an AT-Tree<br />

TABLE II.<br />

PROBABILITY LIST (PROARR)<br />

ID probabilities<br />

1 {0.9, 0.7, 0.8}<br />

2 {0.85, 0.8, 0.4}<br />

3 {0.6, 0.85, 0.6}<br />

4 {0.65, 0.85, 0.9}<br />

5 {0.8, 0.7, 0.95, 0.7}<br />

6 {0.7, 0.65}<br />

B.2 An Example of Construct<strong>in</strong>g a Global AT-Tree<br />

The uncerta<strong>in</strong> dataset <strong>in</strong> Table 1 is used as an example<br />

here to illustrate the construction of the AT-Tree. This<br />

dataset concludes 6 transaction itemsets and 6 dist<strong>in</strong>ct<br />

items. The m<strong>in</strong>imum support threshold is set as 20%.<br />

Step 1: Calculate the m<strong>in</strong>imum expected support number<br />

as 1.2 (6*20%); count the expected support number<br />

and support number of each item by one scan of<br />

database.<br />

Step 2: Create a header table, as shown <strong>in</strong> Figure 2(a).<br />

Each l<strong>in</strong>k <strong>in</strong> the header table records all nodes of a<br />

correspond<strong>in</strong>g item on a tree (not shown <strong>in</strong> the<br />

Figures for simplicity).<br />

Step 3: Initially set the root node of an AT-Tree as null.<br />

Step 4: Remove the <strong>in</strong>frequent item “f” from the<br />

transaction itemset T 1 , and sort the rema<strong>in</strong><strong>in</strong>g items<br />

accord<strong>in</strong>g to the order of the header table, the<br />

result<strong>in</strong>g is {d:0.9, b:0.7, a:0.8}.<br />

Step 5: Ma<strong>in</strong>ta<strong>in</strong> probability value of each item to a list<br />

{0.9, 0.7, 0.8}, and append the list to an array ProArr,<br />

as shown <strong>in</strong> Table 2; the correspond<strong>in</strong>g ID of the list <strong>in</strong><br />

the array ProArr is 1; then <strong>in</strong>sert the first sorted<br />

itemset <strong>in</strong>to the AT-Tree, and the result<strong>in</strong>g AT-Tree is<br />

shown <strong>in</strong> Figure 2(b). On the tail node “a”, “3”<br />

represents the length of the tail-node-itemset (len), and<br />

“{1}” represents the <strong>in</strong>dex number of the array<br />

ProArr <strong>in</strong> Table 2.<br />

Step 6: Process the next transaction T 2 , get the sorted<br />

transaction itemset {d:0.85, c:0.8, e:0.4}. S<strong>in</strong>ce the<br />

path “root-d” can be shared, <strong>in</strong>sert a normal node<br />

“c” and a tail node “e”. The result<strong>in</strong>g AT-Tree is<br />

shown <strong>in</strong> Figure 2(c).<br />

Step 7: Process the next transaction T 3 , get the sorted<br />

transaction itemset {d:0.6, c:0.85, e:0.6}. S<strong>in</strong>ce the<br />

path “root-d-c-e” can be shared and the node “e” on<br />

the path is a tail node, just append the correspond<strong>in</strong>g<br />

ID <strong>in</strong> ProArr of Table 2 to the Tail_<strong>in</strong>fo.Arr_<strong>in</strong>d of<br />

the tail node “e”. The result<strong>in</strong>g AT-Tree is shown <strong>in</strong><br />

Figure 2(d).<br />

Step 8: Process the rema<strong>in</strong><strong>in</strong>g transactions one by one.<br />

The result<strong>in</strong>g AT-Tree is shown <strong>in</strong> Figure 2(e).<br />

C. M<strong>in</strong><strong>in</strong>g Frequent Itemsets from a Global AT-Tree<br />

After an AT-Tree is constructed, the algorithm AT-<br />

M<strong>in</strong>e can directly m<strong>in</strong>e frequent itemsets from the tree<br />

without additional scan of dataset. The details of the<br />

m<strong>in</strong><strong>in</strong>g approach are described below.<br />

C.1 The M<strong>in</strong><strong>in</strong>g Algorithm<br />

The algorithm AT-M<strong>in</strong>e is similar to the algorithm<br />

FP-Growth: it creates and processes sub trees (prefix<br />

trees or conditional trees) recursively. But the condition<br />

of generat<strong>in</strong>g frequent itemsets is different from FP-<br />

Growth. The detailed steps of the m<strong>in</strong><strong>in</strong>g algorithm are as<br />

follows:<br />

M<strong>in</strong><strong>in</strong>g (T, H, m<strong>in</strong>ExpSN)<br />

INPUT: An AT-Tree T, a header table H, and a<br />

m<strong>in</strong>imum expected support number m<strong>in</strong>ExpSN.<br />

OUTPUT: The frequent itemsets (FIs).<br />

Step 1: Process the items <strong>in</strong> the header table one by one<br />

from the last item by the follow<strong>in</strong>g steps (denote the<br />

currently processed item as Z).<br />

Step 2: Append item Z to the current base-itemset (which<br />

is <strong>in</strong>itialized as null); each new base-itemset is a<br />

frequent itemset.<br />

Step 3: Let Z.l<strong>in</strong>ks <strong>in</strong> the header table H conta<strong>in</strong> k nodes<br />

whose item name is Z; we denote these k nodes as N 1 ,<br />

N 2 , …, N k ; because item Z is the last one <strong>in</strong> the<br />

header table, all these k nodes are tail nodes, i.e.,<br />

each of these nodes conta<strong>in</strong>s a Tail_<strong>in</strong>fo.<br />

Substep 3.1: Create a sub header table subH by<br />

scann<strong>in</strong>g the k branches from these k nodes to<br />

the root.<br />

Substep 3.2: If the sub header table is null, go to<br />

Step 4.<br />

Substep 3.3: Create sub AT-Tree subTree =<br />

CreateSubTree(Z.l<strong>in</strong>k, subH).<br />

Substep 3.4: M<strong>in</strong><strong>in</strong>g(subTree, subH, m<strong>in</strong>ExpSN).<br />

Step 4: Remove item Z from the base-itemset.<br />

Step 5: For each of these k nodes (which we denote as N i ,<br />

1≤i≤k), modify its Tail_<strong>in</strong>fo by the follow<strong>in</strong>g<br />

substeps:<br />

Substep 5.1: Alter N i .Tail_<strong>in</strong>fo.len values:<br />

N i .Tail_<strong>in</strong>fo.len = N i .Tail_<strong>in</strong>fo.len -1.<br />

Substep 5.2: Move N i .Tail_<strong>in</strong>fo to the parent of<br />

node N i .<br />

Step 6: Process the next item of the header table H.<br />

Subrout<strong>in</strong>e: CreateSubTree(l<strong>in</strong>k, subH)<br />

INPUT: A list l<strong>in</strong>k which records tree nodes with the<br />

same item name, and a header table subH.<br />

OUTPUT: An AT-Tree subT.<br />

© 2013 ACADEMY PUBLISHER


1422 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Step 1: Initially set the root node of the tree subT as null.<br />

Step 2: Process each node <strong>in</strong> the list l<strong>in</strong>k by the follow<strong>in</strong>g<br />

steps (denote the currently processed node as N).<br />

Step 3: Get the tail-node-itemset of node N (denote it as<br />

itemset X).<br />

Step 4: Remove those items that are not <strong>in</strong> the header<br />

table subH from itemset X, and sort the rema<strong>in</strong><strong>in</strong>g<br />

items <strong>in</strong> itemset X accord<strong>in</strong>g to the order of the<br />

header table subH.<br />

Step 5: If the length of the sorted itemset (denoted as k)<br />

is 0, process the next node of the list l<strong>in</strong>k; otherwise<br />

<strong>in</strong>sert the sorted itemset X <strong>in</strong>to the AT-Tree subT by<br />

the follow<strong>in</strong>g substeps:<br />

Substep 5.1: Get the orig<strong>in</strong>al sequential ID of each<br />

item of the itemset X <strong>in</strong> the correspond<strong>in</strong>g list<br />

of ProArr: item_<strong>in</strong>d = {d 1 , d 2 , .., d k } (k is the<br />

length of itemset X).<br />

Substep 5.2: Make a copy of N.Tail_<strong>in</strong>fo; denote the<br />

copy as nTail_<strong>in</strong>fo.<br />

Substep 5.3: Alter nTail_<strong>in</strong>fo as the follow<strong>in</strong>g:<br />

(1) nTail_<strong>in</strong>fo.len = k.<br />

(2) nTail_<strong>in</strong>fo. Item_<strong>in</strong>d = item_<strong>in</strong>d.<br />

(3) if nTail_<strong>in</strong>fo.bp is null, set nTail_<strong>in</strong>fo.bp[j]<br />

to be the probability of item Z, i.e.<br />

ProArr[nTail_<strong>in</strong>fo.Arr_<strong>in</strong>d[j]]; otherwise,<br />

set nTail_<strong>in</strong>fo.bp[j] to be the product of<br />

nTail_<strong>in</strong>fo.bp[j] and the probability of item<br />

Z (1 ≤ j ≤ bp.size; the array ProArr is<br />

created when the global tree is created <strong>in</strong><br />

Substep 5.1 <strong>in</strong> Section 4.2.1).<br />

C.2 An Example of M<strong>in</strong><strong>in</strong>g Frequent Itemsets from a<br />

Global AT-Tree<br />

Figure 3. An Example of m<strong>in</strong><strong>in</strong>g frequent itemsets from uncerta<strong>in</strong><br />

dataset<br />

The global AT-Tree <strong>in</strong> Figure 2(e) and its<br />

correspond<strong>in</strong>g header table H <strong>in</strong> Figure 2(a) are used as<br />

an example here to illustrate the detailed processes of<br />

m<strong>in</strong><strong>in</strong>g frequent itemsets. The m<strong>in</strong>imum expected support<br />

number is 1.2.<br />

Step 1: Process the item “e” <strong>in</strong> the header table H by the<br />

follow<strong>in</strong>g steps 2-3.<br />

Step 2: Append item “e” to the current base-itemset<br />

(which is <strong>in</strong>itialized as null), and generates a new<br />

frequent itemset {e}.<br />

Step 3: Scan the branches conta<strong>in</strong><strong>in</strong>g the node “e” to<br />

create sub header table:<br />

Substep 3.1: In Figure 2(e), there are 2 nodes “e”.<br />

From the path “root-d-b-a-e” and Table 2, the<br />

expected support numbers of itemsets {ed}, {eb}<br />

and {ea} are calculated as 0.56 (0.7*0.8), 0.49<br />

(0.7*0.7) and 0.665 (0.7*0.95), respectively;<br />

from the path “root-d-c-e”, the expected<br />

supports of itemset {ed} and {ec} are<br />

calculated as 0.7 (0.4*0.85+0.6*0.6) and 0.83<br />

(0.4*0.8+0.6*0.85).<br />

Substep 3.2: Because the total expected support<br />

numbers of itemset {ed} is bigger than 1.2, the<br />

sub header table is not null, create a sub tree<br />

(prefix tree or conditional tree) for the baseitemset<br />

{e}, and get a new frequent itemset<br />

{ed}.<br />

SubStep 3.3: Remove the item “e” from the baseitemset,<br />

pass the Tail_<strong>in</strong>fo of nodes “e” to their<br />

parents, and modify Tail_<strong>in</strong>fo.len as<br />

Tail_<strong>in</strong>fo.len -1; the result is shown <strong>in</strong> Figure<br />

3(a).<br />

Step 4: Process the next item “c” <strong>in</strong> the header table H by<br />

the follow<strong>in</strong>g steps 5-6.<br />

Step 5: Append item “c” to base-itemset, and get a new<br />

frequent itemset {c}.<br />

Step 6: Scan the branches conta<strong>in</strong><strong>in</strong>g node “c” to create<br />

the sub header table:<br />

Substep 6.1: In Figure 3(a), there are 2 nodes “c”.<br />

From the path “root-d-c” and Table 2, the<br />

expected support numbers of itemset {cd} is<br />

calculated as 1.19 (0.8*0.85+0.85*0.6); from<br />

the path “root-b-c”, the expected support of<br />

itemset {cb} is calculated as 0.455 (0.65*0.7).<br />

Substep 6.2: Because the total expected support<br />

numbers of itemsets {cd} and {cb} are smaller<br />

than 1.2, the sub header table is null.<br />

SubStep 6.3: Remove the item “c” from the baseitemset,<br />

pass the Tail_<strong>in</strong>fo of nodes “c” to their<br />

parents; the result is shown <strong>in</strong> Figure 3(b).<br />

Step 7: Process the next item “a” <strong>in</strong> the header table <strong>in</strong><br />

Figure 2(a) as the follow<strong>in</strong>g steps 8-10.<br />

Step 8: Append item “a” to the base-itemset, and get a<br />

new frequent itemset {a}.<br />

Step 9: Scan the branches conta<strong>in</strong><strong>in</strong>g node “a” to create<br />

the sub header table:<br />

Substep 9.1: In Figure 3(b), there is one node “a”.<br />

From the path “root-d-b-a” and Table 2, the<br />

expected support numbers of itemsets {ad} and<br />

{ab} are calculated as 2.065<br />

(0.8*0.9+0.9*0.65+0.95*0.8) and 1.99<br />

(0.8*0.7+0.9*0.85+0.95*0.7).<br />

Substep 9.2: Because the total expected support<br />

numbers of itemsets {ad} and {ab} are not<br />

smaller than 1.2, the sub header table subH is<br />

{d:2.065:3, b:1.99:3}.<br />

Step 10: Create a sub tree for the base-itemset {a} by the<br />

follow<strong>in</strong>g substeps:<br />

Substep 10.1: Initially set the root node of the sub<br />

tree subT as null.<br />

Substep 10.2: Get the itemset {db} from the tailnode-itemset<br />

of the tail node “a” <strong>in</strong> Figure 3(b).<br />

Substep 10.3: Sort the itemset {db} <strong>in</strong> the order of<br />

the header table subH.<br />

Substep 10.4: Make a copy of Tail_<strong>in</strong>fo.Arr_<strong>in</strong>d,<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1423<br />

and denote it as arr_<strong>in</strong>d={1, 4, 5}.<br />

Substep 10.5: Get the list <strong>in</strong>dexes (orig<strong>in</strong>al<br />

sequential ID <strong>in</strong> a list) of items “d” and “b” <strong>in</strong><br />

the list ProArr[1], which are 1 and 2<br />

respectively, and denote it as item_<strong>in</strong>d={1, 2}.<br />

Substep 10.6: Get the probability values of itemset<br />

{a} <strong>in</strong> ProArr[1] and ProArr[4] and ProArr[5]<br />

respectively, and denote them as bp={0.8, 0.9,<br />

0.95}; this is the correspond<strong>in</strong>g base<br />

probabilities <strong>in</strong> the sub tree subT.<br />

Substep 10.7: Add the sorted itemset {db} to subT;<br />

ma<strong>in</strong>ta<strong>in</strong> arr_<strong>in</strong>d, item_<strong>in</strong>d, bp and the length<br />

of the itemset {db} to the tail node <strong>in</strong> subT; the<br />

result is shown <strong>in</strong> Figure 3(c).<br />

Substep 10.8: Process the tree subT recursively, and<br />

get a new sub tree for the base-itemset {ab}, as<br />

shown <strong>in</strong> Figure 3(d). Lastly, get frequent<br />

itemsets {ab}, {abd} and {ad} when process<strong>in</strong>g<br />

the sub tree of itemset {a}.<br />

Step 11: Go on process<strong>in</strong>g the rema<strong>in</strong><strong>in</strong>g items <strong>in</strong> header<br />

table H.<br />

V. EXPERIMENTAL RESULTS<br />

In this section, we evaluate the performance of the<br />

proposed algorithm AT-M<strong>in</strong>e.<br />

Summariz<strong>in</strong>g the related works <strong>in</strong> Section 3, we can<br />

conclude that the algorithm MBP is the state-of-the-art<br />

algorithm employ<strong>in</strong>g the level-wise approach, UP-<br />

Growth is the state-of-the-art algorithm employ<strong>in</strong>g the<br />

pattern-growth approach and CUFP-M<strong>in</strong>e is a new<br />

proposed algorithm. So we compare AT-M<strong>in</strong>e with the<br />

algorithms UF-Growth, CUFP-M<strong>in</strong>e and MBP on both<br />

types of datasets: the sparse transaction datasets and<br />

dense transaction datasets. All algorithms were written <strong>in</strong><br />

Java programm<strong>in</strong>g language. The configuration of the<br />

test<strong>in</strong>g platform is as follows: W<strong>in</strong>dows XP operat<strong>in</strong>g<br />

system, 2G Memory, Intel(R) Core(TM) i3-2310 CPU @<br />

2.10 GHz; Java heap size is 1G.<br />

TABLE III.<br />

DATASET CHARACTERISTICS<br />

Dataset |D| |I| ML SD (%) Type<br />

T20I6D<br />

300K<br />

300,000 1000 20 2 sparse<br />

kosarak 990,002 41,271 8 0.02 sparse<br />

connect 67,557 129 43 33.33 dense<br />

mushroom 8,124 119 23 19.33 dense<br />

Table 3 shows the characteristics of 4 datasets used <strong>in</strong><br />

our experiments. “|D|” represents the total number of<br />

transactions; “|I|” represents the total number of dist<strong>in</strong>ct<br />

items; “ML” represents the mean length of all transaction<br />

itemsets; “SD” represents the degree of sparsity or<br />

density. The synthetic dataset T20I6D300K came from<br />

the IBM Data Generator [1] and the datasets kosarak,<br />

connect and mushroom were obta<strong>in</strong>ed from FIMI<br />

Repository [33]; These four datasets orig<strong>in</strong>ally do not<br />

provide probability values for each item of each<br />

transaction itemset; as suggested by literatures [23, 25, 28,<br />

29], we assign a existential probability of range (0, 1] to<br />

each item. The runnable programs and test<strong>in</strong>g datasets<br />

can be downloaded from the follow<strong>in</strong>g address:<br />

http://code.google.com/p/at-tree/downloads/list.<br />

A. Evaluation on Sparse Datasets<br />

Tables 4-5 show the total number of tree nodes<br />

generated by AT-M<strong>in</strong>e, UF-Growth and CUFP, and the<br />

number of candidate itemsets generated by MBP,<br />

respectively, on the sparse datasets. As shown <strong>in</strong> Tables<br />

4-5, UF-Growth creates much more tree nodes than AT-<br />

M<strong>in</strong>e. This is because that UF-Growth just merges the<br />

nodes that have the same item name and the same<br />

probability. CUFP-M<strong>in</strong>e is out of memory on these two<br />

sparse datasets because it generates too many supersets;<br />

UF-Growth is out of memory on kosarak when the<br />

threshold is set 0.01% because it generates too many tree<br />

nodes; MBP is out of memory when the threshold is set<br />

0.03% because it generates too many candidates. Thus we<br />

can <strong>in</strong>fer that AT-M<strong>in</strong>e has a better performance than<br />

other three algorithms <strong>in</strong> terms of memory usage.<br />

TABLE IV.<br />

DETAILS ANALYSIS ON THE DATASET T20I6D300K<br />

η (%)<br />

trees nodes (#) candidates (#)<br />

AT-M<strong>in</strong>e UF-Growth MBP<br />

0.15 4,978,327 7,556,250 374,271<br />

0.13 5,101,077 8,629,034 391,413<br />

0.11 5,438,410 10,282,811 419,770<br />

0.09 6,310,746 12,978,032 467,217<br />

0.07 8,474,124 17,477,552 594,050<br />

0.05 13,189,900 24,946,139 999,799<br />

Runn<strong>in</strong>g time (s)<br />

TABLE V.<br />

DETAILS ANALYSIS ON THE DATASET KOSARAK<br />

η (%)<br />

trees nodes (#) candidates (#)<br />

AT-M<strong>in</strong>e UF-Growth MBP<br />

0.1 2,020,568 14,471,137 172,399<br />

0.09 2,208,231 15,724,272 252,348<br />

0.07 2,542,835 19,210,453 419,272<br />

0.05 3,058,380 24,651,644 793,554<br />

0.03 4,580,785 38,083,667<br />

0.01 18,829,877<br />

Memory<br />

Overflow<br />

Memory<br />

Overflow<br />

10000<br />

1000<br />

100<br />

AT-M<strong>in</strong>e<br />

MBP<br />

UF-Growth<br />

CUFP-M<strong>in</strong>e (Memory Overflow)<br />

10<br />

0.15 0.14 0.13 0.12 0.11 0.10 0.09 0.08 0.07 0.06 0.05<br />

M<strong>in</strong>imum expected support threshold (%)<br />

© 2013 ACADEMY PUBLISHER


1424 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

(a)<br />

On the dataset T20I6D300K<br />

Runn<strong>in</strong>g time (s)<br />

1000<br />

100<br />

10<br />

AT-M<strong>in</strong>e<br />

MBP<br />

UF-Growth<br />

CUFP-M<strong>in</strong>e (Memory Overflow)<br />

0.10 0.09 0.08 0.07 0.06 0.05 0.04 0.03 0.02 0.01<br />

(b)<br />

M<strong>in</strong>imum expected support threshold (%)<br />

On the dataset kosarak<br />

Figure 4. Runn<strong>in</strong>g time comparison on sparse datasets<br />

Figure 4 shows the runn<strong>in</strong>g time of three algorithms<br />

on two sparse datasets. CUFP-M<strong>in</strong>e is out of memory on<br />

these two sparse datasets. As shown <strong>in</strong> Figure 4, the time<br />

performance of our algorithm outperforms UF-Growth,<br />

MBP and CUFP-M<strong>in</strong>e under different m<strong>in</strong>imum expected<br />

support thresholds. This is because that CUFP-M<strong>in</strong>e<br />

generates too many supersets and UF-Growth generates<br />

too many tree nodes and MBP generates many candidates,<br />

as shown <strong>in</strong> Tables 4-5. The time performance of MBP is<br />

dependent on the length of candidate itemsets, the length<br />

of transaction itemsets, and the size of dataset: the higher<br />

these values are, the lower the time performance of MBP<br />

will be. Thus the time performance of MBP decreases<br />

sharply with the decreas<strong>in</strong>g of the threshold. Figure 4<br />

<strong>in</strong>dicates that AT-M<strong>in</strong>e has achieved a better time<br />

performance; moreover, its time performance is more<br />

stable on sparse dataset.<br />

B. Evaluation on Dense Datasets<br />

In this section, we test the performance of our<br />

proposed algorithm on dense datasets connect and<br />

mushroom.<br />

TABLE VI.<br />

DETAILS ANALYSIS ON THE DATASET CONNECT<br />

η (%)<br />

trees nodes (#) candidates (#)<br />

AT-M<strong>in</strong>e UF-Growth MBP<br />

15.0 36,823 32,204,274 5,981<br />

14.0 89,118 33,739,243 6,962<br />

13.0 98,842 35,332,360 7,786<br />

12.0 116,290 48,046,639 8,565<br />

11.0 130,423 106,626,725 12,754<br />

10.0 153,913 163,809,762 19,162<br />

Tables 6-7 show the total number of tree nodes<br />

generated by AT-M<strong>in</strong>e and UF-Growth, and the number<br />

of candidate itemsets generated by MBP, on the dense<br />

datasets. As shown <strong>in</strong> Tables 6-7, UF-Growth creates too<br />

many tree nodes. For example, on the dataset connect,<br />

UF-Growth generates 163,809,762 nodes while AT-M<strong>in</strong>e<br />

generates 153,913 nodes when the m<strong>in</strong>imum expected<br />

support threshold is 10%. This is because that UF-<br />

Growth just merges the nodes that have the same item<br />

name as well as the same probability, and it is a very<br />

dense and long dataset. Thus we can <strong>in</strong>fer that our<br />

algorithm has achieved better performance than UF-<br />

Growth <strong>in</strong> terms of memory usage. MBP not only<br />

ma<strong>in</strong>ta<strong>in</strong>s candidates, but also ma<strong>in</strong>ta<strong>in</strong> the dataset while<br />

our algorithms only ma<strong>in</strong>ta<strong>in</strong> tree nodes us<strong>in</strong>g compact<br />

trees.<br />

Figure 5 shows the runn<strong>in</strong>g time of three algorithms<br />

on the dense datasets connect and mushroom. CUFP-<br />

M<strong>in</strong>e is out of memory on these two dense datasets. As<br />

shown <strong>in</strong> Figure 5, the time performance of our algorithm<br />

prevails over UF-Growth, MBP and CUFP-M<strong>in</strong>e under<br />

different m<strong>in</strong>imum expected support thresholds. This is<br />

because that CUFP-M<strong>in</strong>e generates too many supersets<br />

and UF-Growth generates too many tree nodes and MBP<br />

generates many candidates, as shown <strong>in</strong> Tables 6-7.<br />

Figure 5 shows that the time performance of AT-M<strong>in</strong>e<br />

obviously outperforms that of other algorithms on these<br />

two dense datasets; moreover, our time performance is<br />

also more stable on the dense datasets.<br />

Runn<strong>in</strong>g time (s)<br />

TABLE VII.<br />

DETAILS ANALYSIS ON THE DATASET MUSHROOM<br />

η (%)<br />

trees nodes (#) candidates(#)<br />

AT-M<strong>in</strong>e UF-Growth MBP<br />

7.0 12,041 1,011,721 1,917<br />

6.0 14,420 1,344,369 2,501<br />

5.0 16,243 1,947,609 3,460<br />

4.0 18,685 2,760,249 5,024<br />

3.0 25,884 4,125,745 8,222<br />

2.0 37,395 8,076,099 16,764<br />

10000<br />

1000<br />

100<br />

AT-M<strong>in</strong>e<br />

MBP<br />

UF-Growth<br />

CUFP-M<strong>in</strong>e (Memory Overflow)<br />

10<br />

15.0 14.5 14.0 13.5 13.0 12.5 12.0 11.5 11.0 10.5 10.0<br />

M<strong>in</strong>imum expected support threshold (%)<br />

(a)<br />

On the dataset connect<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1425<br />

Runn<strong>in</strong>g time (s)<br />

60<br />

50<br />

40<br />

30<br />

20<br />

10<br />

0<br />

AT-M<strong>in</strong>e<br />

MBP<br />

UF-Growth<br />

CUFP-M<strong>in</strong>e (Memory Overflow)<br />

7.0 6.5 6.0 5.5 5.0 4.5 4.0 3.5 3.0 2.5 2.0<br />

(b)<br />

M<strong>in</strong>imum expected support threshold (%)<br />

On the dataset mushroom<br />

Figure 5. Runn<strong>in</strong>g time comparison on dense datasets<br />

VI. CONCLUSION AND DISCUSSION<br />

In this paper, we propose a novel tree structure named<br />

AT-Tree to ma<strong>in</strong>ta<strong>in</strong> transaction itemsets of an uncerta<strong>in</strong><br />

dataset, and a correspond<strong>in</strong>g algorithm named AT-M<strong>in</strong>e<br />

to m<strong>in</strong>e frequent itemsets. AT-M<strong>in</strong>e requires two scans of<br />

dataset to create an AT-Tree. In the first scan, it creates a<br />

header table to ma<strong>in</strong>ta<strong>in</strong> sorted frequent items <strong>in</strong> the<br />

descend<strong>in</strong>g order of support numbers of items. In the<br />

second scan, it ma<strong>in</strong>ta<strong>in</strong>s probability values of frequent<br />

items <strong>in</strong> each transaction itemsets to an array; it <strong>in</strong>serts<br />

frequent items <strong>in</strong> each transaction itemsets to an AT-Tree;<br />

it ma<strong>in</strong>ta<strong>in</strong>s probability <strong>in</strong>formation of each transaction<br />

itemsets to the tail node. So the AT-Tree is as compact as<br />

the orig<strong>in</strong>al FP-Tree, and it does not lose the probability<br />

<strong>in</strong>formation of each transaction itemsets. Thus, AT-M<strong>in</strong>e<br />

can f<strong>in</strong>d frequent itemsets from AT-Tree without<br />

additional scan of dataset.<br />

Experiments were performed on sparse and dense<br />

datasets. We compared our proposed algorithm with<br />

some state-of-the-art level-wise and pattern-growth<br />

algorithms. The experimental results show that the<br />

proposed algorithm has better performance on dense<br />

datasets and large sparse datasets, and their time<br />

performance is stable on both dense and sparse datasets<br />

along with the decreas<strong>in</strong>g of the m<strong>in</strong>imum expected<br />

support threshold.<br />

REFERENCES<br />

[1] R. AGrawal and R. Srikant, Fast algorithms for m<strong>in</strong><strong>in</strong>g<br />

association rules <strong>in</strong> large databases, <strong>in</strong> International<br />

Conference on Very Large Data Bases. 1994, pp.487-487.<br />

[2] J. Han, J. Pei and Y. Y<strong>in</strong>, M<strong>in</strong><strong>in</strong>g frequent patterns without<br />

candidate generation, <strong>in</strong> ACM SIGMOD International<br />

Conference on Management of Data. 2000, pp.1-12.<br />

[3] G. Grahne and J. Zhu, "Fast algorithms for frequent itemset<br />

m<strong>in</strong><strong>in</strong>g us<strong>in</strong>g FP-trees," IEEE Transactions on Knowledge<br />

and Data Eng<strong>in</strong>eer<strong>in</strong>g, Vol.17, no.10, pp.1347-1362, 2005.<br />

[4] M. Song and S. Rajasekaran, "A transaction mapp<strong>in</strong>g<br />

algorithm for frequent itemsets m<strong>in</strong><strong>in</strong>g," IEEE<br />

Transactions on Knowledge and Data Eng<strong>in</strong>eer<strong>in</strong>g, Vol.18,<br />

no.4, pp.472-481, 2006.<br />

[5] J. Pei, et al., "H-M<strong>in</strong>e: Fast and space-preserv<strong>in</strong>g frequent<br />

pattern m<strong>in</strong><strong>in</strong>g <strong>in</strong> a large databases," IIE Transactions<br />

(Institute of Industrial Eng<strong>in</strong>eers), Vol.39, no.6, pp.593-<br />

605, 2007.<br />

[6] P. Paranjape-Voditel and U. Deshpande, "A DIC-based<br />

distributed algorithm for frequent itemset generation,"<br />

Journal of Software, Vol.6, no.2, pp.306-313, 2011.<br />

[7] L. Zhou and Z. Zhang, "Efficient m<strong>in</strong><strong>in</strong>g algorithms of<br />

f<strong>in</strong>d<strong>in</strong>g frequent datasets," Journal of Software, Vol.7, no.4,<br />

pp.727-732, 2012.<br />

[8] R.C. Agarwal, C.C. Aggarwal and V.V.V. Prasad, Depth<br />

first generation of long patterns, <strong>in</strong> ACM SIGKDD<br />

International Conference on Knowledge Discovery and<br />

Data M<strong>in</strong><strong>in</strong>g. 2001, pp.108-118.<br />

[9] R.J. Bayardo Jr., Efficiently m<strong>in</strong><strong>in</strong>g long patterns from<br />

databases, <strong>in</strong> ACM SIGMOD International Conference on<br />

Management of Data. 1998, pp.85-93.<br />

[10] D. Burdick, M. Calimlim, J. Flannick, J. Gehrke, and T.<br />

Yiu, "MAFIA: A maximal frequent itemset algorithm,"<br />

IEEE Transactions on Knowledge and Data Eng<strong>in</strong>eer<strong>in</strong>g,<br />

Vol.17, no.11, pp.1490-1504, 2005.<br />

[11] D.I. L<strong>in</strong> and Z.M. Kedem, "P<strong>in</strong>cer search: A new algorithm<br />

for discover<strong>in</strong>g the maximum frequent set," IEEE<br />

Transactions on Knowledge and Data Eng<strong>in</strong>eer<strong>in</strong>g, Vol.3,<br />

no.14, pp.553- 566, 2002.<br />

[12] H. Li, N. Zhang and Z. Chen, "A simple but effective<br />

maximal frequent itemset m<strong>in</strong><strong>in</strong>g algorithm over streams,"<br />

Journal of Software, Vol.7, no.1, pp.25-32, 2012.<br />

[13] J. Wang, J. Han and J. Pei, CLOSET+: Search<strong>in</strong>g for the<br />

best strategies for m<strong>in</strong><strong>in</strong>g frequent closed itemsets, <strong>in</strong> ACM<br />

SIGKDD International Conference on Knowledge<br />

Discovery and Data M<strong>in</strong><strong>in</strong>g (KDD '03). 2003, pp.236-245.<br />

[14] B. Vo, T. Hong and B. Le, "DBV-M<strong>in</strong>er: A Dynamic Bit-<br />

Vector approach for fast m<strong>in</strong><strong>in</strong>g frequent closed itemsets,"<br />

Expert Systems with Applications, Vol.39, no.8, pp.7196-<br />

7206, 2012.<br />

[15] J. Wang, J. Han, Y. Lu, and P. Tzvetkov, "TFP: An<br />

efficient algorithm for m<strong>in</strong><strong>in</strong>g top-k frequent closed<br />

itemsets," IEEE Transactions on Knowledge and Data<br />

Eng<strong>in</strong>eer<strong>in</strong>g, Vol.17, no.5, pp.652-664, 2005.<br />

[16] C.H. Wei and R. Gob, "Discover<strong>in</strong>g patterns <strong>in</strong> categorical<br />

time series us<strong>in</strong>g IFS," Computational Statistics and Data<br />

Analysis, Vol.52, no.9, pp.4369-4379, 2008.<br />

[17] J.Y. Hu and A.M. Silovic, "High-utility pattern m<strong>in</strong><strong>in</strong>g: A<br />

method for discovery of high-utility item sets," PATTERN<br />

RECOGNITION, Vol.40, no.11, pp.3317-3324, 2007.<br />

[18] C.F. Ahmed, S.K. Tanbeer, B.S. Jeong, and Y.K. Lee,<br />

"Efficient Tree Structures for High Utility Pattern M<strong>in</strong><strong>in</strong>g<br />

<strong>in</strong> Incremental Databases," IEEE Transactions on<br />

Knowledge and Data Eng<strong>in</strong>eer<strong>in</strong>g, Vol.21, no.12, pp.1708-<br />

1721, 2009.<br />

[19] V.S. Tseng, C.W. Wu, B.E. Shie, and P.S. Yu. UP-Growth:<br />

An efficient algorithm for high utility itemset m<strong>in</strong><strong>in</strong>g, <strong>in</strong><br />

ACM SIGKDD International Conference on Knowledge<br />

Discovery and Data M<strong>in</strong><strong>in</strong>g. 2010, pp.253-262.<br />

[20] V.S. Tseng, B. Shie, C. Wu, and P.S. Yu, "Efficient<br />

Algorithms for M<strong>in</strong><strong>in</strong>g High Utility Itemsets from<br />

Transactional Databases," IEEE Transactions on<br />

Knowledge and Data Eng<strong>in</strong>eer<strong>in</strong>g, no.99(PrePr<strong>in</strong>ts), 2012.<br />

[21] A. Prasad Sistla, O. Wolfson, S. Chamberla<strong>in</strong>, and S. Dao,<br />

"Query<strong>in</strong>g the uncerta<strong>in</strong> position of mov<strong>in</strong>g objects,"<br />

Vol.1399, pp.310-337, 1998.<br />

[22] N. Khoussa<strong>in</strong>ova, M. Balaz<strong>in</strong>ska and D. Suciu, Towards<br />

correct<strong>in</strong>g <strong>in</strong>put data errors probabilistically us<strong>in</strong>g <strong>in</strong>tegrity<br />

constra<strong>in</strong>ts, <strong>in</strong> MobiDE 2006: 5th ACM International<br />

Workshop on Data Eng<strong>in</strong>eer<strong>in</strong>g for Wireless and Mobile<br />

Access. 2006, pp.43-50.<br />

[23] C.W. L<strong>in</strong> and T.P. Hong, "A new m<strong>in</strong><strong>in</strong>g approach for<br />

uncerta<strong>in</strong> databases us<strong>in</strong>g CUFP trees," Expert Systems<br />

with Applications, Vol.39(4), pp.4084–4093, 2012.<br />

[24] C.C. Aggarwal and P.S. Yu, "A survey of uncerta<strong>in</strong> data<br />

algorithms and applications," Knowledge and Data<br />

© 2013 ACADEMY PUBLISHER


1426 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Eng<strong>in</strong>eer<strong>in</strong>g, IEEE Transactions on, Vol.21, no.5, pp.609-<br />

623, 2009.<br />

[25] C.K. Leung, M.A.F. Mateo and D.A. Brajczuk, A treebased<br />

approach for frequent pattern m<strong>in</strong><strong>in</strong>g from uncerta<strong>in</strong><br />

data, <strong>in</strong> 12th Pacific-Asia Conference on Knowledge<br />

Discovery and Data M<strong>in</strong><strong>in</strong>g (PAKDD 2008). 2008, pp.653-<br />

661.<br />

[26] X. Sun, L. Lim and S. Wang, "An approximation algorithm<br />

of m<strong>in</strong><strong>in</strong>g frequent itemsets from uncerta<strong>in</strong> dataset,"<br />

International Journal of Advancements <strong>in</strong> Comput<strong>in</strong>g<br />

Technology, Vol.4, no.3, pp.42-49, 2012.<br />

[27] T. Calders, C. Garboni and B. Goethals, Approximation of<br />

frequentness probability of itemsets <strong>in</strong> uncerta<strong>in</strong> data, <strong>in</strong><br />

IEEE International Conference on Data M<strong>in</strong><strong>in</strong>g (ICDM<br />

2010). 2010, pp.749-754.<br />

[28] L. Wang, D.W. Cheung, R. Cheng, S. Lee, and X. Yang,<br />

"Efficient M<strong>in</strong><strong>in</strong>g of Frequent Itemsets on Large Uncerta<strong>in</strong><br />

Databases," IEEE Transactions on Knowledge and Data<br />

Eng<strong>in</strong>eer<strong>in</strong>g, no.99(PrePr<strong>in</strong>ts), 2011.<br />

[29] C.K. Leung, C.L. Carmichael and B. Hao, Efficient m<strong>in</strong><strong>in</strong>g<br />

of frequent patterns from uncerta<strong>in</strong> data, <strong>in</strong> International<br />

Conference on Data M<strong>in</strong><strong>in</strong>g Workshops (ICDM Workshops<br />

2007). 2007, pp.489-494.<br />

[30] C.C. Aggarwal, Y. Li, J. Wang, and J. Wang, Frequent<br />

pattern m<strong>in</strong><strong>in</strong>g with uncerta<strong>in</strong> data, <strong>in</strong> 15th ACM SIGKDD<br />

International Conference on Knowledge Discovery and<br />

Data M<strong>in</strong><strong>in</strong>g (KDD '09). 2009, pp.29-37.<br />

[31] C. Chui, B. Kao and E. Hung, M<strong>in</strong><strong>in</strong>g frequent itemsets<br />

from uncerta<strong>in</strong> data, <strong>in</strong> 11th Pacific-Asia Conference on<br />

Knowledge Discovery and Data M<strong>in</strong><strong>in</strong>g (PAKDD 2007).<br />

2007, pp.47-58.<br />

[32] Y. Liu, "M<strong>in</strong><strong>in</strong>g frequent patterns from univariate uncerta<strong>in</strong><br />

data," Data and Knowledge Eng<strong>in</strong>eer<strong>in</strong>g, Vol.71, no.1,<br />

pp.47-68, 2012.<br />

[33] B. Goethals. Frequent itemset m<strong>in</strong><strong>in</strong>g dataset repository,<br />

http://fimi.cs.hels<strong>in</strong>ki.fi/data/. Accessed June 2011,2011.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1427<br />

A Solution for Privacy-Preserv<strong>in</strong>g Data<br />

Manipulation and Query on NoSQL Database<br />

Guo Yub<strong>in</strong> a , Zhang Liankuan b , L<strong>in</strong> Fengren a , Li Xim<strong>in</strong>g a,∗<br />

a College of Informatics, South Ch<strong>in</strong>a Agricultural University, Guangzhou 510640, Ch<strong>in</strong>a<br />

Email: {guoyub<strong>in</strong>,l<strong>in</strong>fengren,lixim<strong>in</strong>g}@scau.edu.cn<br />

b College of Science, South Ch<strong>in</strong>a Agricultural University, Guangzhou 510640, Ch<strong>in</strong>a<br />

Email: zhangliankuan@scau.edu.cn<br />

Abstract— Privacy of data owners and query users is vital <strong>in</strong><br />

modern cloud<strong>in</strong>g data management. Many researches have<br />

been done on cloud security, but most of them are focused on<br />

the privacy of data owners or of query users separately. How<br />

to protect the privacy of the data owners and users simultaneously<br />

is a great challenge. In this paper, a solution of data<br />

storage and query protocol based on classical homomorphic<br />

encryption scheme is given to preserve privacy of both data<br />

owners and query users. Our ma<strong>in</strong> efforts are put on NoSQL<br />

database which is less structural than relational database.<br />

Storage and <strong>in</strong>dex<strong>in</strong>g structure on NoSQL database, query<br />

protocol are proposed, and algorithms for updat<strong>in</strong>g and<br />

query<strong>in</strong>g are also given. To implement our solution, Berkley<br />

DB, an excellent storage solution for NoSQL database is<br />

chosen and data are encrypted/decrypted us<strong>in</strong>g Elgamal<br />

and Paillier encryption system, us<strong>in</strong>g basic Java package.<br />

Experiments are done under different parameters <strong>in</strong> order<br />

to achieve better efficiency.<br />

Index Terms— NoSQL; cloud data management; privacy<br />

preserv<strong>in</strong>g<br />

need to query data from cloud, but the query might<br />

disclose sensitive <strong>in</strong>formation, behavior patterns of the<br />

user. For example, when Alice searches a website, such as<br />

Facebook, for friends who share the similar backgrounds<br />

(e.g., age, education, home address) with her, she should<br />

not disclose the query that <strong>in</strong>volves her own details to the<br />

cloud. Privacy of data owners and query users are def<strong>in</strong>ed<br />

as data privacy and user privacy respectively.<br />

I. INTRODUCTION<br />

Today cloud comput<strong>in</strong>g and data outsourc<strong>in</strong>g provide<br />

much convenience for k<strong>in</strong>ds of enterprises. For <strong>in</strong>stance,<br />

enterprises can concentrate on their ma<strong>in</strong> bus<strong>in</strong>ess while<br />

outsourc<strong>in</strong>g their complex data management and query<br />

service to service providers <strong>in</strong> cloud. These service<br />

providers <strong>in</strong> cloud focus on data management, and provide<br />

high quality service. But <strong>in</strong> such k<strong>in</strong>d of comput<strong>in</strong>g<br />

pattern, a bottleneck, privacy preserv<strong>in</strong>g of data owners<br />

and query users, seriously restricts progress of cloud<br />

comput<strong>in</strong>g.<br />

Consider environment illustrated <strong>in</strong> Fig. 1, data owners<br />

outsource their data and query services, but the data is<br />

private assets of them and should be protected aga<strong>in</strong>st<br />

the service providers and query<strong>in</strong>g users <strong>in</strong> some extent.<br />

On one hand, data owner can update, query and authorize<br />

access of data, while the service providers <strong>in</strong> cloud should<br />

know noth<strong>in</strong>g about especially detailed data, and query<br />

users should know not more than the exact answers for<br />

what she/he is query<strong>in</strong>g. On the other hand, query users<br />

Partially supported by National Science Foundation of Ch<strong>in</strong>a<br />

(61103232, 61272402, 61202294),Guangdong Provice Nature Science<br />

Foundation (10351806001000000, 10151064201000028), Guangdong<br />

Science Technology Plan Project (2010B010600046, 2011B090400325),<br />

Guangzhou Science Technology Plan Project (12C42101606).<br />

* Contact author.<br />

Figure 1: Architecture of Data Service on Cloud<br />

A. Related works<br />

For data privacy, the most general solution <strong>in</strong> recently<br />

research papers are encryption that means data deposited<br />

to service provider must be encrypted to avoid <strong>in</strong>formation<br />

leakage. Agrawal et al [5] proposed an order<br />

preserv<strong>in</strong>g encryption scheme (OPES) by which <strong>in</strong>dexes<br />

can be built directly on ciphertext. OPES can handle<br />

directly (without decryption) any <strong>in</strong>terest<strong>in</strong>g SQL query<br />

types, except SUM and AVG. But order preserv<strong>in</strong>g would<br />

leak <strong>in</strong>formation about data, and is not a good solution<br />

to privacy preserv<strong>in</strong>g. Hacigumus et al [9] proposed to<br />

handle SUM and AVG us<strong>in</strong>g homomorphic encryption<br />

function <strong>in</strong> the database context. Ayman Mousa et al. [14]<br />

uses classic REA, a symmetric encryption algorithm, to<br />

encrypted data respectively, and <strong>in</strong> this way the query process<strong>in</strong>g<br />

performance is assured, but <strong>in</strong>formation leakage<br />

and query privacy are not considered. Privacy homomorphism<br />

[17] is encryption transformations which map a<br />

set of operations on cleartext to another set of operations<br />

on ciphertext. In essence, privacy homomorphism enables<br />

complex computations (such as distances) based solely on<br />

ciphertext, without decryption. Unfortunately, as po<strong>in</strong>ted<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1427-1432


1428 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

out by Mykletun and Tsudik [15], its encryption scheme<br />

is <strong>in</strong>secure, demonstrated by its vulnerability to a basic<br />

ciphertext-only attack. However, for encrypted database,<br />

efficiency of query process<strong>in</strong>g is a great challenge.<br />

In [8], [10], [11], user privacy is considered together<br />

with data privacy. Yonghong Yu and Wenyang Bai discussed<br />

how to enforce data privacy and user privacy<br />

over outsourced database service <strong>in</strong> [18]. Hu et al. [11]<br />

proposed a solution based on secure traversal framework<br />

and privacy homomorphism based encryption scheme.<br />

Yong Hu et.al <strong>in</strong> [12] constructed an <strong>in</strong>telligent analysis<br />

model for outsourced software. And secure protocols<br />

for process<strong>in</strong>g k-nearest-neighbor queries (kNN) on R-<br />

tree <strong>in</strong>dex is given. In the authors follow<strong>in</strong>g work [10],<br />

they <strong>in</strong>tegrated <strong>in</strong>dex<strong>in</strong>g techniques with secure multiparty<br />

computation (SMC) based protocols to construct<br />

a secure <strong>in</strong>dex traversal framework. In this framework,<br />

the service provider cannot trace the <strong>in</strong>dex traversal path<br />

of a query dur<strong>in</strong>g evaluation, and thus keep privacy of<br />

users. Their protocols for query are complex, and hard<br />

to implement. The thought of composed key <strong>in</strong> <strong>in</strong>dex is<br />

directly prompted by T<strong>in</strong>gjian Ge’s work [8]. In his paper,<br />

keyword are composed together to improve the efficiency<br />

of aggregation operations <strong>in</strong> database. It is <strong>in</strong>tuitively that<br />

addition of keywords <strong>in</strong> block is dramatically efficient<br />

than add<strong>in</strong>g them one by one. But the authors have not<br />

considered range or s<strong>in</strong>gle key search. As to protect<strong>in</strong>g<br />

data privacy and user privacy, we use the block structure<br />

to hide real structure of keys <strong>in</strong> <strong>in</strong>dex. And key search is<br />

efficient for key comparison can be done k−<strong>in</strong>−1 where<br />

the k is key number <strong>in</strong> a s<strong>in</strong>gle block, that is decided by<br />

block and key size.<br />

B. Our contribution<br />

For data privacy and user privacy, a solution of data<br />

storage, manipulation and query is presented <strong>in</strong> this paper.<br />

In ma<strong>in</strong> database files, data are stored <strong>in</strong> key/value pair<br />

which is a typical NoSQL storage structure and are encrypted<br />

with Elgamal homomorphic encryption scheme.<br />

Keys <strong>in</strong> <strong>in</strong>dex are ciphertext of comb<strong>in</strong>ations of real keys<br />

<strong>in</strong> big blocks (<strong>in</strong> our experiments, one block is set to<br />

1024 bits), which are encrypted with Paillier encryption<br />

scheme [16] which is an additive homomorphic cryptosystem.<br />

When a key is queried, comparison can be done<br />

on ciphertext <strong>in</strong> blocks that improves efficiency of query.<br />

Protocols of data manipulation and query among data<br />

owner, service provider and query<strong>in</strong>g user is given. Algorithm<br />

for data updat<strong>in</strong>g and query<strong>in</strong>g are implemented to<br />

verify usefulness of the solution. As to implementation of<br />

our solution, Berkley DB, a typical key/value pair model<br />

database, is chosen to construct a prototype system. It is<br />

an excellent storage solution for NoSQL database for its<br />

high efficiency and convenience.<br />

C. Outl<strong>in</strong>e of the paper<br />

The rest of the paper is organized as follows. Section<br />

II provides background <strong>in</strong>formation on homomorphic<br />

encryption scheme, NoSQL database and <strong>in</strong>dex. Section<br />

III describes the query protocol and ma<strong>in</strong> algorithms,<br />

security analysis is also given <strong>in</strong> the section. Performance<br />

and analysis of experiments results are shown <strong>in</strong> section<br />

IV. F<strong>in</strong>ally, section V gives conclusions and future works.<br />

II. PRELIMINARY<br />

A. Homomorphic Encryption<br />

Homomorphic encryption allows specific types of computations<br />

to be carried out on ciphertext and obta<strong>in</strong>s<br />

an encrypted result which is ciphertext of the result<br />

of operations performed on the pla<strong>in</strong> text. The additive<br />

homomorphic property of a homomorphic cryptosystem<br />

is Enc(a) × Enc(b) = Enc(a + b) , where a and<br />

b are two pla<strong>in</strong> text message blocks, and Enc is the<br />

encryption function that takes a pla<strong>in</strong>text message block<br />

(and an encryption key) and returns the ciphertext block.<br />

Thus, <strong>in</strong> the above equation, + operates on the pla<strong>in</strong><br />

text, and × operates on the ciphertext. An example of<br />

such an encryption scheme is the Paillier system. Elgamal<br />

encryption scheme [6], [7] is multiplicative homomorphic<br />

with Enc(a) × Enc(b) = Enc(a ∗ b) where a, b, Enc<br />

and × share the same mean<strong>in</strong>gs with formula above,<br />

and operation + is multiple operation on the pla<strong>in</strong>text.<br />

The Legion of the Bouncy Castle [1] provided open<br />

source libraries of Java and c# Cryptography Architecture.<br />

Both Paillier and ElGamal encryption scheme have<br />

great practical implications on the outsourc<strong>in</strong>g of private<br />

computations, such as, <strong>in</strong> the context of cloud comput<strong>in</strong>g<br />

and outsourc<strong>in</strong>g [13].<br />

B. NoSQL database and <strong>in</strong>dex<br />

NoSQL database is def<strong>in</strong>ed as the next Generation<br />

Databases mostly because of the follow<strong>in</strong>g characteristics:<br />

be<strong>in</strong>g non-relational, distributed, open-source and horizontally<br />

scalable [2]. The concept NoSQL is prompted<br />

by Carlo Strozzi <strong>in</strong> 1998 [3], and the current NoSQL<br />

movement beg<strong>in</strong>n<strong>in</strong>g from 2009 often more characteristics<br />

apply such as: schema-free, easy replication support,<br />

simple API, eventually consistent / BASE (not ACID),<br />

a huge amount of data and more. From NoSQL Data<br />

Model<strong>in</strong>g Techniques [4] data model for NoSQL Database<br />

can be cataloged <strong>in</strong>to key/value or tuple store, Bigtable<br />

style databases, Document databases, and graph<br />

databases. Berkeley DB is a robust solution on which<br />

to build a NoSQL system, and the storage system of its<br />

key/value pair is more efficient than other database. That<br />

is the reason for us to choose it as our base database <strong>in</strong><br />

our experiments.<br />

III. SOLUTION FOR STORAGE AND UPDATING<br />

In this section some symbols are def<strong>in</strong>ed for simplification.<br />

owner means data owner, sp is service provider<br />

<strong>in</strong> cloud, and user data user for query. We use Paillier<br />

crypto-system to encrypt keys and values <strong>in</strong> NoSQL<br />

database. System parameter is taken as n. Enc(m, pk)<br />

is the function to encrypt pla<strong>in</strong>text m with public key<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1429<br />

pk, and Dec(c, sk) function to decrypt ciphertext c with<br />

private key sk. Denote the public key and secret key of<br />

data owner as (pk owner , sk owner ). Denote the public key<br />

and secret key of user user i as (pk useri , sk useri ). All data<br />

are encrypted us<strong>in</strong>g homomorphic encryption algorithm,<br />

each one of owner, sp and user publishes his public key<br />

and uses the private key to decrypt ciphers.<br />

A. data storage<br />

In our solution, data are stored <strong>in</strong> database, and <strong>in</strong><br />

key/data model. That means each tuple is composed of<br />

one key and one data, the key and data are encrypted<br />

respectively. To construct <strong>in</strong>dices of data, several keys<br />

are composited together to form a 1024 b<strong>in</strong>ary bits block.<br />

Number of keys <strong>in</strong> one block is determ<strong>in</strong>ed by length of<br />

key. Let l be length of key, then the number of keys <strong>in</strong> one<br />

block is ⌊(1024)/(l+1)⌋ and one bit is added to each key<br />

to deal with overflow.. Let k 1 , k 2 , . . . , k m be keys which<br />

will be comb<strong>in</strong>ed together, then the key block <strong>in</strong> <strong>in</strong>dex k<br />

can be computed as follows:<br />

Algorithm 1: Index construct<strong>in</strong>g algorithm<br />

Input: key, po<strong>in</strong>ter*<br />

Output: <strong>in</strong>dex file f<br />

1 f= New(file );<br />

2 l= length of key;<br />

3 n = <strong>in</strong>t(1024/(l + 1));<br />

4 while not end of <strong>in</strong>put do<br />

5 i = 0;<br />

6 m 1 = m 2 = 0;<br />

7 while i


1430 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Algorithm 2: Data <strong>in</strong>sert<strong>in</strong>g algorithm<br />

Input: < key, value > //a new tuple that is <strong>in</strong>sert<strong>in</strong>g<br />

<strong>in</strong>to the database<br />

Output:<br />

1 //Insert a new tuple<br />

< Enc(key, pk owner ), Enc(key, pk owner ) > <strong>in</strong>to<br />

database.;<br />

2 T =< Enc(key, pk owner ), Enc(value, pk owner ) >;<br />

3 Attach<br />

T =< Enc(key, pk owner ), Enc(value, pk owner ) ><br />

to the end of ma<strong>in</strong> database file;<br />

4 //<strong>in</strong>dex ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g;<br />

5 for each <strong>in</strong>dex do<br />

6 Construct its new keys key ′ ;<br />

7 t =<<br />

Enc(key ′ , pk owner ), Enc(key, pk owner ) >;<br />

8 if the last data block of <strong>in</strong>dex file is not full then<br />

9 (c key , c value )= ciphertext of last block ;<br />

10 c key = c l+1<br />

key + Enc(key, pk owner) mod n 2 ;<br />

11 c value = c l+1<br />

value + Enc(value, pk owner)<br />

mod n 2 ;<br />

12 Write (c key , c value ) back to file;<br />

13 else<br />

14 Attach T =<<br />

Enc(key, pk owner ), Enc(value, pk owner ) ><br />

to the end of <strong>in</strong>dex file.<br />

15 Send the <strong>in</strong>dex back to sp and replace old one ;<br />

Algorithm 3: Data delet<strong>in</strong>g algorithm<br />

Input: t =<<br />

Enc(key, pk owner ), Enc(value, pk owner ) >,<br />

database(ma<strong>in</strong> file and <strong>in</strong>dices)<br />

Output: database(ma<strong>in</strong> file and <strong>in</strong>dices) after<br />

deletion<br />

1 Select<br />

t =< Enc(key, pk owner ), Enc(value, pk owner )) ><br />

<strong>in</strong> ma<strong>in</strong> file and <strong>in</strong>dices.;<br />

2 //delet<strong>in</strong>g from ma<strong>in</strong> database file, is done by sp;<br />

3 Select the last tuple of ma<strong>in</strong> database file as t 1 ;<br />

4 Replace t with t 1 ;<br />

5 //delet<strong>in</strong>g from <strong>in</strong>dex;<br />

6 for each <strong>in</strong>dex do<br />

7 Construct key key ′ ;<br />

8 Let t =<<br />

Enc(key ′ , pk owner ), Enc(key, pk owner ) >;<br />

9 F<strong>in</strong>d the block b t <strong>in</strong> which t is the ith key;<br />

10 F<strong>in</strong>d the last key block b l <strong>in</strong> <strong>in</strong> which key t l is<br />

<strong>in</strong> b l ;<br />

11 b t = b t /t i∗(l+1) ∗ t i∗(l+1)<br />

l<br />

mod n 2 ;<br />

12 b l = b l /t l mod n 2 ;<br />

13 Send the <strong>in</strong>dex file to sp and replace old one;<br />

Figure 3: An example of query<strong>in</strong>g<br />

We know, the query algorithm is oblivious for data user.<br />

The data user encrypted additive reverse of queried key<br />

at first, and send it to service provider. Then the service<br />

provider extends it <strong>in</strong>to queried block, and chooses proper<br />

<strong>in</strong>dex to multiple the queried block with a key block, and<br />

as follows, the product is sent to data owner one by one.<br />

When the data owner receives the product, it decrypts<br />

the cipher and decomposes the pla<strong>in</strong>text to f<strong>in</strong>d which<br />

one is 0, which means the accord<strong>in</strong>g key <strong>in</strong> the block<br />

is equal to queried key. The serial numbers of the key<br />

are sent back to the service provider, service provider<br />

can get the key <strong>in</strong> ma<strong>in</strong> data file and get queried data<br />

for the data owner. This process will term<strong>in</strong>ated when the<br />

queried key is found or all blocks <strong>in</strong> the <strong>in</strong>dex is searched.<br />

To database applications, query<strong>in</strong>g is the most common<br />

operation. In our solution, all of the three roles, service<br />

provider, data owner and data user must participant <strong>in</strong><br />

the query<strong>in</strong>g process. To preserve both data owner and<br />

user privacy, query<strong>in</strong>g process is more complex than <strong>in</strong><br />

traditional database system. Fig. 4 presents the query<strong>in</strong>g<br />

protocol <strong>in</strong> detail.<br />

D. Security analysis<br />

Figure 4: Query protocol<br />

In this protocol, data user prompts a query by encrypt<strong>in</strong>g<br />

additive <strong>in</strong>verse of queried key with public key of data<br />

owner and sends it to the service provider. The second<br />

step starts when the service provider receives a query<br />

request. The service provider chooses proper <strong>in</strong>dex, and<br />

then a 1024 bits big <strong>in</strong>teger M is composed by repeat<strong>in</strong>g<br />

the queried key several times. Then multiplies M by each<br />

key block respectively, and sends the results to data owner.<br />

When the data owner receives the products, he decrypts<br />

the cipher and decomposes the pla<strong>in</strong>text to f<strong>in</strong>d 0 <strong>in</strong> each<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1431<br />

product. This procedure can be ended when the key is<br />

found or all products are searched. Then the serial number<br />

of equal key is sent back to the service provider, and all<br />

the queried data are sent to the data owner. At last step,<br />

the data owner decrypts the data with his owner private<br />

key and encrypts it with public key of the data user and<br />

sent the result to him.<br />

Dur<strong>in</strong>g the query process, additive reverse of the<br />

queried keyword is encrypted before send<strong>in</strong>g to the service<br />

provider, and the queried data is sent by data owner,<br />

therefore the service provider can get no <strong>in</strong>formation<br />

about what the data user is query<strong>in</strong>g on the database.<br />

Security can also be enforced by add<strong>in</strong>g disturb<strong>in</strong>g data<br />

when the data owner requests query data from service<br />

provider. And as to the data owner, dur<strong>in</strong>g the query<br />

process, only product of the queried block and <strong>in</strong>dex key<br />

blocks are received and decrypted to f<strong>in</strong>d the order of<br />

equal ones, while the queried key is kept <strong>in</strong>visible. The<br />

data owner do not know which <strong>in</strong>dex is chosen and cannot<br />

deduce what the data user is query<strong>in</strong>g. It is obvious that<br />

we cannot complete query without leak<strong>in</strong>g no <strong>in</strong>formation<br />

about the user and what she is query<strong>in</strong>g. At least, queried<br />

result must be sent back to her. What we really want to do<br />

and can do is to limit the <strong>in</strong>formation leakage as much as<br />

possible. From the analysis above, we can see, confidence<br />

of data owner can surely be protected for homomorphic<br />

encryption scheme is used. Data privacy and user privacy<br />

are all kept by the scheme we propose to some extent.<br />

Figure 5: Query efficiency on data quantity, and length of<br />

key<br />

length. In this figure thread number is x axis, and there<br />

3 curves are with different key length. It is oblivious<br />

that the best value of thread number is 4. When thread<br />

is few, comput<strong>in</strong>g power of CPU cannot be fully used.<br />

And when threads are too much, communication and<br />

context change decrease the efficiency of the solution.<br />

Thread number is vital for most service providers <strong>in</strong><br />

clouds. And parallel process of key words comparison can<br />

improve query performance drastically. In our prototype<br />

system, block comparison is divided <strong>in</strong>to several parts<br />

simply, query efficiency can be heightened further with<br />

sophisticated technology of parallel programm<strong>in</strong>g. Note<br />

that thread number is a hardware-depended parameter.<br />

A. Setup<br />

IV. EXPERIMENTS<br />

Our experiments are conducted on BDB database<br />

system on W<strong>in</strong>dows 7. We implements the generalized<br />

Paillier system with basic Java package, and the Elgamal<br />

scheme is from open source library of bouncy castle<br />

[1]. All experiments of the solution are implemented <strong>in</strong><br />

Java with JDK 1.7 and the prototype system are run on<br />

personal computer with Intel 2Ghz processor and 2GB<br />

memory.<br />

B. Experiments design and analysis<br />

A series of experiments have been done to test efficiency<br />

of our solution. Some vital parameters, like<br />

quantity of data, thread number, and length of key, have<br />

been changed to f<strong>in</strong>d difference. Fig. 5 illustrates query<br />

efficiency of our solution. In this figure, x axis is number<br />

of tuples which is set to be 20000, 30000, 40000, 50000,<br />

75000 and 100000, while y axis is average time used<br />

for a s<strong>in</strong>gle value query. And we can get 3 curves when<br />

the length of key is set to 5, 10 and 20 decimal bits<br />

respectively. (as <strong>in</strong> b<strong>in</strong>ary, it should be 1, 2, and 4 bytes<br />

approximately.) On the whole, query efficiency is much<br />

better when length of key is not so long. The reason<br />

lies <strong>in</strong> that when the key is short, more keys can be put<br />

<strong>in</strong>to one s<strong>in</strong>gle block, therefore a comparison on block is<br />

equivalent to much more comparisons on s<strong>in</strong>gle key.<br />

In Fig. 6, tuple number is set to 50,000, to illustrate<br />

query efficiency variation on thread number and key<br />

Figure 6: Query efficiency on thread number and key<br />

length<br />

Fig. 7 illustrates efficiency variation accord<strong>in</strong>g to thread<br />

number and tuple number when the key size is fixed to 10.<br />

From the figure, we can see, query time <strong>in</strong>creases more<br />

quickly when tuples are more than 50,000. And it means<br />

performance of our solution is more better to middle scale<br />

database.<br />

V. CONCLUSION<br />

Homomorphic encryption scheme provides a good solution<br />

to privacy preservation for database system. We<br />

present a storage solution for NoSQL database us<strong>in</strong>g homomorphic<br />

encryption algorithms. Protocol of data query<strong>in</strong>g<br />

is proposed, and algorithms for data manipulation are<br />

given also. In <strong>in</strong>dices, keys are composed <strong>in</strong>to big blocks<br />

to improve the performance of encryption and decryption,<br />

therefore accelerate the process of data manipulation and<br />

© 2013 ACADEMY PUBLISHER


1432 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 7: Query efficiency on thread number and tuple<br />

number<br />

query. Although Paillier and Elgamal encryption scheme<br />

is not so efficient compar<strong>in</strong>g to symmetric encryption<br />

schemes like DES and SHA. But it is good enough for<br />

some cases that users pay more attention on <strong>in</strong>formation<br />

security than computation performance.<br />

Future work <strong>in</strong>cludes improv<strong>in</strong>g efficiency of the system<br />

and extend<strong>in</strong>g system functionality, such as extended<br />

query on range, aggregation, and jo<strong>in</strong>.<br />

REFERENCES<br />

[1] The legion of the bouncy castle. http://www.<br />

bouncycastle.org/, 2013. [Onl<strong>in</strong>e; accessed 10-Jan-<br />

2013].<br />

[2] Non - relational universe. http://nosql-database.<br />

org/, 2013. [Onl<strong>in</strong>e; accessed 10-Jan-2013].<br />

[3] Nosql, a relational database management system.<br />

http://www.strozzi.it/cgi-b<strong>in</strong>/CSA/tw7/<br />

I/en US/nosql/Home\%20Page, 2013. [Onl<strong>in</strong>e;<br />

accessed 10-Jan-2013].<br />

[4] Nosql data model<strong>in</strong>g techniques. http:<br />

//highlyscalable.wordpress.com/2012/<br />

03/01/nosql-data-model<strong>in</strong>g-techniques/,<br />

2013. [Onl<strong>in</strong>e; accessed 10-Jan-2013].<br />

[5] Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant,<br />

and Yirong Xu. Order preserv<strong>in</strong>g encryption for numeric<br />

data. In Proceed<strong>in</strong>gs of the 2004 ACM SIGMOD <strong>in</strong>ternational<br />

conference on Management of data, SIGMOD ’04,<br />

pages 563–574, New York, NY, USA, 2004. ACM.<br />

[6] Haipeng Chen, Xuanj<strong>in</strong>g Shen, and Y<strong>in</strong>gda Lv. An implicit<br />

elgamal digital signature scheme. JSW, 6(7):1329–1336,<br />

2011.<br />

[7] Taher El Gamal. A public key cryptosystem and a signature<br />

scheme based on discrete logarithms. In CRYPTO, pages<br />

10–18, 1984.<br />

[8] T<strong>in</strong>gjian Ge, Stanley B. Zdonik, and Stanley B. Zdonik.<br />

Answer<strong>in</strong>g aggregation queries <strong>in</strong> a secure system model.<br />

In VLDB, pages 519–530, 2007.<br />

[9] Hakan Hacgm, Bala Iyer, and Sharad Mehrotra. Efficient<br />

execution of aggregation queries over encrypted relational<br />

databases. In YoonJoon Lee, Jianzhong Li, Kyu-Young<br />

Whang, and Doheon Lee, editors, Database Systems for<br />

Advanced Applications, volume 2973 of Lecture Notes<br />

<strong>in</strong> Computer Science, pages 125–136. Spr<strong>in</strong>ger Berl<strong>in</strong><br />

Heidelberg, 2004.<br />

[10] Haibo Hu and Jianliang Xu. Non-exposure location<br />

anonymity. In Yannis E. Ioannidis, Dik Lun Lee, and<br />

Raymond T. Ng, editors, ICDE, pages 1120–1131. IEEE,<br />

2009.<br />

[11] Haibo Hu, Jianliang Xu, Chushi Ren, Byron Choi, and<br />

Byron Choi. Process<strong>in</strong>g private queries over untrusted data<br />

cloud through privacy homomorphism. In ICDE, pages<br />

601–612, 2011.<br />

[12] Yong Hu, Xizhu Mo, Xiangzhou Zhang, Yuran Zeng,<br />

Jianfeng Du, and Kang Xie. Intelligent analysis model<br />

for outsourced software project risk us<strong>in</strong>g constra<strong>in</strong>t-based<br />

bayesian network. JSW, 7(2):440–449, 2012.<br />

[13] Daniele Micciancio. A first glimpse of cryptography’s holy<br />

grail. page 96, 2010.<br />

[14] Ayman Mousa, Elsayed Nigm, El-Sayed El-Rabaie,<br />

Osama S. Faragallah, and Osama S. Faragallah. Query<br />

process<strong>in</strong>g performance on encrypted databases by us<strong>in</strong>g<br />

the rea algorithm. pages 280–288, 2012.<br />

[15] E<strong>in</strong>ar Mykletun and Gene Tsudik. Aggregation queries<br />

<strong>in</strong> the database-as-a-service model. In Ernesto Damiani<br />

and Peng Liu, editors, Data and Applications Security XX,<br />

volume 4127 of Lecture Notes <strong>in</strong> Computer Science, pages<br />

89–103. Spr<strong>in</strong>ger Berl<strong>in</strong> / Heidelberg, 2006.<br />

[16] Pascal Paillier. Public-key cryptosystems based on composite<br />

degree residuosity classes. In EUROCRYPT, pages<br />

223–238, 1999.<br />

[17] R. Rivest, L. Adleman, and M. Dertouzos. On data banks<br />

and privacy homomorphisms. pages 169–177. Academic<br />

Press, 1978.<br />

[18] Yonghong Yu and Wenyang Bai. Enforc<strong>in</strong>g data privacy<br />

and user privacy over outsourced database service. JSW,<br />

6(3):404–412, 2011.<br />

GuoYub<strong>in</strong> Received Ph. D. from South Ch<strong>in</strong>a University of<br />

Technology <strong>in</strong> 2007. She is now lecturer <strong>in</strong> South Ch<strong>in</strong>a<br />

Agricultural University. Her research <strong>in</strong>terests <strong>in</strong>clude Database<br />

theory and technology, cryptography and network comput<strong>in</strong>g.<br />

Zhang Liankuan Received Ph. D. from South Ch<strong>in</strong>a Agricultural<br />

University <strong>in</strong> 2012. He is now lecturer <strong>in</strong> South Ch<strong>in</strong>a<br />

Agricultural University. His research <strong>in</strong>terests <strong>in</strong>clude Database<br />

theory, technology and network comput<strong>in</strong>g.<br />

L<strong>in</strong> Fengren He is now Bachelor student <strong>in</strong> South Ch<strong>in</strong>a<br />

Agricultural University. His research <strong>in</strong>terests <strong>in</strong>clude Database<br />

theory and technology.<br />

Li Xim<strong>in</strong>g Received Ph.D. degree from College of Informatics,<br />

South Ch<strong>in</strong>a Agricultural University, Guangzhou, Guangdong,<br />

Ch<strong>in</strong>a, <strong>in</strong> 2011. His current research <strong>in</strong>terests <strong>in</strong>clude computer<br />

theory and cryptography.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1433<br />

Predicate Formal System based on 1-level<br />

Universal AND Operator and its Soundness<br />

Y<strong>in</strong>gcang Ma<br />

School of Science, Xi’an Polytechnic University, Xi’an, Shaanxi, 710048, Ch<strong>in</strong>a<br />

School of Electronics and <strong>in</strong>formation, Northwestern Polytechnical University, Xi’an, Shaanxi, 710048, Ch<strong>in</strong>a<br />

Email: may<strong>in</strong>gcang@126.com<br />

Huacan He<br />

School of Computer Science, Northwestern Polytechnical University, Xi’an, Shaanxi, 710048, Ch<strong>in</strong>a<br />

Email: hehuac@nwpu.edu.cn<br />

Abstract—The aim of this paper is solv<strong>in</strong>g the predicate<br />

calculus formal system based on 1-level universal AND<br />

operator. Firstly, universal logic and propositional calculus<br />

formal deductive system UL − h∈ (0, 1] are <strong>in</strong>troduced. Secondly,<br />

a predicate calculus formal deductive system ∀ UL − h∈ (0,<br />

1]<br />

based on 1-level universal AND operator is built. Thirdly,<br />

the soundness theorem and deduction theorem of system<br />

∀ UL − h∈ (0,<br />

1] are given, which ensure that the theorems are<br />

tautologies and the reason<strong>in</strong>g rules are valid <strong>in</strong><br />

system ∀ h (0 1] .<br />

UL − ∈ ,<br />

Index Terms—universal logic, predicate calculus formal<br />

system, universal AND operator<br />

I. INTRODUCTION<br />

How to deal with various uncerta<strong>in</strong>ties and evolution<br />

problems have been critical issues for further<br />

development of artificial <strong>in</strong>telligence [1,2]. Mathematical<br />

logic is too rigid and it can only solve certa<strong>in</strong>ty problems,<br />

therefore, non-classical logic and modern logic develop<br />

rapidly, for example, fuzzy logic and universal logic.<br />

Considerable progresses have been made <strong>in</strong> logical<br />

foundations of fuzzy logic <strong>in</strong> recent years, especially for<br />

logic system based on t-norm and its residua [3]. Some<br />

well-known logic systems have been built up, such as, the<br />

basic logic (BL) [4, 5] <strong>in</strong>troduced by Hajek; the monoidal<br />

t-norm based logic [6, 7] <strong>in</strong>troduced by Esteva and Godo;<br />

a formal deductive system L* <strong>in</strong>troduced by Wang [8-10],<br />

Universal logic proposed by He [11], and so on.<br />

Universal logic is a new cont<strong>in</strong>uous-valued logic<br />

system <strong>in</strong> study<strong>in</strong>g flexible world’s logical rule, which<br />

uses generalized correlation and generalized<br />

autocorrelation to describe the relationship between<br />

propositions, more studies can be found <strong>in</strong> [12-14]. For a<br />

logic system, the formalization’s studies are very<br />

important, which <strong>in</strong>clude propositional calculus and<br />

predicate calculus. The propositional calculus formal<br />

systems are studied <strong>in</strong> [15-18]. But the studies of<br />

predicate calculus formal systems of universal logic are<br />

relatively rare, so we will ma<strong>in</strong>ly study the predicate<br />

calculus formal system <strong>in</strong> this paper, which can enrich the<br />

formalization’s studies of universal logic.<br />

Some predicate calculus formal deductive systems are<br />

built for fuzzy logic systems, for example, the predicate<br />

calculus formal deductive systems of Schweizer-Sklar t-<br />

norm <strong>in</strong> [19, 20]. The predicate calculus formal deductive<br />

systems of universal logic have been studies <strong>in</strong> [21-24],<br />

which ma<strong>in</strong>ly focus on the 0-level universal AND<br />

operator. In this paper, we focus on the formal system of<br />

universal logic based on 1-level universal AND operator.<br />

We will build predicate formal system ∀UL − h∈ (0,<br />

1] for 1-<br />

level universal AND operator, and its soundness and<br />

deduction theorem are given.<br />

The paper is organized as follows. After this<br />

<strong>in</strong>troduction, Section II conta<strong>in</strong>s necessary background<br />

knowledge about BL and UL. Section III we will build the<br />

predicate calculus formal deductive system ∀ UL − h∈ (0,<br />

1] for<br />

1-level universal AND operator. In Section IV the<br />

soundness and deduction theorem of system ∀ UL − h∈ (0,<br />

1]<br />

will be given. The f<strong>in</strong>al section offers the conclusion.<br />

II. PRELIMINARIES<br />

A. The Basic Fuzzy Logic BL and BL-algebra<br />

The languages of BL [3] <strong>in</strong>clude two basic connectives<br />

→ and & , one truth constant 0 . Further connectives are<br />

def<strong>in</strong>ed as follows:<br />

ϕ ∧ ψ is ϕ & ( ϕ → ψ)<br />

,<br />

ϕ ∨ ψ is (( ϕ →ψ) →ψ) ∧( ψ →ϕ) → ϕ)<br />

,<br />

¬ ϕ is ϕ → 0 ,<br />

ϕ ≡ ψ is ( ϕ →ψ) & ( ψ → ϕ)<br />

.<br />

The follow<strong>in</strong>g formulas are the axioms of BL:<br />

(i) ( ϕ →ψ) →(( ψ → χ)( ϕ → χ))<br />

(ii) ( ϕ & ψ)<br />

→ ϕ<br />

(iii) ( ϕ & ψ) → ( ψ & ϕ)<br />

(iv) ϕ &( ϕ →ψ) →( ψ &( ψ → ϕ))<br />

(v) ( ϕ →( ψ → χ)) →(( ϕ&<br />

ψ) → χ)<br />

(vi) (( ϕ & ψ) → χ) →( ϕ →( ψ → χ))<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1433-1440


1434 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

(vii) (( ϕ →ψ) → χ) →((( ψ →ϕ) → χ) → χ)<br />

(viii) 0 → ϕ<br />

The deduction rule of BL is modus ponens.<br />

Def<strong>in</strong>ition 1 [3] A BL-algebra is an algebra<br />

L = ( L,∩,∪,∗,⇒, 01) , with four b<strong>in</strong>ary operations and<br />

two constants such that ( L,∩,∪, 01) , is a lattice with the<br />

greatest element 1 and the least element 0 (with respect to<br />

the lattice order<strong>in</strong>g ≤ ), ( L,∗, 1) is a commutative<br />

semigroup with the unit element 1, i.e. ∗ is commutative,<br />

associative and 1∗ x = x for all x, the follow<strong>in</strong>g<br />

conditions hold for all x, yz , :<br />

(i) z ≤( x⇒ y)<br />

iff x ∗z ≤ y<br />

(ii) x ∩ y = x∗( x⇒<br />

y)<br />

(iii) ( x⇒ y) ∪( y⇒ x) = 1.<br />

B. Universal Logic<br />

Universal logic was proposed by He [11], which th<strong>in</strong>ks<br />

that all th<strong>in</strong>gs <strong>in</strong> the world are correlative, that is, they are<br />

either mutually exclusive or mutually consistent, and we<br />

call this k<strong>in</strong>d of relation generalized correlation.<br />

The basic pr<strong>in</strong>ciples of universal logic show as follows:<br />

A core objective. The objective is that any one of<br />

modern logics should <strong>in</strong>clude one or some dialectical<br />

contradictions, and which should exclude the logical<br />

contradictions. And different advanced logics have<br />

different dialectical contradictions.<br />

Two basic methods. There are two ways to <strong>in</strong>clude<br />

dialectical contradictions (or uncerta<strong>in</strong>ty) <strong>in</strong> general.<br />

Firstly, the logical scope narrows to the sub-space that<br />

adapts to just <strong>in</strong>clude the dialectical contradictions (or<br />

uncerta<strong>in</strong>ty). Secondly, the logic system express the<br />

impact of the dialectical contradictions (or uncerta<strong>in</strong>ties)<br />

through cont<strong>in</strong>uously variable flexible parameters and<br />

functions <strong>in</strong> the logic operation model.<br />

Three Break directions. There are three different<br />

break directions for the constra<strong>in</strong>ts of various modern<br />

logics relative to that of standard logic: the number of<br />

truth value of proposition, the dimension of truth value<br />

space, and the completeness of <strong>in</strong>formation reason<strong>in</strong>g.<br />

Four logical elements. There are four logical elements<br />

to construct a logical system: doma<strong>in</strong>, propositional<br />

connectives, quantifiers and reason<strong>in</strong>g rules. Universal<br />

logic discussed the possible forms of these elements, and<br />

put forward their general expression.<br />

Universal logic <strong>in</strong>cludes four ways to conta<strong>in</strong><br />

dialectical contradictions (uncerta<strong>in</strong>ties) as follows:<br />

1) The establishment of flexible doma<strong>in</strong>.<br />

The uncerta<strong>in</strong>ty firstly presents <strong>in</strong> the uncerta<strong>in</strong>ty of<br />

truth value of proposition. From the view of truth value<br />

doma<strong>in</strong> and space dimension of proposition variable, the<br />

scope of uncerta<strong>in</strong>ty is fraction dimension space [0, 1] n ,<br />

n>0, which can <strong>in</strong>clude <strong>in</strong>teger dimension space [0, 1] n ,<br />

n=2, 3, …, and which can also <strong>in</strong>clude 1-dimension<br />

cont<strong>in</strong>uous value space [0, 1]. This gives the possible to<br />

break the limitations of truth value doma<strong>in</strong> of 1-<br />

dimaention two-valued logic.<br />

The classical logic is a s<strong>in</strong>gle granularity from the view<br />

of <strong>in</strong>dividual variable doma<strong>in</strong>, that is, the logical<br />

properties of whole doma<strong>in</strong> are identical. The future<br />

development trend of modern logic is <strong>in</strong>troduced the<br />

concept of granularity comput<strong>in</strong>g <strong>in</strong>to the logic. The<br />

doma<strong>in</strong> is divided <strong>in</strong>to different sub-doma<strong>in</strong>s accord<strong>in</strong>g to<br />

some k<strong>in</strong>d of equivalence relations, and the logical<br />

properties of different sub-doma<strong>in</strong> may be different to<br />

express the uncerta<strong>in</strong>ty of doma<strong>in</strong>. This gives the possible<br />

to break the limitations of s<strong>in</strong>gle granularity of 1-<br />

dimension two-valued logic.<br />

From the model doma<strong>in</strong>, the classical logic is the<br />

s<strong>in</strong>gle-mode. There are many different modes <strong>in</strong> the<br />

current modal logic. In the future cont<strong>in</strong>uous variable<br />

mode may be build, which can accurately describe the<br />

effect of modal area <strong>in</strong> uncerta<strong>in</strong>ty. This gives the<br />

possible to break the limitations of s<strong>in</strong>gle mode of 1-<br />

dimension two-valued logic.<br />

2) The def<strong>in</strong>ition of <strong>in</strong>tegrity cluster of operation<br />

model<br />

The effect of all k<strong>in</strong>ds of uncerta<strong>in</strong>ties on logic<br />

operations results can be expressed by all k<strong>in</strong>ds of<br />

cont<strong>in</strong>uous-valued proposition conjunction <strong>in</strong>tegrity<br />

cluster of operation model. For example, <strong>in</strong> the<br />

propositional universal logics, Firstly, we narrow the<br />

logical scope to <strong>in</strong>clude fitness subspace of the<br />

contradictions of enemy/friends, loose/strict, light/heavy<br />

(<strong>in</strong>clude one, two or three) through time and space;<br />

secondly, we <strong>in</strong>troduce two cont<strong>in</strong>uous variable flexible<br />

parameters k, h∈[0, 1] <strong>in</strong>to the logical operation models,<br />

and use the correspond<strong>in</strong>g adjustment function to<br />

describe the full impact of the dialectical contradictions<br />

(or uncerta<strong>in</strong>ty) for the proposition conjunction<br />

comput<strong>in</strong>g model. F<strong>in</strong>ally, we get the various types of<br />

propositional logics. It is obvious that if we can reduce<br />

the scope of logic to adapt to accommodate just a<br />

dialectical contradiction (or uncerta<strong>in</strong>ty) of the sub-space<br />

by time and space, then cont<strong>in</strong>uously variable flexible<br />

parameters and adjustment functions are <strong>in</strong>troduced <strong>in</strong>to<br />

the logic operation model, which can <strong>in</strong>clude effectively<br />

and deal with the dialectical contradictions (or<br />

uncerta<strong>in</strong>ties) <strong>in</strong> mathematics dialectical logic. This is<br />

foundation for cont<strong>in</strong>uous-valued logical algebra that will<br />

discuss below.<br />

3) Def<strong>in</strong><strong>in</strong>g a variety of flexible quantifiers to express<br />

the uncerta<strong>in</strong>ty of constra<strong>in</strong>ts (ranges).<br />

The flexible quantifiers are: the universal quantifier ∀; the<br />

existential quantifier ∃; the threshold quantifier ♂ k<br />

symboliz<strong>in</strong>g the threshold of propositional truth; the<br />

hypothesis quantifier $ k symboliz<strong>in</strong>g hypothesis<br />

proposition; the scope quantifier ∮ k constra<strong>in</strong><strong>in</strong>g the<br />

scope of <strong>in</strong>dividual variables; the position quantifier ♀ k<br />

<strong>in</strong>dicat<strong>in</strong>g the relative position of an <strong>in</strong>dividual variable<br />

and a specific po<strong>in</strong>t; the transition quantifier ∫ k chang<strong>in</strong>g<br />

the distribution transitional feature of the predicate truth.<br />

k∈[0, 1] is a variable parameter, which express the<br />

change of constra<strong>in</strong>ts. When k=1, the constra<strong>in</strong>ts are the<br />

largest (strong), and when k=0, the constra<strong>in</strong>ts are the<br />

smallest (weak). So <strong>in</strong> this way the logic not only<br />

describe the uncerta<strong>in</strong>ty of constra<strong>in</strong>ts, but also control<br />

the degree of reason<strong>in</strong>g rules by adjust<strong>in</strong>g the degree of k<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1435<br />

value. For example, <strong>in</strong> the scope quantifier ∮ k , k can be<br />

changed cont<strong>in</strong>uously to express the uncerta<strong>in</strong>ty of the<br />

scope of <strong>in</strong>dividual variables. In special case, k=1<br />

<strong>in</strong>dicates the universal quantifier∀; k>0 <strong>in</strong>dicates<br />

existential quantifier ∃, k=! <strong>in</strong>dicates the only existential<br />

quantifier ∃!; k=0 <strong>in</strong>dicates the constra<strong>in</strong>ts of no scope<br />

quantifier.<br />

4) All k<strong>in</strong>ds of cont<strong>in</strong>uous-valued reason<strong>in</strong>g model<br />

Because the truth value of flexible proposition,<br />

comput<strong>in</strong>g model and quantifiers of proposition<br />

conjunction are flexible, the reason<strong>in</strong>g rules based on<br />

them such as deductive reason<strong>in</strong>g, <strong>in</strong>ductive reason<strong>in</strong>g,<br />

analogical reason<strong>in</strong>g, assum<strong>in</strong>g reason<strong>in</strong>g, the evolution<br />

of reason<strong>in</strong>g are also flexible. The flexible reason<strong>in</strong>g<br />

rules are different from standard logic, which can coexist<br />

<strong>in</strong> a reason<strong>in</strong>g process. They transform each other by<br />

chang<strong>in</strong>g flexible parameters, and <strong>in</strong> which deductive<br />

reason<strong>in</strong>g mode is the most basic mode. Therefore, the<br />

theoretical framework can describe the unity of opposites<br />

and transformation process of contradictions, which<br />

provides the possibility to the symbolization and<br />

mathematization of dialectical logic.<br />

The operators of universal logic as follow<strong>in</strong>g:<br />

1) Not operation:<br />

NOT operation model N (x) is unary operation on [0,<br />

1]→[0, 1], which satisfies the follow<strong>in</strong>g Not operation<br />

axiom.<br />

Boundary condition N1: N (0)=1, N (1)=0.<br />

Monotonicity N2: N (x) is monotonously decreas<strong>in</strong>g,<br />

iff ∀x, y∈[0, 1], if x 1 then its value will be 1, if x < 0 , its value<br />

will be 0.<br />

1-level universal AND operators are mapp<strong>in</strong>g<br />

1 mn mn 1/<br />

mn<br />

T :[0, 1] × [0, 1] → [0, 1] T( x, y, h, k) =Γ [( x + y −1) ]<br />

which is usually denoted by<br />

∧<br />

hk ,<br />

. The relation m and h is<br />

as same as (2), the relation of n and k is the same as (1).<br />

There are four special cases of T (x, y, h) (see Figure 2)<br />

as follows:<br />

Zadeh AND operator T (x, y, 1)=T 3 =m<strong>in</strong> (x, y)<br />

Probability AND operator T (x, y, 0.75)=T2=xy<br />

Bounded AND operator T (x, y, 0.5)=T 1 =max (0,<br />

x+y-1)<br />

Drastic AND operator T (x, y, 0)=T 0 =ite{m<strong>in</strong> (x,<br />

y)|max (x, y)=1; 0}<br />

Figure 2. AND operator model figure for special h<br />

3) OR operation:<br />

OR operation model S (x, y) is b<strong>in</strong>ary operation <strong>in</strong> [0,<br />

1] 2 →[0, 1], which satisfies the follow<strong>in</strong>g operation<br />

axioms: x, y, z∈[0, 1].<br />

Boundary condition S (1, y)=1, S (0, y)=y.<br />

Monotonicity S (x, y) <strong>in</strong>creases monotonously along<br />

with x, y.<br />

Association law S (S (x, y), z)=S (x, S (y, z)).<br />

Lower bound S (x, y)≥max (x, y).<br />

The Dualization law holds between S (x, y, k, h) and T<br />

(x, y, k, h).<br />

N (S (x, y, k, h), k)=T (N (x, k), N (y, k), k, h)<br />

N (T (x, y, k, h), k)=S (N (x, k), N (y, k), k, h)<br />

© 2013 ACADEMY PUBLISHER


1436 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

There are four special cases of S (x, y, h) (see Figure 3)<br />

as follow<strong>in</strong>g:<br />

Zadeh OR operator S (x, y, 1)=S 3 =max (x, y)<br />

Probability OR operator S (x, y, 0.75)=S2=x+yxy<br />

Bounded OR operator S (x, y, 0.5)=S 1 =m<strong>in</strong> (1, x+<br />

y)<br />

Drastic OR operator S (x, y, 0)=S 0 =ite{max (x,<br />

y)|m<strong>in</strong> (x, y)=0;1}<br />

Figure 4. IMPLICATION operator model figure for special h<br />

Figure 3. OR operator model figure for special h<br />

4) IMPLICATION operation<br />

IMPLICATION operation model I (x, y) is b<strong>in</strong>ary<br />

operation <strong>in</strong> [0, 1] 2 →[0, 1], which satisfies the follow<strong>in</strong>g<br />

operation axioms: x, y, z∈[0, 1].<br />

Boundary conditions I1 I (0, y, h, k)=1, I (1, y, h, k)<br />

=y, I (x, 1, h, k)=1.<br />

Monotonicity I2 I (x, y, h, k) is monotone <strong>in</strong>creas<strong>in</strong>g<br />

along with y, and is monotone decreas<strong>in</strong>g along with x.<br />

Cont<strong>in</strong>uity I3 When h, k∈ (0, 1), I (x, y, h, k) is<br />

cont<strong>in</strong>uous along with x, y.<br />

Order-preserv<strong>in</strong>g property I4 I (x, y, h, k)=1, iff x≤y<br />

(except for h=0 and k=1).<br />

Deduction I5 T (x, I (x, y, h, k), h, k)≤y (Hypothetical<br />

consequence).<br />

0-level universal IMPLICATION operators are<br />

mapp<strong>in</strong>g<br />

I :[0, 1] × [0, 1] → [0, 1] , I( x, y, h) = ite{1 | x ≤ y; 0 | m ≤ 0 and<br />

1 m m 1/<br />

m<br />

y = 0 ;Γ [(1 − x + y ) ]}}<br />

, which is usually denoted by<br />

⇒<br />

h<br />

. The relation m and h is the same as (1).<br />

1-level universal IMPLICATION operators are<br />

mapp<strong>in</strong>g I :[0, 1] × [0, 1] → [0, 1] , I( x, y, h) = ite{1 | x≤ y; 0 |<br />

m and y x y<br />

1 mn mn 1/<br />

mn<br />

≤ 0 = 0 ;Γ [(1 − + ) ]}, which is usually<br />

denoted by ⇒<br />

h<br />

. The relation m and h is the same as (1),<br />

the relation of n and k is the same as (2).<br />

There are four special cases of I (x, y, h) (see Figure 4)<br />

as follow<strong>in</strong>g:<br />

Zadeh IMPLICATION operator I (x, y, 1)=I 3 =<br />

ite{1|x≤y; y}<br />

Probability IMPLICATION operator (Goguen<br />

Implication) I (x, y, 0.75)=I2=m<strong>in</strong> (1, y/x)<br />

Bounded IMPLICATION operator (Lukasiewicz<br />

Implication) I (x, y, 0.5)=I 1 =m<strong>in</strong> (1, 1-x+y)<br />

Drastic Implication operator I (x, y, 0)=I 0 =ite{y|x<br />

=1; 1}<br />

C. Universal Logic System ULh∈ (0,<br />

1]<br />

The languages of 0-level UL system ULh∈ (0, 1] are based on<br />

two basic connectives → and & and one truth constant 0 ,<br />

which semantics are 0-level universal AND, 0-level<br />

universal IMPLICATION and 0 respectively (see [15]).<br />

Axioms of the system ULh∈ (0, 1] are as follow<strong>in</strong>g:<br />

(i) ( φ →ψ) →(( ψ → χ)( φ → χ))<br />

(ii) ( φ & ψ)<br />

→ φ<br />

(iii) ( φ & ψ) → ( ψ & φ)<br />

(iv) φ &( φ →ψ) →( ψ &( ψ → φ))<br />

(v) ( φ →( ψ → χ)) →(( φ&<br />

ψ) → χ)<br />

(vi) (( φ & ψ) → χ) →( φ →( ψ → χ))<br />

(vii) (( φ →ψ) → χ) →((( ψ →φ) → χ) → χ)<br />

(viii) 0 → φ<br />

(ix) ( φ →φ& ψ) →(( φ →0) ∨ψ ∨(( φ →φ& φ) ∧( ψ → ψ & ψ)))<br />

.<br />

The deduction rule of ULh∈ (0, 1] is modus ponens.<br />

Def<strong>in</strong>ition 2 [15] A ŁΠG<br />

algebra is a BL-algebra <strong>in</strong><br />

which the identity<br />

( x⇒ x∗y) ⇒(( x⇒0) ∪ y∪(( x⇒ x∗x) ∩( y⇒ y∗ y))) = 1<br />

is valid.<br />

For each h ∈ (0, 1] , ([0, 1] , m<strong>in</strong>, max,∧ h,⇒ h, 0, 1) which is<br />

called ŁΠ G unit <strong>in</strong>terval is a l<strong>in</strong>ear order<strong>in</strong>g ŁΠ G algebra<br />

with its standard l<strong>in</strong>ear order<strong>in</strong>g.<br />

Theorem 1 [16] (Soundness) All axioms of ULh∈ (0, 1] are<br />

1-tautology <strong>in</strong> each PC (h). If φ and ϕ → ψ are 1-tautology<br />

of PC (h) then ψ is also a 1-tautology of PC (h).<br />

Consequently, each formula provable <strong>in</strong> ULh∈ (0, 1] is a 1-<br />

tautology of each PC (h), i.e. Γ φ , then Γ φ .<br />

Theorem 2 [16] (Completeness) The system ULh∈ (0, 1] is<br />

complete, i.e. If φ , then φ . In more detail, for each<br />

formula φ ϕ , the follow<strong>in</strong>g are equivalent:<br />

(i) φ is provable <strong>in</strong> ULh∈ (0, 1] , i.e. φ ;<br />

(ii) φ is an L-tautology for each ŁΠG<br />

-algebra L ;<br />

(iii) φ is an L-tautology for each l<strong>in</strong>early ordered ŁΠG<br />

-<br />

algebra L ;<br />

(iv) φ is a tautology for each ŁΠ G unit <strong>in</strong>terval, i.e.<br />

φ .<br />

D. Universal Logic System UL − h∈ (0,<br />

1]<br />

Def<strong>in</strong>ition 3 [17]Axioms of UL − h∈ (0, 1] are those of ULh∈ (0,<br />

1]<br />

plus<br />

( − −φ)<br />

≡ φ (Involution)<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1437<br />

Δ( φ →ψ) →Δ( −ψ →− φ)<br />

(Order Revers<strong>in</strong>g)<br />

Δφ<br />

∨¬Δ φ<br />

Δ( φ ∨ψ) →( Δφ ∨Δ ψ)<br />

Δφ<br />

→ φ<br />

Δφ<br />

→ΔΔ φ<br />

Δ( φ →ψ) →( Δφ →Δ ψ)<br />

where<br />

¬ φ is φ → 0 . Deduction rules of UL − h∈ (0, 1] are those<br />

of UL Δ h∈ (0,, 1] that is, modus ponens and generalization: from<br />

ϕ derive Δ ϕ .<br />

Def<strong>in</strong>ition 4 [17] A ŁΠG Δ<br />

-algebra is a structure<br />

L =< L,∗,⇒,∩,∪, 01 , ,Δ > which is a ŁΠG<br />

algebra<br />

expanded by an unary operation Δ <strong>in</strong> which the<br />

follow<strong>in</strong>g formulas are true:<br />

Δx∪( Δx⇒ 0) = 1<br />

Δ( x ∪ y)<br />

≤ Δx∪Δ<br />

y<br />

Δx<br />

≤ x<br />

Δx<br />

≤ ΔΔ x<br />

( Δx) ∗( Δ( x⇒ y))<br />

≤ Δ y<br />

Δ 1=<br />

1<br />

Def<strong>in</strong>ition 5 [17] A ŁΠG − -algebra is a structure L<br />

=< L,∗,⇒,∩,∪, 01 , ,Δ,− > which is a ŁΠG Δ<br />

-algebra<br />

expanded by an unary operation -, and satisfy<strong>in</strong>g the<br />

follow<strong>in</strong>g conditions:<br />

(1) −− x = x<br />

(2) Δ( x ⇒ y) =Δ( −y⇒ − x)<br />

(3) Δx<br />

∨¬Δ x = 1<br />

(4) Δ( x ∨ y) ≤( Δx∨Δ<br />

y)<br />

(5) Δx ≤ x<br />

(6) Δx ≤ ΔΔ x<br />

(7) ( Δx) ∗( Δ( x⇒ y))<br />

≤ Δ y<br />

(8) Δ 1=<br />

1<br />

Theorem 3 [17] (Soundness) Each formula provable <strong>in</strong><br />

UL − h∈ (0, 1] is a L-tautology for each ŁΠG − -algebra.<br />

Theorem 4 [17] (Completeness) The system UL − h∈ (0, 1] is<br />

complete, i.e. If φ , then φ . In more detail, for each<br />

formula φ , the follow<strong>in</strong>g are equivalent:<br />

(i) φ is provable <strong>in</strong> UL − h∈ (0,, 1] i.e. ϕ ,<br />

(ii) φ is an L-tautology for each ŁΠG − -algebra L,<br />

(iii)φ is an L-tautology for each l<strong>in</strong>early ordered ŁΠG − -<br />

algebra L.<br />

III. PREDICATE FORMAL SYSTEM ∀ h (0 1]<br />

UL − ∈ ,<br />

In order to build first-order predicate formal deductive<br />

system based on 1-level universal AND operator, we give<br />

the first-order predicate language as follow<strong>in</strong>g:<br />

First-order language J consists of symbols set and<br />

generation rules:<br />

The symbols set of J consist of as follow<strong>in</strong>g:<br />

(1) Object variables: x, yzx , ,<br />

1, y1, z1, x2, y2, z2,;<br />

(2) Object constants: abca , , ,<br />

1, b1, c1,, Truth constants:<br />

01 , ;<br />

(3) Predicate symbols: PQRP , , ,<br />

1, Q1, R1,;<br />

(4) Connectives: &,→, Δ,− ;<br />

(5) Quantifiers: ∀ (universal quantifier), ∃<br />

(existential quantifier);<br />

(6) Auxiliary symbols: (, ), , .<br />

The symbols <strong>in</strong> (1)- (3) are called non-logical symbols<br />

of language J. The object variables and object constants<br />

of J are called terms. The set of all object constants is<br />

denoted by Var (J), The set of all object variables is<br />

denoted by Const (J), The set of all terms is denoted by<br />

Term (J). If P is n-ary predicate symbol, t 1<br />

, t 2<br />

,, t n<br />

are<br />

terms, then Pt (<br />

1, t2,, t n<br />

) is called atomic formula.<br />

The formula set of J is generated by the follow<strong>in</strong>g<br />

three rules <strong>in</strong> f<strong>in</strong>ite times:<br />

(i) If P is atomic formula, then P∈ J ;<br />

(ii) If PQ , ∈ J, then P&Q, P→ Q,ΔP∈ J,−P∈ J ;<br />

(iii) If P∈ J , and x ∈ Var( J ) , then<br />

( ∀ x) P,∃ ( x)<br />

P∈ J .<br />

The formulas of J can be denoted by φ, ϕψ , , φ1, ϕ1, ψ1,.<br />

Further connectives are def<strong>in</strong>ed as follow<strong>in</strong>g:<br />

φ ∧ ψ is φ & ( φ → ψ)<br />

,<br />

φ ∨ ψ is (( φ →ψ) →ψ) ∧( ψ →φ) → φ)<br />

,<br />

¬ φ is φ → 0 ,<br />

φ ≡ ψ is ( φ →ψ) & ( ψ → φ)<br />

.<br />

Def<strong>in</strong>ition 6The axioms and deduction rules of predicate<br />

formal system ∀ UL − h∈ (0,<br />

1] as follow<strong>in</strong>g:<br />

(i)The follow<strong>in</strong>g formulas are axioms of ∀ UL − h∈ (0,<br />

1] :<br />

(U1) ( φ →ψ) →(( ψ → χ) →( φ → χ))<br />

(U2) ( φ & ψ)<br />

→ φ<br />

(U3) ( φ & ψ) → ( ψ & φ)<br />

(U4) φ &( φ →ψ) →( ψ &( ψ → φ))<br />

(U5) ( φ →( ψ → χ)) →(( φ&<br />

ψ) → χ)<br />

(U6) (( φ & ψ) → χ) →( φ →( ψ → χ))<br />

(U7) (( φ →ψ) → χ) →((( ψ →φ) → χ) → χ)<br />

(U8) 0 → φ<br />

(U9) ( φ →φ&<br />

ψ) →(( φ →0) ∨ψ ∨(( φ →φ&<br />

φ)<br />

∧<br />

( ψ → ψ & ψ)))<br />

(U10) ( − −ϕ)<br />

≡ ϕ<br />

(U11) Δ( ϕ →ψ) →Δ( −ψ →− ϕ)<br />

(U12) Δφ ∨¬Δ φ<br />

(U13) Δ( φ ∨ψ) →( Δφ∨Δ<br />

ψ)<br />

(U14) Δφ → φ<br />

(U15) Δφ →ΔΔ φ<br />

(U16) Δ( φ →ψ) →( Δφ →Δ ψ)<br />

(U17) ( ∀x) φ( x) → φ( t)<br />

(t substitutable for x <strong>in</strong> φ ( x)<br />

)<br />

(U18) φ() t →( ∃ x) φ( x)<br />

(t substitutable for x <strong>in</strong> φ ( x)<br />

)<br />

(U19) ( ∀x)( χ →φ) →( χ →( ∀ x) φ)<br />

(x is not free <strong>in</strong><br />

χ )<br />

© 2013 ACADEMY PUBLISHER


1438 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

(U20) ( ∀x)( φ → χ) →(( ∃x) φ → χ)<br />

(x is not free <strong>in</strong><br />

χ )<br />

(U21) ( ∀x)( φ ∨χ) →(( ∀x) φ∨ χ)<br />

(x is not free <strong>in</strong> χ )<br />

Deduction rules of ∀ UL − h∈ (0,<br />

1] are three rules. They are:<br />

Modus Ponens (MP): from φ, φ → ψ <strong>in</strong>fer ψ ;<br />

Necessitation: from φ <strong>in</strong>fer Δ φ ;<br />

Generalization: from φ <strong>in</strong>fer ( ∀ x)<br />

φ .<br />

The mean<strong>in</strong>g of “t substitutable for x <strong>in</strong> φ ( x)<br />

” and “x<br />

is not free <strong>in</strong> χ ” <strong>in</strong> the above def<strong>in</strong>ition have the same<br />

mean<strong>in</strong>g <strong>in</strong> the classical first-order predicate logic,<br />

moreover, we can def<strong>in</strong>e the concepts such as proof,<br />

theorem, theory, deduction from a theory T, T-<br />

consequence <strong>in</strong> the system ∀ UL − h∈ (0,<br />

1] . T φ denotes that<br />

φ is provable <strong>in</strong> the theory T. φ denotes that φ is a<br />

theorem of system ∀ ULh<br />

∈ (0 , 1]<br />

. Let<br />

−<br />

Thm( ∀ UL h∈ (0,<br />

1] ) = { φ ∈ J | φ} , Ded( T) = { φ∈ J | T φ}<br />

.<br />

Be<strong>in</strong>g the axioms of propositional system UL − h∈ (0, 1] are <strong>in</strong><br />

predicate system ∀ UL − h∈ (0,<br />

1] , then the theorems <strong>in</strong><br />

UL h∈ (0, 1] are theorems <strong>in</strong> ∀ UL − h∈ (0,<br />

1] . Accord<strong>in</strong>g the<br />

similar proof <strong>in</strong> [3, 16, 17] we can get the follow<strong>in</strong>g<br />

lemmas.<br />

Lemma 1 The hypothetical syllogism holds <strong>in</strong><br />

∀ , i.e. let Γ= { φ → ψψ , → χ}<br />

, then Γ φ → χ .<br />

UL − h∈ (0,<br />

1]<br />

Lemma 2 ∀ UL − h∈ (0,<br />

1] proves:<br />

(1) φ → φ ;<br />

(2) φ →( ψ → φ)<br />

;<br />

(3) ( φ →ψ) →(( φ →γ) →( ψ → γ))<br />

;<br />

(4) ( φ & ( φ →ψ))<br />

→ ψ ;<br />

(5) Δφ ≡ Δφ&<br />

Δ φ .<br />

Lemma 3 If T = { φ → ψ, χ → γ}<br />

, then<br />

T ( φ & χ) → ( ψ & γ)<br />

.<br />

Let J is first-order predicate language, L is l<strong>in</strong>early<br />

ordered ŁΠG − algebra, M = ( M, ( rP )<br />

P, ( mc) c)<br />

is called a<br />

L-evaluation for first-order predicate language J, which<br />

M is non-empty doma<strong>in</strong>, accord<strong>in</strong>g to each n-ary<br />

predicate P and object constant c, r<br />

P<br />

is L-fuzzy n-ary<br />

n<br />

relation: rP<br />

: M → L, m<br />

c<br />

is an element of M.<br />

Def<strong>in</strong>ition 7 Let J be predicate language, M is L-<br />

evaluation of J, x is object variable, P∈ J .<br />

(i) A mapp<strong>in</strong>g v: Term( J ) → M is called M-<br />

evaluation, if for each c ∈Const (J), vc () = mc<br />

;<br />

(ii)Two M-evaluation vv′ , are called equal denoted<br />

by v ≡<br />

x<br />

v′ if for each y∈<br />

Var( J) \ x , there is<br />

vy ( ) = v′<br />

( y)<br />

.<br />

(iii) The value of a term given by M, v is def<strong>in</strong>ed by:<br />

x = v( x)<br />

; c = mc<br />

. We def<strong>in</strong>e the truth value<br />

M, v<br />

M,<br />

v<br />

L<br />

M v<br />

φ ,<br />

of a formula φ as follow<strong>in</strong>g. Clearly, ∗,⇒,Δ<br />

denote the operations of L .<br />

L<br />

1, 2,, n<br />

=<br />

M v P 1<br />

,,<br />

, M, v n M,<br />

v<br />

L L L<br />

→ = ⇒<br />

M, v M, v M,<br />

v<br />

L L L<br />

& = ∗<br />

M, v M, v M,<br />

v<br />

L<br />

L<br />

Pt ( t t) r( t t )<br />

φ ψ φ ψ<br />

φ ψ φ ψ<br />

0 = 0; 1 = 1<br />

M, v<br />

M,<br />

v<br />

L<br />

L<br />

φ<br />

M, v<br />

M,<br />

v<br />

L<br />

L<br />

φ<br />

M, v M,<br />

v<br />

L<br />

L<br />

φ φ<br />

M, v<br />

M,<br />

v′<br />

L<br />

L<br />

φ φ<br />

M, v<br />

M,<br />

v′<br />

Δ φ = Δ<br />

− φ =−<br />

( ∀ x) = <strong>in</strong>f{ | v ≡ v ′ }<br />

( ∃ x) = sup{ | v ≡ v ′ }<br />

In order to the above def<strong>in</strong>itions are reasonable, the<br />

<strong>in</strong>fimum/supremum should exist <strong>in</strong> the sense of L. So the<br />

structure M is L-safe if all the needed <strong>in</strong>fima and suprema<br />

L<br />

exist, i.e. φ<br />

M ,<br />

is def<strong>in</strong>ed for all φ, v .<br />

v<br />

Def<strong>in</strong>ition 8 Let φ ∈ J , M be a safe L-structure for J.<br />

(i) The truth value of φ <strong>in</strong> M is<br />

L<br />

L<br />

φ = <strong>in</strong>f{ φ ,v<br />

| v M − evaluation} .<br />

M<br />

M<br />

(ii) A formula φ of a language J is an L -tautology if<br />

φ<br />

L<br />

= 1 for each safe L-structure M. i.e. L<br />

M L<br />

φ 1<br />

Mv ,<br />

= for<br />

each safe L-structure M and each M-valuation of object<br />

variables.<br />

Remark For each h∈ (0, 1] , k∈ (0, 1) ,<br />

([0, 1] ,∧<br />

hk ,<br />

,⇒<br />

hk ,<br />

, m<strong>in</strong>, max, 0, 1 ,Δ,−)<br />

is a ŁΠG − -algebra.<br />

So the predicate system ∀ UL − h∈ (0,<br />

1] can be considered the<br />

axiomatization for 1-level universal AND operator.<br />

III. SOUNDNESS OF SYSTEM ∀ h (0 1]<br />

x<br />

x<br />

UL − ∈ ,<br />

Def<strong>in</strong>ition 9 A logic system is soundness if for its each<br />

theorem φ , we can get φ is a tautology.<br />

Theorem 5 (Soundness of axioms) The axioms of<br />

∀ are L-tautologies for each l<strong>in</strong>early ordered<br />

UL − h∈ (0,<br />

1]<br />

G −<br />

ŁΠ -algebra L.<br />

Proof. The axioms of (U1)- (U16) are L-tautologies<br />

can be get as <strong>in</strong> propositional calculus. We verify (U17)-<br />

(U21)<br />

To verify (U17), (U18), let y is substitutable for x to<br />

φ , when v′′ ≡<br />

x<br />

v and v′′ ( x) = v( y)<br />

, there is<br />

L<br />

L<br />

L<br />

L<br />

φ( y) = φ ( x)<br />

So, ( ∀ x) φ( x) = <strong>in</strong>f ( )<br />

M, v<br />

M,<br />

v′′<br />

M v v′≡ v<br />

φ x<br />

, M,<br />

v′<br />

≤<br />

L L L<br />

φ( y) ≤ sup ( ) ( ) ( )<br />

M v v<br />

φ x = ∃ ′<br />

x φ x , then<br />

, ′′ M, v′<br />

M,<br />

v<br />

( ∀ x ) φ( x ) → φ( y ) = ( ∀ x ) φ( x ) → φ( y ) = 1.<br />

M, v M, v M,<br />

v<br />

For (U19), let x not free <strong>in</strong> χ , then for each M-<br />

valuation w, when w≡<br />

x<br />

v , we have v = φ( x)<br />

.<br />

M, w<br />

M,<br />

v<br />

We have to prove<br />

L L L L<br />

<strong>in</strong>f ( v ⇒ φ ) ≤( v ⇒ <strong>in</strong>f φ ) .<br />

w<br />

M, w M, w M, v w M,<br />

w<br />

L<br />

L<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1439<br />

L<br />

L<br />

Let v = v = a , φ<br />

M, v M,<br />

w<br />

M ,<br />

= b<br />

w w<br />

, thus we must<br />

prove <strong>in</strong>f<br />

w( a⇒bw) ≤( a⇒ <strong>in</strong>f<br />

wbw)<br />

. On the one hand,<br />

<strong>in</strong>f w<br />

b w<br />

≤ b w<br />

, thus a⇒bw ≥( a⇒ <strong>in</strong>f<br />

wbw)<br />

for each w,<br />

thus <strong>in</strong>f<br />

w( a⇒bw) ≥( a⇒ <strong>in</strong>f<br />

wbw)<br />

. On the other hand if<br />

z ≤( a⇒ b w<br />

) for each w, then z∗a ≤ bw<br />

for each w,<br />

z∗a ≤ <strong>in</strong>f w<br />

b w<br />

, z ≤( a⇒ <strong>in</strong>f<br />

wbw)<br />

. Thus ( a⇒ <strong>in</strong>f<br />

wbw)<br />

is<br />

the <strong>in</strong>fimum of all ( a⇒<br />

b w<br />

). So (U19) holds.<br />

For (U20), we need to verify<br />

<strong>in</strong>f<br />

w( aw ⇒ bw) = (sup<br />

w<br />

aw<br />

⇒ b)<br />

. Indeed, sup w<br />

≥ a w<br />

, thus<br />

(sup<br />

w<br />

aw ⇒b) ≤( aw<br />

⇒ b)<br />

, hence<br />

(sup<br />

w<br />

aw ⇒b) ≤<strong>in</strong>f w( aw<br />

⇒ b)<br />

, If z ≤ aw<br />

⇒ b for all w ,<br />

then aw<br />

≤( z ⇒ b)<br />

for all w, then sup<br />

w<br />

aw<br />

≤( z ⇒ b)<br />

,<br />

z ≤(sup waw<br />

⇒ b)<br />

, so sup w<br />

a w<br />

⇒ b is the <strong>in</strong>fimum. So<br />

(U20) holds.<br />

F<strong>in</strong>ally we verify (U21), we need to verify<br />

<strong>in</strong>f<br />

w( a∨ bw) = a∨ <strong>in</strong>fwbw<br />

. Indeed, a ≤ a∨ bw<br />

, thus<br />

a ≤<strong>in</strong>f w( a∨ bw)<br />

; similarly, <strong>in</strong>fwbw ≤<strong>in</strong>f w( a∨ bw)<br />

, thus<br />

a∨<strong>in</strong>fwbw ≤<strong>in</strong>f w( a∨ b)<br />

. Conversely, let z ≤ a∨ bw<br />

for<br />

all w , we prove z ≤ a∨ <strong>in</strong>f w<br />

b w<br />

.<br />

Case 1: Let a ≤ <strong>in</strong>f w<br />

b w<br />

. Then z ≤ bw<br />

for each w ,<br />

z ≤ <strong>in</strong>f w<br />

b w<br />

and z ≤ a∨ <strong>in</strong>f w<br />

b w<br />

.<br />

Case 2: Let a ≥ <strong>in</strong>f w<br />

b w<br />

. Then for some w 0<br />

, a ≥ b w0<br />

,<br />

thus z ≤ a and z ≤ a∨ <strong>in</strong>f w<br />

b w<br />

.<br />

So we prove the soundness of axioms.<br />

Theorem 6 (Soundness of deduction rules) (1) For<br />

arbitrary formulas φ, ψ , safe-structure M and evaluation<br />

L L L<br />

v , ψ ≥ φ ∗ φ → ψ . In particular, if<br />

M, v M, v M,<br />

v<br />

L<br />

L<br />

L<br />

= → = 1<br />

M, v<br />

M,<br />

v L<br />

then ψ 1<br />

M ,<br />

=<br />

v L<br />

.<br />

L L L<br />

(2) Consequently, ψ φ φ ψ<br />

M M M<br />

φ φ ψ<br />

≥ ∗ → , thus if<br />

φ, φ → ψ are then ψ is 1 L<br />

-true <strong>in</strong> M.<br />

(3) If φ is 1 L<br />

-true <strong>in</strong> M then Δ φ is 1 L<br />

-true <strong>in</strong> M .<br />

(4) If φ is 1 L<br />

-true <strong>in</strong> M then ( ∀ x)<br />

φ is 1 L<br />

-true <strong>in</strong> M.<br />

Proof. (1) is just as <strong>in</strong> propositional calculus.<br />

To prove (2) put φ = aw, ψ = bw, <strong>in</strong>f<br />

w<br />

w<br />

w<br />

aw<br />

= a. We<br />

have to prove <strong>in</strong>f<br />

w( aw ⇒bw) ≤<strong>in</strong>fw aw ⇒ <strong>in</strong>fwbw<br />

.<br />

Observe the follow<strong>in</strong>g:<br />

<strong>in</strong>f( aw ⇒bw) ≤( aw ⇒bw) ≤( a⇒ bw)<br />

,<br />

thus <strong>in</strong>f<br />

w( aw ⇒bw) ≤<strong>in</strong>f w( a⇒ bw)<br />

. It rema<strong>in</strong>s to prove<br />

<strong>in</strong>f<br />

w( a⇒bw) ≤ a⇒ <strong>in</strong>fwbw, this is holds from Theorem<br />

5.<br />

L<br />

(3) If φ is 1 L<br />

-true <strong>in</strong> M then φ<br />

M<br />

= 1L<br />

, so<br />

L<br />

L<br />

Δ φ =Δ φ = . Then (3) holds.<br />

1<br />

M, v<br />

M,<br />

v L<br />

L<br />

M<br />

φ ′<br />

′<br />

,<br />

}<br />

L<br />

M<br />

L<br />

M<br />

(4) Be<strong>in</strong>g φ = <strong>in</strong>f{ φ ,v<br />

| v M − evaluation}<br />

≤ <strong>in</strong>f{<br />

Mv| v ≡ v = ( ∀ x) φ } , So (4) holds.<br />

So we can get the follow<strong>in</strong>g soundness theorem.<br />

L<br />

Theorem 7 (Soundness) Let L is l<strong>in</strong>early ordered<br />

ŁΠG − -algebra and φ is a formula <strong>in</strong> J, if φ , then φ is<br />

L<br />

L-tautology, i.e. φ = 1 . M L<br />

Similarly, we can get the follow<strong>in</strong>g strong soundness<br />

theorem.<br />

Def<strong>in</strong>ition 10 Let T be a theory, L be a l<strong>in</strong>early ordered<br />

ŁΠG − -algebra and M a safe L-structure for the language<br />

of T. M is an L-model of T if all axioms of T are 1 L<br />

-true<br />

<strong>in</strong> M, i.e. φ = 1 L<br />

<strong>in</strong> each φ ∈ T .<br />

Theorem 8 (Strong Soundness) Let T be a theory, L is<br />

l<strong>in</strong>early ordered ŁΠG − -algebra and φ is a formula <strong>in</strong> J,<br />

L<br />

if T φ ( φ is provable <strong>in</strong> T), then φ<br />

M<br />

= 1L<br />

for each<br />

l<strong>in</strong>early ordered ŁΠG − -algebra L and each L-model M<br />

of T.<br />

Proof. In fact, from the proof of Theorem 5, for each<br />

L-model M of T, the axioms are true, and the formulas <strong>in</strong><br />

T are true, from the proof of Theorem 6, the deduction<br />

rules preserve true. So the theorem holds.<br />

Theorem 9 (Deduction Theorem) Let T be a theory,<br />

φ, ψ are closed formulas. Then ( T ∪φ)<br />

ψ iff<br />

T Δφ →ψ<br />

.<br />

Proof. Sufficiency: Let T Δφ →ψ<br />

, from φ<br />

( φ∈ ( T ∪ φ)<br />

), then Δ φ by necessitation, so we can get<br />

ψ by MP rules.<br />

Necessity: Let m is the proof length from T ∪ φ}<br />

to ψ ,<br />

we prove by <strong>in</strong>duction for the length m.<br />

When m = 1 , ψ ∈T<br />

∪φ∪Axm(C ∀ ) , if ψ = φ , The<br />

result holds. If ψ ∈ T or ψ is axiom, from Lemma2 (2),<br />

we have ψ →( Δφ → ψ)<br />

, then by ψψ , →( Δφ→ ψ)<br />

, we<br />

get Δφ → ψ , thus T Δφ →ψ<br />

.<br />

Assume that the result holds when m≤<br />

k , i.e. we get<br />

γ at k step, then T Δφ → γ . Now Let m= k + 1.<br />

If ψ is obta<strong>in</strong>ed from MP rule by the above results<br />

γγ , → ψ <strong>in</strong> the proof sequence, then by <strong>in</strong>duction<br />

hypothesis, we get T Δφ → γ, T Δφ →( γ →ψ)<br />

.<br />

From Lemma 3, we can get<br />

T ( Δφ& Δφ) →( γ &( γ →ψ))<br />

. Be<strong>in</strong>g<br />

T ( Δφ) &( Δφ)<br />

≡ Δφ<br />

, so T Δφ →( γ &( γ →ψ))<br />

.<br />

From lemma 2 (4) we have ( γ & ( γ →ψ)<br />

→ ψ , so we<br />

get T Δφ →ψ<br />

by the hypothetical syllogism.<br />

If ψ is obta<strong>in</strong>ed from necessitation rule by the above<br />

step γ <strong>in</strong> the proof sequence, i.e. Δ γ = ψ , then by<br />

<strong>in</strong>duction hypothesis, we get T Δφ →γ<br />

.<br />

T Δ( Δφ →γ)<br />

, from (U16) we can get T ΔΔφ → Δγ<br />

,<br />

from (U15) we can get Δφ<br />

→ΔΔ φ , thus by the<br />

hypothetical syllogism we can get T Δφ →Δγ<br />

, i.e.<br />

T Δφ →ψ<br />

.<br />

If ψ is obta<strong>in</strong>ed from generalization rule by the above<br />

step γ <strong>in</strong> the proof sequence, i.e. ( ∀ x)<br />

γ = ψ , then by<br />

© 2013 ACADEMY PUBLISHER


1440 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

<strong>in</strong>duction hypothesis, we get T Δφ →γ<br />

, From<br />

generalization rule we can get T ( ∀x)( Δφ →γ)<br />

, be<strong>in</strong>g<br />

Δ φ, γ are closed formula and from (U19), we can get<br />

T Δφ<br />

→( ∀x)<br />

γ , i.e. T Δφ →ψ<br />

.<br />

So the theorem holds.<br />

IV. CONCLUSION<br />

In this paper a predicate calculus formal deductive<br />

system ∀ h (0 1] based on the propositional system<br />

UL − ∈ ,<br />

UL − h∈ (0, 1] for 1-level universal AND operator is built up.<br />

We prove the system ∀ UL − h∈ (0,<br />

1] is sound. The deduction<br />

theorem is also given. Next we will discuss the<br />

completeness of system ∀ h (0 1] .<br />

UL − ∈ ,<br />

ACKNOWLEDGMENT<br />

This work is partially supported Scientific Research<br />

Program Funded by Shaanxi Prov<strong>in</strong>cial Education<br />

Department (Program No. 12JK0878) and Doctor<br />

Scientific Research Foundation Program of Xi'an<br />

Polytechnic University.<br />

REFERENCES<br />

[1] M. Gueffaz, S. Rampacek, C. Nicolle, “Temporal Logic To<br />

Query Semantic Graphs Us<strong>in</strong>g The Model Check<strong>in</strong>g<br />

Method”, Journal of Software, vol. 7(7), pp. 1462-1472,<br />

2012.<br />

[2] W. Jiang, “The Application of the Fuzzy Theory <strong>in</strong> the<br />

Design of Intelligent Build<strong>in</strong>g Control of Water Tank”,<br />

Journal of Software, vol 6(6), pp. 1082-1088, 2011.<br />

[3] E. P. Klement, R. Mesiar, E. Pap, Triangular Norms,<br />

Kluwer Academic <strong>Publisher</strong>s, Dordrecht/London, 2000.<br />

[4] P. Hajek, Metamathematics of Fuzzy Logic, Kluwer<br />

Academic <strong>Publisher</strong>s, Dordrecht/London, 1998.<br />

[5] R. Cignoli, F. Esteva, L. Godo, A. Torrens, “Basic fuzzy<br />

logic is the logic of cont<strong>in</strong>uous t-norms and their residua”,<br />

Soft comput<strong>in</strong>g, vol. 4, pp. 106-112, 2000.<br />

[6] F. Esteva, L.Godo, “Monoidal t-normbased logic: towards<br />

a logic for left-cont<strong>in</strong>ous t- norms”, Fuzzy Sets and Systems,<br />

vol. 124, pp. 271–288, 2001.<br />

[7] U. Hohle, “Commutative, residuated l-monoids”, <strong>in</strong>: Non-<br />

Classical Logics and Their Applications to Fuzzy Subsets,<br />

U. Hohle, E. P. Klement, (eds.), Kluwer Academic<br />

<strong>Publisher</strong>s, Dordrecht/London, pp. 53-106 , 1995.<br />

[8] G.J. Wang, Non-classical Mathematical Logic and<br />

Approximate Reason<strong>in</strong>g, Science Press (<strong>in</strong> Ch<strong>in</strong>ese),<br />

Beij<strong>in</strong>g, 2000.<br />

[9] D.W. Pei, G. J. Wang, “The completeness and applications<br />

of the formal system L*”, Science <strong>in</strong> Ch<strong>in</strong>a (Series F) vol.<br />

45, pp. 40–50, 2002.<br />

[10] D.W. Pei, “First-order Formal System K* and its<br />

Completeness”, Ch<strong>in</strong>ese Annals of Mathematics (Series A),<br />

vol. 23 (6), pp. 675–684, 2002.<br />

[11] H.C. He, et al, Universal Logic Pr<strong>in</strong>ciple, Science Press (<strong>in</strong><br />

Ch<strong>in</strong>ese), Beij<strong>in</strong>g, 2001.<br />

[12] H.C. He, et al, “Cont<strong>in</strong>uous-valued logic algebra-Studies<br />

on the basic of mathematical dialectical propositional<br />

logic”, IEEE International Conference on GrC, IEEE Press,<br />

pp: 194-199, 2010.<br />

[13] J.L. Chen, H.C. He, C.X. Liu, M.X. Luo. “Integrity studies<br />

on 0-level universal operation models of flexible logic”,<br />

Journal of Beij<strong>in</strong>g University of Posts and<br />

Telecommunications, vol. 34 (4): 10-13, 2011.<br />

[14] Y.F. Fan, H.C. He, L.R. Ai, “N-norm on [0, ∞) and method<br />

for calculat<strong>in</strong>g generalized self-correlation coefficient k”,<br />

Journal of Northwestern Polytechnical University, vol. 28<br />

(2): 270-275, 2010.<br />

[15] Y.C. Ma, H.C. He, “A Propositional Calculus Formal<br />

Deductive System ULh<br />

∈ (0 , 1]<br />

of Universal Logic”,<br />

Proceed<strong>in</strong>gs of 2005 ICMLC, IEEE Press, pp: 2716-2721,<br />

2005.<br />

[16] Y.C. Ma, H.C. He, “The Axiomatization for 0-level<br />

Universal Logic”, Lecture Notes <strong>in</strong> Artificial Intelligence,<br />

vol. 3930, pp. 367-37, 2006.<br />

[17] Y.C. Ma, H.C. He, “Axiomatization for 1-level Universal<br />

AND Operator”, The Journal of Ch<strong>in</strong>a Universities of<br />

Posts and Telecommunications, vol. 15 (2), pp. 125-129,<br />

2008.<br />

[18] Y.C. Ma, Q.Y. Li, “A Propositional Deductive System of<br />

Universal Logic with Projection Operator”, Proceed<strong>in</strong>gs of<br />

2006 ISDA, IEEE Press, pp: 993-998, 2006.<br />

[19] Q.Y. Li, Y.C. Ma, “The predicate system based on<br />

schweizer-sklar t-norm and its soundness”, Journal of<br />

Computational Information Systems, vol. 7 (15), p 5600-<br />

5607, 2011.<br />

[20] Q.Y. Li, T, Cheng, The Predicate System Based on<br />

Schweizer-Sklar t-norm and Its Completeness. Lecture<br />

Notes <strong>in</strong> Electrical Eng<strong>in</strong>eer<strong>in</strong>g, vol. 107: 201-209, 2011,<br />

[21] Y.C. Ma, H.C. He, “Predicate Formal System<br />

∀ULh<br />

∈ [0.75 , 1]<br />

and and its completeness”, Computer<br />

Eng<strong>in</strong>eer<strong>in</strong>g and Applications, vol. 46 (34): 17-20, 2010.<br />

[22] Y.C. Ma, H.C. He, “Predicate Formal System<br />

∀ULh<br />

∈ [0.75 , 1]<br />

and its Soundness”, Computer Science, vol.<br />

38 (5): 178-180, 2011.<br />

[23] Y.C. Ma, H.C. He, “Predicate formal system based on 0-<br />

level universal AND operator and its soundness”,<br />

Application Research of Computers, vol. 28 (1): 84-86,<br />

2011.<br />

[24] Y.C. Ma, H.C. He, “Predicate Formal System Based on 0-<br />

level Universal and Operator and its Completeness”,<br />

Journal of Ch<strong>in</strong>ese Computer Systems, vol. 32 (10): 2105-<br />

2108, 2011.<br />

Y<strong>in</strong>gcang Ma, is a professor <strong>in</strong> school<br />

of science, Xi'an Polytechnic University.<br />

He received the PhD. degree from<br />

School of Computer Science,<br />

Northwestern Polytechnical University,<br />

<strong>in</strong> July 2006. His ma<strong>in</strong> research<strong>in</strong>terests<br />

are <strong>in</strong> the areas of fuzzy set, rough set<br />

and non-classical mathematical logic.<br />

Hucan He, male, Professor and Ph.D.<br />

tutor from the Department of Computer<br />

Science and Eng<strong>in</strong>eer<strong>in</strong>g of<br />

Northwestern Polytechnical University,<br />

<strong>in</strong>terested <strong>in</strong> the foundation and<br />

application of AI, universal logic and<br />

uncerta<strong>in</strong>ties reason<strong>in</strong>g.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1441<br />

Analysis of Boolean Networks us<strong>in</strong>g An<br />

Optimized Algorithm of Structure Matrix based<br />

on Semi-Tensor Product<br />

J<strong>in</strong>yu Zhan<br />

University of Electronic Science and Technology of Ch<strong>in</strong>a, Chengdu, Ch<strong>in</strong>a<br />

Email: zhanjy@uestc.edu.cn<br />

Shan Lu and Guowu Yang<br />

University of Electronic Science and Technology of Ch<strong>in</strong>a, Chengdu, Ch<strong>in</strong>a<br />

Email: 617999242@qq.com, guowu@uestc.edu.cn<br />

Abstract—The structure matrix based on semi-tensor<br />

product can provide formulas for analyz<strong>in</strong>g the<br />

characteristics of a Boolean network, such as the number of<br />

fixed po<strong>in</strong>ts, the number of circles of different lengths,<br />

transient period for all po<strong>in</strong>ts to enter the set of attractors<br />

and bas<strong>in</strong> of each attractor. However, the conventional<br />

method of semi-tensor product ga<strong>in</strong>s the structure matrix<br />

through complex matrix operations with high computation<br />

complexity. This paper proposes an optimized algorithm<br />

which ga<strong>in</strong>s the structure matrix through the truth table<br />

reflect<strong>in</strong>g the state transformation of Boolean networks. The<br />

effectiveness and feasibility of our optimized approach are<br />

demonstrated through the analysis of a practical Boolean<br />

network of the mammalian cell.<br />

Index Terms—semi-tensor product, Boolean network,<br />

structure matrix, truth table<br />

I. INTRODUCTION<br />

The Boolean network, <strong>in</strong>troduced firstly by Kauffman<br />

[1], and then developed by [2][3][4][5][6][7][8] and<br />

many others, becomes a powerful tool <strong>in</strong> describ<strong>in</strong>g,<br />

analyz<strong>in</strong>g, and simulat<strong>in</strong>g the cell network. It was shown<br />

that the Boolean network plays an important role <strong>in</strong><br />

model<strong>in</strong>g cell regulation, because they can represent<br />

important features of liv<strong>in</strong>g organisms [9][10]. It has<br />

received the most attention, not only from the biology<br />

community, but also physics, system science, etc.<br />

The structure of a Boolean network is described <strong>in</strong><br />

terms of its cycles and the transient states that lead to<br />

them. Several useful Boolean networks have been<br />

analyzed and their circles have been revealed [11][12]. It<br />

was po<strong>in</strong>ted <strong>in</strong> [13] that f<strong>in</strong>d<strong>in</strong>g fixed po<strong>in</strong>ts and circles<br />

of a Boolean network is an NP hard problem. Semi-tensor<br />

Manuscript received May 24, 2012; revised June 1, 2012; accepted<br />

July 1, 2012.<br />

This work was supported by the Fundamental Research Funds for<br />

the Central Universities of Ch<strong>in</strong>a under Grant No. ZYGX2009J062 and<br />

the National Natural Science Foundation of Ch<strong>in</strong>a under Grant No.<br />

60973016.<br />

Correspond<strong>in</strong>g author: J<strong>in</strong>yu Zhan, email: zhanjy@uestc.edu.cn<br />

product of matrix (STP), presented by Cheng [14]. Us<strong>in</strong>g<br />

STP, a Boolean network equation can be expressed as a<br />

conventional discrete time l<strong>in</strong>ear system which conta<strong>in</strong>s<br />

complete <strong>in</strong>formation of the dynamics of a Boolean<br />

network. Analyz<strong>in</strong>g the structure matrix of a Boolean<br />

network, precise formulas are obta<strong>in</strong>ed to determ<strong>in</strong>e the<br />

number of fixed po<strong>in</strong>ts and numbers of all possible<br />

circles of different lengths.<br />

But the conventional method to calculate the structure<br />

matrix of a Boolean network, presented <strong>in</strong><br />

[15][18][19][21], is very complex. In this paper, a<br />

optimized algorithm is proposed to calculate the structure<br />

matrix. Unlike exist<strong>in</strong>g methods, our approach gets the<br />

structure matrix of a Boolean network not through the<br />

complex matrix operations but through the truth table<br />

which reflects the state transformation of the Boolean<br />

network. Compared with the conventional method, our<br />

approach can greatly reduce the calculation complexity.<br />

The methods for analyz<strong>in</strong>g the characteristics of a<br />

Boolean network are given. The analysis of a practical<br />

Boolean network of the mammalian cell shows that our<br />

approach is effective and efficient.<br />

The rest of the paper is organized as follows. Section II<br />

gives a brief <strong>in</strong>troduction to semi-tensor product of<br />

matrices, matrix expression of logic and dynamics of<br />

Boolean network. The conventional method to calculate<br />

the structure Matrix of a Boolean Network is given <strong>in</strong><br />

Section III and our approach is proposed <strong>in</strong> Section IV.<br />

Section V gives the methods to analyze the characteristics<br />

of Boolean networks through the structure matrix.<br />

Section VI gives a practical Boolean network of the<br />

mammalian cell to show the effectiveness and feasibility<br />

of our approach. F<strong>in</strong>ally, some conclusions are drawn <strong>in</strong><br />

Section VII.<br />

II. EXPRESSION OF BOOLEAN NETWORKS IN SEMI-TENSOR<br />

PRODUCT<br />

A. Semi-tensor Product<br />

This section is a brief <strong>in</strong>troduction to semi-tensor<br />

product (STP) of matrices. STP of matrices is a<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1441-1448


1442 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

generalization of conventional matrix product, which<br />

extends the conventional matrix product to any two<br />

matrices. It plays a fundamental rule <strong>in</strong> the follow<strong>in</strong>g<br />

discussion. We restrict it to some concepts and basic<br />

properties used <strong>in</strong> this paper. In addition, only left semitensor<br />

product for multiply<strong>in</strong>g dimension case is <strong>in</strong>volved<br />

<strong>in</strong> the paper. We refer to [14][15][16][17] for right semitensor<br />

product, arbitrary dimensional case and much<br />

more details. Throughout this paper “semi-tensor<br />

product” means the left semi-tensor product for<br />

multiply<strong>in</strong>g dimensional case.<br />

Def<strong>in</strong>ition 1: 1. Let X be a row vector of dimension<br />

np , and Y be a column vector with dimension p . Then<br />

we split X <strong>in</strong>to p equal-size blocks as 1 , 2 p<br />

X X , , X ,<br />

which are 1× n rows. Def<strong>in</strong>e the STP, denoted by × , as<br />

<strong>in</strong> (1).<br />

p<br />

⎧<br />

⎪X<br />

× Y = ∑ X<br />

i=<br />

1<br />

⎨<br />

p<br />

⎪<br />

T T<br />

Y × X =<br />

⎪⎩<br />

i=<br />

i<br />

∑<br />

1<br />

y ∈ R<br />

i<br />

y ( X<br />

i<br />

i<br />

n<br />

)<br />

T<br />

∈ R<br />

2. Let A ∈ M m × n<br />

and B∈<br />

M<br />

p × q<br />

. If either n is a<br />

factor of p , say nt = p and denote it as A ≺<br />

t<br />

B , or<br />

p is a factor of n , say n = pt and denote is as<br />

A t<br />

B , then we def<strong>in</strong>e the STP of A and B , denoted<br />

by C = A× B , as the follow<strong>in</strong>g: C consists of m × q<br />

ij<br />

blocks as C = ( C ) and each block is <strong>in</strong> (2).<br />

where<br />

ij i<br />

C A B j<br />

n<br />

(1)<br />

= × , i = 1, , m, j = 1, , q . (2)<br />

i<br />

A is the i-th row of A and<br />

B<br />

j<br />

is the j-th column<br />

of B .<br />

We use some simple numerical examples to describe it.<br />

Example 1. Let X = [1 2 3 − 1] and<br />

Then<br />

Example 2. Let<br />

X × Y = [1 2] ⋅ 1 + [3 −1] ⋅ 2 = [7 0]<br />

⎡1 2 1 1⎤<br />

A =<br />

⎢<br />

2 3 1 2<br />

⎥<br />

⎢ ⎥<br />

⎢⎣3 2 1 0⎥⎦<br />

⎡1<br />

− 2⎤<br />

, B = ⎢ ⎥ . Then<br />

⎣2<br />

−1<br />

⎦<br />

⎡1⎤<br />

Y = ⎢<br />

2 ⎥<br />

⎣ ⎦ .<br />

⎡ ⎛1⎞ ⎛−2⎞<br />

⎤<br />

⎢ ( 1 2 1 1 ) ⎜ ⎟ (1 2 1 1) ⎜ ⎟ ⎥<br />

⎢<br />

⎝2⎠ ⎝−1⎠<br />

⎥<br />

⎢<br />

⎛1⎞ ⎛−2⎞⎥<br />

A× B = ⎢( 2 3 1 2) ⎜ ⎟ ( 2 3 1 2)<br />

⎜ ⎟⎥<br />

⎢<br />

⎝2⎠ ⎝−1⎠⎥<br />

⎢<br />

⎥<br />

⎢<br />

⎛1⎞ ⎛−2⎞<br />

( 3 2 1 0) ( 3 2 1 0)<br />

⎥<br />

⎢<br />

⎜ ⎟ ⎜ ⎟<br />

⎝2⎠ ⎝−1⎠<br />

⎥<br />

⎣<br />

⎦<br />

⎡3 4 −3 −5⎤<br />

=<br />

⎢<br />

4 7 5 8<br />

⎥<br />

⎢<br />

− −<br />

⎥<br />

⎢⎣<br />

5 2 −7 −4⎥⎦<br />

B. Matrix Expression of Logic<br />

In this section, the matrix expression of logic will be<br />

given. In a logical doma<strong>in</strong>, we usually set "true" as "1"<br />

and "false" as "0". Then a logical variable is def<strong>in</strong>ed as<br />

x∈ D = {0,1} . There are several fundamental b<strong>in</strong>ary<br />

functions such as ¬ , ∧ , ∨ , ↔ , → , ∨ , ↑ and ↓ .<br />

Their truth table is as TABLE I.<br />

To use matrix expression each element can be<br />

2<br />

0 ~ δ ,<br />

1<br />

identified <strong>in</strong> D with a vector as 1~δ<br />

2<br />

and<br />

2<br />

i<br />

where δ = Col( I ) . Therefore, That a n-ary logical<br />

n<br />

n<br />

n<br />

operator (or function) is a mapp<strong>in</strong>g: f : D → D can be<br />

formed as f : Δ n →Δ.<br />

2<br />

Theorem 1: Let f ( x1<br />

, , x n<br />

) be a logical function <strong>in</strong><br />

vector form as f : Δ n →Δ. Then there exists a unique<br />

2<br />

, called the structure matrix of f , such that<br />

∈L<br />

M<br />

f 2×<br />

2 n<br />

<strong>in</strong> (3).<br />

n<br />

f ( x1<br />

, , xn)<br />

= M<br />

f<br />

× x, where x =×<br />

i=<br />

1<br />

xi<br />

(3)<br />

Therefore, the structure matrix of Negation,<br />

Conjunction, Disjunction, Equivalence and Implication<br />

are as <strong>in</strong> (4) - (11).<br />

¬<br />

= δ 2<br />

[ 2 1]<br />

[ 1 2 2 2]<br />

M (4)<br />

M<br />

∧<br />

= δ 2<br />

(5)<br />

M = δ 2 [ 1 1 1 2<br />

∨ ]<br />

(6)<br />

M = δ 2 [ 1 2 2 1<br />

↔ ]<br />

(7)<br />

M = δ 2 [ 1 2 1 1<br />

→ ]<br />

(8)<br />

p q ¬ p p∧ q p ∨ q<br />

TABLE I.<br />

TRUTH TABLE OF ¬ , ∧ , ∨ , ↔ , → , ∨ , ↑ AND ↓<br />

p ↔ q p → q<br />

p ∨ q p↑ q p ↓ q<br />

0 0 1 0 0 1 1 0 1 1<br />

0 1 1 0 1 0 1 1 1 0<br />

1 0 0 0 1 0 0 1 1 0<br />

1 1 0 1 1 1 1 0 0 0<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1443<br />

M = δ 2 [ 2 1 1 2<br />

∨ ]<br />

(9)<br />

M = δ 2 [ 2 1 1 1<br />

↑<br />

]<br />

(10)<br />

M = δ 2 [ 2 2 2 1<br />

↓<br />

]<br />

(11)<br />

n k<br />

Theorem 2: Let F( x1<br />

, , xn<br />

): D → D be a logical<br />

mapp<strong>in</strong>g: F : Δ n →Δ k .Then there exists a unique<br />

2 2<br />

k n called the structure matrix of F , such <strong>in</strong><br />

∈L<br />

M<br />

F 2 × 2<br />

(12).<br />

F( x , , x ) = M × x<br />

(12)<br />

1<br />

C. Dynamics of Boolean Networks<br />

The Boolean networks play an important role <strong>in</strong><br />

model<strong>in</strong>g cell regulation, because they can represent<br />

important features of liv<strong>in</strong>g organisms. The dynamics of<br />

the Boolean networks will be given <strong>in</strong> this section.<br />

Def<strong>in</strong>ition 2[15][18][20]: A Boolean network is a set<br />

of nodes A , A , 1 2<br />

, An<br />

, which <strong>in</strong>teract with each other<br />

<strong>in</strong> a synchronous manner. At each given time t=0, 1, 2, …,<br />

a node has only one of two different values: 1 or 0. Thus<br />

the network can be described by a set of equations as <strong>in</strong><br />

(13).<br />

⎧ A1( t+ 1) = f1( A1( t), A2( t), , An<br />

( t))<br />

⎪A2( t+ 1) = f2( A1( t), A2( t), , An<br />

( t))<br />

⎨<br />

(13)<br />

⎪<br />

<br />

⎪<br />

⎩An( t+ 1) = fn( A1( t), A2( t), , An( t))<br />

Where<br />

i<br />

n<br />

f , ( i = 1,2, , n)<br />

, are n-ary logic functions.<br />

Note that <strong>in</strong> Boolean networks each function f i<br />

has<br />

only constant, l<strong>in</strong>ear, or product terms [12].<br />

F<br />

Example 3: Consider a Boolean network which<br />

dynamics is described as <strong>in</strong> (15).<br />

⎧ A1( t + 1) = A2( t) ∧ A3( t) ∧ A1( t)<br />

⎪<br />

⎨A2( t + 1) = ( A1() t ∧ A2()) t ∨( A1() t ∧ A3() t ∧ A2())<br />

t<br />

⎪<br />

⎪⎩<br />

A3( t + 1) = ( A1() t ∧ A2() t ∧ A3()) t ∨( A2() t ∧ A3())<br />

t<br />

(15)<br />

In algebraic form (the notation " × " is omitted), we can<br />

have as <strong>in</strong> (16).<br />

⎧A1( t+ 1) = M∧( M A2() t A3()) t A1()<br />

t<br />

↑<br />

⎪<br />

⎪A2( t+ 1) = M∨(( M∧ A1( t)( M¬<br />

A2( t))<br />

⎪ ( M<br />

∧( M A1() t A3()) t A2()))<br />

t<br />

↓<br />

⎨<br />

⎪A3( t+ 1) = M∨(( M∧( M∧A1() t A2())<br />

t<br />

⎪ ( M<br />

¬<br />

A3( t)))( M∧ ( M¬<br />

A2( t))<br />

⎪<br />

⎪⎩ A3<br />

()) t<br />

(16)<br />

There are some propositions <strong>in</strong> [15][18] to calculate the<br />

structure matrix L.<br />

t<br />

Proposition 1: Let Z ∈ R be a column. Then there exists <strong>in</strong><br />

(17).<br />

ZA= ( I ⊗ A)<br />

Z<br />

(17)<br />

Proposition 2: There exists an unique matrix<br />

W ∈ M ×<br />

, called the swap matrix, such that for any<br />

[ mn , ]<br />

mn mn<br />

two column vectors . X ∈ R<br />

m<br />

t<br />

n<br />

. and Y ∈ R .<br />

W[ mn , ]<br />

XY = YX<br />

(18)<br />

We refer to [15][18] for construct<strong>in</strong>g swap matrix.<br />

Proposition 3: Let X . Then we have (19).<br />

X<br />

2<br />

∈ Δ<br />

= M X ,<br />

r<br />

M r<br />

⎡1 0⎤<br />

⎢<br />

0 0<br />

⎥<br />

= ⎢ ⎥<br />

⎢ 0 0 ⎥<br />

⎢ ⎥<br />

⎣0 1⎦<br />

(19)<br />

III. CONVENTIONAL CALCULATION OF STRUCTURE<br />

MATRIX<br />

Us<strong>in</strong>g Theorem 1 and 2, the dynamics of Boolean<br />

networks can be expressed as <strong>in</strong> (14).<br />

A( t+ 1) = LA( t)<br />

(14)<br />

l<br />

l<br />

where At ( + 1) =×<br />

i=<br />

1<br />

Ai( t+ 1) , A( t)<br />

= × i= 1<br />

Ai<br />

( t)<br />

, L is the<br />

structure matrix of F , L l l ∈L . 2 × 2<br />

By means of the STP, the dynamics of Boolean<br />

networks can be converted <strong>in</strong>to the equivalent algebraic<br />

forms. Through the analysis of the structure matrix L ,<br />

we can get the characteristics of the Boolean networks<br />

such as: (1) fixed po<strong>in</strong>ts; (2) circles of different lengths;<br />

(3) transient period; (4) bas<strong>in</strong> of each attractor[15][18].<br />

Therefore, how to get the structure matrix L easily is<br />

very important. The conventional method to get the<br />

structure matrix L is as follows.<br />

Firstly, a simple example is given to show the structure<br />

of a Boolean network.<br />

Where<br />

M<br />

r<br />

is the power-reduc<strong>in</strong>g matrix.<br />

L = M∨M∧M∧ ( I2 ⊗( I2 ⊗M¬<br />

( I2<br />

⊗<br />

M∧ M¬ ( I2 ⊗( I2 ⊗M∨M∧ ( I2<br />

⊗M¬<br />

( I2 ⊗M∧M ( I2 ⊗( I2 ⊗(<br />

I2<br />

⊗M<br />

↓ ↓<br />

M∧)))))))))) W[2] ( I2 ⊗W[2] )( I4 ⊗W[2]<br />

)<br />

( I8 ⊗W[2] )( I32 ⊗W[2] )( I128 ⊗W[2]<br />

)<br />

( I256 ⊗W[2] )( I512 ⊗W[2] )( I1024 ⊗W[2]<br />

)<br />

W[2] ( I4 ⊗W[2] )( I16 ⊗W[2] )( I64 ⊗W[2]<br />

)<br />

( I1<br />

28<br />

⊗W[2] )( I256 ⊗W[2] )( I512 ⊗W[2]<br />

)<br />

( I2 ⊗W[2] )( I32 ⊗W[2] )( I64 ⊗W[2]<br />

)<br />

( I128 ⊗W[2] )( I256 ⊗W[2] )( I16 ⊗W[2]<br />

)<br />

( I128 ⊗W[2] )( I8 ⊗W[2] )( I64 ⊗W[2]<br />

)<br />

( I4 ⊗W[2] )( I32 ⊗W[2] )( I16 ⊗W[2]<br />

)<br />

( I8 ⊗W[2] ) MMM<br />

r r r( I2<br />

⊗(<br />

MM<br />

r r<br />

MM( I ⊗ MMM))<br />

r r 2 r r r<br />

(20)<br />

© 2013 ACADEMY PUBLISHER


1444 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

⎡0 0 0 0 0 0 0 0⎤<br />

1 0 1 [0 0 1 0 0 0 0 0] T<br />

⎢<br />

0 0 1 0 0 0 0 0<br />

⎥<br />

1 1 0 [0 1 0 0 0 0 0 0] T<br />

⎢<br />

⎥<br />

1 1 1 [1 0 0 0 0 0 0 0] T<br />

⎢0 0 0 1 0 0 0 0⎥<br />

⎢<br />

⎥<br />

⎢0 0 0 0 1 0 0 0<br />

=<br />

⎥<br />

Then, we can get the present-state matrix and nextstate<br />

matrix as <strong>in</strong> (21) and (22).<br />

⎢ 0 0 0 0 0 1 0 0 ⎥<br />

⎢<br />

⎥<br />

⎢0 0 0 0 0 0 1 0⎥<br />

⎡1 0 0 0 0 0 0 0⎤<br />

⎢<br />

0 0 0 0 0 0 0 1<br />

⎥<br />

⎢<br />

⎢<br />

⎥<br />

0 1 0 0 0 0 0 0<br />

⎥<br />

⎢<br />

⎥<br />

⎢⎣1 1 0 0 0 0 0 0⎥⎦<br />

⎢0 0 1 0 0 0 0 0⎥<br />

⎢<br />

⎥<br />

0 0 0 1 0 0 0 0<br />

Us<strong>in</strong>g some theorems <strong>in</strong> [15][18][23][24] and<br />

Qt () =<br />

⎢<br />

⎥<br />

⎢<br />

A( t + 1) = LA( t)<br />

, the structure matrix L is as <strong>in</strong> (20).<br />

0 0 0 0 1 0 0 0 ⎥<br />

(21)<br />

⎢<br />

⎥<br />

We can get the structure matrix by the conventional<br />

⎢0 0 0 0 0 1 0 0⎥<br />

⎢<br />

method. But the process is very complex and the biggest<br />

0 0 0 0 0 0 1 0<br />

⎥<br />

⎢<br />

⎥<br />

order of the matrices <strong>in</strong> the equation (20) is more than<br />

⎢⎣<br />

0 0 0 0 0 0 0 1⎥⎦<br />

1024.<br />

⎡0 0 0 0 0 0 0 0⎤<br />

IV. NEW METHOD FOR CALCULATION OF STRUTURE<br />

⎢<br />

0 0 1 0 0 0 0 0<br />

⎥<br />

⎢<br />

⎥<br />

MATRIX<br />

⎢0 0 0 1 0 0 0 0⎥<br />

The conventional method to calculate the structure<br />

⎢<br />

⎥<br />

0 0 0 0 1 0 0 0<br />

matrix L is very complex. A new method will be<br />

Qt ( + 1) =<br />

⎢<br />

⎥<br />

(22)<br />

⎢ 0 0 0 0 0 1 0 0 ⎥<br />

proposed <strong>in</strong> this section.<br />

⎢<br />

⎥<br />

Def<strong>in</strong>ition 3: Form a square matrix by all the presentstate<br />

vectors A() t =×<br />

⎢0 0 0 0 0 0 1 0⎥<br />

l<br />

i=<br />

1<br />

Ai()<br />

t , the matrix is called presentstate<br />

matrix, denoted by Qt ().There is another matrix<br />

⎢⎣<br />

1 1 0 0 0 0 0 0⎥⎦<br />

correspond to Qt (), called next-state matrix, denoted by<br />

⎢0 0 0 0 0 0 0 1⎥<br />

⎢<br />

⎥<br />

Therefore, we can get the structure matrix L = Q( t+<br />

1)<br />

Qt+ ( 1) .<br />

<strong>in</strong> (23).<br />

As A ( t + 1) = LA ( t)<br />

, we can derive<br />

⎡0 0 0 0 0 0 0 0⎤<br />

Q ( t + 1) = LQ ( t)<br />

. It is easy to know that<br />

⎢<br />

0 0 1 0 0 0 0 0<br />

⎥<br />

Qt () l l ∈L , and Qt () is a <strong>in</strong>vertible matrix. Then the<br />

⎢<br />

⎥<br />

2 × 2<br />

⎢0 0 0 1 0 0 0 0⎥<br />

−1<br />

structure matrix L = Q( t+ 1)[ Q( t)]<br />

. Further simplify the<br />

⎢<br />

⎥<br />

0 0 0 0 1 0 0 0<br />

calculation, Qt () can be arrayed to 2 l -order identity<br />

L = Q( t+ 1) =<br />

⎢<br />

⎥<br />

(23)<br />

⎢ 0 0 0 0 0 1 0 0 ⎥<br />

matrix. Therefore, L = Q( t+ 1) .<br />

⎢<br />

⎥<br />

⎢0 0 0 0 0 0 1 0⎥<br />

For the example 3, we have the truth table as TABLE<br />

⎢0 0 0 0 0 0 0 1⎥<br />

II.<br />

⎢<br />

⎥<br />

⎢⎣<br />

1 1 0 0 0 0 0 0⎥⎦<br />

TABLE II.<br />

TRUTH TABLE OF EXAMPLE 3<br />

We can compare the two structure matrix L ga<strong>in</strong>ed <strong>in</strong><br />

Section 3 and our method. And the structure matrix<br />

A 3 (t) A 2 (t) A 1 (t) A 3 (t+1) A 2 (t+1) A 1 (t+1)<br />

which is ga<strong>in</strong>ed by our approach is correct.<br />

0 0 0 0 0 1<br />

0 0 1 0 1 0 By our method, it is easy to get the structure matrix<br />

0 1 0 0 1 1 through the truth table which reflects the transformation<br />

0 1 1 1 0 0 of the states. Our method to get the structure matrix is<br />

1 0 0 1 0 1<br />

simpler than the conventional method.<br />

1 0 1 1 1 0<br />

1 1 0 0 0 0<br />

1 1 1 0 0 0 V. APPLICATION OF STUCTURE MATRIX ON ANALYSIS OF<br />

BOOLEAN NETWORKS<br />

The state vectors’ table is as TABLE III.<br />

S<strong>in</strong>ce a Boolean network has only f<strong>in</strong>ite states, a<br />

trajectory will eventually enter <strong>in</strong>to a fixed po<strong>in</strong>t or a<br />

TABLE III.<br />

STATE VECTORS’ TABLE<br />

cycle. The fixed po<strong>in</strong>ts and cycles form the most<br />

important topological structure of a Boolean network.<br />

A 3 (t) A 2 (t) A 1 (t) A (t)<br />

Therefore, there are many methods to analyze the fixed<br />

0 0 0 [0 0 0 0 0 0 0 1] T<br />

0 0 1 [0 0 0 0 0 0 1 0] T po<strong>in</strong>ts and cycles of Boolean networks.<br />

0 1 0 [0 0 0 0 0 1 0 0] T<br />

Analyz<strong>in</strong>g the structure matrix of the system, easily<br />

0 1 1 [0 0 0 0 1 0 0 0] T<br />

computable formulas are obta<strong>in</strong>ed to show the number of<br />

1 0 0 [0 0 0 1 0 0 0 0] T fixed po<strong>in</strong>ts, the numbers of circles of different lengths<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1445<br />

and the states <strong>in</strong> the circles. The follow<strong>in</strong>g is a general<br />

result based on the algebraic form.<br />

Consider the Boolean network equation<br />

A( t+ 1) = LA( t)<br />

, and denote by L<br />

i<br />

, 1, 2, …, 2 n the i-th<br />

column of the network matrix L . Then there are<br />

L ∈Δ [15][18].<br />

i<br />

2 n<br />

Def<strong>in</strong>ition 4: 1. A state x 0<br />

∈ Δ is called a fixed po<strong>in</strong>t<br />

2 n<br />

of Boolean network A( t+ 1) = LA( t)<br />

, if Lx0 = x0.<br />

k −1<br />

2. { x , Lx , , L x } is called a circle of Boolean<br />

0 0 0<br />

k<br />

network A( t+ 1) = LA( t)<br />

with length k , if, Lx0 = x0<br />

,<br />

k −1<br />

and the elements <strong>in</strong> set { x0, Lx0, , L x0}<br />

are dist<strong>in</strong>ct.<br />

L can be used for the matrix and its l<strong>in</strong>ear mapp<strong>in</strong>g.<br />

So x<br />

0<br />

may be <strong>in</strong> an L-<strong>in</strong>variant subspace. In this way, a<br />

circle (or a fixed po<strong>in</strong>t) can be def<strong>in</strong>ed on an L-<strong>in</strong>variant<br />

subspace.<br />

The next two theorems [15][18] show how many fixed<br />

po<strong>in</strong>ts and circles of different lengths a Boolean network<br />

has.<br />

Theorem 3: Consider the Boolean network system (13).<br />

i<br />

δ is its fixed po<strong>in</strong>t, iff <strong>in</strong> its algebraic form (14) the<br />

2 n<br />

diagonal element l ii<br />

of network matrix L equals 1. It<br />

follows that the number of equilibriums of system (13),<br />

denoted by N<br />

e<br />

, equals the number of i , for which l ii<br />

= 1.<br />

Equivalently, <strong>in</strong> (24).<br />

Ne<br />

= Trace( L)<br />

(24)<br />

Theorem 4: The number of length s circles,<br />

<strong>in</strong>ductively determ<strong>in</strong>ed by (25).<br />

N s<br />

, is<br />

⎧N1<br />

= Ne,<br />

⎪<br />

s<br />

⎨ Trace( L ) − ∑ kNk<br />

(25)<br />

k∈P( s)<br />

⎪<br />

n<br />

Ns<br />

= , 2≤ s ≤ 2 .<br />

⎪⎩<br />

s<br />

where Ps () is the set of proper factors of s , s ∈ Z + . For<br />

<strong>in</strong>stance, P (6) = {1, 2, 3} .<br />

i<br />

s<br />

Let x0<br />

= δ . Then { x<br />

2 n<br />

0<br />

, Lx 0<br />

, , L x 0<br />

} is a circle with<br />

length s , iff i∈ Ds<br />

.<br />

Consider the Boolean network of the example 3,<br />

N1 = N2 = N3 = N4 = N5 = N6 = N8 = 0 , N<br />

7<br />

= 1 .<br />

Therefore, there is no fixed po<strong>in</strong>t <strong>in</strong> this network, and<br />

there is only one circle which length is 7. Moreover, note<br />

<strong>in</strong> (26).<br />

⎡0 0 0 0 0 0 0 0⎤<br />

⎢<br />

1 1 0 0 0 0 0 0<br />

⎥<br />

⎢<br />

⎥<br />

⎢0 0 1 0 0 0 0 0⎥<br />

⎢<br />

⎥<br />

7<br />

0 0 0 1 0 0 0 0<br />

L =<br />

⎢<br />

⎥<br />

⎢ 0 0 0 0 1 0 0 0 ⎥<br />

⎢<br />

⎥<br />

⎢0 0 0 0 0 1 0 0⎥<br />

⎢0 0 0 0 0 0 1 0⎥<br />

⎢<br />

⎥<br />

⎢⎣0 0 0 0 0 0 0 1⎥⎦<br />

(26)<br />

Then each diagonal nonzero column can generate the<br />

circle. Choosed Z = [0 0 0 0 0 0 0 1] T , then<br />

2<br />

LZ<br />

LZ = [0 0 0 0 0 0 1 0] T<br />

2<br />

LZ=<br />

3<br />

LZ=<br />

4<br />

LZ=<br />

5<br />

LZ=<br />

6<br />

LZ=<br />

[0 0 0 0 0 1 0 0] T<br />

[0 0 0 0 1 0 0 0] T<br />

[0 0 0 1 0 0 0 0] T<br />

[0 0 1 0 0 0 0 0] T<br />

[0 1 0 0 0 0 0 0] T<br />

= [0 0 0 0 0 0 0 1] T = Z<br />

The vector forms <strong>in</strong> the circle can be got <strong>in</strong> TABLE IV.<br />

TABLE IV.<br />

VECTOR FORMS IN THE CIRCLE<br />

A (t) A 3 (t) A 2 (t) A 1 (t)<br />

[0 0 0 0 0 0 0 1] T 0 0 0<br />

[0 0 0 0 0 0 1 0] T 0 0 1<br />

[0 0 0 0 0 1 0 0] T 0 1 0<br />

[0 0 0 0 1 0 0 0] T 0 1 1<br />

[0 0 0 1 0 0 0 0] T 1 0 0<br />

[0 0 1 0 0 0 0 0] T 1 0 1<br />

[0 1 0 0 0 0 0 0] T 1 1 0<br />

The vector forms can be converted back to the scalar<br />

form of A 1<br />

() t , A () t , and A () t<br />

2 3<br />

. The circle is as<br />

000 → 001 → 010 → 011 → 100 → 101 → 110 → 000.<br />

F<strong>in</strong>ally, the state space graph of the network <strong>in</strong> Example<br />

3 can be ga<strong>in</strong>ed as <strong>in</strong> Figure 1.<br />

Figure 1. The state space graph<br />

VI. CASE STUDY: MAMMALIAN CELL<br />

In this section, a useful example of mammalian cell[22]<br />

is given to show that our new approach is effective and<br />

feasible.<br />

A proper understand<strong>in</strong>g of the structure and temporal<br />

behaviors of biological regulatory networks requires the<br />

<strong>in</strong>tegration of regulatory data <strong>in</strong>to a formal dynamical<br />

model. A logical framework enables a more systematic<br />

and extensive characterization of all the behaviors<br />

compatible with a given regulatory graph. Furthermore,<br />

this framework offers enumerative or analytical means to<br />

identify relevant asymptotical behaviors (stable states,<br />

state transition cycles).<br />

The cell cycle <strong>in</strong>volves a succession of molecular<br />

events lead<strong>in</strong>g to the reproduction of the genome of a cell.<br />

Here, the logical regulatory graph for a mammalian cell<br />

© 2013 ACADEMY PUBLISHER


1446 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

cycle network and logical rules associated with the<br />

regulatory graph (<strong>in</strong> Figure 2) are given.<br />

Each node represents the activity of a key regulatory<br />

element, whereas the edges represent cross-regulations.<br />

Blunt arrows stand for <strong>in</strong>hibitory effects, normal arrows<br />

for activations.<br />

Rb<br />

E2F<br />

UbcH10<br />

CycD<br />

CycE<br />

CycA<br />

Cdc20<br />

CycB<br />

Cdh1<br />

Figure 2. The state space graph<br />

The logical equations, which are called dynamics of<br />

Boolean network <strong>in</strong> STP, are as <strong>in</strong> (27).<br />

⎧CycD<br />

= CycD<br />

⎪<br />

⎪Rb = ( CycD ∧CycE ∧CycA ∧CycB)<br />

⎪<br />

⎪<br />

∨( p27 ∧( CycE ∧CycA)<br />

∧CycB<br />

⎪ ∧ CycD)<br />

⎪<br />

⎪E2 F = ( Rb ∧CycA ∧CycB) ∨( p27∧<br />

⎪<br />

⎪ Rb ∧ CycB)<br />

⎪<br />

⎪CycE = ( E2 F ∧Rb)<br />

⎪<br />

⎪CycA = ( E2F ∧Rb ∧Cdc20∧<br />

⎪<br />

( Cdh1 ∧UbcH10)) ∨(<br />

CycA ∧<br />

⎪<br />

⎨ Rb ∧Cdc20 ∧( Cdh1 ∧UbcH10))<br />

⎪<br />

⎪ p27 = ( CycD ∧CycE ∧CycA ∧CycB)<br />

⎪<br />

∨( p27∧( CycE ∧CycA)<br />

∧<br />

⎪<br />

⎪ CycB ∧ CycD)<br />

⎪<br />

⎪Cdc20<br />

= CycB<br />

⎪<br />

⎪Cdh1 = ( CycA ∧CycB) ∨( Cdc20)<br />

∨<br />

⎪<br />

⎪<br />

( p27 ∧ CycB)<br />

⎪ UbcH10 = ( Cdh1) ∨( Cdch1 ∧UbcH10<br />

⎪<br />

⎪ ∧( Cdc20 ∨CycA ∨CycB))<br />

⎪<br />

(27)<br />

⎪CycB = ( Cdc20∧Cdh1)<br />

⎩<br />

Then we use the methods mentioned above to get<br />

stable states and state transition cycles.<br />

There are 10 nodes, so the complete state transition<br />

graph conta<strong>in</strong>s 1024 vertices. The structure matrix L can<br />

be ga<strong>in</strong>ed by algorithm1.<br />

p27<br />

Algorithm1 Algorithm for comput<strong>in</strong>g structure matrix L<br />

L=zeros[1024][1024]<br />

A=zeros[10]<br />

beg<strong>in</strong><br />

for k=0 to 1023 do<br />

A=<strong>in</strong>t_to_b<strong>in</strong>ary (k, 10)<br />

/*convert k to b<strong>in</strong>ary number of 10 bit, */<br />

CycD=A[1];<br />

Rb=A[2];<br />

E2F=A[3];<br />

CycE=A[4];<br />

CycA=A[5];<br />

p27=A[6];<br />

Cdc20=A[7];<br />

Cdh1=A[8];<br />

UbcH10=A[9];<br />

CycB=A[10];<br />

/*assignment each bit to the variables,<br />

from high bit to low bit, A[1] is the highest bit*/<br />

CycD=CycD;<br />

Rb= ( (!CycD) && (!CycE) && (!CycA) && (!CycB))<br />

|| (p27&& (!CycD) && (!CycB)) ;<br />

E2F= ( (!Rb) && (!CycA) && (!CycB)) || (p27&& (!Rb)<br />

&& (!CycB)) ;<br />

CycE= (E2F&& (!Rb)) ;<br />

CycA= (E2F&& (!Rb) && (!Cdc20) && (! (Cdh1<br />

&&UbcH10))) || (CycA&& (!Rb) && (!Cdc20)<br />

&& (! (Cdh1&&UbcH10))) ;<br />

p27= ( (!CycD) && (!CycE) && (!CycA) && (!CycB)) || (p27<br />

&& (! (CycE&&CycA)) && (!CycD) && (!CycB)) ;<br />

Cdc20=CycB;<br />

Cdh1= ( (!CycA) && (!CycB)) || (Cdc20) || (p27&& (!CycB)) ;<br />

UbcH10= (!Cdh1) || ( (Cdh1) && (UbcH10) && ( (Cdc20) ||<br />

(CycA)<br />

|| (CycB))) ;<br />

CycB= ( (!Cdc20) && (!Cdh1)) ;<br />

/* substitute <strong>in</strong>to the logical equations */<br />

i=1024- (CycD*512 + Rb*256 + E2F*128 + CycE*64 +<br />

CycA*32<br />

+ p27*16 + Cdc20*8+Cdh1*4 + UbcH10*2 + CycB*1) ;<br />

j=1024-k;<br />

L[i][j]=1;<br />

return L<br />

end<br />

Accord<strong>in</strong>g to Theorem 3, the characteristics of the<br />

mammalian cell example, such as the number of fixed<br />

po<strong>in</strong>ts, the numbers of circles of different lengths and the<br />

states <strong>in</strong> the circles, can be analyzed by algorithms2.<br />

Through Algorithm1 and Algorithm2, the number of<br />

stable states or fixed po<strong>in</strong>t <strong>in</strong> the example of mammalian<br />

cell is 1. The state or fixed po<strong>in</strong>t is 0100010100, which<br />

means only Rb, p27 and Cdh1 active, <strong>in</strong> the absence of<br />

CycD. And there is 1 circle with the length of 7 <strong>in</strong> the<br />

example of mammalian cell. The states on the circle<br />

<strong>in</strong>clude 1011100100, 1001100000, 1000100011,<br />

1000101011, 1000001110, 1010000110, and 1011000100.<br />

Algorithm2 Algorithm for comput<strong>in</strong>g the number of stable states;<br />

the numbers of circles of different lengths;<br />

Input: structure matrix L<br />

N=zeros[1024]<br />

beg<strong>in</strong><br />

N[1]=trace (L)<br />

if N[1]≠0 then<br />

report the number of stable states is N[1]<br />

for i=2 to 1024 do<br />

T=0<br />

for j=1 to i/2 do<br />

if mod (i, j) =0 then<br />

T=T+j*N[j];<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1447<br />

return T<br />

N[i]= (trace (L^i) -T) /i;<br />

if N[i]>0 then<br />

report the number of circle length of i is N[i]<br />

end<br />

The fixed po<strong>in</strong>t and the circle of the mammalian cell<br />

example are as <strong>in</strong> Figure 3.<br />

0100010100<br />

1 fix po<strong>in</strong>t<br />

1011100100 1001100000 1000100011 1000101011<br />

1011000100 1010000110 1000001110<br />

1 circle with the length of 7<br />

Figure 3. The state space graph<br />

The algorithms <strong>in</strong> the mammalian cell example <strong>in</strong> this<br />

section seem difficult. In fact, it can be easily done <strong>in</strong><br />

computer. We have created a program to handle them.<br />

VII. CONCLUSION<br />

Semi-tensor product is an efficient tool for analyz<strong>in</strong>g<br />

the characteristics of Boolean networks which are<br />

determ<strong>in</strong>ed by the structure matrix. Unlike exist<strong>in</strong>g<br />

methods which calculates the structure matrix through<br />

matrix operations with high computation complexity, an<br />

optimized approach is proposed <strong>in</strong> this paper. The<br />

approach gets the structure matrix of Boolean network<br />

through the truth table which reflects the state<br />

transformation of the Boolean network. Compared with<br />

the conventional methods, our method can greatly reduce<br />

the calculation complexity. A practical Boolean network<br />

of mammalian cell shows our approach is effective and<br />

efficient.<br />

The structure matrix which is ga<strong>in</strong>ed <strong>in</strong> semi-tensor<br />

product is a sparse matrix. On the other hand, with the<br />

number of variables <strong>in</strong> a Boolean network <strong>in</strong>creas<strong>in</strong>g, the<br />

size of the structure matrix will become larger and larger.<br />

These cause higher computation complexity. To optimize<br />

the algorithms <strong>in</strong> section VI, we need to solve the<br />

follow<strong>in</strong>g problems: How to express the structure matrix<br />

<strong>in</strong> sparse matrix How to analyze the fixed po<strong>in</strong>ts and<br />

circles <strong>in</strong> the sparse matrix They are our future work.<br />

ACKNOWLEDGMENT<br />

This work was supported by the Fundamental<br />

Research Funds for the Central Universities of Ch<strong>in</strong>a<br />

under Grant No. ZYGX2009J062 and the National<br />

Natural Science Foundation of Ch<strong>in</strong>a under Grant No.<br />

60973016.<br />

REFERENCES<br />

[1] S. A. Kauffman, “Metabolic stability and epigenesist <strong>in</strong><br />

randomly constructed genetic nets”, Journal of Theoretical<br />

Biology, vol. 22, pp. 437–467, 1969.<br />

[2] T. Akustsu, S. Miyano, and S. Kuhara, “Inferr<strong>in</strong>g<br />

qualitative relations <strong>in</strong> genetic networks and metabolic<br />

pathways”, Bio<strong>in</strong>formatics, vol. 16, pp.727–773, 2000.<br />

[3] R. Albert, A. L. Barabasi, “Dynamics of complex systems:<br />

scal<strong>in</strong>g laws or the period of Boolean networks”, Phys.<br />

Rev. Lett., vol. 84, 5660–5663, 2000.<br />

[4] I. Shumlevich, R. Dougherty, S. Kim, and W. Zhang,<br />

“Probabilistic Boolean network: a rule-based uncerta<strong>in</strong>ty<br />

model for gene regulatory networks”, Bio<strong>in</strong>formatics, no. 2,<br />

vol. 18, 261–274, 2002.<br />

[5] S. E. Harris, B. K. Sawhill, A. Wuensche, and S. Kauffman,<br />

“A model of transcriptional regulatory networks based on<br />

biases <strong>in</strong> the observed regulation rules”, Complexity, vol. 7,<br />

23–40, 2002.<br />

[6] M. Aldana, “Boolean dynamics of networks with scale-free<br />

topology”, Physica D, vol. 185, 45–66, 2003.<br />

[7] B. Samuelsson, C. Troe<strong>in</strong>, “Superpolynomial growth <strong>in</strong> the<br />

number of attractors <strong>in</strong> kayffman networks.” Phys. Rev.<br />

Lett., vol. 90, pp. 90098701, 2003.<br />

[8] B. Drossel, T. Mihaljev, and F.Greil, “Number and length<br />

of attractors <strong>in</strong> a critical Kauffman model with<br />

connectivity one”, Phys. Rev. Lett., vol. 94, pp. 088701,<br />

2005.<br />

[9] R. Albert, H. G. Othmer, “The topology and signature of<br />

the regulatory <strong>in</strong>teractions predict the expression pattern of<br />

the segment polarity genes <strong>in</strong> Drospphila melanogaster”,<br />

Journal of Theory Biology, vol. 223, no. 1, pp. 1–18, 2003.<br />

[10] S. Huang, “Regulation of cellular states <strong>in</strong> mammalian<br />

cells from a genomewide view”, <strong>in</strong> Gene Regulation and<br />

Metabolism, J. Collado-Vodes and R. Hofestadt, Eds.<br />

Cambridge, MA: MIT Press, 2002, pp. 181–220.<br />

[11] J. Heidel, J. Maloney, J. Farrow, and J. Rogers, “F<strong>in</strong>d<strong>in</strong>g<br />

cycles <strong>in</strong> synchronous Boolean networks with applications<br />

to biochemical systems”, Int. J. Bifurcat. Chaos, vol. 13,<br />

no. 3, 535–552, 2003.<br />

[12] C. Farrow, J. Heidel, H. Maloney, and J. Rogers, “Scalar<br />

equations for synchronous Boolean networks with<br />

biological applications”, IEEE Trans. Neural Networks,<br />

vol. 15, no. 2, 348–354, 2004.<br />

[13] Q. Zhao, “A remark on ‘Scalar Equations for synchronous<br />

Boolean Networks with biologicapplications’ by C.Farrow,<br />

J.Heidel, J.Maloney, and J.Rogers”, IEEE Trans. Neural<br />

Networks, vol. 16, no. 6, 1715–1716, 2005.<br />

[14] D. Cheng, H. Qi, Semi-tensor Product of Matrices-Theory<br />

and Application (second edition), Science Press: Beij<strong>in</strong>g,<br />

2011.<br />

[15] D. Cheng, H. Qi, and Z. Li, Analysis and Control of<br />

Boolean Networks: A Semi-tensor Product Approach,<br />

Spr<strong>in</strong>ger Press: London, 2011.<br />

[16] D. Cheng, Matrix and Polynomial Approach to Dynamic<br />

Control Systems, Science Press: Beij<strong>in</strong>g, 2002.<br />

[17] D. Cheng, “Semi-tensor product of matrices and its<br />

applications – A survey”, Proceed<strong>in</strong>g of ICCM, vol. 3,<br />

641–668, 2007.<br />

[18] D. Cheng, H. Qi, and Y. Zhao, “Analysis and control of<br />

Boolean networks: a semi-tensor product approach”,<br />

ACTA Automatica SINICA, vol. 37, no. 5, 529–539, 2011.<br />

[19] D. Cheng, H. Qi, and Z. Li, Model construction of Boolean<br />

network via observed data. IEEE Transactions on Neural<br />

Networks, vol. 22, no. 4, pp. 525–536, 2011.<br />

[20] D. Cheng, H. Qi, “A l<strong>in</strong>ear representation of dynamics of<br />

boolean networks”, IEEE Transactions on Automatic<br />

Control, vol. 55, no. 10, pp. 2251–2258, 2011.<br />

[21] D. Cheng, H. Qi, “State-space analysis of Boolean<br />

networks”, IEEE Transaction on Neural Networks, vol. 21,<br />

no. 4, pp. 584–594, 2010.<br />

© 2013 ACADEMY PUBLISHER


1448 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

[22] A. Faure, A. Naldi, C. Chaouiya, and D. Thieffry,<br />

“Dynamical analysis of a generic Boolean model for the<br />

control of the mammalian cell cycle”, Bio<strong>in</strong>formatics, vol.<br />

22, no. 14, pp. 124–131, 2006.<br />

[23] D. Cheng, Y. Zhao, X. Xu, “Matrix approach to boolean<br />

calculus”, IEEE Conference on Decision and Control and<br />

European Control, pp. 6950–6955, 2011.<br />

[24] D. Cheng, H. Qi, Y. Zhao, “Synthesis of Boolean networks<br />

via semi-tensor product”, 30th Ch<strong>in</strong>ese Control Conference,<br />

pp. 6–17, 2011.<br />

J<strong>in</strong>yu Zhan was born <strong>in</strong> Heilongjiang Prov<strong>in</strong>ce of Ch<strong>in</strong>a <strong>in</strong><br />

1978. She received the Ph.D. degree <strong>in</strong> computer applications<br />

from the University of Electronic Science and Technology of<br />

Ch<strong>in</strong>a <strong>in</strong> 2006.<br />

Currently, she is an associate professor at the University of<br />

Electronic Science and Technology of Ch<strong>in</strong>a. Her research<br />

<strong>in</strong>terests <strong>in</strong>clude formal co-verification of SoC, model check<strong>in</strong>g,<br />

real time embedded systems, and VLSI design and verification.<br />

Shan Lu was born <strong>in</strong> Hunan Prov<strong>in</strong>ce of Ch<strong>in</strong>a <strong>in</strong> 1989. He<br />

received the Bachelor degree <strong>in</strong> <strong>in</strong>formation and computation<br />

science from Chongq<strong>in</strong>g Three Gorges University <strong>in</strong> 2011.<br />

Currently, he is a graduate student at the University of<br />

Electronic Science and Technology of Ch<strong>in</strong>a. His research<br />

<strong>in</strong>terests <strong>in</strong>clude formal verification and model check<strong>in</strong>g.<br />

Guowu Yang was born <strong>in</strong> Hubei Prov<strong>in</strong>ce of Ch<strong>in</strong>a <strong>in</strong> 1966. He<br />

received the Ph.D. degree at Electrical and Computer<br />

Eng<strong>in</strong>eer<strong>in</strong>g department of Portland State University <strong>in</strong> USA <strong>in</strong><br />

2005. He was a research associate at Computer Science<br />

department of Portland State University from 2005 to 2006.<br />

Currently, he is a professor of College of Computer Science<br />

and Eng<strong>in</strong>eer<strong>in</strong>g at University of Electronic Science and<br />

Technololgy of Ch<strong>in</strong>a. His research <strong>in</strong>terests <strong>in</strong>clude formal<br />

verification and develop<strong>in</strong>g correspond<strong>in</strong>g program package,<br />

theoretical study of synthesis algorithms <strong>in</strong> quantum comput<strong>in</strong>g,<br />

and non-l<strong>in</strong>ear control theory.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1449<br />

Adaptive Chaotic Prediction Algorithm of RBF<br />

Neural Network Filter<strong>in</strong>g Model based on Phase<br />

Space Reconstruction<br />

Lisheng Y<strong>in</strong>, Yigang He, Xuep<strong>in</strong>g Dong, Zhaoquan Lu<br />

School of Electrical and Automation Eng<strong>in</strong>eer<strong>in</strong>g, Hefei University of Technology, Hefei, Ch<strong>in</strong>a<br />

E-mail: yls20000@163.com, hyghnu@yahoo.com.cn, hfdxp@126.com, luzhquan@126.com<br />

Abstract—With the analysis of the technology of phase space<br />

reconstruction, a model<strong>in</strong>g and forecast<strong>in</strong>g technique based<br />

on the Radial Basis Function (RBF) neural network for<br />

chaotic time series is presented <strong>in</strong> this paper. The predictive<br />

model of chaotic time series is established with the adaptive<br />

RBF neural networks and the steps of the chaotic learn<strong>in</strong>g<br />

algorithm with adaptive RBF neural networks are expressed.<br />

The network system can enhance the stabilization and<br />

associative memory of chaotic dynamics and generalization<br />

ability of predictive model even by imperfect and variation<br />

<strong>in</strong>puts dur<strong>in</strong>g the learn<strong>in</strong>g and prediction process by<br />

select<strong>in</strong>g the suitable nonl<strong>in</strong>ear feedback term. The<br />

dynamics of network become chaotic one <strong>in</strong> the weight space.<br />

Simulation experiments of chaotic time series produced by<br />

Lorenz equation are proceeded by a RBF neural<br />

network.The experimental and simulat<strong>in</strong>g results <strong>in</strong>dicated<br />

that the forecast method of the adaptive RBF neutral<br />

network compared with the forecast method of back<br />

propagation (BP) neutral network based on the chaotic<br />

learn<strong>in</strong>g algorithm has faster learn<strong>in</strong>g capacity and higher<br />

accuracy of forecast.The method provides a new way for<br />

the chaotic time series prediction.<br />

Index Terms—Chaos Theory, Phase Space Reconstruction,<br />

Time Series Prediction, RBF Neural network, Algorithm<br />

I. INTRODUCTION<br />

S<strong>in</strong>ce the phase space reconstruction theory proposed<br />

by Packard et al. <strong>in</strong> 1980, many scholars at home and<br />

abroad to set off a climax of chaotic time series<br />

prediction. Prediction for chaotic time series is to<br />

approximate the unknown nonl<strong>in</strong>ear functional mapp<strong>in</strong>g<br />

of a chaotic signal. The laws underly<strong>in</strong>g the chaotic time<br />

series can be expressed as a determ<strong>in</strong>istic dynamical<br />

system. Farmer and Sidorowich suggest reconstruct<strong>in</strong>g<br />

the dynamics <strong>in</strong> phase space by choos<strong>in</strong>g a suitable<br />

embedd<strong>in</strong>g dimension and time delay [1]. Takens’<br />

theorem ensures that the method is reliable, based on the<br />

fact that the <strong>in</strong>teraction between the variables is such that<br />

every component conta<strong>in</strong>s <strong>in</strong>formation on the complex<br />

dynamics of the system [2].<br />

The neural network [3-6]. not only has the selfadaptive,<br />

parallelism and fault tolerance characteristics,<br />

but also has the ability to approximate any nonl<strong>in</strong>ear<br />

function. Based on these advantages, the neural network<br />

model of the nonl<strong>in</strong>ear system has a very wide range of<br />

applications [7-10]. In recent years, particular <strong>in</strong>terest has<br />

been put <strong>in</strong>to predict<strong>in</strong>g chaotic time series us<strong>in</strong>g neural<br />

networks because of their universal approximation<br />

capabilities. Most applications <strong>in</strong> this field are based on<br />

feed-forward neural networks, such as the Back<br />

Propagation (BP) network [11-13], Radial Basis Function<br />

(RBF) network [14-15], Recurrent neural networks<br />

(RNNs) [16-18], FIR neural networks [19-20] and so on.<br />

It is widely used tool for the prediction of time series [21-<br />

23].<br />

The RBF neural network model structure is easy to<br />

understand, tra<strong>in</strong><strong>in</strong>g process stability, tra<strong>in</strong><strong>in</strong>g speed is<br />

fast, tra<strong>in</strong><strong>in</strong>g result is high accuracy and generalization<br />

ability is strong. In this paper, the chaotic algorithm is<br />

proposed to a RBF neural network filter<strong>in</strong>g predictive<br />

model and the model is proposed to make prediction of<br />

chaotic time series. The network system can enhance the<br />

stabilization and associative memory of chaotic dynamics<br />

and generalization ability of predictive model even by<br />

imperfect and variation <strong>in</strong>puts by select<strong>in</strong>g the suitable<br />

nonl<strong>in</strong>ear feedback term. The dynamics of network<br />

become chaotic one <strong>in</strong> the weight space. The model is<br />

tested for the chaotic time series which venerated with<br />

Lorentz system by on-l<strong>in</strong>e method. The experimental and<br />

simulation results <strong>in</strong>dicated that the adaptive filter<strong>in</strong>g has<br />

a good self-suitable prediction performance and can be<br />

successfully used to predict chaotic time series.<br />

II. ESTABLISHMENT OF ADAPTIVE RBF NEURAL<br />

NETWORK FILTERING PREDICTIVE MODEL BASED ON<br />

CHAOTIC ALGORITHM<br />

A. Model of Chaotic Time Series Prediction<br />

Takens theorem considers evolution of any component<br />

of the system is decided by other components <strong>in</strong>teract<strong>in</strong>g<br />

with this component, therefore, the <strong>in</strong>formation of<br />

relevant component imply <strong>in</strong> the development process of<br />

this component, so the orig<strong>in</strong>al rules of the system can be<br />

extracted and restored from a group of time-series data of<br />

a certa<strong>in</strong> component. The one-dimensional time series is<br />

embedded to multi-dimensional phase space through<br />

reconstruction and the new system with same dynamic<br />

characteristics as orig<strong>in</strong>al system can be obta<strong>in</strong>ed through<br />

the selection of a suitable embedd<strong>in</strong>g dimension m and<br />

time delayτ . The usual method of select<strong>in</strong>g time delay<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1449-1455


1450 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

τ <strong>in</strong>cludes autocorrelation function method, multiple<br />

correlation function method, mutual <strong>in</strong>formation method.<br />

Embedd<strong>in</strong>g dimension m is calculated by the methods of<br />

GP algorithm, pseudo-nearest-po<strong>in</strong>t method, correlation<br />

<strong>in</strong>tegral method and Cao method.<br />

The chaotic time series prediction is based on the<br />

Takens' delay-coord<strong>in</strong>ate phase reconstruct theory. If the<br />

time series of one of the variables is available, based on<br />

the fact that the <strong>in</strong>teraction between the variables is such<br />

that every component conta<strong>in</strong>s <strong>in</strong>formation on the<br />

complex dynamics of the system, a smooth function can<br />

be found to model the portraits of time series. If the<br />

chaotic time series are{ x()<br />

t }, then the reconstruct state<br />

vector is<br />

x( t) = ( x( t), x( t+ τ ), , x( t+ ( m−1) τ ))<br />

where m ( m = 2,3, ) is called the embedd<strong>in</strong>g<br />

dimension ( m= 2d<br />

+ 1 , d is called the freedom of<br />

dynamics of the system), and τ is the delay time. The<br />

predictive reconstruct of chaotic series is a <strong>in</strong>verse<br />

problem to the dynamics of the system essentially. There<br />

exists a smooth function def<strong>in</strong>ed on the reconstructed<br />

m<br />

manifold <strong>in</strong> R to <strong>in</strong>terpret the<br />

dynamics x( t+ T) = F( x( t))<br />

, where T ( T > 0) is forward<br />

predictive step length, and F()<br />

⋅ is the reconstructed<br />

predictive model.<br />

B. RBF Neural Network Function Approximation Theory<br />

Takens embedd<strong>in</strong>g theorem states that there is a<br />

smooth mapp<strong>in</strong>g F of the F makes:<br />

x( t+ τ ) = F( x( t))<br />

(1)<br />

that is,<br />

xt ( + τ), xt (), , xt ( −( m− 2) τ) = F{[ xt (), xt ( −τ), , xt ( −( m−1) τ]}<br />

For purposes of calculation, equation (1) can be rewritten<br />

as:<br />

xt ( + τ ) = Fxt [ ( ), xt ( −τ), , xt ( −( m−1) τ]<br />

(2)<br />

where, f is the mapp<strong>in</strong>g from R M to R L . Chaos theory<br />

suggests that the chaotic time series is short-term forecast,<br />

and the essence of prediction is how to get a good<br />

approximation f on the function f . Chaotic time series<br />

determ<strong>in</strong>ed by the <strong>in</strong>ternal regularity, this regularity<br />

comes from the non-l<strong>in</strong>ear, it exhibits the time series <strong>in</strong><br />

the time delay state, this feature makes the system seem<br />

to have some k<strong>in</strong>d of memory capacity. The same time, it<br />

is difficult to demonstrate such a regularity by us<strong>in</strong>g the<br />

analytic methods; this type of <strong>in</strong>formation process<strong>in</strong>g<br />

happens to be the neural network, and the Kolmogorov<br />

cont<strong>in</strong>uity theorem <strong>in</strong> the neural networks theory<br />

provides a theoretical guarantee for the neural network<br />

nonl<strong>in</strong>ear function approximation.<br />

Theorem (Kolmogorov cont<strong>in</strong>uity theorem) Let ϕ ( x)<br />

be a non-constant and bounded monotonically <strong>in</strong>creas<strong>in</strong>g<br />

a cont<strong>in</strong>uous function; M is a compact sub-set of R n ,<br />

and f( x) = f( x1, x2, , x n<br />

) is the cont<strong>in</strong>uous real value<br />

function on M , then for ∀ ε > 0 , exists a positive <strong>in</strong>teger<br />

N and real numbers C , makes:<br />

<br />

N n<br />

f( x , x , , x ) = Cϕ( ϖ x −θ<br />

) (3)<br />

1 2<br />

∑<br />

∑<br />

n i ij j j<br />

i= 1 j=<br />

1<br />

meet:<br />

<br />

max f( x , x , , x ) − f( x , x , , x ) < ε (4)<br />

M<br />

1 2 n 1 2<br />

By the above theorem, the nonl<strong>in</strong>ear time series<br />

prediction process us<strong>in</strong>g neural network can be<br />

considered as dynamic reconfiguration, which is an<br />

<strong>in</strong>verse process. Namely, the existence of a three-layer<br />

network, the hidden unit output function, the network<br />

<strong>in</strong>put and output function is l<strong>in</strong>ear, three-layer network<br />

<strong>in</strong>put and output relation f can approximate p.<br />

Therefore, the theorem from mathematics is to ensure<br />

the feasibility of chaotic time series prediction by neural<br />

network.<br />

C. Realized Architecture of Adaptive RBF Neural<br />

Network Filter<strong>in</strong>g Predictive Model<br />

After reconstruct<strong>in</strong>g the phase space, the RBF neural<br />

networks adopt three layers networks of Figure 1. Where<br />

the <strong>in</strong>put layer has m nerve cells, the first layer feed to<br />

the second layer directly and it do not need the power<br />

process<strong>in</strong>g. r i<br />

( i = 1, 2, , L ) is the reference vector and<br />

ϖ<br />

k<br />

( i = 1, 2, , L ) is the adjustable parameters <strong>in</strong> the<br />

adaptive RBF neural network filter<strong>in</strong>g. Thus, the adaptive<br />

RBF neural network filter<strong>in</strong>g is more flexible <strong>in</strong> study<strong>in</strong>g<br />

the nonl<strong>in</strong>ear functions. The differentiation between the<br />

networks and the traditional neural networks is that the<br />

activation function is a RBF function but not the Sigmoid<br />

function. The activation function usually choose the<br />

Gauss function, the spl<strong>in</strong>e function f ( di<br />

( k )) ,<br />

where d ( k) = x( k) − r( k)<br />

. In the adaptive RBF neural<br />

i<br />

network filter<strong>in</strong>g, yk ( ) is expressed as<br />

i<br />

2<br />

L−1<br />

yˆ( k) = f ( ∑ ϖ ( k) f( d ( k)))<br />

,<br />

i=<br />

0<br />

i = 0, 2, , L−1,<br />

where f () 2<br />

⋅ is the activation function of output signal.<br />

i<br />

x(k)<br />

−1<br />

z<br />

−1<br />

z<br />

−1<br />

z<br />

r 0<br />

r 1<br />

r 2<br />

r L<br />

i<br />

ϖ 0<br />

( k)<br />

ϖ 1<br />

( k)<br />

ϖ 2<br />

( k)<br />

(k) ϖ L<br />

n<br />

∑<br />

yˆ ( k)<br />

<strong>in</strong>put hidden layer output<br />

Figure 1. Structure of adaptive RBF neural network filter<strong>in</strong>g<br />

Generally, the learn<strong>in</strong>g of the RBF neural network<br />

filter<strong>in</strong>g has three steps. If the gradient method and the<br />

Gauss activation function are adopted, the regulate<br />

formulas of RBF are shown as:<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1451<br />

⎧ϖi( k+ 1) = ϖi( k) + 2 μϖ<br />

e( k) f( di( k))<br />

⎪<br />

2<br />

⎪ di<br />

( k)<br />

σi( k+ 1) = σi( k) + 2 μϖ<br />

e( k) f( di( k)) ϖi( k)<br />

⎪<br />

3<br />

σ<br />

i<br />

( k)<br />

⎪<br />

⎨<br />

x( k) − ri<br />

( k)<br />

(5)<br />

⎪ri( k + 1) = ri( k) + 2 μre( k) f( di( k)) ϖi( k)<br />

2<br />

σ<br />

i<br />

( k)<br />

⎪<br />

⎪<br />

x( k) − ri<br />

( k)<br />

⎪ri( k + 1) = ri( k) + 2 μre( k) f( di( k)) ϖi( k)<br />

2<br />

⎩<br />

σ<br />

i<br />

( k)<br />

i = 0, 2, , L−1.<br />

The RBF neural network system can enhance the<br />

stabilization and associative memory of chaotic dynamics<br />

and generalization ability of predictive model even by<br />

imperfect and variation <strong>in</strong>puts by select<strong>in</strong>g the suitable<br />

nonl<strong>in</strong>ear feedback term. The dynamics of network<br />

become chaotic one <strong>in</strong> the weight space. Thus, the<br />

regulate formula ϖ ( k)<br />

is shown as<br />

ϖ<br />

i( k + 1) = ϖi( k) + 2 μϖ<br />

e( k) f( di( k)) + g( ϖi( k) −ϖI( k−1))<br />

(6)<br />

2<br />

where g( x) = tanh( ax)exp( − bx ), x = ϖ ( k) −ϖ<br />

( k− 1) .<br />

That the feedback function g( x ) is chose is because<br />

that g( x)<br />

can get the difference feedback function<br />

correspond<strong>in</strong>g to the dissimilar parameter, such as the<br />

staircase function, δ function and so on. If the feedback<br />

function is seen as the motion-promot<strong>in</strong>g force, the<br />

different feedback parameters a and b correspond<strong>in</strong>g to<br />

the amplitude and width of the motion-promot<strong>in</strong>g force.<br />

The paper [18] was detailed to discuss the <strong>in</strong>fluences by<br />

select<strong>in</strong>g the suitable learn<strong>in</strong>g and predictive process. The<br />

simulation results <strong>in</strong>dicated that the network system can<br />

enhance the stabilization and associative memory of<br />

chaotic dynamics and generalization ability of predictive<br />

model even by imperfect and variation <strong>in</strong>puts dur<strong>in</strong>g the<br />

learn<strong>in</strong>g and prediction process by select<strong>in</strong>g the suitable<br />

nonl<strong>in</strong>ear feedback term.<br />

III. DETERMINATION METHOD OF THE OPTIMAL DELAY<br />

TIME AND MINIMUM EMBEDDING DIMENSION<br />

A. Determ<strong>in</strong>ation Method of the Optimal Delay Time τ<br />

Dur<strong>in</strong>g Phase Space Reconstruction <strong>in</strong> the Takens<br />

embedd<strong>in</strong>g theorem does not make limited to the delay<br />

time τ .In theory, when the observational data po<strong>in</strong>t is an<br />

<strong>in</strong>f<strong>in</strong>itely long, the effect of embedded not too large.<br />

However, <strong>in</strong> actual operation, τ is caused a great impact.<br />

If τ is too small, the chaotic attractor cannot be fully<br />

expanded, redundant error is larger; if τ is too large, the<br />

no related error is larger. Therefore, <strong>in</strong> order for complex<br />

nonl<strong>in</strong>ear systems, us<strong>in</strong>g the mutual <strong>in</strong>formation method<br />

to determ<strong>in</strong>e the optimal delay time τ , the mutual<br />

<strong>in</strong>formation method us<strong>in</strong>g a m<strong>in</strong>imal value of the mutual<br />

<strong>in</strong>formation function to determ<strong>in</strong>e the optimal delay time<br />

τ , its expression is as follows:<br />

P,<br />

() r<br />

M( x , )<br />

,<br />

( )ln i j<br />

t<br />

xt− τ<br />

= ∑ Pi j<br />

r<br />

(7)<br />

PP<br />

i,<br />

j i j<br />

i<br />

i<br />

where, P<br />

i<br />

is the probability of po<strong>in</strong>t x t<br />

<strong>in</strong> the i time<br />

<strong>in</strong>terval; Pi, j()<br />

r is the jo<strong>in</strong>t probability of the po<strong>in</strong>t x t<br />

<strong>in</strong><br />

t moment fall <strong>in</strong>to the i time <strong>in</strong>terval and the t + τ<br />

moment fall <strong>in</strong>to the j time <strong>in</strong>tervals.<br />

B. Determ<strong>in</strong>ation Method of the M<strong>in</strong>imum Embedd<strong>in</strong>g m<br />

In this paper, the commonly used pseudo-near-po<strong>in</strong>t<br />

method to calculate the m<strong>in</strong>imum embedd<strong>in</strong>g dimension<br />

m , set the number of attractor dimension d , then m is<br />

just the m<strong>in</strong>imum embedd<strong>in</strong>g dimension when the<br />

attractor is fully open. When m< d , the attractor <strong>in</strong> the<br />

phase space cannot be completely open, the attractor will<br />

produce some projection po<strong>in</strong>t <strong>in</strong> the embedded space,<br />

the projection po<strong>in</strong>t and the other po<strong>in</strong>ts <strong>in</strong> the phase<br />

space will form the closest po<strong>in</strong>t. In the orig<strong>in</strong>al system,<br />

the 2 po<strong>in</strong>ts are not true nearest neighbors, so called<br />

pseudo adjacent po<strong>in</strong>ts. Assume that any po<strong>in</strong>t yt () <strong>in</strong> the<br />

phase space, the criterion of false neighbor<strong>in</strong>g po<strong>in</strong>ts are<br />

as follows:<br />

1<br />

2 2<br />

D () () 2<br />

m+ 1<br />

t − Dm<br />

t xt ( + mτ) − xt ( ′ + mτ)<br />

= > ρm<br />

(8)<br />

D () t D () t<br />

m<br />

Where D () t is the Euclidean distance between the<br />

m<br />

N<br />

po<strong>in</strong>ts of yt () with its nearest neighbor y () t <strong>in</strong> the<br />

phase space when the embedd<strong>in</strong>g dimension is m .<br />

Accord<strong>in</strong>g to this criterion, the calculation pseudo-nearest<br />

neighbor number N when m from small to large, and<br />

then calculate the change amount Δ N when the<br />

embedd<strong>in</strong>g dimension from m to m + 1. Draw the curve<br />

ΔN<br />

Δ<br />

from to m ; when Δ N = 0 , just N dropped to 0,<br />

N<br />

N<br />

the value m * of m is seek<strong>in</strong>g the m<strong>in</strong>imum embedd<strong>in</strong>g<br />

dimension.<br />

IV. ADAPTIVE RBF NEURAL NETWORK RAPID LEARNING<br />

ALGORITHM<br />

On the establishment of chaotic time series RBF,<br />

Network <strong>in</strong>put the number of neurons, hidden layers and<br />

the number of neurons <strong>in</strong> the hidden layer are to be<br />

considered.The follow<strong>in</strong>g chaotic time series used are<br />

from Lorenz chaotic sampl<strong>in</strong>g time series. The Lorenz<br />

chaotic sampl<strong>in</strong>g time series RBF neural network can be<br />

constructed: RBF neural network is designed to be three<br />

layers: <strong>in</strong>put layer, s<strong>in</strong>gle hidden layer and output layer;<br />

the number of hidden layer wavelet neural taken as 9 by<br />

Kolmogorov Theorem, the number of <strong>in</strong>put layer neurons<br />

equal to the m<strong>in</strong>imum embedd<strong>in</strong>g dimension, the number<br />

of output layer is 1, so that the 4-9-1 structure of Lorenz<br />

chaotic sampl<strong>in</strong>g time series RBF was obta<strong>in</strong>ed,<br />

specifically shown <strong>in</strong> Figure 1.<br />

Algorithm The steps of the chaotic time series learn<strong>in</strong>g<br />

and prediction of the adaptive RBF neural network<br />

filter<strong>in</strong>g predictive model are showed:<br />

Step1) Based on the Takens' delay-coord<strong>in</strong>ate phase<br />

reconstruct theory, the number of the <strong>in</strong>put nerve cells<br />

m<br />

© 2013 ACADEMY PUBLISHER


1452 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

M of the adaptive RBF neural network filter<strong>in</strong>g is<br />

determ<strong>in</strong>ed.<br />

The dimension m of chaotic time series is<br />

calculated by the way of G- P algorithms, and<br />

the delay time τ is calculated by the selfcorrelation<br />

method. For the overall description<br />

of the dynamics characteristic of the orig<strong>in</strong>al<br />

system by the Takens' delay-coord<strong>in</strong>ate phase<br />

reconstruct theory, a chaotic series demand<br />

m≥ 2d<br />

+ 1 variances at least, so the number of<br />

the <strong>in</strong>put nerve cells of the adaptive RBF neural<br />

network filter<strong>in</strong>g is M = m ; The reconstruction<br />

phase space vector number is 200, Then, the<br />

200 phase space vectors to make a simple<br />

normalized, the normalized as<br />

[ x() t −mean( x())]/[max( t x()) t − m<strong>in</strong>( x())]<br />

t<br />

,<br />

t = 1, 2, 200 , and mak<strong>in</strong>g the value is owned by a range<br />

of -1 / 2 to 1/2.<br />

Step2) The adaptive filter<strong>in</strong>g is <strong>in</strong>itialized and the<br />

weights are vested the <strong>in</strong>itial values. RBF neural network<br />

vector weight<strong>in</strong>g parameters w is <strong>in</strong>itialized, where the<br />

weight vector w <strong>in</strong> each component take random function<br />

between 0 and 1; and the learn<strong>in</strong>g rate η is <strong>in</strong>itialized at<br />

the same time, where η = 0.0002 . β and γ are the<br />

learn<strong>in</strong>g rate adjustment factors, 0< β < 1, γ > 1 , for<br />

example, β = 0.75, γ = 1.05 .<br />

Step3) Us<strong>in</strong>g the above the <strong>in</strong>itialization network and<br />

the pretreatment traffic flow time series, the first tra<strong>in</strong><strong>in</strong>g<br />

network is carried out.<br />

Step4) The error is calculated. If the error is <strong>in</strong> the<br />

scope of the permission, the error is calculated and it<br />

turns <strong>in</strong>to Step4), otherwise it cont<strong>in</strong>ues; the error<br />

function formula:<br />

200<br />

1 2<br />

E( θ ) = ( y( t) − y( t))<br />

(9)<br />

∑<br />

2 t = 1<br />

Set the maximum error is E max<br />

= 0.035 , if E < Emax<br />

,<br />

the storage RBF neural network parameter use w ;<br />

otherwise, then a second tra<strong>in</strong><strong>in</strong>g network will be<br />

required.<br />

Step5) Adjust the adaptive learn<strong>in</strong>g rate If A previous<br />

tra<strong>in</strong><strong>in</strong>g error is recorded as En<br />

− 1<br />

, the current error is<br />

recorded as E n<br />

, then Calculate the ratio of E<br />

n<br />

to En<br />

− 1<br />

,<br />

En<br />

Sett<strong>in</strong>g constants k = 1.04 , if > k = 1.04 , then<br />

En<br />

− 1<br />

substitute βη for η to reduce learn<strong>in</strong>g rate; otherwise,<br />

replace η with γη to <strong>in</strong>crease learn<strong>in</strong>g rate.<br />

Step6) In the adaptive RBF neural network filter<strong>in</strong>g for<br />

the chaotic time series prediction <strong>in</strong> Figure 1,<br />

x( k) = x( t)<br />

t = 1, 2, , N is the <strong>in</strong>put, yk ˆ( ) = xt ˆ( ) is the<br />

output.<br />

Introduce nonl<strong>in</strong>ear feedback <strong>in</strong>to the weight<strong>in</strong>g<br />

formal to adopt Chaos Mechanisms, due to the nonl<strong>in</strong>ear<br />

feedback is vector form of weight<strong>in</strong>g variables. In order<br />

to facilitate understand<strong>in</strong>g, respectively, gives the vector<br />

w and its weight<strong>in</strong>g formal, as follows.<br />

Note<br />

Δ w l ( t+ 1) = w l ( t+ 1) −w l ( t)<br />

,<br />

ji ji ji<br />

which represents the current value of weight<strong>in</strong>g variables,<br />

then<br />

1<br />

Δ w l ( t+ 1) = w l ( t+ 1) − w l () t = −ηδ l+<br />

() t x<br />

l () t<br />

ji ji ji j i<br />

In order to speed up the learn<strong>in</strong>g process, <strong>in</strong> the right to<br />

l<br />

jo<strong>in</strong> a momentum term αΔw () t , then<br />

l 1<br />

( 1) l +<br />

( ) l ( ) l<br />

ji<br />

t ηδ<br />

j<br />

t<br />

i<br />

t α<br />

ji<br />

( t)<br />

ji<br />

Δ w + = − x + Δw (10)<br />

where α is <strong>in</strong>ertia factor. As a constant, the weight of<br />

amendments is l<strong>in</strong>ear, not <strong>in</strong>troduce chaos mechanism.<br />

then we Introduce a nonl<strong>in</strong>ear feedback (chaos<br />

mechanism on the right):<br />

1<br />

Δ w l ( t+ 1) = − ηδ l+<br />

( t) x l ( t) + g( Δ w l ( t+<br />

1)) (11)<br />

ji j i ji<br />

Expand this equation <strong>in</strong>to scalar form as follow:<br />

l l+<br />

1 l l<br />

⎧Δ wji ( t+ 1) = − ηδ<br />

j<br />

( t) xi ( t) + g( Δwji<br />

( t))<br />

⎪<br />

l l+<br />

1<br />

l l<br />

⎪Δ wji ( t+ 1 + τ) =− ηδ<br />

j<br />

( t+ τ) xi ( t+ τ) + g( Δ wji<br />

( t+<br />

τ))<br />

⎪<br />

l l+<br />

1<br />

l l<br />

⎪Δ wji ( t+ 1+ 2 τ ) = − ηδ<br />

j<br />

( t+ 2) xi ( t+ 2 τ ) + g( Δ wji<br />

( t+<br />

2 τ ))<br />

⎨<br />

⎪<br />

⎪ l l+<br />

1<br />

l<br />

⎪<br />

Δ wji ( t+ 1 + ( m− 1) τ ) =− ηδ<br />

j<br />

( t+ ( m− 1) τ ) xi<br />

( t+ ( m−1) τ )<br />

⎪ l<br />

⎩<br />

+ g(<br />

Δwji<br />

( t+ ( m−1) τ ))<br />

(12)<br />

where, feedback can take a variety of vector functions,<br />

for example:<br />

2<br />

g( x) = tanh( px)exp( − qx )<br />

or<br />

g( x) = pxexp( − q x)<br />

,<br />

<strong>in</strong> the study, p = 0.7 , q = 0.1.<br />

Step7) Us<strong>in</strong>g the new learn<strong>in</strong>g rate <strong>in</strong> Step5) and RBF<br />

network parameters with nonl<strong>in</strong>ear feedback <strong>in</strong> Step6) to<br />

calculate the new value, and tra<strong>in</strong> network aga<strong>in</strong>, then get<br />

the error and enter <strong>in</strong>to Step4), repeated tra<strong>in</strong><strong>in</strong>g until the<br />

relative error <strong>in</strong> traffic meet E < Emax<br />

.<br />

Step8) Output of each stored network parameters and<br />

tra<strong>in</strong><strong>in</strong>g error curve.<br />

V. EXAMPLE ANALYSIS AND CONCLUSIONS<br />

A. Model and Data<br />

In this paper, the chaotic time series is the object of<br />

study of the numerical simulation <strong>in</strong> Lorenz dynamic<br />

system. In 1963, the meteorologist Lorenz describe the<br />

evolution of the weather by three-dimensional<br />

autonomous equations; when the parameter σ = 10 ,<br />

8<br />

r = 28 , b = , the long-term changes <strong>in</strong> the weather<br />

3<br />

unpredictable, that is, the system presents a chaotic state,<br />

and for the first time given a strange attractor. The<br />

attractors are shown <strong>in</strong> Figure 2 (a), Figure 2 (b), Figure 2<br />

(c) and Figure 2 (d):<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1453<br />

z(t)<br />

30<br />

20<br />

10<br />

0<br />

-10<br />

-20<br />

-30<br />

20<br />

10<br />

0<br />

y(t)<br />

-10<br />

attractor of Lorenz<br />

-20 -20<br />

(a) three-dimensional map of Lorenz attractor<br />

y(t)<br />

20<br />

15<br />

10<br />

5<br />

0<br />

-5<br />

-10<br />

-15<br />

attractor of Lorenz<br />

-20<br />

-10 0 10 20 30 40 50<br />

x(t)<br />

(b) two-dimensional map of Lorenz attractor <strong>in</strong> the x-y-plan<br />

z(t)<br />

30<br />

20<br />

10<br />

0<br />

-10<br />

-20<br />

attractor of Lorenz<br />

-30<br />

-10 0 10 20 30 40 50<br />

x(t)<br />

(c) two-dimensional map of Lorenz attractor <strong>in</strong> the x-z-plan<br />

y(t)<br />

30<br />

20<br />

10<br />

0<br />

-10<br />

-20<br />

attractor of Lorenz<br />

-30<br />

-20 -15 -10 -5 0 5 10 15 20<br />

z(t)<br />

(d) two-dimensional map of Lorenz attractor <strong>in</strong> the z-y-plan<br />

0<br />

x(t)<br />

20<br />

40<br />

60<br />

Lorenz map:<br />

•<br />

⎧<br />

⎪<br />

x = σ ( y − x)<br />

⎪ •<br />

⎨ y = rx − y − xz<br />

(13)<br />

⎪ •<br />

⎪ z =− bz+<br />

xy<br />

⎩<br />

8<br />

Where σ = 10 , r = 28 , b = .The <strong>in</strong>itial value is<br />

3<br />

x (0) = 0 , y (0) = 5 , z (0) = − 5 ; and the fix<strong>in</strong>g step length<br />

of <strong>in</strong>itial value is 0.05s . Time series to the branch x with<br />

70s is produced by the Runge-Kutta algorithms and the<br />

total data is 1200. The embedded dimension of the<br />

sampl<strong>in</strong>g chaotic time series m is 8 by the G- P<br />

algorithms. The delay time is τ= 1 by the self-correlation<br />

function algorithms and the <strong>in</strong>put dimension of the<br />

adaptive RBF neural network filter<strong>in</strong>g is 8.The former<br />

1200 data is tra<strong>in</strong>ed and other 200 data is predicted by the<br />

adaptive RBF neural network filter<strong>in</strong>g predictive model.<br />

B. Evaluation of the Predictive Ability<br />

The model's predictive ability is generally measure the<br />

follow<strong>in</strong>g three <strong>in</strong>dicators: of MAPE (mean absolute<br />

percentage error), RMSE (root mean square error) and<br />

RMSPE (root mean square percentage error), they are<br />

calculated as follows:<br />

n<br />

1 yi<br />

− yi<br />

MAPE = 100<br />

n<br />

∑ × , (14)<br />

y<br />

i=<br />

1<br />

i<br />

n<br />

1 ⎛ yi<br />

− y ⎞<br />

i<br />

RMSPE = 100× ∑ ⎜ ⎟<br />

n I = 1 ⎝ y<br />

, (15)<br />

i ⎠<br />

n I = 1<br />

i i<br />

1 n<br />

RMSE = y − y<br />

∑( ) 2<br />

(16)<br />

where, y i<br />

is predictive value of the model; y i<br />

is the real<br />

value; n is prediction phases, and MAPE assess the<br />

predictive capability are as follows: less than or equal to<br />

10%, then predictive ability is excellent; 10% -20%, then<br />

the predictive ability is excellent; 20% -50%, more than<br />

50%, then the prediction is <strong>in</strong>accurate. For RMSPE, the<br />

prediction square vulnerable to the impact of outliers, for<br />

the larger error given greater weight, but still can be<br />

modeled on the MAPE to determ<strong>in</strong>e the model of the pros<br />

and cons. RMSPE values range from zero to <strong>in</strong>f<strong>in</strong>ity.<br />

MAPE and RMSPE are the relative <strong>in</strong>dicator, RMSE is<br />

the absolute <strong>in</strong>dicator. The RMSE is the smaller, the<br />

model predictive ability is the stronger.<br />

C. The Simulation Results<br />

That the experimental outcome of Lorenz chaotic<br />

sampl<strong>in</strong>g time series, the true value (real l<strong>in</strong>e) and the<br />

predictive value (star l<strong>in</strong>e) and the predictive error curve<br />

are showed <strong>in</strong> Figure 3., Figure 4. and Figure 5.<br />

2<br />

Figure 2. Lorenz attractor <strong>in</strong> the phase space reconstruction<br />

Consider<strong>in</strong>g Lorenz chaotic system<br />

© 2013 ACADEMY PUBLISHER


1454 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

50<br />

40<br />

30<br />

20<br />

10<br />

0<br />

-10<br />

0 200 400 600<br />

n<br />

800 1000 1200 1400<br />

40<br />

35<br />

30<br />

25<br />

20<br />

15<br />

Figure 3. Lorenz chaotic sampl<strong>in</strong>g time series<br />

10<br />

1200 1220 1240 1260 1280 1300 1320 1340 1360 1380 1400<br />

n<br />

Figure 4. True value (real l<strong>in</strong>e) and predictive value (star l<strong>in</strong>e)<br />

error<br />

square<br />

0.5<br />

x 10 -3<br />

1<br />

0<br />

1200 1220 1240 1260 1280 1300 1320 1340 136013801400<br />

Figure 5. Predictive error curve<br />

In Figure 3 the sampl<strong>in</strong>g chaotic time series number is<br />

1200 by the Runge-Kutta algorithms.<br />

The former 1200 datum is used to learn and tra<strong>in</strong> the<br />

adaptive wavelet neural networks every 8 datum. After<br />

the learned and tra<strong>in</strong>ed stage, the true value (real l<strong>in</strong>e) and<br />

predictive value (star l<strong>in</strong>e) are shown <strong>in</strong> Figure 4.<br />

The predictive error curve of the true value and the<br />

predictive value is very small <strong>in</strong> Figure 5.<br />

The true value and the predictive value <strong>in</strong> the adaptive<br />

RBF neural network filter<strong>in</strong>g is to f<strong>in</strong>d a <strong>in</strong>ner law <strong>in</strong> the<br />

series itself, which can avoid the disturbance of some<br />

subjective factors and enjoys higher reliability. In this<br />

study, the fusion of chaotic theory with the adaptive RBF<br />

neural network filter<strong>in</strong>g based on chaotic algorithm<br />

provides a new method for chaotic time series prediction.<br />

The experimental <strong>in</strong>dicated that the network system can<br />

enhance the stabilization and associative memory of<br />

chaotic dynamics and generalization ability of predictive<br />

model even by imperfect and variation <strong>in</strong>puts dur<strong>in</strong>g the<br />

learn<strong>in</strong>g and prediction process by select<strong>in</strong>g the suitable<br />

nonl<strong>in</strong>ear feedback term. Simulation results for the<br />

model<strong>in</strong>g and prediction of chaotic time series show<br />

better predictive effectiveness and reliability.<br />

TABLE 1<br />

PREDICTIVE PERFORMANCE COMPARISON TABLE<br />

comparative<br />

<strong>in</strong>dicators<br />

BP neural network<br />

prediction<br />

RBF neural network<br />

prediction<br />

MAPE 5.01% 3.71%<br />

RMSPE 6.13% 4.55%<br />

RMSE 62.50 46.37<br />

From Table 1, the mean absolute percentage error of<br />

Lorenz chaotic sampl<strong>in</strong>g time series prediction and actual<br />

values, BP neural network based on the learn<strong>in</strong>g rate<br />

variable tra<strong>in</strong><strong>in</strong>g algorithm, RBF network based on fast<br />

learn<strong>in</strong>g algorithm, are 5.1% and 3.71%, respectively.<br />

Similarly, for the RMSPE, the results were 6.13% and<br />

4.55%; For RMSE, the results were 62.50 and 46.37. Can<br />

be seen from the data on Lorenz chaotic sampl<strong>in</strong>g time<br />

series RBF network prediction is better than BP neural<br />

network.<br />

VI. CONCLUSIONS<br />

In the paper the chaotic time series RBF neural<br />

network model was designed. A RBF neural network<br />

Adaptive learn<strong>in</strong>g algorithm based on Chaos mechanism<br />

was proposed. The method of model selection and<br />

algorithm design, are considered the chaos of Lorenz<br />

chaotic sampl<strong>in</strong>g time series, which is a theoretical value.<br />

Simulation results show that the method can reduce<br />

MAPE, RMSPE, RMSE, and improve the forecast<br />

accuracy, and show better predictive effectiveness and<br />

reliability.<br />

ACKNOWLEDGMENT<br />

This research is f<strong>in</strong>ancially supported by the National<br />

Natural Science Funds of Ch<strong>in</strong>a for Dist<strong>in</strong>guished Young<br />

Scholar under Grant (50925727), and the Fundamental<br />

Research Funds for the Central Universities, Hefei<br />

University of Technology for Professor He Yigang, the<br />

National Natural Science Foundation of Ch<strong>in</strong>a (NSFC)<br />

for Professor Xue-p<strong>in</strong>g Dong (No. 60974022) and the<br />

Universities Natural Science Foundation of Anhui<br />

Prov<strong>in</strong>ce (No. KJ2012A219) for Professor Y<strong>in</strong> Lisheng.<br />

REFERENCES<br />

[1] Jieni XUE, Zhongke SHI, “Short-Time Traffic Flow<br />

Prediction Based on Chaos Time Series Theory”, Journal<br />

of Transportation Systems Eng<strong>in</strong>eer<strong>in</strong>g and Information<br />

Technology, 8 (5), pp. 68-72, 2008.<br />

[2] Ajit Kumar Gautam, A.B. Chelani, V.K. Ja<strong>in</strong>a, S. Devotta,<br />

“A new scheme to predict chaotic time series of air<br />

pollutant concentrations us<strong>in</strong>g artificial neural network and<br />

nearest neighbor search<strong>in</strong>g”, Atmospheric Environment, 42<br />

(18), pp.4409-4417, 2008.<br />

[3] Roman M. Balab<strong>in</strong>, Ekater<strong>in</strong>a I. Lomak<strong>in</strong>a, Ravilya Z.<br />

Safieva, “Neuralnetwork (ANN) approach to biodiesel<br />

analysis: Analysis of biodiesel density, k<strong>in</strong>ematic viscosity,<br />

methanol and water contents us<strong>in</strong>g near <strong>in</strong>frared (NIR)<br />

spectroscopy”, Fuel, Vol. 90, no. 5, pp. 2007-2015, May<br />

2011.<br />

[4] Yuanp<strong>in</strong>g Zhu, Jun Sun and Satoshi Naoi, “Recogniz<strong>in</strong>g<br />

Natural Scene Characters by Convolutional Neural<br />

Network and Bimodal Image Enhancement, “Lecture<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1455<br />

Notes <strong>in</strong> Computer Science, Vol. 7139/2012, pp. 69-82,<br />

2012.<br />

[5] Yüksel Özbaya, Rahime Ceylanb, Bekir Karlikc,<br />

“Integration of type-2 fuzzy cluster<strong>in</strong>g and wavelet<br />

transform <strong>in</strong> a neuralnetwork based ECG classifier”,<br />

Expert Systems with Applications, Vol. 38, pp.1004-1010,<br />

January 2011.<br />

[6] Yan Fan, Niall W. Duncan, Moritz de Greck, Georg<br />

Northoff, “Is there a core neuralnetwork <strong>in</strong> empathy An<br />

fMRI based quantitative meta-analysis”, Neuroscience &<br />

Biobehavioral Reviews, Vol. 35, pp.903-911, January 2011.<br />

[7] Shunsuke Kobayakawa, Hirokazu Yokoi, “Evaluation of<br />

Prediction Capability of Non-recursion Type 2nd-order<br />

Volterra Neuron Network for Electrocardiogram”, Lecture<br />

Notes <strong>in</strong> Computer Science, vol. 5507, pp. 679-686, 2009.<br />

[8] Li-Sheng Y<strong>in</strong>, Xi-Yue Huang, Zu-Yuan Yang, et al,<br />

“Prediction for chaotic time series based on discrete<br />

Volterra neural networks”, Lect Notes Comput SC vol.<br />

3972, pp. 759-764, 2006.<br />

[9] Satoru Murakami, Pham Huu, Anh Ngoc, “On stability and<br />

robust stability of positive l<strong>in</strong>ear Volterra equations <strong>in</strong><br />

Banach lattices”, Central European Journal of<br />

Mathematics, 2010, pp.966-984.<br />

[10] Yu. V. Bibik, “The second Hamiltonian structure for a<br />

special case of the Lotka-Volterra equations”, Mathematics<br />

and Mathematical Physics, 2007, 47, pp.1285-1294.<br />

[11] Zhi Xiao, Shi-Jie Ye, Bo Zhong, Cai-X<strong>in</strong> Sun, “BP neural<br />

network with rough set for short term load forecast<strong>in</strong>g”,<br />

Expert Systems with Applications, 36 (1), pp. 276-279,<br />

2009.<br />

[12] Shiwei Yu, Kejun Zhu, Fengq<strong>in</strong> Diao, “A dynamic all<br />

parameters adaptive BP neural networks model and its<br />

application on oil reservoir prediction”, Applied<br />

Mathematics and Computation, 2008, 195 (1), pp.66-75.<br />

[13] R. Bakker, J. C. Schouten, and C. L. Giles et al., “Learn<strong>in</strong>g<br />

chaotic attractorsby neural networks”, Neural Computer,<br />

12, pp.2355-2383, 2000.”,<br />

[14] H. Leung, T. Lo, and S. Wang, “Prediction of noisy<br />

chaotic time series us<strong>in</strong>g an optimal radial basis function<br />

neural network”, IEEE Trans. Neural Networks, 12,<br />

pp.1163-1172, 2001.<br />

[15] Zhang Yun, Zhou Quan, Sun Caix<strong>in</strong>, Lei Shaolan, Liu<br />

Yum<strong>in</strong>g, Song Yang, “RBF Neural Network and ANFIS-<br />

Based Short-Term Load Forecast<strong>in</strong>g Approach <strong>in</strong> Real-<br />

Time Price Environment”, Power Systems, 23 (3), pp.853-<br />

858, 2008.<br />

[16] Zidong Wang, Yurong Liu, Xiaohui Liu, “State estimation<br />

for jump<strong>in</strong>g recurrent neural networks with discrete and<br />

distributed delays”, Neural Networks, 22 (1), pp.41-48,<br />

2009.<br />

[17] Talebi, H.A., Khorasani, K., Tafazoli, S., “A Recurrent<br />

Neural-Network-Based Sensor and Actuator Fault<br />

Detection and Isolation for Nonl<strong>in</strong>ear Systems With<br />

Application to the Satellite's Attitude Control Subsystem”,<br />

Neural Networks, 2009, 20 (1), pp.45-60.<br />

[18] M<strong>in</strong> Han, Jianhui Xi, Shiguo Xu, and Fuliang Y<strong>in</strong>,<br />

“Prediction of time series based on the recurrent predictor<br />

neural network”, IEEE Transactions on signal process<strong>in</strong>g,<br />

vol.52.no.12.december 2004.<br />

[19] Sirapart Chiewchanwattana, Chidchanok Lurs<strong>in</strong>sap, Chee-<br />

Hung Chu, “Time-series datd prediction based on<br />

reconstruction of miss<strong>in</strong>g samples and selective<br />

ensembl<strong>in</strong>g of FIR neural networks”, Proceed<strong>in</strong>g of the 9th<br />

<strong>in</strong>ternational conference on neural <strong>in</strong>formation<br />

process<strong>in</strong>g.vol.5, 2002.<br />

[20] Dhruba C.Panda, Shyam S.Pattnaik, Rab<strong>in</strong>dra K.Mishra,<br />

“Application of FIR-neural network on f<strong>in</strong>ite difference<br />

time doma<strong>in</strong> technique to calculate <strong>in</strong>put impedance of<br />

microstrip patch antenna”, International Journal of RF and<br />

Microwave Computer-Aided Eng<strong>in</strong>eer<strong>in</strong>g, Vol. 20, pp.158-<br />

162, 2010.<br />

[21] Wu Jian-Da, Hsu Chuang-Ch<strong>in</strong>, Wu Guozhen, “Fault gear<br />

identification and classification us<strong>in</strong>g discrete wavelet<br />

transform and adaptive neuro-fuzzy <strong>in</strong>ference”, Expert<br />

Systems with Applications, vol. 36, pp. 6244-6255, 2009.<br />

[22] Lee Jong Jae, Kim Dookie, Chang Seong Kyu, “An<br />

improved application technique of the adaptive<br />

probabilistic neural network for predict<strong>in</strong>g concrete<br />

strength, “Computational Materials Science, vol. 44, pp.<br />

988-998, 2009.<br />

[23] Hu xiao-jian, wang wei, sheng hui, “Urban Traffic Flow<br />

Prediction with Variable Cell Transmission Model”,<br />

Journal of Transportation Systems Eng<strong>in</strong>eer<strong>in</strong>g and<br />

Information Technology, vol. 4, pp.17-22, 2010.<br />

Lisheng Y<strong>in</strong> (yls20000@163.com) received his doctor’s degree<br />

<strong>in</strong> Control Theory and Control Eng<strong>in</strong>eer<strong>in</strong>g from School of<br />

Automation, Chongq<strong>in</strong>g University, Chongq<strong>in</strong>g Ch<strong>in</strong>a. He is an<br />

associate professor <strong>in</strong> the School of Electrical and Automation<br />

Eng<strong>in</strong>eer<strong>in</strong>g, Hefei University of Technology.He conducts<br />

research <strong>in</strong> Modern <strong>in</strong>telligent algorithm, Chaos Theory, Neural<br />

network theory and Fuzzy Theory.<br />

Yigang He (hyghnu@yahoo.com.cn) received his doctor’s<br />

degree <strong>in</strong> Electrical Eng<strong>in</strong>eer<strong>in</strong>g from Electrical Eng<strong>in</strong>eer<strong>in</strong>g,<br />

Xi'an Jiaotong University, Xian Ch<strong>in</strong>a. He is a professor <strong>in</strong> the<br />

School of Electrical and Automation Eng<strong>in</strong>eer<strong>in</strong>g, Hefei<br />

University of Technology. He conducts research <strong>in</strong> Electrical<br />

science and eng<strong>in</strong>eer<strong>in</strong>g, automatic test and diagnostic<br />

equipment, High-speed low-voltage low-power <strong>in</strong>tegrated<br />

circuits, systems, <strong>in</strong>telligent and real-time <strong>in</strong>formation<br />

process<strong>in</strong>g, Smart grid, electrical measurement techniques and<br />

Circuit theory of massive proportions and Mixed-signal system<br />

test<strong>in</strong>g and diagnosis<br />

Xuep<strong>in</strong>g Dong (hfdxp@126.com) received his doctor’s degree<br />

<strong>in</strong> Control Theory and Control Eng<strong>in</strong>eer<strong>in</strong>g from School of<br />

Automation, Nanj<strong>in</strong>g University Of Science and Technology,<br />

Nangj<strong>in</strong>g Ch<strong>in</strong>a. He is an associate professor <strong>in</strong> the School of<br />

Electrical and Automation Eng<strong>in</strong>eer<strong>in</strong>g, Hefei University of<br />

Technology.He conducts research <strong>in</strong> Model<strong>in</strong>g and control of<br />

complex systems, Modern control theory and its application.<br />

Zhaoquan Lu (luzhquan@126.com) received his doctor’s<br />

degree from University of Science and Technology of Ch<strong>in</strong>a,<br />

Hefei Ch<strong>in</strong>a. He is a professor <strong>in</strong> the School of Electrical and<br />

Automation Eng<strong>in</strong>eer<strong>in</strong>g, Hefei University of Technology.He<br />

conducts research <strong>in</strong> Large time delay uncerta<strong>in</strong> process and<br />

control, complex systems and controls, <strong>in</strong>telligent control,<br />

wireless communication network and automation systems,<br />

automotive electronics technology research and development,<br />

energy-sav<strong>in</strong>g control system research and development.<br />

© 2013 ACADEMY PUBLISHER


1456 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Intrusion Detection Based on Improved SOM<br />

with Optimized GA<br />

ZHAO Jian-Hua 1, 2<br />

1 College of computer, Northwestern Polytechnical University, Xi’an 710072, Ch<strong>in</strong>a<br />

2 Department of Computer Science, ShangLuo University, ShangLuo 726000, Ch<strong>in</strong>a<br />

E-mail: zhaojh2009@yahoo.com.cn<br />

LI Wei-Hua<br />

College of computer, Northwestern Polytechnical University, Xi’an 710072, Ch<strong>in</strong>a<br />

Abstract—In order to improve the effectiveness of<br />

supervised self-organiz<strong>in</strong>g map (SSOM) neural network, a<br />

k<strong>in</strong>d of genetic algorithm is designed to optimize it. To<br />

improve its classification rate, a real number encod<strong>in</strong>g<br />

genetic algorithm is provided and used to optimize the<br />

learn<strong>in</strong>g rate and neighbor radius of SSOM. To speed up<br />

the model<strong>in</strong>g speed, a b<strong>in</strong>ary encod<strong>in</strong>g genetic algorithm is<br />

provided to optimize <strong>in</strong>put variables of SSOM and reduce<br />

its dimension of <strong>in</strong>put sample. F<strong>in</strong>ally, <strong>in</strong>trusion detection<br />

data set KDD Cup 1999 is used to carry out experiment<br />

based on the proposed model. The results show that the<br />

optimized model has shorter model<strong>in</strong>g time and higher<br />

<strong>in</strong>trusion detection rate.<br />

Index Terms—SOM, <strong>in</strong>trusion detection, classification,<br />

dimension reduction, genetic algorithm<br />

I. INTRODUCTION<br />

Nowadays, network communications become more<br />

and more important to the <strong>in</strong>formation society [1, 2].<br />

Bus<strong>in</strong>ess, e-commerce, onl<strong>in</strong>e shopp<strong>in</strong>g, Internet bank<br />

and other network transactions require more secured<br />

networks. As these operations <strong>in</strong>creases, computer crimes<br />

and attacks become more frequents and dangerous,<br />

compromis<strong>in</strong>g the security and the trust of a computer<br />

system and caus<strong>in</strong>g costly f<strong>in</strong>ancial losses [3, 4].<br />

While a number of effective techniques exist for the<br />

prevention of attacks, it has been approved over and over<br />

aga<strong>in</strong> that attacks and <strong>in</strong>trusions will persist and always<br />

be there [5, 6]. Although <strong>in</strong>trusion prevention is still<br />

important, another aspect of network security, <strong>in</strong>trusion<br />

detection, is just as important [7, 8]. With trenchant<br />

<strong>in</strong>trusion detection techniques, network systems can<br />

make themselves less vulnerable by detect<strong>in</strong>g the attacks<br />

and <strong>in</strong>trusions effectively so the damages can be<br />

m<strong>in</strong>imized while keep<strong>in</strong>g normal network activities<br />

unaffected [2, 9, 10].<br />

The <strong>in</strong>trusion detection system (IDS) is used to detect<br />

<strong>in</strong>trusion action. Collect<strong>in</strong>g and analyz<strong>in</strong>g the <strong>in</strong>formation<br />

This work was sponsored by Scientific Research Program Funded by<br />

Shaanxi Prov<strong>in</strong>cial Education Department (No.12JK0748) and National<br />

m<strong>in</strong>istries foundation <strong>in</strong> Ch<strong>in</strong>a.<br />

of a network or system [11, 12], IDS can f<strong>in</strong>d the actions<br />

of violat<strong>in</strong>g security policy and detect the traces of be<strong>in</strong>g<br />

attacked from the network or system. Accord<strong>in</strong>g to the<br />

network <strong>in</strong>formation, it classifies the network behavior<br />

normal behavior or abnormal behavior [13, 14].<br />

The neural network has the function of pattern<br />

recognition, it may be used <strong>in</strong> the field of the<br />

classification of <strong>in</strong>trusion detection and get very good<br />

results [15, 16]. At the same time, neural network has<br />

self-learn<strong>in</strong>g and adaptive capacity. As long as the system<br />

audit data and the network data packet are provided,<br />

neural network can extract normal user or system feature<br />

model from it and detect the attack mode from the<br />

abnormal activity [25].<br />

The self-organiz<strong>in</strong>g map (SOM) neural network<br />

constitutes an excellent tool for knowledge discovery <strong>in</strong> a<br />

data base, extraction of relevant <strong>in</strong>formation, detection of<br />

<strong>in</strong>herent structures <strong>in</strong> high-dimensional data and mapp<strong>in</strong>g<br />

these data <strong>in</strong>to a two-dimensional representation space. It<br />

has been applied successfully <strong>in</strong> multiple areas. Many<br />

researcher has apply it <strong>in</strong> the field of <strong>in</strong>trusion detection<br />

and got the good test result.<br />

However, the network architecture of SOM has to be<br />

established <strong>in</strong> advance and it requires knowledge about<br />

the problem doma<strong>in</strong>. Moreover, the hierarchical relations<br />

among <strong>in</strong>put data are difficult to represent and it is an<br />

unsupervised network and not easy to determ<strong>in</strong>e the<br />

classification type. Some researcher has improved SOM<br />

and they improved unsupervised SOM to supervised<br />

SOM (name SSOM) and obta<strong>in</strong> good results. However,<br />

there are still some problem exit<strong>in</strong>g for SOM and SSOM.<br />

For example, it is difficult to determ<strong>in</strong>e the parameters of<br />

SOM and SSOM [17, 18].<br />

In light of the disadvantage of SOM and SSOM, this<br />

paper uses genetic algorithm to optimize their parameters<br />

(<strong>in</strong>clud<strong>in</strong>g learn<strong>in</strong>g rate and neighborhood radius). New<br />

neural network model (GA-SOM and New-GA-SSOM)<br />

are proposed and applied <strong>in</strong> the field of <strong>in</strong>trusion<br />

detection.<br />

The rest of the paper is organized as follows: In<br />

Section II we describe the basic def<strong>in</strong>itions and<br />

characteristics of SOM neural network, SSOM neural<br />

network and genetic algorithm. Section III designs a<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1456-1463


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1457<br />

genetic algorithm based on real number encod<strong>in</strong>g, which<br />

is to optimize the learn<strong>in</strong>g rate and neighbor radius of<br />

SSOM and solve the random <strong>in</strong>itialization problem of<br />

learn<strong>in</strong>g rate and neighbor radius. Section IV designs a<br />

genetic algorithm based on b<strong>in</strong>ary encod<strong>in</strong>g to optimize<br />

the <strong>in</strong>put variables and reduce the dimension for SSOM.<br />

In Section V, <strong>in</strong>trusion detection experiment is carried<br />

out based on KDD Cup 1999 data sets to verify the<br />

effectiveness of the provided model.<br />

II. PROPOSED SCHEME<br />

A. SOM Neural Network<br />

Self-organiz<strong>in</strong>g feature map network (SOM) is also<br />

known as Kohonen network, which is proposed by<br />

Holland scholar Teuvo Kohonen <strong>in</strong> 1981. The network is<br />

a no-teachers, self-organization and self-learn<strong>in</strong>g network<br />

consist<strong>in</strong>g of fully connected neurons array.<br />

Adjust the weights of the w<strong>in</strong>n<strong>in</strong>g neuron and its<br />

adjacent neurons, so that the weights can reflect the<br />

relationship between the <strong>in</strong>put samples. Through the<br />

repeated tra<strong>in</strong><strong>in</strong>g and learn<strong>in</strong>g, the neurons are divided<br />

<strong>in</strong>to different regions which have different response<br />

characteristics to <strong>in</strong>put model and implement the<br />

cluster<strong>in</strong>g of <strong>in</strong>put model. And it can realize the<br />

classification of the <strong>in</strong>put samples and can be applied <strong>in</strong><br />

various areas of the classification.<br />

The steps of SOM neural network algorithm are as<br />

follow:<br />

(1) Initialization. Initialize the weights and the<br />

neighbor radius etc.<br />

(2) Distance calculation. Distance can reflect the<br />

similarity degree and closeness degree between samples.<br />

We calculate the distance d between <strong>in</strong>put vector<br />

x<br />

i<br />

= ( x 1<br />

, x 2<br />

,..., xn<br />

) and competitive layer neuron j , which<br />

is shown <strong>in</strong> equation (1).<br />

j<br />

m<br />

2<br />

j<br />

= (<br />

i<br />

− ωij) = 1,2...<br />

i=<br />

1<br />

d ∑ x j n (1)<br />

Figure 1.<br />

The structure diagram of SOM<br />

SOM is an artificial neural network model and it is<br />

proved to be exceptionally successful for data<br />

visualization applications mapp<strong>in</strong>g from a usually very<br />

high-dimensional data space <strong>in</strong>to a two-dimensional<br />

representation space. The remarkable benefit of SOM is<br />

that the similarity between the <strong>in</strong>put data as measured <strong>in</strong><br />

the <strong>in</strong>put data space is preserved as faithfully as possible<br />

with<strong>in</strong> the representation space. Thus, the similarity of<br />

the <strong>in</strong>put data is mirrored to a very large extends <strong>in</strong> terms<br />

of geographical vic<strong>in</strong>ity with<strong>in</strong> the representation space<br />

[19, 20].<br />

The structure of SOM neural network is shown <strong>in</strong><br />

Figure 1, <strong>in</strong>clud<strong>in</strong>g two layers feed forward neural<br />

network structure which is an <strong>in</strong>put layer and a<br />

competitive layer. The first layer is the <strong>in</strong>put layer and its<br />

dimension is equal with the <strong>in</strong>put vector dimension which<br />

is set to m. The second layer is a competitive layer and it<br />

generally shows a two-dimensional array distribution. A<br />

competitive layer node represents a neuron and the<br />

number of competitive layer node is set to n. The<br />

association between <strong>in</strong>put layer and competitive layer is<br />

<strong>in</strong> the form of a full connection; its weight is <strong>in</strong>dicated<br />

byω .<br />

ij<br />

The basic work<strong>in</strong>g pr<strong>in</strong>ciple of SOM neural network is<br />

as follow: dur<strong>in</strong>g the network tra<strong>in</strong> and learn<strong>in</strong>g the<br />

neurons on competitive layer get the response to the <strong>in</strong>put<br />

model by compet<strong>in</strong>g with each other, the neuron hav<strong>in</strong>g<br />

the m<strong>in</strong>imum distance from <strong>in</strong>put sample becomes the<br />

w<strong>in</strong>n<strong>in</strong>g neuron.<br />

(3) The w<strong>in</strong>n<strong>in</strong>g neuron selection on competitive<br />

layer.<br />

F<strong>in</strong>d out neuron c with the m<strong>in</strong>imal distance from the<br />

w<strong>in</strong>n<strong>in</strong>g neuron and calculate the neighborhood N c (t) of<br />

c <strong>in</strong> accordance with equation (2).<br />

N() t = ( t f<strong>in</strong>d( norm( pos , pos ) < r) t = 1,2,.., n (2)<br />

c t c<br />

where posc<br />

represents the position of neuron c<br />

and post<br />

represents the position of neuron t; norm<br />

represents the calculation of Euclidean distance between<br />

two neurons; r represents the neighborhood radius.<br />

(4) Weight adjustment. Adjust the neuron weights of<br />

neuron c and others <strong>in</strong> its neighborhood N c (t) accord<strong>in</strong>g<br />

to equation (3).<br />

ω = ω + η( x − ω )<br />

(3)<br />

ij ij i ij<br />

where ω represents the weight between <strong>in</strong>put layer and<br />

competitive layer, η represents learn<strong>in</strong>g rate, η<br />

decreases with the <strong>in</strong>crease of evolution number<br />

(5) Judge whether the algorithm ends. If not end,<br />

return to (2).<br />

B. SSOM Neural Network<br />

SOM is an unsupervised neural network and it can<br />

effectively classify unlabeled data. However It cannot<br />

determ<strong>in</strong>e the classification types of labeled data more<br />

effectively <strong>in</strong> the help of data labels.. To facilitate the<br />

process<strong>in</strong>g of classification problem and quickly get the<br />

classification type, some researchers improve the<br />

unsupervised SOM to supervised SOM which is named<br />

SSOM.<br />

As shown <strong>in</strong> Figure 2, there are three-layer structures<br />

<strong>in</strong> SSOM <strong>in</strong>stead of two layer structure <strong>in</strong> SOM. They are<br />

<strong>in</strong>put layer, competitive layer and output layer. In this<br />

network, the number of output layer is equal with data<br />

classification category. Each output node represents a<br />

© 2013 ACADEMY PUBLISHER


1458 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

data category, and connection between the output layer<br />

node and the competitive layer node is also full<br />

connection way.<br />

Accord<strong>in</strong>g to different prediction category of <strong>in</strong>put<br />

samples, SSOM selects different weight adjustment<br />

formula to adjust weights and tra<strong>in</strong> network. SSOM not<br />

only adjusts the weight ω ij<br />

between <strong>in</strong>put layer and<br />

competitive layer, but also adjust the weight ω<br />

jk<br />

between<br />

competitive layer and output layer. F<strong>in</strong>ally, the<br />

classification results are generated by the comb<strong>in</strong>ation of<br />

the two weights<br />

Figure 2.<br />

The structure diagram of SSOM<br />

The learn<strong>in</strong>g and tra<strong>in</strong> step of SSOM is as follow:<br />

(1) Initialization. Initialize the weight ω ij<br />

between<br />

<strong>in</strong>put layer and competitive layer, the weight<br />

ω<br />

jk<br />

between competitive layer and output layer, and the<br />

neighbor radius r etc.<br />

(2) The w<strong>in</strong>n<strong>in</strong>g neuron selection on competitive layer.<br />

Compute the distance between <strong>in</strong>put sample x i<br />

and<br />

competitive layer neural j to get the neuron c with the<br />

m<strong>in</strong>imal distance from the w<strong>in</strong>n<strong>in</strong>g neuron. Assume d is<br />

the m<strong>in</strong>imal distance, use c i<br />

to marker output categories<br />

connected to it.<br />

(3) Weight adjustment. Adjust the neuron weights<br />

ω and ω accord<strong>in</strong>g to the predictive value of <strong>in</strong>put<br />

ij<br />

jk<br />

sample x i<br />

. Here we assume the actual output value of x<br />

i<br />

is c<br />

x<br />

. If c i<br />

= c x<br />

, adjust the weights <strong>in</strong> the neighbor area<br />

of Nc (t) accord<strong>in</strong>g to equation (4) and (5).<br />

ω new old ( old )<br />

ij<br />

= ωij + η1 x − ωij<br />

(4)<br />

ω new old ( old )<br />

jk<br />

= ωjk + η2 x − ωjk<br />

(5)<br />

If ci<br />

≠ c x<br />

, adjust the weights accord<strong>in</strong>g to equations<br />

(6) and (7).<br />

ω new old ( old )<br />

ij<br />

= ωij −η1 x − ωij<br />

(6)<br />

ω new old ( old )<br />

jk<br />

= ωjk −η2 x − ωjk<br />

(7)<br />

i<br />

where η<br />

1<br />

and η2<br />

represent the learn<strong>in</strong>g rate, they<br />

decrease with the evolution number <strong>in</strong>creas<strong>in</strong>g.<br />

(5) Judge whether the algorithm ends. If not end,<br />

return it to step (2).<br />

Dur<strong>in</strong>g the tra<strong>in</strong> process of SSOM neural network, The<br />

<strong>in</strong>itial parameters such as weight ω ij<br />

, ω<br />

jk<br />

, learn<strong>in</strong>g rate<br />

η<br />

1<br />

, η2<br />

and neighbor radius r have much <strong>in</strong>fluence on<br />

test<strong>in</strong>g result. These parameters randomly selected will<br />

have a negative effect on test result. In this paper, we use<br />

genetic algorithm to optimize the parameters ( η<br />

1<br />

, η2<br />

and<br />

neighbor radius r ) of SSOM..<br />

Genetic algorithm (GA) is a k<strong>in</strong>d of parallel search<br />

optimization method, which simulates the natural genetic<br />

mechanisms of biological evolution and Darw<strong>in</strong>ian<br />

natural selection. Genetic algorithm simulates the<br />

phenomenon of duplication, crossover and mutation that<br />

occur <strong>in</strong> natural selection and genetic replication.<br />

Start<strong>in</strong>g at a group which is a potential solution set of<br />

problem, it performs selection, crossover and mutation<br />

operation to generate a group of <strong>in</strong>dividuals better<br />

adapted to the environment. Then, group evolves <strong>in</strong>to<br />

better and better areas <strong>in</strong> the search space and cont<strong>in</strong>ues<br />

to evolve through the generations. Eventually they<br />

converge to a group of <strong>in</strong>dividuals best adapted to the<br />

environment and obta<strong>in</strong> the optimal solution.<br />

In recent years, genetic algorithm has been<br />

successfully used <strong>in</strong> the fields of economic management,<br />

traffic transportation, and <strong>in</strong>dustrial design and resolved<br />

many technical problems successfully. For example,<br />

reliability optimization, flow shop schedul<strong>in</strong>g, job shop<br />

schedul<strong>in</strong>g, mach<strong>in</strong>e schedul<strong>in</strong>g, equipment layout design,<br />

image process<strong>in</strong>g and data m<strong>in</strong><strong>in</strong>g etc.<br />

The basic operation of optimization us<strong>in</strong>g genetic<br />

algorithm <strong>in</strong>cludes population <strong>in</strong>itialization, fitness<br />

function calculation, selection, crossover and mutation<br />

operation.<br />

III. OPTIMIZATION OF WEIGHTS AND THRESHOLDS<br />

After tra<strong>in</strong> and learn<strong>in</strong>g SSOM network can quickly<br />

and easily achieves the classification of test<strong>in</strong>g data. It<br />

can be used <strong>in</strong> a variety of classification field for labeled<br />

data such as text classification, <strong>in</strong>trusion detection, fault<br />

detection, etc. However dur<strong>in</strong>g the tra<strong>in</strong> and learn<strong>in</strong>g<br />

process of SSOM neural network, the <strong>in</strong>itialization of<br />

three parameters (learn<strong>in</strong>g rate η 1<br />

andη 2<br />

, neighborhood<br />

radius r ) have much <strong>in</strong>fluence on the experiment result.<br />

If the choice of these parameters is not very good or not<br />

very correct, it will have much negative effect on the test<br />

results and lead to lower correct classification rate.<br />

The real number encod<strong>in</strong>g method is an important<br />

encod<strong>in</strong>g method of genetic algorithm, <strong>in</strong> which each<br />

<strong>in</strong>dividual gene value is real number. The real number<br />

encod<strong>in</strong>g method has follow<strong>in</strong>g advantages:<br />

• Suitable for the scope of the larger number.<br />

• Easy to expand the space of the genetic search.<br />

• It can improve the accuracy requirements of the<br />

genetic algorithm.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1459<br />

• It can improve the computational complexity and<br />

efficiency of operations.<br />

• Easy to use together with other classical optimization<br />

method.<br />

Here, we design a real encod<strong>in</strong>g genetic algorithm to<br />

optimize the parameters η 1<br />

, η<br />

2<br />

and r of SSOM to<br />

obta<strong>in</strong> the optimal parameters. Us<strong>in</strong>g these optimal<br />

parameters we create a new SSOM network model named<br />

GA-SSOM and perform <strong>in</strong>trusion classification based on<br />

KDD Cup 1999 data set.<br />

To complete the optimization us<strong>in</strong>g GA, we firstly<br />

should <strong>in</strong>itialize the <strong>in</strong>dividual population composed of<br />

parameters η<br />

1<br />

, η<br />

2<br />

and r <strong>in</strong> real cod<strong>in</strong>g, then design a<br />

proper fitness function to perform selection operation,<br />

crossover operation and mutation operation. After many<br />

times repeated iteration, the optimal <strong>in</strong>dividual <strong>in</strong>clud<strong>in</strong>g<br />

the optimal parameters is obta<strong>in</strong>ed. It is what we needed<br />

to create the GA-SSOM model.<br />

The implementation step is shown <strong>in</strong> Figure 3 and the<br />

detailed process is as follows:<br />

Figure 3. The optimization of parameter<br />

(1) Data normalization<br />

Data normalization is a data preprocess<strong>in</strong>g procedure<br />

before tra<strong>in</strong><strong>in</strong>g network; it is accomplished by data<br />

normalized function. Data normalization function is used<br />

to cancel the orders of magnitude difference between the<br />

dimensions of data and avoid large prediction error<br />

caused by differences <strong>in</strong> <strong>in</strong>put and output. In this paper,<br />

the <strong>in</strong>put feature value is normalized to [0, 1] by data<br />

normalization function <strong>in</strong> equation (8).<br />

x = ( x −x )/( x − x ) (8)<br />

k k m<strong>in</strong> max m<strong>in</strong><br />

where x k represents the data sequence, x m<strong>in</strong> and x max<br />

represents the m<strong>in</strong>imum value and maximum value <strong>in</strong><br />

data sequence.<br />

(2) The <strong>in</strong>itialization of population<br />

A population is formed by N <strong>in</strong>dividuals generated<br />

randomly and genetic algorithm starts the iteration from<br />

this population as the <strong>in</strong>itial po<strong>in</strong>t.<br />

In this part, <strong>in</strong>dividual cod<strong>in</strong>g adopts real cod<strong>in</strong>g and<br />

each <strong>in</strong>dividual is a real number series, which consists of<br />

3 components: learn<strong>in</strong>g rate η 1<br />

, learn<strong>in</strong>g rate η 2<br />

and<br />

neighborhood radius r . And N is set to 20 <strong>in</strong> our work.<br />

(3) Fitness function calculation<br />

Fitness value is to measure the excellent degree that<br />

each <strong>in</strong>dividual approach or reach <strong>in</strong> optimization<br />

calculation. The higher fitness value the <strong>in</strong>dividual has,<br />

the larger probability it is genetic to next generation than<br />

others. Fitness value is usually calculated through a<br />

fitness function.<br />

Here, we choose the reciprocal of the square of the<br />

absolute error between forecast output and the desired<br />

output data as the fitness function to judge the quality<br />

level of <strong>in</strong>dividual. The <strong>in</strong>dividual with greater fitness<br />

value will have more opportunity to be selected and<br />

<strong>in</strong>herited to the next generation. The fitness function is<br />

shown <strong>in</strong> equation (9).<br />

F =<br />

1<br />

m<br />

2<br />

∑(ci-c x)<br />

i=<br />

1<br />

Where F represents the fitness value, c i represents the<br />

forecast output and c x represent the desired output of the<br />

first i node, m is the number of output node.<br />

(4) Selection operation<br />

The task of select operation is to select body from the<br />

parent group to <strong>in</strong>herit to the next group. The genetic<br />

algorithm uses selection operator (or copy operation) to<br />

achieve the group <strong>in</strong>dividual survival of the fittest<br />

operation. The probability that high fitness <strong>in</strong>dividual is<br />

<strong>in</strong>herited to the next generation of group is great, and the<br />

probability that small fitness <strong>in</strong>dividual is <strong>in</strong>herited to the<br />

next generation of group is small.<br />

Dur<strong>in</strong>g the process of selection operation, proportional<br />

selection method is used. The basic idea of proportional<br />

selection method is as follow: the probability that<br />

<strong>in</strong>dividuals are selected is proportional to the size of its<br />

fitness.<br />

The selection probability p i which represents the first i<br />

<strong>in</strong>dividual is shown <strong>in</strong> equation (10).<br />

p<br />

i<br />

=<br />

N<br />

F<br />

∑<br />

j = 1<br />

i<br />

F<br />

j<br />

(9)<br />

(10)<br />

where Fi is fitness value of the first i <strong>in</strong>dividual, N is the<br />

population size.<br />

(5) The crossover operation<br />

The crossover operation is a process <strong>in</strong> which the two<br />

paired chromosomes exchange some of its genes <strong>in</strong> a<br />

certa<strong>in</strong> way to form two new <strong>in</strong>dividuals. The crossover<br />

operation is an important feature that the genetic<br />

algorithm is different from other evolutionary algorithms.<br />

It plays a key role <strong>in</strong> the genetic algorithm and is the<br />

ma<strong>in</strong> method to generate new <strong>in</strong>dividual.<br />

© 2013 ACADEMY PUBLISHER


1460 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Because we use real number encod<strong>in</strong>g GA, the<br />

crossover operation uses arithmetic crossover which is a<br />

l<strong>in</strong>ear comb<strong>in</strong>ation of the two <strong>in</strong>dividuals to produce a<br />

new <strong>in</strong>dividual. The process is shown <strong>in</strong> equation (11).<br />

In this equation, it shows that the first k chromosome<br />

named a k performs crossover operation with the first l<br />

chromosome named a l , and the crossover bit is at first j<br />

bit. After crossover operation, a new pair of <strong>in</strong>dividual<br />

with good genes is generated.<br />

In this part we use b<strong>in</strong>ary encod<strong>in</strong>g genetic algorithm<br />

to optimize <strong>in</strong>put variable and reduce its dimensionality.<br />

To complete it, first encode the <strong>in</strong>dividual components,<br />

<strong>in</strong>itialize the number of populations and the evolution,<br />

and design the fitness function. Then perform selection<br />

operation, crossover operation and mutation operation to<br />

generate the best <strong>in</strong>dividual which is the optimal<br />

comb<strong>in</strong>ation of <strong>in</strong>dependent variables. The workflow is<br />

shown <strong>in</strong> Figure 4, each part functions as follows:<br />

⎧⎪ akj = akjb+ alj<br />

(1 −b)<br />

⎨<br />

⎪⎩ alj = aljb+ akj<br />

(1 −b)<br />

(11)<br />

where b represents a random number between 0 and 1.<br />

(6) Mutation operation<br />

The so-called mutation operation is a process <strong>in</strong> which<br />

the value of certa<strong>in</strong> genes <strong>in</strong> the <strong>in</strong>dividual encoded str<strong>in</strong>g<br />

is replaced by other genetic value to form a new<br />

<strong>in</strong>dividual. The mutation operation is a helper method to<br />

generate new <strong>in</strong>dividual, but it is essential to a comput<strong>in</strong>g<br />

step. Mutation operation determ<strong>in</strong>es the local search<br />

ability of genetic algorithms.<br />

Equation (12) shows the process of mutation operation<br />

<strong>in</strong> this part. Select a ij , which is the first j gene of the first i<br />

<strong>in</strong>dividual to perform mutation operation. The mutation<br />

operation is as follows:<br />

a<br />

ij<br />

⎧⎪ aij<br />

+ ( aij<br />

− amax<br />

) × r r > 0.5<br />

= ⎨<br />

⎪⎩ aij<br />

+ ( am<strong>in</strong><br />

− aij<br />

) × r r < 0.5<br />

(12)<br />

where a max is the upper bound of a ij , a m<strong>in</strong> is the lower<br />

bound of a ij , r is the random value between 0 and 1.<br />

Through the above steps, we get the optimal<br />

chromosome which is composed of the optimal learn<strong>in</strong>g<br />

rate η<br />

1<br />

and η<br />

2<br />

, the optimal neighborhood radius r . Use<br />

these optimal variables to create SSOM neural network<br />

model named GA-BP. Then we use this model to carry<br />

out <strong>in</strong>trusion detection experiment based on KDD Cup<br />

1999 data set.<br />

IV. OPTIMIZATION OF INPUT VARIABLE FOR<br />

DIMENSIONALITY REDUCTION<br />

Us<strong>in</strong>g SSOM neural network to establish the model,<br />

the excessive <strong>in</strong>put variable is easy to over fitt<strong>in</strong>g, which<br />

leads to the low precision, low rates of detection and<br />

excessive time. So it is necessary to optimize the<br />

selection of <strong>in</strong>put variables, remove the redundancy<br />

variables and reta<strong>in</strong> the variables which can most reflect<br />

the relationship between <strong>in</strong>put and output variables <strong>in</strong> the<br />

model [21].<br />

B<strong>in</strong>ary encod<strong>in</strong>g is one of the most commonly cod<strong>in</strong>g<br />

of genetic algorithm. It has the follow<strong>in</strong>g advantages:<br />

• Encod<strong>in</strong>g, decod<strong>in</strong>g operation is simple.<br />

• The cross and mutation operation is easy to realize.<br />

• Meet<strong>in</strong>g the m<strong>in</strong>imum character set encod<strong>in</strong>g<br />

pr<strong>in</strong>ciple.<br />

• Easy to use schema theorem theoretical to analyze the<br />

algorithm.<br />

Figure 4. The optimization of <strong>in</strong>put variables<br />

(1) Data normalization<br />

Data normalization is a data preprocess<strong>in</strong>g procedure<br />

before the experiment, it is also important for variable<br />

dimension reduction. Here, the <strong>in</strong>put feature value is also<br />

normalized to [0, 1]. Data normalization function also<br />

uses equation (8).<br />

(2) The <strong>in</strong>itialization of population<br />

In this optimization process, the <strong>in</strong>dividual cod<strong>in</strong>g<br />

adopts the b<strong>in</strong>ary cod<strong>in</strong>g mode. As the <strong>in</strong>trusion detection<br />

data has 41 features, the length of cod<strong>in</strong>g is designed to<br />

41 and every <strong>in</strong>dividual is a b<strong>in</strong>ary str<strong>in</strong>g composed of 41<br />

b<strong>in</strong>ary bits. Every chromosome corresponds to an <strong>in</strong>put<br />

feature and every gene can only be 1 and 0. If the value<br />

of a particular chromosome is 1, it means that the <strong>in</strong>put<br />

variable correspond<strong>in</strong>g to this bit takes part <strong>in</strong> the f<strong>in</strong>al<br />

model, otherwise not.<br />

A population is formed by N <strong>in</strong>dividuals generated<br />

randomly and genetic algorithm starts the iteration from<br />

this population as the <strong>in</strong>itial po<strong>in</strong>t.<br />

(3) Fitness function calculation<br />

Here, the reciprocal of the absolute error between<br />

forecast output and the desired output data is chose as the<br />

fitness function and it is shown <strong>in</strong> equation (13).<br />

In the process of calculat<strong>in</strong>g the fitness function, the<br />

learn<strong>in</strong>g rate η 1<br />

and η 2<br />

, neighborhood radius r of<br />

every <strong>in</strong>dividual is optimized by the genetic algorithm <strong>in</strong><br />

Section III, avoid<strong>in</strong>g the impact of its random on fitness<br />

function calculation.<br />

F=<br />

1<br />

m<br />

∑(Ci<br />

-C<br />

x<br />

)<br />

i=1<br />

(13)<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1461<br />

where F represents the fitness function, m is the number<br />

of output node, c i and c x represent respectively forecast<br />

output and the desired output of the first i node.<br />

(4) Selection operation<br />

Dur<strong>in</strong>g this process, we adapt proportion selection<br />

operator and calculate the probability of each <strong>in</strong>dividual's<br />

fitness <strong>in</strong> accordance with the equation (10). The<br />

<strong>in</strong>dividuals with larger probability is selected as the best<br />

<strong>in</strong>dividual to the next generation of genetic population,<br />

the one with smaller probability not.<br />

(5) The crossover operation<br />

Dur<strong>in</strong>g crossover operation, two <strong>in</strong>dividual are selected<br />

randomly from population to generate a new and<br />

outstand<strong>in</strong>g <strong>in</strong>dividual.<br />

As the optimization of this part adopts b<strong>in</strong>ary cod<strong>in</strong>g,<br />

one-po<strong>in</strong>t crossover operator is used dur<strong>in</strong>g the crossover<br />

operation. For a matched pair of <strong>in</strong>dividual, select<br />

randomly the cross-po<strong>in</strong>t and swap the other bit from<br />

cross-po<strong>in</strong>t. The operat<strong>in</strong>g diagram is shown <strong>in</strong> Figure 5.<br />

The b<strong>in</strong>ary str<strong>in</strong>g 1001 <strong>in</strong> <strong>in</strong>dividual A exchanges data<br />

<strong>in</strong>formation with b<strong>in</strong>ary str<strong>in</strong>g 0011 <strong>in</strong> <strong>in</strong>dividual B. After<br />

crossover operation, it generates two new <strong>in</strong>dividual and<br />

<strong>in</strong>creases the diversity of <strong>in</strong>dividual.<br />

Figure 5.<br />

Crossover operation<br />

(6) Mutation operation<br />

Mutation operation can also <strong>in</strong>crease the diversity of<br />

<strong>in</strong>dividual. Here, select a s<strong>in</strong>gle po<strong>in</strong>t mutation operator<br />

and random mutation po<strong>in</strong>t, then 0 and 1 is exchanged.<br />

The pr<strong>in</strong>ciple is shown <strong>in</strong> Figure 6. Two new <strong>in</strong>dividual<br />

generate after this operation.<br />

Figure 6. Mutation operation<br />

(7) The establishment of New-GA-SSOM network<br />

model<br />

After many times evolution, when meet<strong>in</strong>g the<br />

iteration condition, the output of the population is the<br />

optimal solution of the problem. They are the handsome<br />

and the most representative <strong>in</strong>put variable comb<strong>in</strong>ation.<br />

Through the above steps, we get the optimal<br />

chromosome which is composed of the optimal feature.<br />

Extract a set of variables from the best chromosome gene<br />

as the f<strong>in</strong>al <strong>in</strong>put variables to achieve the dimension<br />

reduction of <strong>in</strong>dependent variables. That is the new neural<br />

network model, named New-GA-SSOM. Then we use<br />

this model to tra<strong>in</strong> network, and carry out <strong>in</strong>trusion<br />

detection data based on KDD Cup 1999 data set.<br />

V. EXPERIMENT<br />

KDD Cup 1999 data set is a standard data set for<br />

<strong>in</strong>trusion detection, <strong>in</strong>clud<strong>in</strong>g the tra<strong>in</strong><strong>in</strong>g data set and test<br />

data set. The tra<strong>in</strong><strong>in</strong>g data set <strong>in</strong>cludes 494 021 records<br />

and test<strong>in</strong>g data set <strong>in</strong>cludes 311 029 records. In the<br />

KDD99 data set, each data example represents attribute<br />

values of a class <strong>in</strong> the network data flow, and each class<br />

is labeled either as normal or as an attack with exactly<br />

one specific attack type. There are 22 types of attacks <strong>in</strong><br />

the tra<strong>in</strong><strong>in</strong>g data set and an <strong>in</strong>crease of new 14 k<strong>in</strong>ds of<br />

attacks <strong>in</strong> the test<strong>in</strong>g data set. All the attack types can be<br />

divided <strong>in</strong>to four major categories: Prob<strong>in</strong>g, Denial of<br />

Service (DoS), User-to-Root (U2R) and Remote-to-Local<br />

(R2L). Each complete TCP (transmission control<br />

protocol) connection is considered as a record, <strong>in</strong>clud<strong>in</strong>g<br />

four types of attributes collection: time-based traffic<br />

features, host-based traffic features, content features and<br />

basic features [22, 23, 24].<br />

Our experiment is based on the KDD Cup 1999<br />

<strong>in</strong>trusion detection data set. Tra<strong>in</strong><strong>in</strong>g data set is composed<br />

of 3 000 data of normal type and 3 000 data of attack type,<br />

selected randomly from KDD Cup99 of "10% KDD"<br />

dataset. Test<strong>in</strong>g data set is composed of 2 000 data of<br />

normal type and 2 000 data of attack type, selected<br />

randomly from KDD Cup99 of the "Corrected KDD"<br />

dataset. The selected data set is shown <strong>in</strong> Table I.<br />

Each data has 41 different attributes (32 cont<strong>in</strong>uous<br />

attributes and 9 discrete attributes) used as SSOM <strong>in</strong>put<br />

value and 1 attack type label used as output value of<br />

SSOM. Some of them are the numerical types, and some<br />

are character types, but SSOM can only deal with<br />

numerical data. Therefore, before tra<strong>in</strong><strong>in</strong>g we must make<br />

the <strong>in</strong>put data numerical and normalized. This study used<br />

simple substitution symbols with numerical data types.<br />

The protocol-type, service and flag are replaced by digital<br />

attributes. For example, three k<strong>in</strong>ds of protocol-type (tcp,<br />

udp and icmp) will be expressed with 1, 2, 3. Also, 70<br />

k<strong>in</strong>ds of services are substituted with 1, 2… 70. The<br />

attack types are also numbered with 1, 2, 3 and so on.<br />

Experimental platform is the PC with Intel Core2 Duo<br />

CPU 2.0GHz, memory 2.0GB, W<strong>in</strong>dows XP operat<strong>in</strong>g<br />

system and MATLAB 7.8.0 (R2009.0a) programm<strong>in</strong>g<br />

environment.<br />

Based on the experiment data <strong>in</strong> Table I, tra<strong>in</strong><strong>in</strong>g and<br />

test are carried out respectively us<strong>in</strong>g SSOM (its<br />

parameters are selected randomly), GA-SSOM and New-<br />

GA-SSOM neural network. Accord<strong>in</strong>g to the different<br />

classification number of attack type, experiment is carried<br />

out as follow<strong>in</strong>g two cases.<br />

TABLE I.<br />

TRAINING SET AND TEST SETS<br />

Attack class Attack type Tra<strong>in</strong><strong>in</strong>g set Test set<br />

Normal normal 6000 3000<br />

back 700 400<br />

DOS<br />

neptune 2700 1200<br />

smurf 1600 800<br />

R2L guess_passwd 53 40<br />

U2R buffer_overflow 30 22<br />

ipsweep 350 180<br />

Probe portsweep 350 200<br />

satan 217 158<br />

© 2013 ACADEMY PUBLISHER


1462 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

TABLE II.<br />

DETECTION RATE AND MODEL TIME (TWO CLASSIFICATION)<br />

Type<br />

Detection rate (%)<br />

Time<br />

Model<br />

normal abnormal<br />

SSOM<br />

93.2 90.2<br />

38.1s<br />

GA-SSOM 98.5 95.3<br />

New-GA-SSOM 13.5s 97.5 95.5<br />

TABLE III.<br />

DETECTION RATE AND MODEL TIME (FIVE CLASSIFICATION)<br />

Model<br />

Model<br />

GA- New-GA-<br />

Type<br />

SSOM<br />

SSOM SSOM<br />

Normal 92.1% 98.4% 96.5%<br />

DOS 89.8% 94.4% 94%<br />

R2L 6.7% 7.7% 7.1%<br />

detection U2R 19.2% 23.4% 22.4%<br />

rate (%) Probe 89.3% 95.1% 96.1%<br />

time (s) 45.4.s 16.5s<br />

Experiment 1: the attack types of selected experiment<br />

data are divided <strong>in</strong>to normal data and attack data, the<br />

normal data is numbered with 1 and the attack data is<br />

numbered with 2. It is a two classification problem and<br />

the experiment result is shown <strong>in</strong> Table II.<br />

Experiment 2: The attack types are classified <strong>in</strong>to<br />

Normal data, DOS, R2L, U2L, Probe. The Normal label<br />

data is numbered with 1, the other four types are<br />

numbered with 2, 3, 4 and 5. It is a multiple classification<br />

problem and the experiment result is shown <strong>in</strong> Table III.<br />

From Table II and Table III, we can know that the<br />

proposed GA-SSOM and New-GA-SSOM have higher<br />

detection than SSOM whose parameters are selected<br />

randomly. Although there is little difference <strong>in</strong> detection<br />

rate between GA-SSOM and New-GA-SSOM, New-GA-<br />

SSOM spends less time than SSOM and GA-SOM <strong>in</strong><br />

model<strong>in</strong>g. So it shows that GA-SSOM has rather higher<br />

<strong>in</strong>trusion detection rate than SSOM, and New-GA-SSOM<br />

has higher <strong>in</strong>trusion detection rate and much shorter<br />

model<strong>in</strong>g time than SSOM.<br />

VI. CONCLUSION<br />

In this paper, we use genetic algorithm to optimize the<br />

SSOM which is an improved and a supervised SOM<br />

neural network. A real encod<strong>in</strong>g genetic algorithm is<br />

applied to optimize the learn<strong>in</strong>g rate η1<br />

and η<br />

2<br />

,<br />

neighborhood radius r of SSOM neural network to<br />

improve detection rate. And a b<strong>in</strong>ary encod<strong>in</strong>g genetic<br />

algorithm is used to reduce the dimension of <strong>in</strong>put<br />

variable of SSOM neural network to improve the<br />

efficiency of model<strong>in</strong>g.<br />

Through optimization, it can quickly and effectively<br />

establish SSOM network model and improve speed of<br />

tra<strong>in</strong><strong>in</strong>g and learn<strong>in</strong>g. Classification experiments based<br />

on KDD Cup 1999 data set was carried out and results<br />

showed that the optimized model has shorter model<strong>in</strong>g<br />

time and higher <strong>in</strong>trusion detection rate.<br />

In the future, we plan to propose a semi-supervised<br />

<strong>in</strong>trusion detection classifier based SOM, and use genetic<br />

algorithm to optimize the <strong>in</strong>put parameters of this semisupervised<br />

classifier.<br />

ACKNOWLEDGMENT<br />

The authors wish to thank the support of ShangLuo<br />

University and Northwestern Polytechnical University.<br />

This work was sponsored by Scientific Research Program<br />

Funded by Shaanxi Prov<strong>in</strong>cial Education Department<br />

(No.12JK0748) and National m<strong>in</strong>istries foundation <strong>in</strong><br />

Ch<strong>in</strong>a.<br />

REFERENCES<br />

[1] E. J. Palomo, E. Domínguez, R. M. Luque and J. Muñoz,<br />

“An Intrusion Detection System Based on Hierarchical<br />

Self-Organization”, Advances <strong>in</strong> Soft Comput<strong>in</strong>g, 2009,<br />

Volume 53, 139-146. [Proceed<strong>in</strong>gs of the International<br />

Workshop on Computational Intelligence <strong>in</strong> Security for<br />

Information Systems CISIS’08].<br />

[2] Q<strong>in</strong>glei Zhang, Gongzhu Hu and Weny<strong>in</strong>g Feng, “Design<br />

and Performance Evaluation of a Mach<strong>in</strong>e Learn<strong>in</strong>g-Based<br />

Method for Intrusion Detection”, Studies <strong>in</strong> Computational<br />

Intelligence, Volume 295, pp.69-83, 2010.<br />

[3] Zhang yirong, Xiao ShunP<strong>in</strong>g, Xian M<strong>in</strong>g, “An overview<br />

of <strong>in</strong>trusion detection techniques based on mach<strong>in</strong>e<br />

learn<strong>in</strong>g”, Computer Eng<strong>in</strong>neer<strong>in</strong>g and Application, vol. 42<br />

(2): 7-10, 2006.<br />

[4] Zhou Honggang, Yang Dechun, “Anomaly detection<br />

approach based on immune algorithm and support vector<br />

mach<strong>in</strong>e”, Computer Application, vol. 26, no. 9, pp. 2145-<br />

2147, 2006.<br />

[5] Jason Shifflet, “A Technique Independent Fusion Model<br />

for Network Intrusion Detection”. Proceed<strong>in</strong>gs of the<br />

Midstates Conference on Undergraduate Research <strong>in</strong><br />

Computer Science and Mathematics, University of<br />

Denison, America, pp. 13-19, 2004.<br />

[6] ZANG Weihua, GUO Rui, “The Application of Neural<br />

Network based on Evolutionary Strategy <strong>in</strong> Network<br />

Security Quantification Analysis”, AISS: Advances <strong>in</strong><br />

Information Sciences and Service Sciences, vol. 4, no. 2,<br />

pp. 151 ~ 159, 2012.<br />

[7] Wei Xiong, "Anomaly-based detection us<strong>in</strong>g synergetic<br />

neural network", JDCTA: International Journal of Digital<br />

Content Technology and its Applications, vol. 6, no. 4, pp.<br />

188-196, 2012.<br />

[8] Patcha, A., & Park, J. M, “Network anomaly detection<br />

with <strong>in</strong>complete audit data”, Computer Networks, vol. 51,<br />

no. 13, pp. 3935–3955, 2007.<br />

[9] SWARUP K S, CORTHIS P B, “ANN approach assesses<br />

system security”, Computer Applications <strong>in</strong> Power, vol.15,<br />

no.3, pp.32-38, 2002.<br />

[10] Xiaomei YI, Peng WU, Dan DAI, Lijuan LIU, Xiong HE,<br />

“Intrusion Detection Us<strong>in</strong>g BP Optimized by PSO”, IJACT:<br />

International Journal of Advancements <strong>in</strong> Comput<strong>in</strong>g<br />

Technology, vol. 4, no. 2, pp. 268 -274, 2012.<br />

[11] Liu Hui, CAO Yonghui, “The Research of mach<strong>in</strong>e<br />

learn<strong>in</strong>g algorithm for <strong>in</strong>trusion detection techniques”,<br />

JDCTA: International Journal of Digital Content<br />

Technology and its Applications, vol. 6, no. 1, pp. 343-347,<br />

2012.<br />

[12] Jie Ma, Zhi Tang Li, B<strong>in</strong>g B<strong>in</strong>g Wang, “Application of<br />

S<strong>in</strong>gular Spectrum Analysis to the Noise Reduction of<br />

Intrusion Detection Alarms”. Journal of Computers, vol. 6,<br />

no. 8, pp. 1715-1722, 2011.<br />

[13] Rauber A., Merkl D., Dittenbach M., “The grow<strong>in</strong>g<br />

hierarchical self-organiz<strong>in</strong>g map: Exploratory analysis of<br />

high-dimensional data”, IEEE Transactions on Neural<br />

Networks, Vol. 13, no. 6, pp.1331-1341, 2002.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1463<br />

[14] E. J. Palomo, E. Domínguez, R. M. Luque and J. Muñoz,<br />

“An Intrusion Detection System Based on Hierarchical<br />

Self-Organization, “ Advances <strong>in</strong> Soft Comput<strong>in</strong>g, vol. 53,<br />

pp. 139-146, 2009.<br />

[15] Jian Wu, Jie Xia, Jian-m<strong>in</strong>g Chen, Zhi-m<strong>in</strong>g Cui, “Mov<strong>in</strong>g<br />

Object Classification Method Based on SOM and K-means.<br />

Journal of Computers”, vol.6, no.8, pp.1654-1661, 2011.<br />

[16] YANG Ya-hui, JIANG Dian-bo, SHEN Q<strong>in</strong>g-ni, XIA M<strong>in</strong>,<br />

“Research on <strong>in</strong>trusion detection based on an improved<br />

GHSOM”, Journal on Communications, vol.32, no. 1, pp.<br />

121-126. 2011<br />

[17] Zhao Jianhua, LI Weihua, Application of Supervised SOM<br />

Neural Network <strong>in</strong> Intrusion Detection, Computer<br />

Eng<strong>in</strong>eer<strong>in</strong>g, vol. 38, no. 12, pp. 1-3, 2012.<br />

[18] MIYOSHI Tsutomu, “Initial Node Exchange and<br />

Convergence of SOM Learn<strong>in</strong>g”, Proceed<strong>in</strong>gs of The 6 th<br />

International Symposium on Advanced Intelligent Systems<br />

(ISIS2005), pp. 316-319, 2005.<br />

[19] Kohonen.T, “Self-organized formation of topologically<br />

correct feature maps”, Biological cybernetics, vol. 43, no.<br />

1, pp. 59-69, 1982.<br />

[20] Chao Shao, Yongqiang Yang, “Distance-Preserv<strong>in</strong>g SOM:<br />

A New Data Visualization Algorithm”, Journal of<br />

Software, vol. 7, no. 1, pp. 196-203, Jan 2012.<br />

[21] SHI F, WANG S C, YU L, “Matlab neural network 30<br />

cases analysis”, Beij<strong>in</strong>g University of Aeronautics and<br />

Astronautics Press, Ch<strong>in</strong>a, 2010.<br />

[22] Mukkamala S, Sung AH, and Abraham A, "Intrusion<br />

dection us<strong>in</strong>g an ensemble of <strong>in</strong>telligent paradigms",<br />

Proceed<strong>in</strong>gs of Journal of Network and Computer<br />

Applications, vol. 2, no. 8, pp. 167-182, 2005.<br />

[23] WANG Hui, ZHANG Guil<strong>in</strong>g, E M<strong>in</strong>gjie, SUN Na, “A<br />

Novel Intrusion Detection Method Based on Improved<br />

SVM by Comb<strong>in</strong><strong>in</strong>g PCA and PSO”, Wuhan University<br />

Journal of Natural Sciences, vol. 16, no. 5, pp. 409-413,<br />

2011.<br />

[24] Jim<strong>in</strong> Li, Wei Zhang, KunLun Li, “A Novel Semisupervised<br />

SVM based on Tri-tra<strong>in</strong><strong>in</strong>g for Intrusion<br />

Detection”, Journal of Computers, vol. 5, no. 4, pp. 638-<br />

645, 2010.<br />

[25] Hettich S, Bay S D.The UCI KDD Archive [EB/OL]. http:<br />

//kdd.ics.uci.edu/ databases/kddcup99.]<br />

Zhao Jianhua was born <strong>in</strong> 1982. He is currently a lecturer and<br />

seek<strong>in</strong>g for his doctor’s degree. His research <strong>in</strong>terests <strong>in</strong>clude<br />

mach<strong>in</strong>e learn<strong>in</strong>g, network security.<br />

Li Weihua was born <strong>in</strong> 1951. He is currently a professor. His<br />

research <strong>in</strong>terests <strong>in</strong>clude network security and <strong>in</strong>telligent<br />

decision.<br />

© 2013 ACADEMY PUBLISHER


1464 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Fault Diagnosis System for NPC Inverter based<br />

on Multi-Layer Pr<strong>in</strong>cipal Component Neural<br />

Network<br />

Danjiang Chen<br />

Shanghai Maritime University, Shanghai, Ch<strong>in</strong>a<br />

Zhejiang Wanli University, N<strong>in</strong>gbo Zhejiang, Ch<strong>in</strong>a<br />

Email: cdj02@163.com<br />

Y<strong>in</strong>zhong Ye and Rong Hua<br />

Shanghai Institute of Technology, Shanghai, Ch<strong>in</strong>a<br />

Email: yzye@sit.edu.cn, huarong@sit.edu.cn<br />

Abstract—This paper presents a fault diagnosis method for<br />

a neutral po<strong>in</strong>t clamped (NPC) <strong>in</strong>verter us<strong>in</strong>g a multi-layer<br />

artificial neural network (MANN). The considered possible<br />

faults of NPC <strong>in</strong>verter <strong>in</strong>clude the open-circuit fault<br />

occurr<strong>in</strong>g <strong>in</strong> one s<strong>in</strong>gle device or more devices. The upper,<br />

middle and down bridge voltages are adopted the test<br />

signals because of the difficulties <strong>in</strong> isolat<strong>in</strong>g some fault<br />

modes. A novel multi-layer neural network is proposed to<br />

diagnose all possible open-circuit faults. Furthermore, the<br />

pr<strong>in</strong>cipal component analysis (PCA) is utilized to reduce the<br />

<strong>in</strong>put size of neural network. The comparison between<br />

neural network with and without PCA is performed. The<br />

simulation and experimental results prove the feasibility of<br />

the diagnostic method and show that the proposed method<br />

has the advantages of good classification performance and<br />

high reliability.<br />

Index Terms—three level <strong>in</strong>verter, fault diagnosis, MANN,<br />

PCA<br />

I. INTRODUCTION<br />

The multilevel <strong>in</strong>verter could achieve more levels,<br />

lower harmonic distortion <strong>in</strong> the voltage output <strong>in</strong><br />

addition to lower<strong>in</strong>g the voltage stress of the power<br />

devices, as compared with the conventional two-level<br />

<strong>in</strong>verters [1-5] . Due to these advantages, NPC <strong>in</strong>verter has<br />

been widely used <strong>in</strong> high-power <strong>in</strong>dustrial applications.<br />

However, the NPC <strong>in</strong>verter system is composed of many<br />

switch<strong>in</strong>g devices which would reduce the reliability of a<br />

multilevel <strong>in</strong>verter, as a break <strong>in</strong> any one of these devices<br />

will <strong>in</strong>evitably make the entire <strong>in</strong>verter fail to work and<br />

produce the economic losses [6]. Therefore the fault<br />

diagnosis methods would be necessary to ensure the<br />

reliability of the multilevel <strong>in</strong>verter.<br />

Some efforts have been made <strong>in</strong> the problem<br />

mentioned above. For example, the voltage output <strong>in</strong><br />

faulty situation could be analyzed <strong>in</strong> real time mode and<br />

compared with the voltage output <strong>in</strong> normal situation <strong>in</strong><br />

order to f<strong>in</strong>d out the faulty device, see [7]-[10].<br />

Furthermore, it has been shown that the diagnostic<br />

performance could be enhanced if the <strong>in</strong>telligent methods<br />

like neural network, support vector mach<strong>in</strong>e etc. are<br />

<strong>in</strong>troduced <strong>in</strong> recogniz<strong>in</strong>g different fault modes, see [11]-<br />

[14], though only simple applications of the neural<br />

network <strong>in</strong> NPC <strong>in</strong>verter have been proposed [15] .<br />

Investigat<strong>in</strong>g the current research works reveals that<br />

only the simplest fault mode, i.e. the open-circuit<br />

occurr<strong>in</strong>g <strong>in</strong> a s<strong>in</strong>gle device has been taken <strong>in</strong>to account.<br />

In order to improve the reliability of NPC <strong>in</strong>verter, this<br />

paper will focus on a more complicated fault mode, i.e.<br />

the open-circuit fault occurr<strong>in</strong>g <strong>in</strong> two devices<br />

simultaneously, <strong>in</strong> addition to diagnos<strong>in</strong>g the open-circuit<br />

fault mode. Fault features will be extracted from three<br />

bridge voltages by the discrete Fourier transform (DFT)<br />

and a multi-layer artificial neural network (ANN) will be<br />

proposed to accomplish diagnos<strong>in</strong>g all fault modes under<br />

consideration. In additional, the PCA is performed <strong>in</strong> this<br />

paper to reduce the <strong>in</strong>put neural size [16-17]. Figure 1<br />

shows a three level NPC <strong>in</strong>verter.<br />

1<br />

U<br />

2 d<br />

o<br />

1<br />

U<br />

2 d<br />

D a5<br />

D a6<br />

S a1<br />

S a2<br />

S a3<br />

S a4<br />

a<br />

D a1<br />

D a2<br />

D a3<br />

D a4<br />

D b1<br />

D S D<br />

b5 b2<br />

b 2<br />

D b6<br />

S b1<br />

S b3<br />

b<br />

D b3<br />

D c5<br />

D c6<br />

S c1<br />

S c2<br />

S c3<br />

S D b4<br />

S c 4<br />

b4<br />

Figure 1. Ma<strong>in</strong> circuit of a three level NPC <strong>in</strong>verter<br />

II. ANALYSIS OF POSSIBLE FAULT MODE<br />

One s<strong>in</strong>gle bridge leg of NPC <strong>in</strong>verter could be derived<br />

from Figure 1, e.g., as shown <strong>in</strong> Figure 2 for phase a.<br />

There are three bridge voltages <strong>in</strong> Figure 2. The<br />

voltage between po<strong>in</strong>ts a<br />

u<br />

and o V<br />

ao<br />

is named as ‘middle<br />

bridge voltage’, or ‘bridge voltage’ for simplicity. The<br />

voltage between po<strong>in</strong>ts a<br />

u<br />

and o V auo<br />

is named as ‘upper<br />

c<br />

D c1<br />

D c2<br />

D c3<br />

D c4<br />

R a<br />

R b<br />

R c<br />

L a<br />

L b<br />

L c<br />

n<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1464-1471


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1465<br />

bridge voltage’, while V ado<br />

between po<strong>in</strong>ts a<br />

d<br />

and o is<br />

‘down bridge voltage’.<br />

1<br />

U<br />

2 d<br />

D a5<br />

S a1<br />

S a2<br />

D a1<br />

a u<br />

D a2<br />

o<br />

1<br />

U<br />

2 d<br />

D a6<br />

S a3<br />

S a4<br />

a<br />

i a<br />

D a3<br />

a d<br />

D a4<br />

Ra<br />

L a<br />

b<br />

n<br />

Rb<br />

L b<br />

c<br />

Rc<br />

L c<br />

(c) S<br />

a2<br />

open-circuit<br />

Figure 2. S<strong>in</strong>gle bridge leg of NPC <strong>in</strong>verter<br />

A. Open-circuit Fault of S<strong>in</strong>gle Device<br />

Consider the circuit shown <strong>in</strong> Figure 2 which consists<br />

of six devices, namely S<br />

a1<br />

, S<br />

a2<br />

, S<br />

a3<br />

, S<br />

a4<br />

, D<br />

a5<br />

and D<br />

a6<br />

.<br />

Correspond<strong>in</strong>gly, there are six possible fault modes for<br />

the open-circuit fault of s<strong>in</strong>gle device, with each mode<br />

be<strong>in</strong>g denoted by the same symbol of each device. As the<br />

circuit is symmetric <strong>in</strong> configuration, those fault modes<br />

of S<br />

a1<br />

, S<br />

a2<br />

and D<br />

a5<br />

need to be analyzed <strong>in</strong> detail, and<br />

the results apply for the other three fault modes.<br />

Perform<strong>in</strong>g simulation for the NPC <strong>in</strong>verter by the<br />

software PSIM, with the <strong>in</strong>put DC voltage U be<strong>in</strong>g<br />

100V, the load of each phase be<strong>in</strong>g resistance 8Ω and<br />

<strong>in</strong>ductance 20mH <strong>in</strong> series, under the normal (fault free)<br />

condition and each s<strong>in</strong>gle device open-circuit fault mode,<br />

the simulation waveforms of bridge voltage could be<br />

obta<strong>in</strong>ed as shown <strong>in</strong> Figure 3.<br />

(a) Fault free mode<br />

(b) S<br />

a1<br />

open-circuit<br />

d<br />

(d) D<br />

a5<br />

open-circuit<br />

Figure 3. Simulation waveforms of bridge voltage for open-circuit<br />

fault of s<strong>in</strong>gle device<br />

It could be seen obviously from Figure 3 that the<br />

waveform of the bridge voltage is different from one<br />

another and has specific features. By theory of spectrum<br />

analysis [18], each waveform of bridge voltage <strong>in</strong> Figure<br />

3 consists of specific harmonics differ<strong>in</strong>g from the other’s.<br />

Therefore the ‘fault features’ could be extracted from the<br />

bridge voltages. Based on such fault features, it is<br />

possible to isolate the open-circuit fault of s<strong>in</strong>gle device<br />

<strong>in</strong> some proper ways.<br />

B. Open-circuit Fault of Two Devices<br />

Two different situations arise while the case that two<br />

devices malfunction by open-circuit dur<strong>in</strong>g certa<strong>in</strong> period<br />

is taken <strong>in</strong>to account. The first situation arises when two<br />

faulty devices lie <strong>in</strong> the same phase, e.g. S<br />

a1<br />

and S<br />

a3<br />

, and<br />

the second one arises when two faulty devices lie <strong>in</strong><br />

different phases, e.g. S<br />

a1<br />

<strong>in</strong> phase a and S<br />

b1<br />

<strong>in</strong> phase b.<br />

Only the first situation needs to be <strong>in</strong>vestigated because<br />

the second situation could be reduced to the open-circuit<br />

fault of s<strong>in</strong>gle device <strong>in</strong> two phases and then be treated by<br />

the way mentioned above.<br />

Consider<strong>in</strong>g the phase a without loss of generality,<br />

possibly there are six different fault modes as { S<br />

a1<br />

, S<br />

a2<br />

},<br />

{ S<br />

a1<br />

, S<br />

a3<br />

}, { S<br />

a1<br />

, S<br />

a4<br />

}, { S<br />

a2<br />

, S<br />

a3<br />

}, { S<br />

a2<br />

, S<br />

a4<br />

} and<br />

{ S<br />

a3<br />

, S<br />

a4<br />

}. Due to the symmetry <strong>in</strong> the configuration of<br />

NPC <strong>in</strong>verter, for the fault modes { S<br />

a2<br />

, S<br />

a4<br />

} and { S<br />

a3<br />

,<br />

S<br />

a4<br />

}, the bridge voltage would be the same as one for<br />

{ S<br />

a1<br />

, S<br />

a3<br />

} and { S<br />

a1<br />

, S<br />

a2<br />

} respectively, while the phase<br />

is just opposite. Therefore only the other four fault modes<br />

should be analyzed. The bridge voltages’ simulation for<br />

these four faulty modes is given out <strong>in</strong> Figure 4.<br />

© 2013 ACADEMY PUBLISHER


1466 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

(a) { S<br />

a1<br />

, S<br />

a2<br />

}<br />

only one path through D<br />

a1<br />

and D<br />

a2<br />

as shown <strong>in</strong> Figure 5<br />

(c). When the fault { S<br />

a2<br />

} occurs, current flow (3) is<br />

possible while current flow (1) or (2) is impossible. When<br />

the fault { S<br />

a1<br />

, S<br />

a2<br />

} occurs, only current flow (3) is<br />

possible. Hence, no difference exists <strong>in</strong> current flow and<br />

the bridge voltages for the cases { S<br />

a2<br />

} and { S<br />

a1<br />

, S<br />

a2<br />

}.<br />

This reveals that the fault modes { S<br />

a2<br />

} and { S<br />

a1<br />

, S<br />

a2<br />

}<br />

cannot be isolated if only the bridge voltage is used.<br />

1<br />

U<br />

2 d<br />

D a5<br />

S a1<br />

S a2<br />

D a1<br />

a u<br />

D a2<br />

o<br />

a<br />

i a<br />

Ra<br />

b<br />

Rb<br />

c<br />

Rc<br />

(b) { S<br />

a1<br />

, S<br />

a3<br />

}<br />

1<br />

U<br />

2 d<br />

D a6<br />

S a3<br />

S a4<br />

D a3<br />

a d<br />

D a4<br />

L a<br />

n<br />

L b<br />

L c<br />

(a) Current flow (1)<br />

1<br />

U<br />

2 d<br />

D a5<br />

S a1<br />

S a2<br />

D a1<br />

a u<br />

D a2<br />

o<br />

a<br />

i a<br />

R a<br />

b<br />

Rb<br />

c<br />

Rc<br />

(c) { S<br />

a1<br />

, S<br />

a4<br />

}<br />

1<br />

U<br />

2 d<br />

D a6<br />

S a3<br />

S a4<br />

D a3<br />

a d<br />

D a4<br />

L a<br />

n<br />

L b<br />

L c<br />

(b) Current flow (2)<br />

1<br />

U<br />

2 d<br />

D a5<br />

S a1<br />

S a2<br />

D a1<br />

a u<br />

D a2<br />

(d) { S<br />

a2<br />

, S<br />

a3<br />

}<br />

Figure 4. Bridge voltage when two devices malfunction<br />

From Figure 3 and Figure 4 it could be found that the<br />

circuit would have the same bridge voltage for the fault<br />

modes { S<br />

a2<br />

} (see Figure 3 (c)) and { S<br />

a1<br />

, S<br />

a2<br />

} (see<br />

Figure 4 (a)). This will be also the case for the fault<br />

modes { S<br />

a3<br />

} and { S<br />

a3<br />

, S<br />

a4<br />

}.<br />

Consider the current path <strong>in</strong> Figure 2 from a to o<br />

through the upper half bridge where S<br />

a1<br />

, S<br />

a2<br />

, D<br />

a5<br />

,<br />

Da1<br />

and D<br />

a2<br />

are <strong>in</strong>volved, and denote the current of phase<br />

a as i a<br />

. If i<br />

a<br />

> 0 , the current has two possible paths as<br />

shown <strong>in</strong> Figure 5 (a-b), but if i<br />

a<br />

< 0 , the current has<br />

o<br />

1<br />

U<br />

2 d<br />

D a6<br />

S a3<br />

S a4<br />

a<br />

i a<br />

D a3<br />

a d<br />

D a4<br />

Ra<br />

(c) Current flow (3)<br />

L a<br />

b<br />

n<br />

Rb<br />

L b<br />

c<br />

Rc<br />

Figure 5. Diagram of NPC <strong>in</strong>verter work states<br />

In order to isolate all possible fault modes, the voltages<br />

of both the upper bridge and the down bridge as def<strong>in</strong>ed<br />

before are <strong>in</strong>troduced. Figure 6 shows the waveform of<br />

the upper bridge voltage for { S<br />

a2<br />

} and { S<br />

a1<br />

, S<br />

a2<br />

}.<br />

Obviously the waveform is different from each other.<br />

L c<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1467<br />

Fault free<br />

x 104<br />

4<br />

Sa1 open-circuit<br />

x 104<br />

4<br />

Amp<br />

2<br />

Amp<br />

2<br />

0<br />

0 1 2 3 4<br />

Freq:kHz<br />

Sa2 open-circuit<br />

x 104<br />

4<br />

0<br />

0 1 2 3 4<br />

Freq:kHz<br />

Da5 open-circuit<br />

x 104<br />

4<br />

Amp<br />

2<br />

Amp<br />

2<br />

(a) { S<br />

a2<br />

}<br />

0<br />

0 1 2 3 4<br />

Freq:kHz<br />

{Sa1,Sa2}<br />

x 104<br />

4<br />

Figure 8. DFT result of figure 3<br />

0<br />

0 1 2 3 4<br />

Freq:kHz<br />

{Sa1,Sa3}<br />

x 104<br />

4<br />

Amp<br />

2<br />

Amp<br />

2<br />

0<br />

0 1 2 3 4<br />

Freq:kHz<br />

{Sa1,Sa4}<br />

x 104<br />

4<br />

0<br />

0 1 2 3 4<br />

Freq:kHz<br />

{Sa2,Sa3}<br />

x 104<br />

4<br />

Amp<br />

2<br />

Amp<br />

2<br />

0<br />

0 1 2 3 4<br />

Freq:kHz<br />

Figure 9. DFT result of figure 4<br />

0<br />

0 1 2 3 4<br />

Freq:kHz<br />

(b) { S<br />

a1<br />

, S<br />

a2<br />

}<br />

Figure 6. Waveform of the upper bridge voltage<br />

III. FAULT DIAGNOSIS<br />

A. Structure of Fault Diagnosis System<br />

The structure for a fault diagnosis system is shown <strong>in</strong><br />

Figure 7. The system is composed of three major states:<br />

feature extraction, pr<strong>in</strong>cipal component analysis and<br />

multi-layer neural network. The output of the MNN is<br />

nearly 0 and 1 as b<strong>in</strong>ary code which can be related to<br />

different fault mode.<br />

NPC<br />

Inverter<br />

Bridge Voltage<br />

Feature<br />

Extraction<br />

System<br />

MNN<br />

PCA<br />

Figure 7. Structure of Fault Diagnosis System<br />

B. Feature Extraction<br />

An appropriate selection of the feature extractor is to<br />

provide the MNN with adequate significant details <strong>in</strong><br />

orig<strong>in</strong>al data so that the highest accuracy <strong>in</strong> the MNN<br />

performance can be obta<strong>in</strong>ed. In this paper the DFT<br />

technique is adopted to extract feature from the middle,<br />

upper and down bridge voltages. The transformed signals<br />

of Figure 3 and Figure 4, whose fundamental frequency is<br />

50Hz and carrier frequency is 1.5kHz, are represented <strong>in</strong><br />

Figure 8 and Figure 9 respectively.<br />

Accord<strong>in</strong>g to the spectrum characteristics of PWM<br />

<strong>in</strong>verters [19], and also could be seen from Figure 8 and<br />

Figure 9, obviously, ma<strong>in</strong> harmonics of the bridge<br />

voltage are distributed <strong>in</strong> the fundamental frequency,<br />

carrier frequency and their multiples. Hence, some<br />

components of these ma<strong>in</strong> harmonics are selected as the<br />

fault feature by feature extraction system <strong>in</strong> Figure 7.<br />

The selection of <strong>in</strong>put data for the ma<strong>in</strong> neural network<br />

<strong>in</strong>clude amplitude of DC component, fundamental,<br />

double fundamental, three times of fundamental, carrier<br />

frequency (1.5kHz), side frequency of carrier (1.4kHz<br />

and 1.6kHz) and double carrier frequency. The phase of<br />

DC component, fundamental and double fundamental are<br />

also selected as <strong>in</strong>put data for the ma<strong>in</strong> neural network. It<br />

could be counted that the dimension of the <strong>in</strong>put data for<br />

the ma<strong>in</strong> neural network is 11.<br />

For both auxiliary neural networks, the amplitude of<br />

DC component, fundamental and double fundamental are<br />

selected as the <strong>in</strong>put data with the dimension of three.<br />

C. Pr<strong>in</strong>cipal Component Analysis<br />

It could be seen that the <strong>in</strong>put data of the ma<strong>in</strong> neural<br />

network has high dimension and we don’t know whether<br />

these 11 dimension data are correlated or uncorrelated.<br />

PCA is a statistical technique used to transform a set of<br />

correlated variables to a new lower dimensional set of<br />

variables, which are uncorrelated or orthogonal with each<br />

other. The fundamental PCA used <strong>in</strong> a l<strong>in</strong>ear<br />

transformation is shown as follows:<br />

T = X ⋅ P<br />

(1)<br />

Where T is the m× k score matrix (transformed data),<br />

m is number of observations, k is dimensionality of the<br />

PC space; X is the m× n data matrix, m is number of<br />

observations, n is dimensionality of orig<strong>in</strong>al space; and<br />

P is the n× k load<strong>in</strong>gs matrix (PC coord<strong>in</strong>ates), n is<br />

dimensionality of orig<strong>in</strong>al space, k is number of the PCs<br />

kept <strong>in</strong> the model. The detail equation of Equation (1) is<br />

shown <strong>in</strong> the follow expression:<br />

© 2013 ACADEMY PUBLISHER


1468 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

⎡t11 t12 t1 k ⎤ ⎡x11 x12 x1 n ⎤ ⎡p11 p12 p1k<br />

⎤<br />

⎢<br />

t21 t22 t<br />

⎥ ⎢<br />

2k x21 x22 x<br />

⎥ ⎢<br />

2n p21 p22 p<br />

⎥<br />

⎢<br />

<br />

⎥ ⎢<br />

<br />

⎥ ⎢<br />

<br />

2k<br />

= ⋅<br />

⎥<br />

⎢ ⎥ ⎢ ⎥ ⎢ ⎥<br />

⎢ ⎥ ⎢ ⎥ ⎢ ⎥<br />

t t t x x x p p p<br />

⎣ m1 m2 mk⎦ ⎣ m1 m2 mn⎦ ⎣ n1 n2<br />

nk⎦<br />

Select<strong>in</strong>g a reduced subset of PC space results <strong>in</strong> a<br />

reduced dimension structure with respect to the important<br />

<strong>in</strong>formation available as shown <strong>in</strong> the follow<strong>in</strong>g<br />

expression:<br />

[ t t t ] [ x x x ]<br />

⎡ p11 p12 p1<br />

k ⎤<br />

⎢<br />

p p p<br />

⎥<br />

⎢<br />

<br />

⎥<br />

<br />

⎢<br />

⎥<br />

⎣ pn 1<br />

pn2<br />

pnk⎦<br />

21 22 2k<br />

1 2 k<br />

=<br />

1 2<br />

n<br />

⋅ ⎢ ⎥<br />

D. Artificial Neural Network<br />

ANN is a computer model whose architecture<br />

essentially mimics the knowledge acquisition and<br />

organizational skills of the human bra<strong>in</strong>. Although there<br />

are a variety of ways to construct these models, Back-<br />

Propagated (BP) neural network has become one of the<br />

most widely used ANNs <strong>in</strong> practice. BP neural network<br />

with a s<strong>in</strong>gle hidden layer is selected <strong>in</strong> this paper, which<br />

has been demonstrated to be sufficient to approximate<br />

any cont<strong>in</strong>uous function with<strong>in</strong> the desired accuracy [20].<br />

Figure 10 shows a diagram of neural network with a<br />

s<strong>in</strong>gle hidden layer.<br />

x 1<br />

(2)<br />

(3)<br />

The goal of the tra<strong>in</strong><strong>in</strong>g of ANN is to m<strong>in</strong>imize the<br />

error between predicted and target values by adjust<strong>in</strong>g the<br />

connection weights and biased. The error is given by<br />

Equation (6):<br />

p q<br />

2<br />

E = ∑∑ ( apq<br />

−opq<br />

)<br />

(6)<br />

p= 1 q=<br />

1<br />

Where q is the number of logic units <strong>in</strong> output layer, and<br />

p is the number of tra<strong>in</strong><strong>in</strong>g samples, a pq<br />

and o<br />

pq<br />

are<br />

the predicted and target values, respectively.<br />

E. Multi-layer Neural Network<br />

A new method named as multi-layer neural network is<br />

proposed to diagnose all open-circuit fault modes under<br />

consideration for the NPC <strong>in</strong>verter, as shown <strong>in</strong> Figure 11.<br />

Feature A<br />

Ma<strong>in</strong><br />

Feature<br />

Feature B<br />

Ma<strong>in</strong><br />

ANN<br />

Output<br />

Auxiliary<br />

ANN A<br />

S or { S , S }<br />

a a a<br />

2 1 2<br />

S or { S , S }<br />

a a a<br />

3 3 4<br />

Auxiliary<br />

ANN B<br />

Figure 11. Multi-layer neural network<br />

Output<br />

Output<br />

y 1<br />

x 2<br />

x 3<br />

<br />

x n<br />

<br />

n h q<br />

<br />

<br />

y 2<br />

<br />

y q<br />

Figure 10. Neural network with a s<strong>in</strong>gle hidden layer<br />

The three layers are called the <strong>in</strong>put layer, hidden layer<br />

and output layer, respectively. Each layer consists of<br />

logic units or neurons, as the basic <strong>in</strong>formation<br />

process<strong>in</strong>g units <strong>in</strong> ANN. The relationship of the <strong>in</strong>put<br />

value of the unit i <strong>in</strong> <strong>in</strong>put layer and that of unit j <strong>in</strong><br />

hidden layer is:<br />

n<br />

uj = ∑ ω<br />

ji<br />

xi + bj<br />

(4)<br />

i=<br />

1<br />

Where x<br />

i<br />

is an <strong>in</strong>put value of the logic unit i <strong>in</strong> the <strong>in</strong>put<br />

layer, u<br />

j<br />

an <strong>in</strong>itial output value of the logic unit j <strong>in</strong> the<br />

hidden layer, ω<br />

ji<br />

connection weights between unit j and<br />

i , b<br />

j<br />

<strong>in</strong>put bias of the unit j , n the number of logic<br />

units <strong>in</strong> the <strong>in</strong>put layer.<br />

The <strong>in</strong>itial output value u<br />

j<br />

is further transformed with<br />

the common transfer function <strong>in</strong> a sigmoid form:<br />

1<br />

= (5)<br />

+<br />

O j u j<br />

1 e −<br />

Where O is the f<strong>in</strong>al output value of the logic unit j .<br />

j<br />

TABLE I.<br />

FAULT MODES AND OUTPUT OF MAIN ANN<br />

Fault modes (open-circuit)<br />

Target output<br />

Fault free 000000<br />

S<br />

a1<br />

100000<br />

S<br />

a2<br />

or { S<br />

a1<br />

, S<br />

a2<br />

} 010000<br />

S<br />

a3<br />

or { S<br />

a3<br />

, S<br />

a4<br />

} 001000<br />

S<br />

a4<br />

000100<br />

D<br />

a5<br />

000010<br />

D<br />

a6<br />

000001<br />

{ S<br />

a1<br />

, S<br />

a3<br />

} 101000<br />

{ S<br />

a1<br />

, S<br />

a4<br />

} 100100<br />

{ S<br />

a2<br />

, S<br />

a3<br />

} 011000<br />

{ S<br />

a2<br />

, S<br />

a4<br />

} 010100<br />

TABLE II.<br />

FAULT MODES AND OUTPUT OF AUXILIARY ANN A<br />

Fault modes (open-circuit)<br />

Target output<br />

S<br />

a2<br />

0<br />

{ S<br />

a1<br />

, S<br />

a2<br />

} 1<br />

Ma<strong>in</strong> Feature extracted from the bridge voltage V ao<br />

is<br />

used as <strong>in</strong>put data for ma<strong>in</strong> ANN, which is used to<br />

diagnose eleven fault modes represented <strong>in</strong> Table I<br />

(<strong>in</strong>clud<strong>in</strong>g fault free mode). While Feature A and Feature<br />

B extracted from upper bridge voltage V auo<br />

and down<br />

bridge voltage V ado<br />

are used as the <strong>in</strong>put data for<br />

auxiliary ANN A and B respectively. Table II and Table<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1469<br />

III represent the fault modes diagnosed by two auxiliary<br />

ANNs and their target output.<br />

TABLE III.<br />

FAULT MODES AND OUTPUT OF AUXILIARY ANN B<br />

Fault modes (open-circuit)<br />

Target output<br />

S 0<br />

{<br />

a3<br />

a3<br />

S , S<br />

a4<br />

} 1<br />

IV. DIAGNOSIS RESULT<br />

To verify the proposed method, an NPC <strong>in</strong>verter us<strong>in</strong>g<br />

MOSFET IRF640 as the switch<strong>in</strong>g device is used to carry<br />

out the three bridge voltages. A DSP chip TMS320F2812<br />

is utilized to generate gate drive signals. The <strong>in</strong>put DC<br />

voltage is 90V to 110V and the three phase wyeconnected<br />

load is 8Ω resistance series with 20mH<br />

<strong>in</strong>ductance. Fault occurrence is created by physically<br />

remov<strong>in</strong>g switch<strong>in</strong>g signal <strong>in</strong> the desired position.<br />

Figure 12 shows the experimental bridge voltage<br />

waveforms for open-circuit fault of s<strong>in</strong>gle device. Figure<br />

13 shows the experimental bridge voltage waveforms<br />

when open-circuit fault occurr<strong>in</strong>g <strong>in</strong> two devices<br />

simultaneously.<br />

Figure 12. Experimental bridge voltage waveforms for open-circuit of<br />

s<strong>in</strong>gle device<br />

Each fault mode from Tab.1 to Tab.3 must cover the<br />

operat<strong>in</strong>g region. Thus, there are three degrees of <strong>in</strong>put<br />

DC voltage <strong>in</strong> the experiment <strong>in</strong>clude 90V, 100V and<br />

110V. Under each DC voltage, the modulation <strong>in</strong>dex is<br />

changed from 0.2 to 1 with step of 0.1. Therefore, 27 sets<br />

orig<strong>in</strong>al data can be obta<strong>in</strong>ed for each fault mode. The<br />

data whose modulation <strong>in</strong>dex is 0.5, 0.7 and 0.9 are<br />

utilized as test sample and the rest data are utilized as<br />

tra<strong>in</strong> sample.<br />

Volt:20/div<br />

Time:5ms/div<br />

(a) { S<br />

a1<br />

, S<br />

a2<br />

}<br />

Volt:20/div<br />

Time:5ms/div<br />

(a) S<br />

a1<br />

open-circuit<br />

Volt:20/div<br />

Time:5ms/div<br />

(b) S<br />

a2<br />

open-circuit<br />

Volt:20/div<br />

Volt:20/div<br />

Time:5ms/div<br />

(b) { S<br />

a1<br />

, S<br />

a3<br />

}<br />

Volt:20/div<br />

Time:5ms/div<br />

(c) { S<br />

a1<br />

, S<br />

a4<br />

}<br />

Volt:20/div<br />

Time:5ms/div<br />

(c) D<br />

a5<br />

open-circuit<br />

Time:5ms/div<br />

(d) { S<br />

a2<br />

, S<br />

a3<br />

}<br />

Figure 13. Experimental bridge voltage waveforms when two devices<br />

malfunction<br />

© 2013 ACADEMY PUBLISHER


1470 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

TABLE IV.<br />

DIAGNOSIS RESULT OF MULTI-LAYER ANN (WITHOUT PCA)<br />

Ma<strong>in</strong> SVM<br />

Auxiliary<br />

SVM A<br />

Auxiliary<br />

SVM B<br />

No noise 98.84% 100% 100%<br />

10% white<br />

nosie 96.31% 100% 100%<br />

Table IV shows diagnosis result of the multi-layer<br />

ANN without PCA and the dimension of the <strong>in</strong>put data of<br />

the ma<strong>in</strong> ANN is 11.<br />

Table V shows diagnosis result of the multi-layer ANN<br />

with PCA. Here, only the <strong>in</strong>put data of the ma<strong>in</strong> ANN is<br />

transformed by the technique of PCA and the dimension<br />

of the new <strong>in</strong>put data of the ma<strong>in</strong> ANN is 8.<br />

TABLE V.<br />

DIAGNOSIS RESULT OF MAIN ANN (WITH PCA)<br />

Ma<strong>in</strong> SVM<br />

No noise 99.24%<br />

10% white nosie 98.43%<br />

It could be seen from Table IV and Table V that the<br />

diagnosis precision of the ma<strong>in</strong> ANN with PCA is higher<br />

than that without PCA. It could be deduced that the ANN<br />

with PCA must be tra<strong>in</strong>ed better than the ANN without<br />

PCA and has better generalization ability.<br />

V. CONCLUSIONS<br />

Additional signals are required <strong>in</strong> order to isolate more<br />

complicated faults of open-circuit occurr<strong>in</strong>g <strong>in</strong> two<br />

devices <strong>in</strong> NPC <strong>in</strong>verter dur<strong>in</strong>g certa<strong>in</strong> period. Note that<br />

this is not just a theoretical problem but a practical one<br />

because some failures have been reported recently, see<br />

[21]-[22]. In this paper, the voltages <strong>in</strong> all the upper,<br />

middle and down bridge are suggested to extract fault<br />

features. A scheme of multi-layer ANN is proposed to<br />

implement fault diagnosis of NPC <strong>in</strong>verter, <strong>in</strong>volv<strong>in</strong>g the<br />

simple open-circuit of one device or more devices. Better<br />

precision could be achieved when the <strong>in</strong>put data is<br />

transformed by PCA.<br />

ACKNOWLEDGMENT<br />

The project is supported by Innovation Project of<br />

Shanghai Municipal Education Commission numbered<br />

12zz191, Graduates’ Innovation Fund of Shanghai<br />

Maritime University numbered YC2011061.<br />

REFERENCES<br />

[1] C. Hochgraf, R. Lasseter, D. Divan, T. Lipo, “Comparison<br />

of Multilevel Inverters for Static Var Compensation,<br />

“ IEEE Conference on Industrial Applications, 1994,<br />

pp.921-928.<br />

[2] R. W. Menzies, P.Steimer, J.K.Ste<strong>in</strong>ke, “Five level GTO<br />

Inverters for Large Induction MotorDrives”, IEEE IAS<br />

Annual Meet<strong>in</strong>g, 1993, pp.593-601.<br />

[3] H. Stemmler, “Power Electronics <strong>in</strong> Electric Traction<br />

Applications”, IEEE IECON’93, 1993, pp. 707-713.<br />

[4] A. Steimel, “Electric Railway Traction <strong>in</strong> Europe”, IEEE<br />

Transactions on Industry Applications, Vol.2, 1996, pp.7-<br />

17.<br />

[5] Jih-Sheng Lai, Fang Zheng Peng, “Multilevel Converters-<br />

A New Breed of Power Converters”, IEEE Transctions on<br />

Industry Applications, Vol.32, 1996, pp. 509-517.<br />

[6] Ceballos S., Pou J., Robles E., Zaragoza J., Mart<strong>in</strong> J. L,<br />

“Three-Leg Fault-Tolerant Neutral-Po<strong>in</strong>t-Clamped<br />

Converter”, IEEE International Symposium on Industrial<br />

Electronics, 2007, pp.3180-3185.<br />

[7] Tang Q<strong>in</strong>g-quan, Yan Shi-chao, Lu Song-sheng, Liu<br />

Zheng-zhi, “Open-circuit Fault Diagnosis of Transistor <strong>in</strong><br />

Three-level Inverter”, Proceed<strong>in</strong>gs of the CSEE, 2008, 28<br />

(21): 26-32.<br />

[8] Zhou J<strong>in</strong>g-hua, Liu Hui-chen, Yao Lan-ya, Li Zheng-xi,<br />

“Research on the Faults Characteristics and the Fault<br />

Diagnosis Methods of Three-level High-power Inverter”,<br />

Power Electronics, 2009, 43 (6), pp.1-3<br />

[9] Ho-In Son, Tae-J<strong>in</strong> Kim, Dae-Wook Kang, Dong-Seok<br />

Hyun, “Fault Diagnosis and Neutral Po<strong>in</strong>t Voltage Control<br />

When the 3-level Inverter Faults Occur”, Power<br />

Electronics Specialists Conference, 2004, pp.4558- 4563.<br />

[10] Jae-Chul Lee, Tae-J<strong>in</strong> Kim, Dae-Wook Kang, Dong-Seok<br />

Hyun, “A Control Method for Improvement of Reliability<br />

<strong>in</strong> Fault Tolerant NPC Inverter System”, 37th IEEE Power<br />

Electronics Specialists Conference, 2006, pp.1-5.<br />

[11] Bo Fan, Yix<strong>in</strong> Y<strong>in</strong>, Cunfa Fu, “A Method of Inverter<br />

Circuit Fault Diagnosis Based on BP Neural Network and<br />

D-S Evidence Theory”, 8th World Congress on Intelligent<br />

Control and Automation, 2010, pp.2249-2253.<br />

[12] Wang Baocheng, Li Danhe, Sun Xiaofeng, Wu Weiyang,<br />

“The Studies of S<strong>in</strong>gle-phase Inverter Fault Diagnosis<br />

Based on D-S Evidential Theory and Fuzzy Logical<br />

Theory”, CES/IEEE 5th International on Power<br />

Electronics and Motion Control Conference, 2006, pp.1-4.<br />

[13] Dong-Eok Kim, Dong-Choon Lee, “Fault Diagnosis of<br />

Three-phase PWM Inverters Us<strong>in</strong>g Wavelet and SVM”,<br />

IEEE International Symposium on Industrial Electronics,<br />

2008, pp.329-334.<br />

[14] Liang hong, Wang yan-qiu, “Study of Fault Diagnosis on<br />

Three-phase S<strong>in</strong>e-PWM Inverter Based on Rough Setneural<br />

Network System”, Journal of Liaon<strong>in</strong>g Istitute of<br />

Technology, 2005, 25 (6), pp.351-353.<br />

[15] Babu B.P., Sr<strong>in</strong>ivas J.V.S., Vikranth B., Premchnad P.,<br />

“Fault Diagnosis <strong>in</strong> Multi-level Inverter System Us<strong>in</strong>g<br />

Adaptive Back Propagation Neural Network”, India<br />

Conference, INDICON 2008, pp.494-498.<br />

[16] Foito D., Mart<strong>in</strong>s J.F., Pires V.F., Maia, J., “An<br />

Eigenvalue/Eigenvector 3D Current Reference Method for<br />

Detection and Fault Diagnosis <strong>in</strong> a Voltage Source<br />

Inverter”, 35th Annual Conference of IEEE on Industrial<br />

Electronics, 2009, pp.190-194.<br />

[17] Khomfoi S., Tolbert L.M., “Fault Diagnosis and<br />

Reconfiguration for Multilevel Inverter Drive Us<strong>in</strong>g AI-<br />

Based Techniques”, IEEE Transactions on Industrial<br />

Electronics, vol.54, no.6, 2007, pp.2954-2968.<br />

[18] Hu Guang-shu, “Digital Signal Process<strong>in</strong>g-theory,<br />

Algorithms and Implementation”, Beij<strong>in</strong>g, Ts<strong>in</strong>ghua<br />

University Press, 2003.<br />

[19] L<strong>in</strong> Wei-xun, “Modern Power Electronics Technology”,<br />

Beij<strong>in</strong>g, Mach<strong>in</strong>ery Industry Press, 2006.<br />

[20] U.Ahmad, A.Gavrilov, S.Lee, “Modular Multilayer<br />

Perceptron for WLAN Based Localization”, Proc. of<br />

International Jo<strong>in</strong>t Conference on Neural Networks, 2006,<br />

pp. 3465-3471.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1471<br />

[21] Sun J<strong>in</strong>g, “Fault Recovery Process<strong>in</strong>g for CRH2 Multipleunit<br />

Traction Converter”, Railway Locomotive & Car, vol.<br />

29, no. 6, pp. 64-66, 2009,.<br />

[22] Li Li-jun, Li Pu-m<strong>in</strong>, “Fault Analysis and Recovery<br />

Process<strong>in</strong>g for CRH2 M ultiple-unit Traction Converter”,<br />

Railway Locomotive & Car, vol. 28, no. 4, pp. 69-70, 2008.<br />

Danjiang Chen was born <strong>in</strong> N<strong>in</strong>gbo, Ch<strong>in</strong>a, on Feb 15, 1979.<br />

He received the B.S. and M.S. degrees <strong>in</strong> electrical eng<strong>in</strong>eer<strong>in</strong>g<br />

from Zhejiang University, Hangzhou, Ch<strong>in</strong>a, <strong>in</strong> 2002 and 2005,<br />

respectively. He is currently work<strong>in</strong>g toward the Ph.D. degree <strong>in</strong><br />

Shanghai Maritime University, Shanghai, Ch<strong>in</strong>a.<br />

After received the M.S. degree, he jo<strong>in</strong>ed Zhejiang Wanli<br />

University, where he is a lecturer <strong>in</strong> the faculty of electronic and<br />

<strong>in</strong>formation eng<strong>in</strong>eer<strong>in</strong>g. His current area of research <strong>in</strong>cludes<br />

power electronics and their fault diagnosis system.<br />

Y<strong>in</strong>zhong Ye was born <strong>in</strong> Zhejiang, Ch<strong>in</strong>a, <strong>in</strong> 1964. He<br />

received the B.Sc., M.Sc. and Ph.D. degrees <strong>in</strong> <strong>in</strong>dustrial<br />

automation and electronic eng<strong>in</strong>eer<strong>in</strong>g from East Ch<strong>in</strong>a<br />

University of Science and Technology, Shanghai, Ch<strong>in</strong>a <strong>in</strong> 1982,<br />

1985 and 1989, respectively.<br />

After receiv<strong>in</strong>g the M.Sc. degree, he jo<strong>in</strong>ed the Research<br />

Institute of Automation, East Ch<strong>in</strong>a University of Science and<br />

Technology, Shanghai, Ch<strong>in</strong>a, where he had worked as a<br />

Teach<strong>in</strong>g Assistant, Lecturer and Associate Professor. In 1994<br />

he jo<strong>in</strong>ed Shanghai Maritime University, Shanghai, Ch<strong>in</strong>a, as a<br />

Professor of electrical and automatic control eng<strong>in</strong>eer<strong>in</strong>g. S<strong>in</strong>ce<br />

2009 he has jo<strong>in</strong>ed Shanghai Institute of Technology, Shanghai,<br />

Ch<strong>in</strong>a as Vice President and Professor <strong>in</strong> electrical eng<strong>in</strong>eer<strong>in</strong>g<br />

and automation. His ma<strong>in</strong> research <strong>in</strong>terests and experience<br />

<strong>in</strong>clude fault diagnosis, fault-tolerant control, system simulation,<br />

power electronics, measurement and control of <strong>in</strong>dustrial<br />

processes.<br />

Dr. Ye is a Vice Chairperson of SAFEPROCESS CHINA,<br />

Ch<strong>in</strong>ese Association of Automation.<br />

Rong Hua was born <strong>in</strong> Shanghai, Ch<strong>in</strong>a, on March 26, 1960.<br />

He received the B.S. degrees <strong>in</strong> motor control eng<strong>in</strong>eer<strong>in</strong>g from<br />

Shanghai University, Shanghai, Ch<strong>in</strong>a, <strong>in</strong> July 1982, and the<br />

M.S. degrees <strong>in</strong> control eng<strong>in</strong>eer<strong>in</strong>g from East Ch<strong>in</strong>a University<br />

of Science and Technology, Shanghai, Ch<strong>in</strong>a, <strong>in</strong> March 2008.<br />

At present, he jo<strong>in</strong>ed the Shanghai Institute of Technology,<br />

Shanghai, Ch<strong>in</strong>a, as a Professor and a Master's Supervisor of<br />

electronics Information eng<strong>in</strong>eer<strong>in</strong>g. His ma<strong>in</strong> research <strong>in</strong>terests<br />

and experience <strong>in</strong>clude control eng<strong>in</strong>eer<strong>in</strong>g, signal process<strong>in</strong>g<br />

and power electronics and fault diagnosis system.<br />

© 2013 ACADEMY PUBLISHER


1472 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Pulse Wave K Value Averag<strong>in</strong>g Computation and<br />

Pathological Diagnosis<br />

Li Yang 1, 2 , J<strong>in</strong>xue Sui<br />

1 Shandong Institute of Bus<strong>in</strong>ess and Technology / School of Information and Electronic Eng<strong>in</strong>eer<strong>in</strong>g, Yantai, Ch<strong>in</strong>a<br />

Email: suij<strong>in</strong>xue@163.com<br />

Yunan Hu<br />

2 Department of Control Eng<strong>in</strong>eer<strong>in</strong>g / Naval Aeronautical Eng<strong>in</strong>eer<strong>in</strong>g University, Yantai, Ch<strong>in</strong>a<br />

Email: yangl-2005@163.com<br />

Abstract—Many cardiovascular diseases will lead to changes<br />

<strong>in</strong> pulse wave. Pulse wave’s transmission will play a<br />

significant role <strong>in</strong> promot<strong>in</strong>g the cl<strong>in</strong>ical detection and<br />

diagnosis, one k<strong>in</strong>d pulse wave computational method based<br />

on averag<strong>in</strong>g method is proposed, and comput<strong>in</strong>g<br />

cardiovascular function parameter K accord<strong>in</strong>g to the<br />

waveform area, the K value is associated with pathological<br />

analysis and diagnosis. A large number of cl<strong>in</strong>ical<br />

simulation and experiments proved that the relationship<br />

between the form factor K value and the human<br />

cardiovascular health, the pulse wave of the cerebral<br />

<strong>in</strong>farction matches with the actual cl<strong>in</strong>ical detection, it can<br />

provide theoretical support for the non-<strong>in</strong>vasive detection<br />

and parametric analysis of the cardiovascular function.<br />

Index Terms—pulse wave, averag<strong>in</strong>g computation, cerebral<br />

circulation, pathological diagnosis<br />

I. INTRODUCTION<br />

As the cycle of contraction and relaxation of the heart,<br />

blood pressure, blood flow velocity and blood flow’s<br />

pulsation and vessel wall changes’ expansion spread <strong>in</strong><br />

the vascular network, are known as pulse wave.<br />

Pulse wave transmitt<strong>in</strong>g characteristics are closely<br />

l<strong>in</strong>ked with the hemodynamic parameters of the blood<br />

circulation system. Changes <strong>in</strong> pulse waveform<br />

characteristics are an important basis to evaluate the<br />

physiological and pathological state of the human<br />

cardiovascular system. When the pulse wave spreads<br />

from the heart to the arterial system, it is not only<br />

affected by the heart itself, but also by various<br />

physiological factors that flow through all artery and its<br />

branches, such as vascular resistance, vessel wall<br />

elasticity, the pulse wave conta<strong>in</strong>s very rich physiological<br />

and pathological <strong>in</strong>formation <strong>in</strong> cardiovascular system, so<br />

that whether Ch<strong>in</strong>ese pulse-tak<strong>in</strong>g or Western<br />

cardiovascular tests is tried to extract a variety of<br />

physiological and pathological <strong>in</strong>formation from the<br />

pulse waveform and pressure’s changes. Therefore, the<br />

pulse wave transmitt<strong>in</strong>g studies are comb<strong>in</strong>ed with the<br />

cl<strong>in</strong>ical test<strong>in</strong>g and the pathological diagnosis <strong>in</strong> order to<br />

use non-<strong>in</strong>vasive detection to analyze and diagnose the<br />

cardiovascular disease, will play a very important<br />

practical effect [1-12].<br />

This paper proposed a solv<strong>in</strong>g method that<br />

cardiovascular function parameters K-value will be<br />

calculated based on the averag<strong>in</strong>g method, accord<strong>in</strong>g to<br />

changes of the area and waveform of the pulse <strong>in</strong><br />

different physiological and pathological conditions,<br />

comb<strong>in</strong>ed the K value with the pathological and<br />

diagnostic analysis.<br />

II. WAVE DIAGNOSTIC PRINCIPLES BASED ON BLOOD<br />

FLOW<br />

A. The Formation of Arterial Pulse Wave<br />

The driv<strong>in</strong>g force of the blood circulatory system is the<br />

heart of the ejection, which the ventricle play a major role,<br />

it is usually called the cardiac cycle, <strong>in</strong> fact, refers to the<br />

movement cycle of the ventricle. Arterial blood pressure<br />

is the driv<strong>in</strong>g force that promotes blood to flow; it must<br />

reach a certa<strong>in</strong> height <strong>in</strong> order to ensure the blood supply<br />

for all over organ. The process formed the arterial pulse<br />

wave that the arterial pressure transmits from the aorta to<br />

the small blood vessels and capillaries, which changes<br />

periodically <strong>in</strong>to the cardiac cycle [11].<br />

Figure 1. Pulse waveform coefficient K.<br />

The typical pulse wave is shown <strong>in</strong> figure 1, it can be a<br />

good reflection of cardiovascular <strong>in</strong>formation system, if<br />

the body abnormal occurs (such as atherosclerosis, etc.),<br />

the arteries’ nature will change, so pulse waveform<br />

changes must also occur.<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1472-1479


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1473<br />

B. Cardiovascular Function Parameters K Comput<strong>in</strong>g<br />

Based on Pulse Wave<br />

Needless to say, the characteristic <strong>in</strong>formation of pulse<br />

wave is closely related with the physiological factors. To<br />

study the relationship each other, many researchers get<br />

<strong>in</strong>formation from the time doma<strong>in</strong> or frequency doma<strong>in</strong><br />

characteristics based on pulse wave <strong>in</strong> cl<strong>in</strong>ical trials or<br />

model. In the time doma<strong>in</strong>, usually the pulse extracts<br />

some po<strong>in</strong>t with a clear physical mean<strong>in</strong>g (such as the<br />

ma<strong>in</strong> wave peak, heavy pump wave height, etc.). The<br />

comb<strong>in</strong>ation with the characteristic po<strong>in</strong>ts and the<br />

correspond<strong>in</strong>g physiological factors may get much<br />

cl<strong>in</strong>ical value. Some researchers have used simulation<br />

models to measure pulse wave different model<br />

parameters, to determ<strong>in</strong>e the person's physical condition<br />

accord<strong>in</strong>g to different parameters. Facts have proved that<br />

this method is more effective, but the simulation models<br />

and the extracted characteristic parameters must be<br />

proper, can effectively dist<strong>in</strong>guish the pathological state.<br />

In many studies, because the extracted parameters are<br />

too complicated to make the dist<strong>in</strong>ction between pulse<br />

waves, it often occurs the misjudg<strong>in</strong>g phenomenon.<br />

Therefore, the extraction of the pulse wave parameter is<br />

the critical research. Professor Luo Zhichang used the<br />

exist<strong>in</strong>g two-chamber model of elastic wave pulse to<br />

extract the characteristics of K (called form factor) which<br />

represents changes of the pulse wave’s area [11].<br />

Through the model theoretical analysis, thousands of<br />

animal experiments and cl<strong>in</strong>ical test<strong>in</strong>g with different<br />

age’s healthy people and patients with cardiovascular<br />

disease, confirmed that caused the pulse wave map<br />

features and the correspond<strong>in</strong>g changes <strong>in</strong> the area by<br />

physiological and pathological cardiovascular changes,<br />

and then reflect on the changes <strong>in</strong> K value. Determ<strong>in</strong>e the<br />

body's physical condition with the K value, although it<br />

can not achieve accurate quantitative analysis, but a<br />

simple calculation, differentiation, and the advantages of<br />

high sensitivity, which is important <strong>in</strong> the cl<strong>in</strong>ical<br />

reference value, is an important physiological <strong>in</strong>dicators<br />

of the cardiovascular cl<strong>in</strong>ical exam<strong>in</strong>ation.<br />

The K value reflects the characteristic quantities which<br />

changes <strong>in</strong> the amount of area of the pulse wave [11],<br />

which is def<strong>in</strong>ed as the average of the relative position of<br />

the pulse wave, which is def<strong>in</strong>ed by type (1) and figure 1.<br />

Pm<br />

− Pd<br />

K = . (1)<br />

P − P<br />

where K is the form factor; P<br />

m<br />

is mean arterial pressure,<br />

P<br />

d<br />

is the diastolic blood pressure; P s<br />

is the systolic<br />

blood pressure.<br />

Thus, the form factor K value have noth<strong>in</strong>g to do with<br />

the absolute value of systolic and diastolic blood pressure,<br />

it only depends on wave map area of the pulse wave, is a<br />

dimensionless parameter. Pulse waveform and area will<br />

have a great change <strong>in</strong> different physiological and<br />

pathological conditions, these changes can be expressed<br />

as K value.<br />

Because the pulse wave is difficult to accurately<br />

measure and solve, this paper propose a solution based on<br />

s<br />

d<br />

the averag<strong>in</strong>g method that K value of the pulse wave can<br />

be computed, and then through the specific network<br />

simulation of the cerebral circulation, the results is<br />

co<strong>in</strong>cided with cl<strong>in</strong>ical measurement.<br />

Ⅲ. CARDIOVASCULAR NETWORK HEMODYNAMIC<br />

ANALYSIS AND AVERAGING COMPUTATION<br />

Accord<strong>in</strong>g to the aforementioned study, <strong>in</strong> order to<br />

solve the pulse wave of blood circulation network<br />

diagram, first, analyze its network model [12-18]. In<br />

order to build blood circulation network's model, at first<br />

establishes the dynamic equation of one blood vessel<br />

branch. For simplicity, we make the follow<strong>in</strong>g<br />

assumptions: Al. the blood is <strong>in</strong>compressible; A2.the<br />

temperatures <strong>in</strong> all branches are identical. Under<br />

assumptions Al and A2, one branch of the blood network<br />

is described with the follow<strong>in</strong>g equations [12-18]:<br />

dQ<br />

j<br />

T<br />

j<br />

= −R<br />

j<br />

Q<br />

j<br />

Q<br />

dt<br />

TQ<br />

2<br />

= −Q<br />

R + H<br />

D<br />

j<br />

+ H<br />

j<br />

. (2)<br />

where Q<br />

j<br />

is flow through a branch j , R<br />

j<br />

are<br />

hemodynamic resistances, H<br />

j<br />

are pressure drops of the<br />

branches, Tj = ρl j<br />

/ S are <strong>in</strong>ertia coefficients, j = 1,<br />

,<br />

n<br />

j<br />

and n is the number of network branches (exclud<strong>in</strong>g the<br />

generator branch). T = diag T } , R = col R } and<br />

{ j<br />

{ j<br />

2<br />

Q = diag{<br />

Q Q } . (3)<br />

D<br />

Let nc<br />

denote the number of nodes. Then l = n − nc<br />

+ 1<br />

is the number of l<strong>in</strong>ks (exclud<strong>in</strong>g the generator branch)<br />

and n − l is the number of tree branches.<br />

Like an electrical network, a fluid network must satisfy<br />

Kirchhoff's current law, i.e., the flow out of any node is<br />

equal to the flow <strong>in</strong>to that node. Mathematically,<br />

Kirchhoff's current law for fluid flow networks can be<br />

expressed as:<br />

n<br />

∑<br />

j=<br />

1<br />

E<br />

Qij<br />

E<br />

⎡Q<strong>in</strong><br />

⎤<br />

⎢ ⎥ = 0<br />

⎣ Q ⎦<br />

Q<strong>in</strong><br />

or<br />

Q + e<br />

j<br />

Q<strong>in</strong>i<br />

Q<br />

<strong>in</strong><br />

j<br />

j<br />

= 0,<br />

i = 1, , n − l . (4)<br />

where n − l + 1 is the number of nodes (of which one is a<br />

“reference” node), Q is a vector of flows,<br />

E = [ e E ] Q<br />

, and E = E ] is a full rank matrix of<br />

Q<strong>in</strong><br />

Q<strong>in</strong><br />

Q<br />

[<br />

Qij<br />

order ( n − l)<br />

× n where E = 1 if branch j is connected<br />

Qij<br />

to node i and the flow goes away from node i ,<br />

E = −1 if it goes <strong>in</strong>to node i , E = 0 if branch j is<br />

Qij<br />

not connected to node i ; e<br />

Q<strong>in</strong><br />

is an (n-l)×1 vector such<br />

that, if the generator is connected to node i and the flow<br />

goes away from node i then e = 1 , if the flow goes<br />

Q<strong>in</strong>i<br />

Qij<br />

© 2013 ACADEMY PUBLISHER


1474 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

<strong>in</strong>to node i then e = −1<br />

, and e = 0 if the generator<br />

Q<strong>in</strong>i<br />

is not connected to node i .<br />

Similarly, the network satisfies Kirchhoff's voltage law,<br />

i.e., the sum of the pressure drops around any loop <strong>in</strong> the<br />

network must be equal to zero, or mathematically<br />

E H<br />

H = 0 or<br />

n<br />

∑<br />

j = 1<br />

E<br />

Hij<br />

H<br />

j<br />

Q<strong>in</strong>i<br />

= 0,<br />

i = 1, , l,<br />

(5)<br />

where H<br />

j<br />

is the pressure drop of the branch j , H is a<br />

vector of pressure drops, E<br />

H<br />

= [ EHij<br />

] is an l × n mesh<br />

matrix, <strong>in</strong> which each mesh (loop) is formed by a l<strong>in</strong>k and<br />

a unique cha<strong>in</strong> <strong>in</strong> the tree connect<strong>in</strong>g the two nodes of the<br />

l<strong>in</strong>k. The elements of E Hij<br />

are def<strong>in</strong>ed as follows:<br />

E<br />

Hij<br />

= 1 if branch j is conta<strong>in</strong>ed <strong>in</strong> mesh i and has the<br />

same direction, E<br />

Hij<br />

= −1<br />

if branch j is conta<strong>in</strong>ed <strong>in</strong><br />

mesh i and has the opposite direction, E<br />

Hij<br />

= 0 if branch<br />

j is not conta<strong>in</strong>ed <strong>in</strong> mesh i .<br />

In order to establish a dynamic model of m<strong>in</strong>imal order,<br />

one has to f<strong>in</strong>d <strong>in</strong>dependent variables as states of the<br />

system. We take the flows of l<strong>in</strong>k (co-tree) branches as<br />

state variables. If regards one time heartbeat as one<br />

period T , decomposes the blood pressure wave f (t)<br />

<strong>in</strong>to each k<strong>in</strong>d of simple harmonic wave comb<strong>in</strong>ation,<br />

that is:<br />

n<br />

⎛ 2πk<br />

⎞<br />

Q<strong>in</strong>(<br />

t)<br />

= Q0<br />

+ ⎜∑ak<br />

s<strong>in</strong>( t + φk<br />

) ⎟<br />

⎝ k=<br />

1 T ⎠<br />

(6)<br />

n<br />

= Q + a s<strong>in</strong>( kωt<br />

+ φ )<br />

0<br />

∑<br />

k=<br />

1<br />

k<br />

For convenience of analysis, we label the l<strong>in</strong>k branches<br />

(except the generator branch) from 1 to l. Def<strong>in</strong>e<br />

⎡Qc<br />

⎤ ⎡H<br />

c ⎤<br />

Q = ⎢ ⎥ , H = ⎢ ⎥ (7)<br />

⎣Qa<br />

⎦ ⎣H<br />

a ⎦<br />

so that Q c<br />

and H<br />

c<br />

vectors describe flow and pressure<br />

drop, respectively, <strong>in</strong> the l<strong>in</strong>ks, exclud<strong>in</strong>g the generator<br />

branch, and Q and H vectors describe them <strong>in</strong> the tree<br />

branches.<br />

The matrices<br />

where [18-19]<br />

E<br />

a<br />

Qa<br />

a<br />

E<br />

H<br />

and EQ<br />

<strong>in</strong> can be split <strong>in</strong>to blocks<br />

H<br />

[ E E ]<br />

E = (8)<br />

Q<strong>in</strong><br />

Hc<br />

Ha<br />

[ eQ<strong>in</strong><br />

EQc<br />

EQa]<br />

E = (9)<br />

= I , E<br />

Hc<br />

= I l × l<br />

, E<br />

( n−l<br />

) × ( n−l<br />

)<br />

k<br />

= − (10)<br />

T<br />

Ha<br />

E Qc<br />

Hence, the structure of the network can be expressed <strong>in</strong><br />

the matrix form as<br />

⎡ 0<br />

E = ⎢<br />

⎢⎣<br />

e<br />

Q<strong>in</strong><br />

E<br />

I<br />

Qc<br />

− E<br />

I<br />

T<br />

Qc<br />

⎤<br />

⎥<br />

⎥⎦<br />

(11)<br />

Furthermore,<br />

⎡T<br />

c<br />

T = ⎢<br />

⎣0<br />

0 , [ ] T<br />

⎤<br />

T T<br />

T<br />

⎥ R = R c<br />

Ra<br />

(12)<br />

a⎦<br />

Fluid circulation through the network of network<br />

model<strong>in</strong>g, accord<strong>in</strong>g to the aforementioned study, us<strong>in</strong>g<br />

the average method can solve the flow waveform, and<br />

then f<strong>in</strong>d its pulse wave flow waveform[15-20], that is:<br />

n 2<br />

⎛ a ⎞<br />

k −1<br />

Q<br />

⎜<br />

⎟<br />

c<br />

( t)<br />

= Qc0<br />

− ∑ V U<br />

⎝ k=<br />

1 4 ⎠<br />

(13)<br />

n<br />

⎛<br />

⎞<br />

+ Bc<br />

⎜∑<br />

ak<br />

s<strong>in</strong>( kωt<br />

+ φk<br />

) ⎟<br />

⎝ k=<br />

1<br />

⎠<br />

where<br />

Q ( t)<br />

= ( −E<br />

a<br />

Qc<br />

⎛<br />

+ Bc<br />

⎜<br />

⎝<br />

Q<br />

c0<br />

n<br />

∑<br />

k=<br />

1<br />

− e<br />

Q<strong>in</strong><br />

⎛<br />

Q +<br />

⎜<br />

0)<br />

⎝<br />

n<br />

∑<br />

k=<br />

1<br />

⎞<br />

ak<br />

s<strong>in</strong>( kωt<br />

+ φk<br />

) ⎟<br />

⎠<br />

T ( T)<br />

= T + E T E<br />

2<br />

a ⎞<br />

k<br />

⎟E<br />

4 ⎠<br />

Qc<br />

V<br />

−1<br />

U<br />

(14)<br />

T<br />

0 c Qc a Qc<br />

(15)<br />

2<br />

T 2<br />

{ B R } E col{ B R }<br />

U ( R,<br />

T,<br />

E)<br />

= col −<br />

(16)<br />

ci<br />

ci<br />

Qc<br />

ai<br />

ai<br />

T<br />

{ Q R } − E W<br />

V ( R,<br />

E,<br />

Q0)<br />

= diag<br />

c0i<br />

ci Qc<br />

(17)<br />

= E ( −E<br />

Q − e Q R (18)<br />

{<br />

Qcij Qci c0 Q<strong>in</strong> 0)<br />

ci} n l l<br />

W<br />

i ( − ) ×<br />

0<br />

( R,<br />

E,<br />

Q0<br />

and Q c<br />

) denotes l-dimensional solution of<br />

quadratic equation, that is:<br />

2<br />

T<br />

2<br />

Q R − E diag ( E Q + e Q ) R (19)<br />

i<br />

{ } 0<br />

c0 D c Qc<br />

Qci c0<br />

Q<strong>in</strong> 0 a<br />

=<br />

−<br />

such that V is nons<strong>in</strong>gular and − T 1 V is Hurwitz. Then<br />

for a given Q<br />

0<br />

> 0 , for sufficiently small a and<br />

sufficiently large ω the solutions of the system (1) ~ (6)<br />

4<br />

locally exponentially converge to a O ( 1 ω + a )<br />

neighborhood.<br />

IV. PULSE WAVE K VALUE SIMULATION AND CLINICAL<br />

PATHOLOGICAL DIAGNOSIS<br />

A. Healthy Middle-aged Cl<strong>in</strong>ical Detection and Pulse<br />

Wave Simulation Analysis<br />

To observe the relationship between the cl<strong>in</strong>ical value<br />

of K changes and the major physiological factors (such as<br />

the harden<strong>in</strong>g degree of the blood vessel wall, peripheral<br />

resistance, etc.). First we measured the pulse waveform to<br />

a thousand patients with different age groups, <strong>in</strong>clud<strong>in</strong>g<br />

healthy people and people with vary<strong>in</strong>g degrees of high<br />

blood pressure or vascular sclerosis. The <strong>in</strong>strument is<br />

used with cardiovascular blood flow parameters TP-CBS<br />

detector. After statistical analysis, the typical waveform<br />

and the correspond<strong>in</strong>g coefficient K are shown <strong>in</strong> Figure<br />

2.<br />

After measurement and cl<strong>in</strong>ical trials, the results<br />

showed that:<br />

(1) Young and healthy people, pregnant women,<br />

athletes are low vascular resistance, arterial elasticity, the<br />

K value is about 0.33 (Figure 2 (a));<br />

0<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1475<br />

(2) Healthy young people <strong>in</strong> the vascular resistance<br />

and arterial elastic are medium, the K value between<br />

about 0.34 to 0.39 (Figure 2 (b), (c), (d), (e));<br />

(3) Middle aged and elderly people are higher vascular<br />

resistance, poor arterial elasticity, the K value is about 0.4<br />

or so (Figure 2 (f));<br />

(4) Patients with severe hypertension and<br />

atherosclerosis are high vascular resistance, poor arterial<br />

elasticity, the K value is about 0.45 to 0.5 (Figure 2 (g),<br />

(h) ).<br />

Generally we measured radial artery pulse wave,<br />

because of its high flow, it is easy to measure, but<br />

consider<strong>in</strong>g that the circulatory system is large and<br />

complex, its model is difficult to solve, because the<br />

arterial pulse wave is constant <strong>in</strong> the transmission cycle,<br />

Therefore, we use the above method to solve cerebral<br />

circulation network.<br />

Cerebral circulation refers to the movement of blood<br />

through the network of blood vessels supply<strong>in</strong>g the bra<strong>in</strong>.<br />

The arteries deliver oxygenated blood, glucose and other<br />

nutrients to the bra<strong>in</strong> and the ve<strong>in</strong>s carry deoxygenated<br />

blood back to the heart, remov<strong>in</strong>g carbon dioxide, lactic<br />

acid, and other metabolic products. S<strong>in</strong>ce the bra<strong>in</strong> is very<br />

vulnerable to compromises <strong>in</strong> its blood supply, the<br />

cerebral circulatory system has many safeguards. Failure<br />

of these safeguards results <strong>in</strong> cerebrovascular accidents,<br />

commonly known as strokes. The amount of blood that<br />

the cerebral circulation carries is known as cerebral blood<br />

flow.<br />

Cerebral arteries describe three ma<strong>in</strong> pairs of arteries<br />

and their branches, which irrigate the cerebrum of the<br />

bra<strong>in</strong>. The three ma<strong>in</strong> arteries consist of the: Anterior<br />

cerebral artery (ACA), Middle cerebral artery (MCA),<br />

Posterior cerebral artery (PCA). Both the ACA and MCA<br />

orig<strong>in</strong>ate from the cerebral portion of <strong>in</strong>ternal carotid<br />

artery, while PCA branches from the <strong>in</strong>tersection of the<br />

posterior communicat<strong>in</strong>g artery and the anterior portion<br />

of the basilar artery. The three pairs of arteries are l<strong>in</strong>ked<br />

via the anterior communicat<strong>in</strong>g artery and the posterior<br />

communicat<strong>in</strong>g arteries. All three arteries send out<br />

arteries that perforate bra<strong>in</strong> <strong>in</strong> the medial central portions<br />

prior to branch<strong>in</strong>g and bifurcat<strong>in</strong>g further. Anatomy of<br />

the cerebral circulation is shown <strong>in</strong> figure 4, the cerebral<br />

circulation equivalent plane structure (18 branches) is<br />

shown <strong>in</strong> figure 5.<br />

Figure 2. Pulse waves and K of people <strong>in</strong> different ages and healthy<br />

conditions.<br />

Thus, <strong>in</strong>creased with age or the development of<br />

hypertension, atherosclerosis, vascular resistance, pulse<br />

wave waveform develops bread-type waveform by the<br />

steep progressive, the waveform coefficient K <strong>in</strong>creases<br />

correspond<strong>in</strong>gly (<strong>in</strong> general changes between 0.35 ~ 0.5).<br />

It is shown <strong>in</strong> figure 3, maps of K values <strong>in</strong> the different<br />

age groups<br />

Figure 4. Anatomy of the cerebral circulation.<br />

Figure 3. Maps of K values <strong>in</strong> the different age groups<br />

© 2013 ACADEMY PUBLISHER


1476 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Loop 7: H<br />

7<br />

− H9<br />

− H10<br />

+ H11<br />

= 0 ,<br />

Loop 8: H<br />

8<br />

− H10<br />

+ H11<br />

− H12<br />

− H13<br />

+ H14<br />

− H15<br />

= 0 .<br />

We knew l , d<br />

1<br />

, ρ of the cerebral circulation network<br />

from paper [1], it is shown <strong>in</strong> table I.<br />

TABLE I.<br />

THE ARTERIAL GEOMETRY PARAMETERS OF THE CIRCLE OF WILLIS<br />

artery number length(cm) diameter(cm)<br />

<strong>in</strong>ternal carotid a. 7,1 25 0.4<br />

basilar a. 9 3 0.4<br />

Posterior communicat<strong>in</strong>g 11,15 2 0.12<br />

a.<br />

posterior cerebral a.Ⅰ 10,8 2 0.3<br />

anterior cerebral a.Ⅰ 12,14 2 0.25<br />

anterior communicat<strong>in</strong>g a. 13 0.5 0.15<br />

middle cerebral a. 5,2 7 0.35<br />

posterior cerebral a.Ⅱ 6,16 7 0.3<br />

Figure 5. The network equivalent plane diagram of cerebral circulation<br />

(16 branches).<br />

The network of the cerebral circulation has 16<br />

branches, 8 nodes and 1 generator branch. Choose<br />

branches 9 to 16 and generator as the tree of the network.<br />

The node equations can be expressed as:<br />

Node 1: Q <strong>in</strong><br />

− Q1 − Q7<br />

− Q9<br />

= 0 ;<br />

Node 2: Q<br />

8<br />

+ Q10<br />

− Q9<br />

= 0 ;<br />

Node 3: Q<br />

6<br />

− Q10<br />

− Q11<br />

= 0 ;<br />

Node 4: Q<br />

5<br />

− Q7<br />

+ Q11<br />

+ Q12<br />

= 0 ;<br />

Node 5: Q<br />

4<br />

− Q12<br />

+ Q13<br />

= 0 ;<br />

Node 6: Q<br />

3<br />

− Q13<br />

− Q14<br />

= 0 ;<br />

Node 7: Q<br />

2<br />

+ Q14<br />

+ Q15<br />

− Q1<br />

= 0 ;<br />

Node 8: Q<br />

16<br />

− Q8<br />

− Q15<br />

= 0 ;<br />

After transformation:<br />

Q <strong>in</strong><br />

= Q1 + Q7<br />

+ Q9<br />

Q <strong>in</strong><br />

= Q1 + Q7<br />

+ Q8<br />

+ Q10<br />

Q <strong>in</strong><br />

= Q1 + Q6<br />

+ Q7<br />

+ Q8<br />

− Q11<br />

Q <strong>in</strong><br />

= Q1 + Q5<br />

+ Q6<br />

+ Q8<br />

+ Q12<br />

Q <strong>in</strong><br />

= Q1 + Q4<br />

+ Q5<br />

+ Q6<br />

+ Q8<br />

+ Q13<br />

Q <strong>in</strong><br />

= Q1 + Q3<br />

+ Q4<br />

+ Q5<br />

+ Q6<br />

+ Q8<br />

− Q14<br />

Q <strong>in</strong><br />

= Q2 + Q3<br />

+ Q4<br />

+ Q5<br />

+ Q6<br />

+ Q8<br />

+ Q15<br />

Q <strong>in</strong><br />

= Q2 + Q3<br />

+ Q4<br />

+ Q5<br />

+ Q6<br />

+ Q16<br />

The loop equations can be expressed as:<br />

Loop 1: H<br />

1<br />

− H<br />

9<br />

− H10<br />

− H11<br />

+ H12<br />

− H13<br />

− H14<br />

= 0 ;<br />

Loop 2: H<br />

2<br />

− H15<br />

− H16<br />

= 0 ;<br />

Loop 3: H<br />

3<br />

+ H14<br />

− H15<br />

− H16<br />

= 0 ;<br />

Loop 4: H<br />

4<br />

− H13<br />

+ H14<br />

− H15<br />

− H16<br />

= 0 ,<br />

Loop 5: H<br />

5<br />

− H12<br />

− H13<br />

+ H14<br />

− H15<br />

− H16<br />

= 0 ,<br />

Loop 6: H + H − H − H + H − H − H 0 ,<br />

6 11 12 13 14 15 16<br />

=<br />

anterior cerebral a.Ⅱ 4,3 5 0.25<br />

ρl<br />

1.63l<br />

We can obta<strong>in</strong> T from T = and R from R = .<br />

4<br />

S<br />

D<br />

We may obta<strong>in</strong> Q c0 equation set from type (19), this<br />

equation only has numerical solution, but does not have<br />

the exact solution, uses the genetic algorithm to get the<br />

iterative solution. We can get H from Q , H is equal to<br />

P .<br />

First, we solve the cerebral circulation blood flow Q<br />

with the normal person, and we can get H from (2), that<br />

is P <strong>in</strong> (1), its comput<strong>in</strong>g simulation result is shown <strong>in</strong><br />

figure 6.<br />

`<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1477<br />

It is shown <strong>in</strong> figure 6, the normal cerebral circulation<br />

network 10 times harmonic waveform are basically the<br />

same with healthy middle-aged <strong>in</strong> figure 2 and figure 3 ,<br />

the K value is 0.356 by calculat<strong>in</strong>g, and K is cl<strong>in</strong>ically<br />

consistent with 0.34 ~ 0.39.<br />

B. Cerebral Infarction Cl<strong>in</strong>ical Detection and Pulse<br />

Wave Pathological Analysis<br />

Cerebral <strong>in</strong>farction causes bra<strong>in</strong> tissue partial arterial<br />

blood flows poorly or completely stop due to <strong>in</strong>sufficient<br />

blood supply, and blood viscosity is an important factor<br />

<strong>in</strong> caus<strong>in</strong>g vascular resistance, and its dynamic changes<br />

are related with the cerebral lesions closely. From paper<br />

[11], <strong>in</strong> order to clarify the correlation between the<br />

waveform characteristic K value and the blood viscosity,<br />

<strong>in</strong> cl<strong>in</strong>ical test, the observed 100 cerebral <strong>in</strong>farction<br />

patients with CT or NMR diagnosis (mean age 54 years,<br />

male 63 cases, females 37 cases) are vary<strong>in</strong>g degrees of<br />

hyperviscosity and microcirculation. Before and after<br />

treatment, use blood flow parameters TP.CBS<br />

nondestructive detector to detect the patient's pulse wave<br />

pressure and K-value. At the same time, use LS30 to test<br />

blood viscosity, and compared with the K value, the<br />

results is shown <strong>in</strong> Table II.<br />

TABLE II.<br />

CLINICAL EXAMINING RESULTS<br />

Parameter<br />

Before treatment After treatment<br />

K 0.55±0.12 0.31±0.1<br />

Blood viscosity 6.27±1.9 3.6±1.2<br />

Sett<strong>in</strong>g the term<strong>in</strong>al resistance value of R 2 that is 3<br />

times higher than normal to simulate the side of the<br />

middle cerebral artery area <strong>in</strong>farction lesions, choose to<br />

simulate the case of compensatory cerebral calculation,<br />

select the compensatory situation <strong>in</strong> which the normal<br />

circle of Willis before and after the traffic artery open.<br />

Tak<strong>in</strong>g the term<strong>in</strong>al resistance value of R 2 which is 3<br />

times higher than normal to simulate the side of the<br />

middle cerebral artery area <strong>in</strong>farction lesions, choose the<br />

compensatory situation to simulate cerebral calculation,<br />

which the traffic arteries of the circle of Willis are open.<br />

Tak<strong>in</strong>g the diameter of the anterior communicat<strong>in</strong>g artery<br />

to calculate parameters, D13=0.2cm, the diameter of the<br />

posterior communicat<strong>in</strong>g artery D 11 =D 15 =0.15cm, R 13 ,<br />

R 11 , R 15 are 590, 6439 and 6439 dyn·s/cm, T 13 =119.4908,<br />

we can get Ten harmonics from (13) and (14), The circle<br />

of Willis pulse wave with the cerebral <strong>in</strong>farction is shown<br />

<strong>in</strong> figure 7.<br />

Figure 6. The circle of Willis pulse wave with the normal human.<br />

© 2013 ACADEMY PUBLISHER


1478 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 7. The circle of Willis pulse wave with the cerebral <strong>in</strong>farction.<br />

We can see the pulse wave of the cerebral <strong>in</strong>farction<br />

from the simulation figure 6, the K value is 0.495, and is<br />

close to the cl<strong>in</strong>ical test of cerebral <strong>in</strong>farction <strong>in</strong> Table II,<br />

K = 0.55 ± 0.12, from the chang<strong>in</strong>g trend of the K<br />

value, this result matches with the actual cl<strong>in</strong>ical<br />

detection basically.<br />

V. CONCLUSION<br />

In summary, the pulse waveforms extracted the K<br />

value by averag<strong>in</strong>g computation and the wave area,<br />

although it does not fully reflect subtle changes <strong>in</strong> the<br />

pulse curve that conta<strong>in</strong>s all the local physiological and<br />

pathological significance, but it represents some<br />

important physiological parameters <strong>in</strong> the human blood<br />

circulatory system, such as peripheral vascular resistance,<br />

blood viscosity and so on. Consider<strong>in</strong>g the characteristic<br />

<strong>in</strong>formation to reduce only one characteristic quantity K,<br />

it is easy to remember, a clear physiological significance,<br />

and changes very regular, can be easily accepted by<br />

cl<strong>in</strong>icians, so it can be used as important cardiovascular<br />

physiological parameters of the cl<strong>in</strong>ical exam<strong>in</strong>ation.<br />

In the averag<strong>in</strong>g comput<strong>in</strong>g pulse wave process, the<br />

network only needs to know the relevant basic<br />

physiological parameters of blood vessel branch, and<br />

calculat<strong>in</strong>g the pulse wave and the K value is more high<br />

precision than pulse wave detector. The stability test<strong>in</strong>g<br />

results do not affect with the emotional fluctuates <strong>in</strong> the<br />

waveform, the different K values corresponds to different<br />

pathological conditions, so that it can provide an nondestructive<br />

test<strong>in</strong>g mathematical calculation and analysis<br />

methods for the cl<strong>in</strong>ical parameters of blood circulation.<br />

ACKNOWLEDGMENT<br />

This work is supported by NSF 60970105; education<br />

department S&T plan J08LJ70 and NSF of Shandong<br />

Prov<strong>in</strong>ce ZR2010FL015 and ZR2010FL021; MOHURD<br />

and Shandong Development science and technology<br />

project 2010-K9-26 and 2011YK05.<br />

REFERENCES<br />

[1] D<strong>in</strong>g Guang-hong, Yao Wei,Wang Yan-bo, “A<br />

Hemodynmic Model and A Mathematical Method to<br />

calculate the Dynamics <strong>in</strong>dex for Cerebral Circulation”,<br />

Journal of Hydrodynamics, Ser. B, vol. 9, no.4, pp.71-78,<br />

1997.<br />

[2] Satish Chandra , Rajesh Bhat , Har<strong>in</strong>der S<strong>in</strong>gh ,<br />

D.S.Chauhan, "Detection of Bra<strong>in</strong> Tumors from MRI us<strong>in</strong>g<br />

Gaussian RBF kernel based Support Vector Mach<strong>in</strong>e",<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1479<br />

IJACT: International Journal of Advancements <strong>in</strong><br />

Comput<strong>in</strong>g Technology, vol. 1, no. 1, pp. 46-51, 2009.<br />

[3] Hui Liu, Guochao Sun, " A New Method of Medical Image<br />

Retrieval for Computer-Aided Diagnosis", Journal of<br />

Software, v 7, n 6, p 1289-1295, 2012.<br />

[4] Berend Hillen, Hendrik W. Hoogstraten and Lourens Post,<br />

“A mathematical model of the flow <strong>in</strong> the circle of Willis”,<br />

Journal of Biomechanics, Elsevier, vol. 19, no.3, pp. 187-<br />

194, 1986.<br />

[5] Berend Hillen, Bart A.H. Dr<strong>in</strong>kenburg, Hendrik W.<br />

Hoogstraten and Lourens Post, "Analysis of flow and<br />

vascular resistance <strong>in</strong> a model of the cricle of Willis",<br />

Journal of Biomechanics, Elsevier, vol. 21, no.10, pp. 807-<br />

814, 1988.<br />

[6] Wang, Xiaoyong, Fang, Yuefeng, "Study on remote aided<br />

diagnosis system of mental health base on export<br />

knowledge base", Journal of Software, v 6, n 5, p 834-841,<br />

2011.<br />

[7] Mauro Urs<strong>in</strong>o, Massimo Giannessi, "A Model of<br />

Cerebrovascular Reactivity Includ<strong>in</strong>g the Circle of Willis<br />

and Cortical Anastomoses", Annals of Biomedical<br />

Eng<strong>in</strong>eer<strong>in</strong>g, vol. 38, no.3, pp.955-974, 2010.<br />

[8] Liang F, Fukasaku K, Liu H, et al., "A computational<br />

model study of the <strong>in</strong>fluence of the anatomy of the circle of<br />

willis on cerebral hyperperfusion follow<strong>in</strong>g carotid artery<br />

surgery", Biomedical Eng<strong>in</strong>eer<strong>in</strong>g Onl<strong>in</strong>e, pp. 84.2010.<br />

[9] Devault K, Gremaud PA, Novak V, et al., Blood Flow <strong>in</strong><br />

the circle of willis: Model<strong>in</strong>g and Calibration, Multiscale<br />

Model Simulation, vol. 7, no.2, p888-909, 2008.<br />

[10] Seol HJ, Sh<strong>in</strong> DC, Kim YS, et al., Computational analysis<br />

of hemodynamics us<strong>in</strong>g a two-dimensional model <strong>in</strong><br />

moyamoya disease, Journal Neurosurg Pediatr, vol. 5, no.3,<br />

p297-301, 2010.<br />

[11] Luo zhichang, Zhang Song, Yang Wenm<strong>in</strong>g, "A research<br />

on characteristic <strong>in</strong>formation of pulse wave", Journal of<br />

Beij<strong>in</strong>g polytechnic university, vol.22, no.1, pp.71-79, 1996.<br />

[12] Li Yang, J<strong>in</strong>xue Sui, Yunan Hu, X<strong>in</strong>li Zhang, Yan J<strong>in</strong>,<br />

"Cerebral Circulation Nonl<strong>in</strong>ear Model<strong>in</strong>g and Vertebral<br />

Artery Stenosis Pathological Simulation", JCIT: Journal of<br />

Convergence Information Technology, Vol. 6, No. 11, pp.<br />

361 ~ 370, 2011.<br />

[13] J<strong>in</strong>xue Sui, Yun'an Hu, Li Yang, Zhen Hua, "A<br />

Hemodynamics M<strong>in</strong>imal Model for the Cerebral<br />

Circulation of Willis Based on Graph Theory", The 2nd<br />

International Conference on Bio<strong>in</strong>formatics and<br />

Biomedical Eng<strong>in</strong>eer<strong>in</strong>g, pp.1796-1799, 2008.<br />

[14] Yun'an Hu, J<strong>in</strong>xue Sui, Li Yang, Zhen Hua, "A Nonl<strong>in</strong>ear<br />

Model for the Circle of Willis Based on Hemodynamics”,<br />

The 3rd International Conference on Bio<strong>in</strong>formatics and<br />

Biomedical Eng<strong>in</strong>eer<strong>in</strong>g, pp.1-4, 2009.<br />

[15] Olga I. Koroleva, Miroslav Krstic, “Averag<strong>in</strong>g analysis of<br />

periodically forced Fluid flow networks”, Automatica,<br />

Elsevier, vol. 41, no.1, pp.129-135, 2005.<br />

[16] Yunan Hu, Olga I. Koroleva, Miroslav Krstic, Nonl<strong>in</strong>ear<br />

Control of M<strong>in</strong>e Ventilation Networks, Systems & Control<br />

Letters, 2003,49: 239-254.<br />

[17] Sui, J<strong>in</strong>xue, Yang, Li, Hu, Yunan, Zhu, Zhil<strong>in</strong>, "Cerebral<br />

circulation network model<strong>in</strong>g and averag<strong>in</strong>g pathological<br />

analysis", Applied Mechanics and Materials, vol. 40-41,<br />

pp.133-139, 2011.<br />

[18] Li Yang, J<strong>in</strong>xue Sui, Yunan Hu, X<strong>in</strong>li Zhang, Yan J<strong>in</strong>,<br />

"Cerebral Circulation Averag<strong>in</strong>g Computation and<br />

Pathological Analysis", IJACT: International Journal of<br />

Advancements <strong>in</strong> Comput<strong>in</strong>g Technology, Vol. 3, No. 11,<br />

pp. 88 ~ 95, 2011.<br />

[19] H.K. Khalil, Nonl<strong>in</strong>ear Systems, 3rd ed., Prentice Hall,<br />

2002.<br />

[20] Han Zengj<strong>in</strong>, Adaptive control, Beij<strong>in</strong>g: Ts<strong>in</strong>ghua<br />

University Press, 1995: 171 -192.<br />

Li Yang received the B.S. degree <strong>in</strong> the<br />

applied mathematics from yantai university,<br />

Yantai <strong>in</strong> 2002 and the M.S. degree and <strong>in</strong><br />

the operational research and cybernetics<br />

from Beij<strong>in</strong>g Jiaotong University, Ch<strong>in</strong>a, <strong>in</strong><br />

2005. Currently, she is an <strong>in</strong>structor with<br />

Shandong Institute of Bus<strong>in</strong>ess and<br />

Technology and doctoral student with<br />

Naval Aeronautical Eng<strong>in</strong>eer<strong>in</strong>g University,<br />

Ch<strong>in</strong>a. His research <strong>in</strong>terests are <strong>in</strong>telligent control, fluid<br />

network control.<br />

J<strong>in</strong>xue Sui, associate professor, he<br />

received the M.S. degree <strong>in</strong> the control<br />

theory and control eng<strong>in</strong>eer<strong>in</strong>g from<br />

Northeast Dianli University, Jil<strong>in</strong>, Ch<strong>in</strong>a<br />

<strong>in</strong> 2005 and the Ph.D.~degree <strong>in</strong> the<br />

navigation, guidance and control from<br />

Naval Aeronautical Eng<strong>in</strong>eer<strong>in</strong>g<br />

University, Yantai, Ch<strong>in</strong>a <strong>in</strong> 2009.<br />

Currently, he is a <strong>in</strong>structor with<br />

Shandong Institute of Bus<strong>in</strong>ess and<br />

Technology, Ch<strong>in</strong>a. His research <strong>in</strong>terests are <strong>in</strong>telligent sensor,<br />

fluid network control and biological control now.<br />

© 2013 ACADEMY PUBLISHER


1480 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Multi-Step Prediction Algorithm of Traffic Flow<br />

Chaotic Time Series based on Volterra Neural<br />

Network<br />

Lisheng Y<strong>in</strong><br />

School of Electrical and Automation Eng<strong>in</strong>eer<strong>in</strong>g, Hefei University of Technology, Hefei, Ch<strong>in</strong>a<br />

E-mail: yls20000@163.com<br />

Yigang He, Xuep<strong>in</strong>g Dong, Zhaoquan Lu<br />

School of Electrical and Automation Eng<strong>in</strong>eer<strong>in</strong>g, Hefei University of Technology, Hefei, Ch<strong>in</strong>a<br />

E-mail: hyghnu@yahoo.com.cn, hfdxp@126.com, luzhquan@126.com<br />

Abstract—The accurate traffic flow time series prediction is<br />

the prerequisite for achiev<strong>in</strong>g traffic flow <strong>in</strong>ducible system.<br />

Aim<strong>in</strong>g at the issue about multi-step prediction traffic flow<br />

chaotic time series, the traffic flow Volterra Neural Network<br />

(VNN) rapid learn<strong>in</strong>g algorithm is proposed. Comb<strong>in</strong>g with<br />

the chaos theory and the Volterra functional analysis,<br />

method of the truncation order and the truncation items is<br />

given and the VNN model of traffic flow time series is built.<br />

Then the mechanism of the chaotic learn<strong>in</strong>g algorithm is<br />

described, and the adaptive learn<strong>in</strong>g algorithm of VNN for<br />

traffic flow time series is designed. Last, a multi-step<br />

prediction of traffic flow chaotic time series is researched by<br />

traffic flow VNN network model, Volterra prediction filter<br />

and the BP neural network based on chaotic algorithm. The<br />

simulations show that the VNNTF network model predictive<br />

performance is better than the Volterra prediction filter and<br />

the BP neural network by the simulation results and rootmean-square<br />

value.<br />

Index Terms—Chaos Theory, Phase Space Reconstruction,<br />

Time Series Prediction, VNN Neural Networks, Algorithm<br />

I. INTRODUCTION<br />

The Volterra series is a model for non-l<strong>in</strong>ear behavior<br />

similar to the Taylor series. It differs from the Taylor<br />

series <strong>in</strong> its ability to capture 'memory' effects. It has the<br />

advantages of high precision and clear physical mean<strong>in</strong>g,<br />

has become one of the very effective non-parametric<br />

model of nonl<strong>in</strong>ear system [1-4]. Traffic flow chaotic<br />

time series with the nonl<strong>in</strong>ear behavior of the response<br />

and memory function, the Volterra series to become one<br />

of the primary means of traffic flow <strong>in</strong> nonl<strong>in</strong>ear system<br />

identification [5-6]. Many scholars and technology<br />

developers have proposed a lot of Volterra identification<br />

algorithm, but the establishment of nonl<strong>in</strong>ear systems on<br />

Volterra Series model is very difficult [7-9]. Volterra<br />

series has an obvious drawback is that if you want to<br />

achieve a satisfactory accuracy may require a<br />

considerable number of estimated parameters. The highlevel<br />

nuclear estimates are fac<strong>in</strong>g the greatest difficulties.<br />

Therefore, the Volterra functional model of the<br />

application is to be greatly restricted, and sometimes <strong>in</strong><br />

order to avoid solv<strong>in</strong>g the higher-order kernel function<br />

and Volterra functional model artificially simplified,<br />

result<strong>in</strong>g <strong>in</strong> the model<strong>in</strong>g <strong>in</strong>accuracy.<br />

With the rapid development of computer technology,<br />

the neural network is more deeply and widely used <strong>in</strong><br />

nonl<strong>in</strong>ear systems [11-13]. The neural network not only<br />

has the self-adaptive, parallelism and fault tolerance<br />

characteristics, but also has the ability to approximate any<br />

nonl<strong>in</strong>ear function. Based on these advantages, the neural<br />

network model of the nonl<strong>in</strong>ear system has a very wide<br />

range of applications [14-16]. Due to the consistency of<br />

the Volterra model and the three-layer ANN model,<br />

comb<strong>in</strong>ed with the traffic flow chaotic time series chaotic<br />

characteristics, how to make use the Volterra accurate<br />

model<strong>in</strong>g of the advantages to overcome the<br />

shortcom<strong>in</strong>gs of Solutions of Higher Order kernel<br />

function; and how to use the advantages of ANN neural<br />

network model for learn<strong>in</strong>g and tra<strong>in</strong><strong>in</strong>g network to<br />

overcome the bl<strong>in</strong>dness of the ANN neural network<br />

model<strong>in</strong>g is worth explor<strong>in</strong>g.<br />

Based on the above considerations, the physical<br />

significance of the truncation order of the Volterra series<br />

model and the truncated number and the mathematical<br />

properties of the m<strong>in</strong>imum embedd<strong>in</strong>g dimension and<br />

delay time <strong>in</strong> traffic flow chaotic time series<br />

reconstructed phase space, thus, traffic flow chaotic time<br />

series VNNTF network model and the correspond<strong>in</strong>g<br />

algorithm has been established [17-20]. VNNIF neural<br />

network model to learn the advantages of the Volterra<br />

series to establish an accurate traffic prediction model<br />

and the ANN network tra<strong>in</strong><strong>in</strong>g is easy to solve the<br />

Volterra model kernel function; thus, to overcome the<br />

difficulties on Volterra series model for solv<strong>in</strong>g the<br />

higher order kernel function and the bl<strong>in</strong>dness of the<br />

ANN network model, <strong>in</strong> the traffic flow chaotic time<br />

series prediction, obta<strong>in</strong>ed good results.<br />

II. TRAFFIC FLOW CHAOTIC TIME SERIES VOLTERRA<br />

MODEL<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1480-1487


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1481<br />

For nonl<strong>in</strong>ear systems, discretization of the Volterra<br />

model is as follows:<br />

Where,<br />

∞<br />

∑∑<br />

yn ( ) = h( l, , l) xn ( −l) xn ( −l)<br />

(1)<br />

nl , i<br />

i l1<br />

, , li<br />

= 0<br />

i 1 i 1<br />

i<br />

∈ R, yn ( ) is the output of the nonl<strong>in</strong>ear<br />

system; x( n− l i<br />

) is the <strong>in</strong>put of the nonl<strong>in</strong>ear system and<br />

hi( l1, l2, , li)<br />

( i = 1, 2, , n ) is Volterra kernel function<br />

of order i .<br />

A. Model of Chaotic Time Series Prediction<br />

The chaotic time series prediction is based on the<br />

Takens' delay-coord<strong>in</strong>ate phase reconstruct theory. If the<br />

time series of one of the variables is available, based on<br />

the fact that the <strong>in</strong>teraction between the variables is such<br />

that every component conta<strong>in</strong>s <strong>in</strong>formation on the<br />

complex dynamics of the system, a smooth function can<br />

be found to model the portraits of time series. If the<br />

chaotic time series are{ x()<br />

t }, then the reconstruct state<br />

vector is x( t) = ( x( t), x( t+ τ ), , x( t+ ( m−1) τ )) , Where<br />

m ( m = 2,3, ) is called the embedd<strong>in</strong>g dimension<br />

( m = 2d<br />

+ 1, d is called the freedom of dynamics of the<br />

system), and τ is the delay time. The predictive<br />

reconstruct of chaotic series is a <strong>in</strong>verse problem to the<br />

dynamics of the system essentially. There exists a smooth<br />

m<br />

function def<strong>in</strong>ed on the reconstructed manifold <strong>in</strong> R to<br />

<strong>in</strong>terpret the dynamics x( t+ T) = F( x( t))<br />

,<br />

where T ( T > 0)<br />

is forward predictive step length, and<br />

F()<br />

⋅ is the reconstructed predictive model.<br />

B. The Determ<strong>in</strong>ation of the Truncation Order on Traffic<br />

Flow Chaotic Time Series Volterra Model<br />

Assume that the measured traffic flow chaotic time<br />

series is { xt ()( t= 1,2,3, )}, the traffic flow chaotic time<br />

series phase space reconstruction based on Takens<br />

Theorem, you can get the <strong>in</strong>put of the nonl<strong>in</strong>ear system is<br />

xt ( ), xt ( + τ ), xt ( + 2 τ), , xt ( + ( m−1) τ)<br />

, where, m is the<br />

embedd<strong>in</strong>g dimension, namely the reconstruction of<br />

phase space dimension, τ is the delay time. Here, m<br />

corresponds to the number of f<strong>in</strong>ite order <strong>in</strong> the<br />

discretization of the Volterra model, and to predict the<br />

traffic flow is predicted on the basis of the m item, then<br />

the traffic flow chaotic time series phase space<br />

reconstruction model with m-order truncation Volterra<br />

series model can be characterized as follows:<br />

x( t′ + T) = F( X( t)) = h + h ( l ) x( t−lτ<br />

)<br />

∞ ∞ ∞<br />

∑∑<br />

∞<br />

l1= 0l2= 0 lp<br />

= 0<br />

∞<br />

∑∑<br />

∞<br />

∑<br />

0 1 0 0<br />

l0<br />

= 0<br />

+ h ( l , l ) x( t−lτ) x( t− lτ)<br />

+ <br />

2 1 2 1 2<br />

l1= 0l2=<br />

0<br />

∑<br />

+ h ( l, l, , l ) xt ( −lτ ) xt ( −lτ) xt ( −lτ)<br />

m 1 2 m 1 2<br />

m<br />

(2)<br />

where, hm( l1, l2, , lm)<br />

is the m order Volterra kernel<br />

function, t′ = t+ ( m− 1) τ , T ( T > 0 ) is the forward<br />

prediction step. This <strong>in</strong>f<strong>in</strong>ite series, theoretically, can be<br />

very accurately predict<strong>in</strong>g traffic flow chaotic time series,<br />

but difficult to achieve <strong>in</strong> practical applications, it must<br />

be a f<strong>in</strong>ite order truncation and the f<strong>in</strong>ite sum <strong>in</strong> the form.<br />

Your goal is to simulate the usual appearance of papers<br />

<strong>in</strong> a Journal of the <strong>Academy</strong> <strong>Publisher</strong>. We are request<strong>in</strong>g<br />

that you follow these guidel<strong>in</strong>es as closely as possible.<br />

For traffic flow chaotic time series prediction from<br />

equation (2), it is the m-order truncated <strong>in</strong>f<strong>in</strong>ite item<br />

summation form. For example, when m = 3, it is a f<strong>in</strong>ite<br />

sum of the third order <strong>in</strong>tercept Volterra series model:<br />

N1<br />

−1<br />

∑<br />

x( t′ + T) = F( X( t)) = h + h ( l ) x( t−lτ<br />

)<br />

N2−1N2−1<br />

∑∑<br />

l1= 0 l2=<br />

0<br />

0 1 0 0<br />

l0<br />

= 0<br />

+ h ( l , l ) x( t−lτ<br />

) x( t−lτ<br />

)<br />

2 1 2 1 2<br />

N3−1N3−1N3−1<br />

∑∑∑ h2( l1, l2, l3) x( t l1τ ) x( t l2τ) x( t l3τ)<br />

(3)<br />

l1= 0 l2= 0 l3=<br />

0<br />

+ − − −<br />

so, actually want to calculate the total number of<br />

2 2<br />

coefficients is 1+ N1+ N2 + N3<br />

. Be seen with the<br />

<strong>in</strong>crease of m <strong>in</strong> the Volterra series, the number of items<br />

of Volterra Series will power rapid <strong>in</strong>crease; the<br />

correspond<strong>in</strong>g required number of calculations also<br />

showed exponential growth, which makes the actual<br />

traffic flow chaotic time series predicted to achieve more<br />

and more difficult. The total number of items of Volterra<br />

series number decreases exponentially growth. In practice,<br />

the truncation order is generally the second-order<br />

truncation or third order <strong>in</strong>tercept.<br />

C. The Determ<strong>in</strong>ation of the Truncation Items on<br />

Traffic Flow Chaotic Time Series Volterra Model<br />

In the form of the flow chaotic time series Volterra<br />

series model is (2), assume that the truncated form of<br />

limited items are as follows:<br />

N1<br />

−1<br />

∑<br />

x( t′ + T) = F( X( t)) = h + h ( l ) x( t−lτ<br />

)<br />

N2−1N2−1<br />

∑∑<br />

l1= 0 l2=<br />

0<br />

Nm−1Nm−1 Nm−1<br />

∑∑<br />

l1= 0 l2= 0 lp<br />

= 0<br />

0 1 0 0<br />

l0<br />

= 0<br />

+ h ( l , l ) x( t−lτ) x( t− lτ)<br />

+ <br />

∑<br />

2 1 2 1 2<br />

+ h ( l , l , , l ) x( t−lτ ) x( t−lτ) x( t−l<br />

τ)<br />

m 1 2 m 1 2<br />

m<br />

For traffic flow chaotic time series, it is assumed that<br />

x()<br />

t and yt () are the <strong>in</strong>put and output signals of the<br />

functional system f (, txt (′), t′ ≤ t)<br />

<strong>in</strong> the traffic flow, the<br />

<strong>in</strong>put signal of the functional system <strong>in</strong> the traffic flow to<br />

meet:<br />

1 Traffic flow <strong>in</strong>put signal is a causal relationship is<br />

met when t < 0 , then xt () = 0.<br />

2 Traffic flow functional system f (, txt (′), t′ ≤ t)<br />

is<br />

the limited memory, that is, for the t time <strong>in</strong> the system,<br />

(4)<br />

© 2013 ACADEMY PUBLISHER


1482 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

t<br />

0<br />

time very far from the t time, t 0<br />

→∞, x( t− t0<br />

) has<br />

no effect on yt (); means that the predicted value of yt ()<br />

is irrelevant to x( t− t0<br />

).<br />

In the prediction of chaos traffic flow chaotic time<br />

series, t′ = t+ ( m− 1) τ , T ( T > 0 ) is forward prediction<br />

step, x( t′ + T)<br />

represents the output associated with the<br />

<strong>in</strong>put signal x()<br />

t and the delay time τ , then<br />

N l −1<br />

1<br />

l1 l<br />

<br />

2 N li 0 ∑ 1 1 1<br />

l1<br />

= 0<br />

x( t′ + T) = f( x , x , x ) = h + h ( l ) x( t−lτ<br />

)<br />

Nl<br />

−1N<br />

1<br />

2 l −<br />

2<br />

∑∑<br />

+ h ( l , l ) x( t−lτ<br />

) x( t−l<br />

τ )<br />

l1= 0 l2=<br />

0<br />

2 1 2 1 2<br />

Nl −1N 3 l −1N<br />

1<br />

3 l −<br />

3<br />

∑∑∑ h3( l1, l2, l3) xt ( l1τ) xt ( l2τ) xt ( l3τ)<br />

(5)<br />

l1= 0 l2= 0 l3=<br />

0<br />

+ − − − +<br />

note<br />

Nmax = max( N , N , N , N ) , ( i = 1, 2, 3, ),<br />

when n≥<br />

N<br />

li<br />

max<br />

l1 l2 l3<br />

l i<br />

, the same to meet the <strong>in</strong>put traffic flow<br />

signal x = xt ( − lτ ) is irrelevant to yt () , then the<br />

formula (4) can be written as:<br />

i<br />

Nmax<br />

−1<br />

l1 l<br />

<br />

2 N li 0 ∑ 1 1 1<br />

l1<br />

= 0<br />

x( t′ + T) = f( x , x , x ) = h + h ( l ) x( t−lτ<br />

)<br />

Nmax<br />

−1Nmax<br />

−1<br />

∑ ∑<br />

+ h ( l , l ) x( t−lτ<br />

) x( t−lτ<br />

)<br />

l1= 0 l2=<br />

0<br />

Nmax −1Nmax −1Nmax<br />

−1<br />

∑ ∑ ∑<br />

l1= 0 l2= 0 l3=<br />

0<br />

2 1 2 1 2<br />

+ h ( l , l , l ) x( t−lτ) x( t−lτ) x( t− lτ)<br />

+ <br />

3 1 2 3 1 2 3<br />

Know from the above analysis of the traffic flow<br />

functional systems, the power series expansion item of<br />

prediction results are <strong>in</strong> fact only related to Know from<br />

the above analysis of the traffic flow functional systems,<br />

the power series expansion item of prediction results are<br />

<strong>in</strong> fact only related to summation form all the products of<br />

the Input signal and the first power delay time signal.<br />

This means that the value of<br />

Nmax = max( Nl , N , , )<br />

1 l<br />

N<br />

2 l<br />

N<br />

3 l i<br />

, ( i = 1, 2, 3, ) is only<br />

related with the number of <strong>in</strong>put signal and the delay time<br />

signal, which is the m<strong>in</strong>imum embedd<strong>in</strong>g dimension m<br />

of phase space, so Nmax = max( Nl , N , , )<br />

1 l<br />

N<br />

2 l<br />

N<br />

3 l i<br />

= m.<br />

Such traffic flow chaotic time series Volterra series<br />

model is f<strong>in</strong>alized by the formula (5) as follows:<br />

m−1<br />

l1 l<br />

<br />

2 N li 0 ∑ 1 1 1<br />

l1<br />

= 0<br />

x( t′ + T) = f( x , x , x ) = h + h ( l ) x( t−lτ<br />

)<br />

m−1 m−1 m−1<br />

∑∑∑<br />

m−1 m−1<br />

∑∑<br />

+ h ( l , l ) x( t−lτ<br />

) x( t−lτ<br />

)<br />

2 1 2 1 2<br />

l1= 0l2=<br />

0<br />

+ h( l, l, l) xt ( −lτ) xt ( −lτ) xt ( − lτ)<br />

+ <br />

3 1 2 3 1 2 3<br />

l1= 0l2= 0l3=<br />

0<br />

m−1m−1m−1 m−1<br />

∑∑∑ ∑<br />

+ h (, l l, l, , l xt−lτ)( xt−lτ)( xt−lτ) xt ( −lτ)<br />

(7)<br />

m 1 2 3 m 1 2 3<br />

m<br />

l1= 0l2= 0l3= 0 lm=<br />

0<br />

(6)<br />

III. TRAFFIC FLOW TIME SERIES VOLTERRA NEURAL<br />

NETWORK MODEL (VNNTF)<br />

A. Representation of Nonl<strong>in</strong>ear Systems Us<strong>in</strong>g Artificial<br />

Neural Network<br />

Has proven that the BP neural network with one<br />

hidden layer can approximate any cont<strong>in</strong>uous bounded<br />

non-l<strong>in</strong>ear system, therefore, generally selected to conta<strong>in</strong><br />

a three-layer back propagation BP network with one<br />

hidden layer to approximate nonl<strong>in</strong>ear systems. A s<strong>in</strong>gle<br />

output three-layer back propagation neural network is<br />

shown <strong>in</strong> Figure 1. In the figure, the <strong>in</strong>put vector<br />

T<br />

x = [ x , x , x ] at moment n can obta<strong>in</strong> by the<br />

k k,0 k,1 k,<br />

M<br />

delay of x( k ), where x<br />

,<br />

= xk ( − m)<br />

, the <strong>in</strong>put of the l<br />

km<br />

hidden unit ( l = 1, 2, , L) is<br />

Z<br />

= S ( u ); ulk ,<br />

= ∑ wlm ,<br />

xkm<br />

,<br />

(8)<br />

lk , l lk ,<br />

M<br />

m=<br />

0<br />

A s<strong>in</strong>gle output three-layer back propagation neural<br />

network is shown <strong>in</strong> Figure 1.<br />

x k,0<br />

x km ,<br />

x kM ,<br />

w L , m<br />

w 1,0<br />

w<br />

,0<br />

w l<br />

L,0<br />

w 1,m<br />

w lm ,<br />

w 1,M<br />

w lM ,<br />

w L , M<br />

U 1,k<br />

U lk ,<br />

U L , k<br />

S()<br />

⋅<br />

S()<br />

⋅<br />

S()<br />

⋅<br />

Z 1,k<br />

Z lk ,<br />

Z L , k<br />

<strong>in</strong>put hidden layer output<br />

Figure 1. Three layer neural networks <strong>in</strong> response to M+1 <strong>in</strong>put and<br />

s<strong>in</strong>gle output system<br />

If the implicit function selected the sigmoid function,<br />

then<br />

1<br />

Sl( u<br />

,<br />

) = l k<br />

1 + exp[ − λ( u − θ )]<br />

(9)<br />

Where, θ<br />

l<br />

is the threshold of the unit n, If the output unit<br />

is l<strong>in</strong>ear summation unit, the output at moment n is<br />

y<br />

L<br />

r l<br />

lk ,<br />

r 1<br />

r L<br />

k l l,<br />

k<br />

l = 1<br />

l<br />

Z<br />

= ∑ rZ<br />

(10)<br />

The output of each hidden unit to expand <strong>in</strong>to a Taylor<br />

series at the threshold θ<br />

l<br />

:<br />

Z = ϕ ( u ) =∑ d ( θ ) u<br />

i<br />

(11)<br />

l, k l l, k i l l,<br />

k<br />

i=<br />

0<br />

where, d ( θ ) is the commencement of the coefficient,<br />

i<br />

l<br />

the value associated with<br />

M<br />

lk , lm , km ,<br />

m=<br />

0<br />

∞<br />

θ<br />

l<br />

y k<br />

, and because of<br />

u = ∑ w x , then the output of the neural network<br />

is<br />

L ∞<br />

M M<br />

∑∑ ∑ ∑<br />

y = r d ( θ ) ⋅ w w x x (12)<br />

k l i l l, m1 l, mi<br />

k, m1<br />

k,<br />

mi<br />

l= 1 i= 0 m1<br />

= 0 mi<br />

= 0<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1483<br />

B. Traffic Flow Volterra Neural Network Model<br />

Analysis and comparison of traffic flow Volterra series<br />

model <strong>in</strong> equation (6) and three-layer BP neural network<br />

<strong>in</strong> equation (12), if the <strong>in</strong>put vector <strong>in</strong> equation (12) <strong>in</strong><br />

VNNTF to take the traffic flow chaotic time series, then<br />

between them <strong>in</strong> the function, structure and method for<br />

solv<strong>in</strong>g are <strong>in</strong>herently close contact and similarity.<br />

1) From a functional po<strong>in</strong>t of view, the traffic flow<br />

chaotic time series, Volterra series model and ANN<br />

model can be measured traffic flow chaotic time series, to<br />

simulate and predict the traffic flow process. Traffic flow<br />

chaotic time series Volterra model can determ<strong>in</strong>e the<br />

model truncation order of the truncation by the<br />

characteristics analysis of the traffic flow time series.<br />

Then, it can use the system identification to strike a<br />

nuclear function of the Volterra series model, or proper<br />

orthogonal decomposition method, stepwise multiple<br />

regression method, iterative decl<strong>in</strong>e <strong>in</strong> the gradient<br />

method, Volterra filter and constra<strong>in</strong>ts orthogonal<br />

approximation method to solve the nuclear function or<br />

Volterra series, which reflect the chaotic nonl<strong>in</strong>ear law of<br />

the traffic flow.<br />

2) From a structural po<strong>in</strong>t of view, the traffic flow<br />

chaotic time series Volterra model and ANN model is<br />

also isomorphic. Length of the storage memory of past<br />

traffic flow relative to chaotic time series <strong>in</strong> the traffic<br />

flow Volterra model, that is, the m<strong>in</strong>imum embedd<strong>in</strong>g<br />

dimension <strong>in</strong> phase space reconstruction of is equivalent<br />

to the number of neurons of the ANN model <strong>in</strong>put layer.<br />

3) From a method for solv<strong>in</strong>g po<strong>in</strong>t of view, Traffic<br />

flow chaotic time series Volterra model is based on<br />

orthogonal polynomials for the numerical approximation<br />

to f<strong>in</strong>d the approximate solution.the Meixner function<br />

systems and network weights have the same effect.<br />

x()<br />

t<br />

xt ( + τ )<br />

xt ( + ( m−1) τ )<br />

w N ,1<br />

w 1,m<br />

w 1,0<br />

w2,0<br />

wN ,0<br />

w 1,1<br />

w 2,1<br />

w 2,m<br />

w N , m<br />

V () t 1<br />

V () t yt <br />

g ()<br />

2 2<br />

V () N<br />

t<br />

Input Hidden layer Output<br />

Figure 2. The chaotic time series Volterra neural network traffic flow<br />

model (VNNTF)<br />

Through consistency of traffic flow chaotic time series<br />

Volterra model and ANN model, <strong>in</strong> this paper, the traffic<br />

flow chaotic time series Volterra neural network model<br />

(VNNTF) has been proposed <strong>in</strong> Figure 2. In the figure,<br />

X() t = ( xt (), xt ( + τ ), , xt ( + ( m−1) τ ) T ( t = 1, 2, ) is the<br />

traffic flow chaotic time series reconstructed phase space<br />

vector; w<br />

i,<br />

j<br />

( i = 1, 2, ; j = 1, 2, ), r n<br />

is the traffic flow<br />

chaotic time series Volterra neural network weights<br />

parameters; g , ( s = 1, 2, , N ) is the activation function<br />

s<br />

and Vs<br />

( k ) is the traffic flow of the convolution of the<br />

<strong>in</strong>put signal:<br />

g 1<br />

g N<br />

r 2<br />

r 1<br />

r N<br />

m<br />

V () t = w x( t+ ( i−1) τ )<br />

N<br />

∑ Ni<br />

(13)<br />

i=<br />

0<br />

Thus, the traffic flow chaotic time series Volterra<br />

neural network expression is<br />

N<br />

<br />

<br />

y( t) = f( X( t)) = f( x( t)) =∑ rsgs( VN( t))<br />

N<br />

m<br />

s s si<br />

s= 1 i=<br />

0<br />

s=<br />

1<br />

∑ ∑ (14)<br />

= rg ( w xt ( + ( i−1) τ ))<br />

IV. TRAFFIC FLOW VOLTERRA NEURAL NETWORK RAPID<br />

LEARNING ALGORITHM<br />

A. Activation Function Analysis of Traffic Tlow Volterra<br />

Neural Network<br />

Activation function of hidden layer to the VNNTF<br />

model designed for the follow<strong>in</strong>g polynomial function:<br />

g = a + a x+ a x + + a x + (15)<br />

2<br />

i<br />

s 0, s 1, s 2, s i,<br />

s<br />

where ais<br />

,<br />

∈ R is the polynomial coefficients, and then<br />

So, to get:<br />

N<br />

N +∞<br />

<br />

i<br />

y( t) = r g ( V ( t)) = ra ( V ( t))<br />

∑<br />

∑∑<br />

s s N s i,<br />

s N<br />

s= 1 s= 1 i=<br />

1<br />

N<br />

+∞<br />

m<br />

∑∑ ∑<br />

i<br />

= ra ( w xt ( + ( i−1) τ ))<br />

s i,<br />

s si<br />

s= 1 i= 1 i=<br />

0<br />

N<br />

h ( l , l , l ) = ∑ ra w w w<br />

j 1 2 j s js , sl , 1 sl , 2 sl , j<br />

s=<br />

1<br />

( j = 1, 2, , m) (16)<br />

In the VNNTF model, the sigmoid function or other<br />

functions as the activation function gs( Vs( t )) tra<strong>in</strong><strong>in</strong>g<br />

VNNTF network, the weights and thresholds are obta<strong>in</strong>ed,<br />

the activation function gs( Vs( t )) is expanded <strong>in</strong>to a<br />

Taylor series, you can obta<strong>in</strong> the polynomial coefficients:<br />

a<br />

js .<br />

( j)<br />

gs<br />

( θs<br />

)<br />

= (17)<br />

j!<br />

Among them, ( j<br />

g ) ( θ ) is the j -order derivative of<br />

s<br />

s<br />

function gs( Vs( t ) <strong>in</strong> θ s<br />

; that is a different activation<br />

function, you can get a<br />

js .<br />

. VNNTF network learn<strong>in</strong>g and<br />

tra<strong>in</strong><strong>in</strong>g, accord<strong>in</strong>g to the connection weights of the<br />

network of neurons and the coefficients of a<br />

js .<br />

, you can<br />

solve any order kernel function, which would address the<br />

difficulties of solv<strong>in</strong>g high-level nuclear function <strong>in</strong> the<br />

Volterra model. In general, if directly us<strong>in</strong>g the<br />

polynomial function for the activation function, the<br />

polynomial order is taken as m , the same Taylor<br />

expansion of the Taylor series, the order is taken to the<br />

m , so VNNTF model by sett<strong>in</strong>g different order of the<br />

activation functions to reflect the effect equivalent to the<br />

Volterra model higher order kernel function.<br />

© 2013 ACADEMY PUBLISHER


1484 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

B. Traffic Flow Volterra Neural Network Rapid Learn<strong>in</strong>g<br />

Algorithm<br />

On the establishment of traffic flow chaotic time series<br />

WNN, Network <strong>in</strong>put the number of neurons, hidden<br />

layers and the number of neurons <strong>in</strong> the hidden layer are<br />

to be considered. The follow<strong>in</strong>g traffic flow data used are<br />

from "Chongq<strong>in</strong>g Road Traffic Management Data Sheet<br />

I" and "Chongq<strong>in</strong>g Road Traffic Management Data Sheet<br />

II" <strong>in</strong> 2006. There is the study of traffic volume time<br />

series of two-lane road 28 hours and 5 m<strong>in</strong>utes every 5<br />

m<strong>in</strong>utes, <strong>in</strong>clud<strong>in</strong>g m<strong>in</strong>i-vehicles, passenger cars, light<br />

trucks, midsize, large cars, trailer, micro van, not<br />

stereotypes, such as vehicles, and its sequence length<br />

n = 337 .First, Pretreatment of the traffic flow time series,<br />

the m<strong>in</strong>imum embedd<strong>in</strong>g dimension m = 4 and delay<br />

time τ = 3 are obta<strong>in</strong>ed by calculation. Then, the traffic<br />

flow Volterra neural network can be constructed: traffic<br />

flow Volterra neural network is designed to be three<br />

layers: <strong>in</strong>put layer, s<strong>in</strong>gle hidden layer and output layer;<br />

the number of hidden layer wavelet neural taken as 9 by<br />

Kolmogorov Theorem, the number of <strong>in</strong>put layer neurons<br />

equal to the m<strong>in</strong>imum embedd<strong>in</strong>g dimension ( m = 4 ),<br />

the number of output layer is 1, so that the 4-9-1 structure<br />

of traffic flow Volterra neural network was obta<strong>in</strong>ed,<br />

specifically shown <strong>in</strong> Figure 2. The hidden layer<br />

activation function can be used sigmoid function or other<br />

commonly used functions, and here it be used with<br />

polynomial activation functions<br />

2<br />

i<br />

gs = a0, s<br />

+ a1, sx+ a2, sx + + ai,<br />

sx<br />

+ , ais<br />

,<br />

∈ R is<br />

polynomial coefficients. Optimal network parameter w<br />

s,<br />

j<br />

and r<br />

s<br />

( s = 1, 2, N , j = 1, 2, m ) can be obta<strong>in</strong>ed by<br />

learn<strong>in</strong>g and tra<strong>in</strong><strong>in</strong>g the network for reduc<strong>in</strong>g the<br />

error E , and further hj( l1, l2, lj)<br />

( j = 1, 2, m) can be<br />

calculated by comb<strong>in</strong><strong>in</strong>g the polynomial coefficients.<br />

The steps of traffic flow chaotic time series Volterra<br />

Neural Network fast learn<strong>in</strong>g algorithm is showed and the<br />

specific steps are as follows:<br />

Algorithm VNNTF model fast learn<strong>in</strong>g algorithm<br />

Step1) The hidden neurons number is 9 by<br />

Kolmogorov Theorem, so that the 4-9-1 structure of<br />

traffic flow VNNTF neural networks was obta<strong>in</strong>ed. The<br />

traffic flow time series <strong>in</strong>put signal is<br />

( xt ( ), xt ( + τ ), , xt ( + ( m−1) τ ) T , ( t = 1, 2, ) ; the<br />

<br />

output signal is yt (); the weight coefficient matrix of the<br />

hidden layer is w = ( ws, l<br />

)<br />

N× m<br />

= ( ws,<br />

i)<br />

N×<br />

m<br />

, ( s = 1, 2, 9 ,<br />

j<br />

i , j = 1, 2, , 4 ) and the parameter is r s<br />

( s = 1, 2, 9 ).<br />

Step2) The traffic flow chaotic time series Volterra<br />

Neural Network parameters w = ( w<br />

s,<br />

i)<br />

N×<br />

m<br />

and r<br />

s<br />

( s = 1, 2, 9 , i = 1, 2, 4 ) are <strong>in</strong>itialized, where the<br />

parameters w = ( w<br />

s,<br />

i)<br />

N×<br />

m<strong>in</strong> each component take random<br />

function between 0 and 1; and r s<br />

are <strong>in</strong>itialized to take 9<br />

number between 0 and 1 by the random function.<br />

Step3) Us<strong>in</strong>g phase space reconstruction theory to<br />

preprocess the traffic flow chaotic time series, and<br />

perform normalization for the reconstructed network<br />

<strong>in</strong>put signal. Based on Takens theorem, the m<strong>in</strong>imum<br />

embedd<strong>in</strong>g dimension m = 4 , and the delay time τ = 3 .<br />

The reconstruction phase space vector number is<br />

N −1 −( m− 1) τ = 327, which the top 250 vector are used<br />

as network <strong>in</strong>put signals. the form is<br />

( xt ( ), xt ( + τ ), , xx ( + ( m−1) τ )) T , where t = 1, 2, 250 ,<br />

m = 4 and τ = 3.<br />

Then, the 250 phase space vectors to make a simple<br />

normalized, the normalized as<br />

[ x() t − mean( x())]/[max( t x()) t − m<strong>in</strong>( x())]<br />

t<br />

,<br />

t = 1, 2, 250 and, mak<strong>in</strong>g the value is owned by a range<br />

of -1 / 2 to 1/2.<br />

Step4) Us<strong>in</strong>g the <strong>in</strong>itialized network and the<br />

preprocessed traffic flow time series, the first VNNTF<br />

neural network tra<strong>in</strong><strong>in</strong>g beg<strong>in</strong> with the function<br />

N +∞ m<br />

<br />

i<br />

yt () = ra ( wxt ( + ( i−1) τ )) ,<br />

∑∑<br />

∑<br />

s i,<br />

s si<br />

s= 1 i= 1 i=<br />

0<br />

and the assumed activation function is a polynomial<br />

activation function g s<br />

, here a is ,<br />

∈ R are polynomial<br />

coefficients.<br />

Step5) Calculate error function, the function formula:<br />

250<br />

1 2<br />

E( θ ) = ( y( t) − y( t))<br />

∑<br />

2 t = 1<br />

Set the maximum error is E max<br />

= 0.035 , if E < Emax<br />

,<br />

the storage VNNTF neural network parameter use<br />

w = ( w<br />

s,<br />

i)<br />

N×<br />

m<br />

and r<br />

s<br />

( s = 1, 2, 9 , i = 1, 2, 4 ) ; and<br />

further hj<br />

( l1, l2, lj<br />

) ( j = 1, 2, m) can be calculated by<br />

comb<strong>in</strong><strong>in</strong>g the polynomial coefficients, otherwise,<br />

transferred to step6).<br />

Step6) Calculate local gradient of the traffic flow<br />

chaotic time series Volterra neural network. Specifically,<br />

accord<strong>in</strong>g to the formula δ ( t) = ( y( t) − y ( t)) g ′( V ( t))<br />

( j is the output layer) and the formula<br />

j j s j<br />

∂Et<br />

()<br />

δ<br />

j() t =− g ′<br />

s<br />

( Vj())<br />

t<br />

(18)<br />

∂ y () t<br />

j<br />

where, the local gradients are calculated <strong>in</strong> the hidden<br />

layer.<br />

Step7) By <strong>in</strong>troduc<strong>in</strong>g the momentum term, to adjust<br />

the learn<strong>in</strong>g weights of the traffic flow chaotic time series<br />

Volterra neural network. Introduce nonl<strong>in</strong>ear feedback<br />

<strong>in</strong>to the weight<strong>in</strong>g formal to adopt Chaos Mechanisms,<br />

due to the nonl<strong>in</strong>ear feedback is vector form of weight<strong>in</strong>g<br />

variables. In order to facilitate understand<strong>in</strong>g,<br />

respectively, gives the vector w and its weight<strong>in</strong>g formal,<br />

as follows. Note Δ w l ( t+ 1) = w l ( t+ 1) −w l ( t)<br />

, which<br />

ji ji ji<br />

represents the current value of weight<strong>in</strong>g variables, then<br />

1<br />

Δ w l ( t+ 1) = w l ( t+ 1) − w l () t = −ηδ l+<br />

() t x l () t .<br />

ji ji ji j i<br />

In order to speed up the learn<strong>in</strong>g process, <strong>in</strong> the right to<br />

l<br />

jo<strong>in</strong> a momentum term αΔw () t , then<br />

Δ w + = − x + Δw<br />

ji<br />

l 1<br />

( 1) l +<br />

( ) l ( ) l<br />

ji<br />

t ηδ<br />

j<br />

t<br />

i<br />

t α<br />

ji<br />

( t)<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1485<br />

where α is <strong>in</strong>ertia factor; η is learn<strong>in</strong>g step;<br />

αΔ wji<br />

,<br />

( t+ 1) is the <strong>in</strong>troduction of the momentum and<br />

δ () t is calculated with the formula (9).<br />

j<br />

Expand this equation <strong>in</strong>to scalar form as follow:<br />

l l+<br />

1 l l<br />

⎧Δ wji( t+ 1) =− ηδ<br />

j<br />

() t xi () t + g( Δwji())<br />

t<br />

⎪<br />

l l+<br />

1 l l<br />

⎪Δ wji( t+ 1 + τ) =− ηδj ( t+ τ) xi ( t+ τ) + g( Δ wji( t+<br />

τ))<br />

⎪<br />

l l+<br />

1 l l<br />

⎨Δ wji( t+ 1+ 2) τ =− ηδj ( t+ 2) xi ( t+ 2) τ + g( Δ wji<br />

( t+<br />

2)) τ<br />

⎪<br />

⎪<br />

<br />

⎪ l l+<br />

1<br />

l l<br />

Δ wji( t+ 1 + ( m− 1) τ) =− ηδj ( t+ ( m− 1) τ) xi ( t+ ( m− 1) τ) + g(<br />

Δwji( t+ ( m−1) τ))<br />

⎩<br />

(19)<br />

where, feedback can take a variety of vector functions,<br />

for example:<br />

2<br />

g( x) = tanh( px) exp( − qx ) or<br />

g( x) = pxexp( − q x)<br />

,<br />

<strong>in</strong> the study, p = 0.7 , q = 0.1.<br />

Step8) Calculat<strong>in</strong>g the modified weights <strong>in</strong> the traffic<br />

flow chaotic time series Volterra neural network <strong>in</strong> Step8)<br />

and transferred to step4), and tra<strong>in</strong> network aga<strong>in</strong>, then<br />

<br />

calculate the network output yt () and the error E ,<br />

repeated tra<strong>in</strong><strong>in</strong>g until the relative error <strong>in</strong> traffic meet<br />

E < E max<br />

= 0.035 .<br />

Step9) Output of every tra<strong>in</strong><strong>in</strong>g storage of network<br />

parameters w = ( w<br />

s,<br />

i)<br />

N×<br />

m<br />

and r<br />

s<br />

( s = 1,2, 9 ,<br />

i = 1, 2, 4 ) <strong>in</strong> the traffic flow chaotic time series<br />

Volterra neural network. The activation function<br />

g ( V ( t )) is expanded <strong>in</strong>to a Taylor series at the<br />

s<br />

s<br />

threshold θ<br />

s<br />

and the expansion coefficient di( θ<br />

s)<br />

is<br />

obta<strong>in</strong>ed. If the activation function is a polynomial, then<br />

d ( θ ) = a ( s = 1, 2, 9 , i = 1, 2, 4 ).<br />

i s i,<br />

s<br />

Step10) Accord<strong>in</strong>g to the formula<br />

N<br />

h ( l , l , l ) = ∑ rd ( θ ) w w w (20)<br />

j 1 2 j s i s sl , 1 sl , 2 sl , j<br />

s=<br />

1<br />

the kernel function ( s = 1, 2, 9 , i = 1, 2, 4 ) of the<br />

output system is calculated.<br />

N + 3 values... N + T values ( T > 0 ). That is, for the<br />

known sample set can be extrapolated to predict T step.<br />

The follow<strong>in</strong>g multi-step prediction of the traffic flow<br />

VNNTF network, and the results compare with the multistep<br />

prediction of the BP neural network and filter<br />

Voltrra, further, analyz<strong>in</strong>g the causes of the different<br />

predictions. In fact, the multi-step prediction results can<br />

also be compared with the prediction results of wavelet<br />

neural network Algorithm and Wavelet Neural Network<br />

Based on Chaotic Algorithm. Can also be an attempt of<br />

the analysis for the prediction of the different results.<br />

Where, the m<strong>in</strong>imum embedd<strong>in</strong>g dimension <strong>in</strong> phase<br />

space is m = 4 , the delay time is τ = 3 , and the vector<br />

number of phase space reconstruction which can be used<br />

to tra<strong>in</strong> and predict is N − ( m− 1) τ = 327.<br />

Figure 4. The 2-step forecast result and real result<br />

Figure 5. The 2-step forecast error curve<br />

V. EXPERIMENTAL RESULTS AND ANALYSIS<br />

Experimental objective is study how much extent does<br />

the prediction performance <strong>in</strong> VNNTF neural network<br />

improve from the aspects of model construction and<br />

algorithm application.<br />

In order to study the prediction performance of traffic<br />

flow time series <strong>in</strong> traffic flow VNNTF network,<br />

respectively the VNNTF network model, Volterra<br />

prediction filter and ANN to predict the network traffic<br />

flow chaotic time series, and analyze and compare their<br />

predictions.<br />

Multi-step prediction is a major aspect to reflect the<br />

performance of predictive model. Traffic flow time series<br />

Multi-step prediction is as follows: If the sample size is<br />

N , <strong>in</strong> the new data po<strong>in</strong>t cannot be used or only the<br />

sample po<strong>in</strong>ts N , It can be predicted beyond N + 1<br />

values, can also predict the N + 2 values,<br />

Figure 6. The 3-step forecast result and real result<br />

In the network tra<strong>in</strong><strong>in</strong>g of the multi-step prediction,<br />

such as Step 2 to Step 4, the tra<strong>in</strong><strong>in</strong>g objectives of the 250<br />

reconstructed vector among the 327 reconstructed phase<br />

space vector are the traffic flow signals from t′ to<br />

t′ + 249 ( t′ = 12,13,14 ).Network tra<strong>in</strong><strong>in</strong>g, <strong>in</strong> order to<br />

compare with the measured traffic flow signal, the<br />

TT= ( 2,3,4) step forecast traffic flow signal<br />

© 2013 ACADEMY PUBLISHER


1486 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

correspond<strong>in</strong>g 260 + T ( T = 2,3, 4 ) to 337 traffic flow<br />

signal, that is, if the forecast number of steps each one<br />

more, then its projection is reduced by one. If not to make<br />

a prediction comparison with the measured signal, it does<br />

not have this restriction.<br />

Figure 7. The 3-step forecast error curve<br />

which corresponds to 2-step, 3-step and 4-step absolute<br />

error curve. Figure 4 to Figure 9 shows the effect of 3-<br />

step prediction results is worse than the 2-step prediction,<br />

the effect of 4-step prediction results is worse than the 3-<br />

step prediction; and the general trend is to predict the<br />

longer the step, the prediction performance has become<br />

gett<strong>in</strong>g worse.<br />

Analysis of multi-step prediction results to VNNTF<br />

network, the 2-step, 3-step and 4-step predictable<br />

performance overall is better than the BP neural network<br />

prediction and the Volterra filter prediction; this is<br />

because the network VNNTF comb<strong>in</strong>es the Volterra<br />

series and ANN network advantages, to overcome the<br />

difficulties of solv<strong>in</strong>g the Volterra kernel function and the<br />

bl<strong>in</strong>dness of ANN network model<strong>in</strong>g. In fact, the<br />

prediction results to VNNTF network is better than the<br />

wavelet neural network prediction based on chaotic<br />

algorithm, and this may be the establishment of a good<br />

traffic flow time series prediction model is relatively<br />

more important than to choose a good algorithm, from<br />

this sense, the establishment of traffic flow prediction<br />

model is the most critical.<br />

TABLE I.<br />

NORMALIZATION OF RMSE COMPARISON<br />

Figure 8. The 4-step forecast result and real result<br />

prediction<br />

step<br />

BP<br />

network<br />

Volterra<br />

filter<br />

VNNTF<br />

network<br />

1 step 0.7014 0.3567 0.1368<br />

2 step 0.8074 0.3941 0.1507<br />

3 step 0.8653 0.4225 0.2322<br />

4 step 0.9799 0.4782 0.2417<br />

VI. CONCLUSIONS<br />

In the paper traffic flow chaotic time series VNNTF<br />

model was designed. A traffic flow VNNTF fast learn<strong>in</strong>g<br />

algorithm based on chaos theory was proposed. The<br />

method of model selection and algorithm design, are<br />

considered the chaotic characteristics of traffic flow time<br />

series, which is a theoretical value. Simulation results<br />

show that the method can reduce network tra<strong>in</strong><strong>in</strong>g time<br />

and improve the forecast accuracy, and show better<br />

predictive effectiveness and reliability.<br />

Figure 9. The 4-step forecast error curve<br />

Were calculated the error root mean square <strong>in</strong> Figure 5,<br />

7 and 9, and these results are compared with the error<br />

root mean square of the BP network and the wavelet<br />

neural network based on the non-chaotic algorithm, and<br />

the compare results are shown <strong>in</strong> Table 1. From Table 1,<br />

with the <strong>in</strong>creas<strong>in</strong>g number of prediction steps, <strong>in</strong> which<br />

the same prediction step, the root mean square of the<br />

wavelet neural network based on chaotic algorithm is<br />

significantly less than the root mean square of BP neural<br />

network and the wavelet neural network based on nonchaotic<br />

algorithm.<br />

Figure 4, 6 and 8, respectively, which corresponds to<br />

2-step, 3-step and 4-step predicted and actual comparison<br />

curves of VNNTF network based VNNTF network rapid<br />

learn<strong>in</strong>g algorithm; and “+” shows the true value, “o”<br />

shows the forecasted value Figure 3, 7, and 9 respectively,<br />

ACKNOWLEDGMENT<br />

This research is f<strong>in</strong>ancially supported by the National<br />

Natural Science Funds of Ch<strong>in</strong>a for Dist<strong>in</strong>guished Young<br />

Scholar under Grant (50925727), and the Fundamental<br />

Research Funds for the Central Universities, Hefei<br />

University of Technology for Professor He Yigang, the<br />

National Natural Science Foundation of Ch<strong>in</strong>a (NSFC)<br />

for Professor Xue-p<strong>in</strong>g Dong (No. 60974022) and the<br />

Universities Natural Science Foundation of Anhui<br />

Prov<strong>in</strong>ce (No.KJ2012A219) for Professor Y<strong>in</strong> Lisheng.<br />

REFERENCES<br />

[1] A. Maachou, R. Malti, P. Melchior, J-L. Battaglia, et al,<br />

“Application of fractional Volterra series for the<br />

identification of thermal diffusion <strong>in</strong> an ARMCO iron<br />

sample subject to large temperature variations, “the 18th<br />

IFAC World Congress, pp. 5621-5626, August 2011<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1487<br />

[2] J. Biazara, H. Ghazv<strong>in</strong>i, “He’s homotopy perturbation<br />

method for solv<strong>in</strong>g systems of Volterra <strong>in</strong>tegral equations<br />

of the second k<strong>in</strong>d”, Chaos, Solitons & Fractals. Shahrood,<br />

Iran, vol. 39, no. 2, pp. 770-777, 2009.<br />

[3] S. Abbasbandy, A. Taati., “Numerical solution of the<br />

system of nonl<strong>in</strong>ear Volterra <strong>in</strong>tegro-differential equations<br />

with nonl<strong>in</strong>ear differential part by the operational Tau<br />

method and error estimation”, Journal of Computational<br />

and Applied Mathematics, Ghazv<strong>in</strong>, Iran, vol. 231, no. 1,<br />

pp. 106-113, September 2009.<br />

[4] Mehdi Dehghan, Mohammad Shakourifar, Asgar Hamidi,<br />

“The solution of l<strong>in</strong>ear and nonl<strong>in</strong>ear systems of Volterra<br />

functional equations us<strong>in</strong>g Adomian–Pade technique”,<br />

Chaos, Solitons & Fractals.Shahrood, Iran, vol. 39, no. 5,<br />

pp. 2509-2521, March 2009.<br />

[5] Musa Asyali, Musa Alc, “Obta<strong>in</strong><strong>in</strong>g Volterra Kernels from<br />

Neural Networks”, World Congress on Medical Physics<br />

and Biomedical Eng<strong>in</strong>eer<strong>in</strong>g, vol. 2, pp. 11-15, 2006.<br />

[6] Guy Barles, Sepideh Mirrahimi, Benoît Perthame,<br />

“Concentration <strong>in</strong> Lotka-Volterra Parabolic or Integral<br />

Equations: A General Convergence Result”, Methods Appl.<br />

Anal. Boston, vol.16, pp. 321-340, 2009.<br />

[7] M.Ghasemi, M.Tavassoli Kajani, E.Babolian, “Numerical<br />

solutions of the nonl<strong>in</strong>ear Volterra–Fredholm <strong>in</strong>tegral<br />

equations by us<strong>in</strong>g homotopy perturbation method”,<br />

Applied Mathematics and Computation, vol. 188, no. 1, pp.<br />

446-449, 2007.<br />

[8] B<strong>in</strong>g Liu, Yujuan Zhang, Lansun Chen, “Dynamic<br />

complexities <strong>in</strong> a lotka–volterra predator–prey model<br />

concern<strong>in</strong>g impulsive control strategy”, International<br />

Journal of Biomathematics, vol. 1, no. 1, pp. 179-196,<br />

2008.<br />

[9] A. Ya. Yakubov, “On nonl<strong>in</strong>ear Volterra equations of<br />

convolution type”, Differential Equations, 45, no. 9, pp.<br />

1326-1336, 2009.<br />

[10] Shunsuke Kobayakawa, Hirokazu Yokoi, “Evaluation of<br />

Prediction Capability of Non-recursion Type 2nd-order<br />

Volterra Neuron Network for Electrocardiogram”, Lecture<br />

Notes <strong>in</strong> Computer Science, vol. 5507, pp. 679-686, 2009.<br />

[11] Kang L<strong>in</strong>g, Wang Cheng, Jiang Tieb<strong>in</strong>g, “Hydrologic<br />

model of Volterra neural network and its application”,<br />

Journal of Hydroelectric Eng<strong>in</strong>eer<strong>in</strong>g.25, no. 5, pp. 22-26,<br />

2006.<br />

[12] Haiy<strong>in</strong>g Yuan, Guangju Chen, “Fault Diagnosis <strong>in</strong><br />

Nonl<strong>in</strong>ear Circuit Based on Volterra Series and Recurrent<br />

Neural Network”, Lecture Notes <strong>in</strong> Computer Science,<br />

vol.4234, pp.518-525, 2006.<br />

[13] Wei Si, Zhe-M<strong>in</strong> Duan, Hai-Tao Wang, “Novel Method<br />

Based on Projection of Vectors <strong>in</strong> L<strong>in</strong>ear Space to Identify<br />

Volterra Kernels of Arbitrary Orders”, Application<br />

Research of Computers, vol. 25, no. 11, pp. 3340-3342,<br />

2008.<br />

[14] Wei Si, Zhe-M<strong>in</strong> Duan, Hai-Tao Wang, “Novel Method<br />

Based on Projection of Vectors <strong>in</strong> L<strong>in</strong>ear Space to Identify<br />

Volterra Kernels of Arbitrary Orders”, Application<br />

Research of Computers, 2008, vol. 25, no. 11, pp. 3340-<br />

3342.<br />

[15] Wu Jian-Da, Hsu Chuang-Ch<strong>in</strong>, Wu Guozhen, “Fault gear<br />

identification and classification us<strong>in</strong>g discrete wavelet<br />

transform and adaptive neuro-fuzzy <strong>in</strong>ference”, Expert<br />

Systems with Applications, vol. 36: pp.6244-6255.2009.<br />

[16] Wu Jian-Da, Hsu Chuang-Ch<strong>in</strong>, Wu Guozhen. “Fault gear<br />

identification and classification us<strong>in</strong>g discrete wavelet<br />

transform and adaptive neuro-fuzzy <strong>in</strong>ference”, Expert<br />

Systems with Applications, vol. 36: pp. 6244-6255, 2009.<br />

[17] Lee Jong Jae, Kim Dookie, Chang Seong Kyu. “An<br />

improved application technique of the adaptive<br />

probabilistic neural network for predict<strong>in</strong>g concrete<br />

strength”, Computational Materials Science, vol. 44:<br />

pp.988-998, 2009.<br />

[18] Hu xiao-jian, wang wei, sheng hui. “Urban Traffic Flow<br />

Prediction with Variable Cell Transmission Model”,<br />

Journal of Transportation Systems Eng<strong>in</strong>eer<strong>in</strong>g and<br />

Information Technology, no. 4, pp.17-22, 2010.<br />

[19] A. Ya. Yakubov, “On nonl<strong>in</strong>ear Volterra equations of<br />

convolution type”, Differential Equations, 2009, 45, no. 9),<br />

pp.1326-1336.<br />

[20] Satoru Murakami, Pham Huu, Anh Ngoc, “On stability and<br />

robust stability of positive l<strong>in</strong>ear Volterra equations <strong>in</strong><br />

Banach lattices”, Central European Journal of Mathematics,<br />

vol. 8, no. 5, pp. 966-984, 2010.<br />

[21] Yu. V. Bibik, “The second Hamiltonian structure for a<br />

special case of the Lotka-Volterra equations”,<br />

Computational Mathematics and Mathematical Physics, ,<br />

vol. 47, no. 8, pp. 1285-1294, 2007.<br />

[22] Li-Sheng Y<strong>in</strong>, Xi-Yue Huang, Zu-Yuan Yang, et al,<br />

“Prediction for chaotic time series based on discrete<br />

Volterra neural networks”, Lect Notes Comput SC, vol.<br />

3972, pp. 759-764, 2006.<br />

Lisheng Y<strong>in</strong> (yls20000@163.com) received his doctor’s degree<br />

<strong>in</strong> Control Theory and Control Eng<strong>in</strong>eer<strong>in</strong>g from School of<br />

Automation, Chongq<strong>in</strong>g University, Chongq<strong>in</strong>g Ch<strong>in</strong>a. He is an<br />

associate professor <strong>in</strong> the School of Electrical and Automation<br />

Eng<strong>in</strong>eer<strong>in</strong>g, Hefei University of Technology.He conducts<br />

research <strong>in</strong> Modern <strong>in</strong>telligent algorithm, Chaos Theory, Neural<br />

network theory and Fuzzy Theory.<br />

Yigang He (hyghnu@yahoo.com.cn) received his doctor’s<br />

degree <strong>in</strong> Electrical Eng<strong>in</strong>eer<strong>in</strong>g from Electrical Eng<strong>in</strong>eer<strong>in</strong>g,<br />

Xi'an Jiaotong University, Xian Ch<strong>in</strong>a. He is a professor <strong>in</strong> the<br />

School of Electrical and Automation Eng<strong>in</strong>eer<strong>in</strong>g, Hefei<br />

University of Technology. He conducts research <strong>in</strong> Electrical<br />

science and eng<strong>in</strong>eer<strong>in</strong>g, automatic test and diagnostic<br />

equipment, High-speed low-voltage low-power <strong>in</strong>tegrated<br />

circuits, systems, <strong>in</strong>telligent and real-time <strong>in</strong>formation<br />

process<strong>in</strong>g, Smart grid, electrical measurement techniques and<br />

Circuit theory of massive proportions and Mixed-signal system<br />

test<strong>in</strong>g and diagnosis<br />

Xuep<strong>in</strong>g Dong (hfdxp@126.com) received his doctor’s degree<br />

<strong>in</strong> Control Theory and Control Eng<strong>in</strong>eer<strong>in</strong>g from School of<br />

Automation, Nanj<strong>in</strong>g University Of Science and Technology,<br />

Nangj<strong>in</strong>g Ch<strong>in</strong>a. He is an associate professor <strong>in</strong> the School of<br />

Electrical and Automation Eng<strong>in</strong>eer<strong>in</strong>g, Hefei University of<br />

Technology.He conducts research <strong>in</strong> Model<strong>in</strong>g and control of<br />

complex systems, Modern control theory and its application.<br />

Zhaoquan Lu (luzhquan@126.com) received his doctor’s<br />

degree from University of Science and Technology of Ch<strong>in</strong>a,<br />

Hefei Ch<strong>in</strong>a. He is a professor <strong>in</strong> the School of Electrical and<br />

Automation Eng<strong>in</strong>eer<strong>in</strong>g, Hefei University of Technology. He<br />

conducts research <strong>in</strong> Large time delay uncerta<strong>in</strong> process and<br />

control, complex systems and controls, <strong>in</strong>telligent control,<br />

wireless communication network and automation systems,<br />

automotive electronics technology research and development,<br />

energy-sav<strong>in</strong>g control system research and development.<br />

© 2013 ACADEMY PUBLISHER


1488 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Adaptive Track<strong>in</strong>g Control for Nonaff<strong>in</strong>e<br />

Nonl<strong>in</strong>ear Systems with Zero Dynamics<br />

Hui Hu<br />

Dept of Electrical and Information Eng<strong>in</strong>eer<strong>in</strong>g, Hunan Institute of Eng<strong>in</strong>eer<strong>in</strong>g, Hunan Xiangtan, Ch<strong>in</strong>a<br />

Email: onlymyhui@126.com<br />

Peng Guo<br />

Dept of Computer Science, Hunan Institute of Eng<strong>in</strong>eer<strong>in</strong>g, Hunan Xiangtan, Ch<strong>in</strong>a<br />

Email: da_peng219@126.com<br />

Abstract—A direct adaptive neural network track<strong>in</strong>g<br />

control scheme is presented for a class of nonaff<strong>in</strong>e<br />

nonl<strong>in</strong>ear systems with zero dynamics. The method does not<br />

assume boundedness on the time derivative of a control<br />

effectiveness term. Parameters <strong>in</strong> neural networks are<br />

updated us<strong>in</strong>g a gradient descent method which designed <strong>in</strong><br />

order to m<strong>in</strong>imize a quadratic cost function of the error<br />

between the unknown ideal implicit controller and the used<br />

neural networks controller. The f<strong>in</strong>al updated law is a<br />

nonl<strong>in</strong>ear function of output error. No robust control term<br />

is used <strong>in</strong> controller. The convergence of parameters and the<br />

uniformly ultimately bounded of track<strong>in</strong>g error and all<br />

states of the correspond<strong>in</strong>g closed-loop system are<br />

demonstrated by Lyapunov stability theorem.Simulation<br />

results illustrate the availability of this method.<br />

Index Terms—nonaff<strong>in</strong>e nonl<strong>in</strong>ear, neural network,<br />

track<strong>in</strong>g control, gradient descent method, zero dynamic<br />

I. INTRODUCTION<br />

Modern mechanical or electrical systems that are to be<br />

controlled become more and more complicated and, thus,<br />

their mathematical models are often hard to be<br />

established. In recent years, adaptive neural network [1, 2,<br />

3, 4, 7, 8, 9, 10, 12, 15] that model the functional<br />

mechanism of the human bra<strong>in</strong> and fuzzy logic control [5,<br />

6, 11, 13, 14, 16, 17, 18] that can cooperate with human<br />

expert knowledge have been successfully applied to many<br />

control problems because they need no accurate<br />

mathematical models of the system under control. These<br />

methodologies become especially more helpful if control<br />

of highly uncerta<strong>in</strong>, nonl<strong>in</strong>ear and complex systems is the<br />

design issue. The ma<strong>in</strong> philosophy that is exploited<br />

heavily <strong>in</strong> system theory applications is the universal<br />

function approximation property of neural networks or<br />

fuzzy logic. Benefits of us<strong>in</strong>g neural networks or fuzzy<br />

logic for control applications <strong>in</strong>clude its ability to<br />

effectively control nonl<strong>in</strong>ear plants while adapt<strong>in</strong>g to<br />

unmodeled dynamics.<br />

In fact, most of the works [1-4, 6, 9, 11, 12, 13, 15-18,<br />

22-25]are devoted to the control problem of the aff<strong>in</strong>e-<strong>in</strong>control<br />

nonl<strong>in</strong>ear systems, i.e., systems characterized by<br />

<strong>in</strong>puts appear<strong>in</strong>g l<strong>in</strong>early <strong>in</strong> the system state equation.<br />

Few results are available for nonaff<strong>in</strong>e nonl<strong>in</strong>ear systems<br />

where the control <strong>in</strong>put appears <strong>in</strong> a nonl<strong>in</strong>ear fashion [5,<br />

7, 8, 10, 14, 19, 21]. In general, a two-step procedure is<br />

taken <strong>in</strong> nonaff<strong>in</strong>e nonl<strong>in</strong>ear system. First, based on<br />

implicit function theorem an ideal controller is developed<br />

to stabilize the underly<strong>in</strong>g system and makes the track<strong>in</strong>g<br />

approach a neighborhood of zero. Then, a neural network<br />

or fuzzy logic to approximate this ideal controller is<br />

designed. Based on the Lyapunov stability analysis, an<br />

adaptation law is devised to update the adjustable<br />

parameters. However a bound<strong>in</strong>g controller may also be<br />

added for more performance robustness.<br />

In the above most methods the parameter adaptation<br />

laws are designed based on a Lyapunov approach, where<br />

an error signal between the desired output and the actual<br />

output is used to update the adjustable parameters and the<br />

control laws are composed of three control terms: a l<strong>in</strong>ear<br />

control term, an adaptive neural network control term and<br />

a robust control term used to compensate for disturbances<br />

and approximation errors. On the other hand, almost all<br />

of the above works don’t consider the zero dynamics,<br />

though it plays an important role <strong>in</strong> nonl<strong>in</strong>ear system<br />

control. Consider<strong>in</strong>g that zero dynamics exist <strong>in</strong> many<br />

practical systems, <strong>in</strong>clud<strong>in</strong>g isothermal cont<strong>in</strong>uous stirred<br />

tank reactors, aircraft trajectory track<strong>in</strong>g control systems<br />

and others, it is necessary to <strong>in</strong>vestigate their <strong>in</strong>fluence on<br />

nonl<strong>in</strong>ear system.<br />

In the paper, accord<strong>in</strong>g to [5], we <strong>in</strong>troduce a direct<br />

adaptive neural network control approach for a class of<br />

nonaff<strong>in</strong>e nonl<strong>in</strong>ear systems with zero dynamics. The<br />

basic idea is to use neural network to adaptively construct<br />

an unknown ideal controller and the parameter adaptive<br />

laws is designed, based on the gradient descent method,<br />

to directly m<strong>in</strong>imiz<strong>in</strong>g the error between the unknown<br />

ideal controller and the neural network controller And no<br />

robust control term is used <strong>in</strong> controller. This paper<br />

proves the availability of the method <strong>in</strong> both theory and<br />

simulation experiment.<br />

The paper is organized as follows. First, the problem is<br />

formulated <strong>in</strong> Section II. Zero dynamics is given <strong>in</strong> III.<br />

Design<strong>in</strong>g a control law with on-l<strong>in</strong>e tun<strong>in</strong>g of neural<br />

network weight<strong>in</strong>g factors is given <strong>in</strong> Section IV. In<br />

Section V, convergence and stability analysis of control<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1488-1495


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1489<br />

system is given. In Section VI, simulation results are<br />

presented to confirm the effectiveness and applicability of<br />

the proposed method. F<strong>in</strong>ally, conclusions are <strong>in</strong>cluded.<br />

A. Notations and Prelim<strong>in</strong>aries<br />

The follow<strong>in</strong>g notations and def<strong>in</strong>itions will<br />

extensively be used throughout the paper. Let be the<br />

real number, n<br />

n×<br />

m<br />

and represent the real n-vectors<br />

and the real n× m matrices, respectively. i denotes the<br />

usual Euclidean norm of a vector. In the case where y is<br />

a scalar, y denotes its absolute value and if Y is a<br />

matrix, Y means Frobenious norm def<strong>in</strong>ed as<br />

Y<br />

T<br />

{ }<br />

= tr Y Y .where tr{ i}<br />

stands for trace operator.<br />

Implicit Function Theorem: Assume that<br />

n m n<br />

h : × → is cont<strong>in</strong>uously differentiable at each<br />

n m<br />

ab of an open set S ⊂ × a , b be a<br />

po<strong>in</strong>t ( , )<br />

. Let ( 0 0)<br />

po<strong>in</strong>t <strong>in</strong> S for which ( , )<br />

h a b and for which the<br />

0 0<br />

Jacobian matrix ⎡∂h<br />

⎤( a , b )<br />

⎣<br />

∂a⎦<br />

0 0<br />

is nons<strong>in</strong>gular. Then<br />

n<br />

m<br />

there exist neighborhoods U ⊂ of a0<br />

and V ⊂ of<br />

b0<br />

such that for each b∈V<br />

the equation h( a, b ) = 0has a<br />

unique solution a∈<br />

U . Moreover, the solution can be<br />

given as a = g( b)<br />

where g is cont<strong>in</strong>uously differentiable<br />

at b= b0<br />

.<br />

II. PROBLEM FORMALATION<br />

Consider the follow<strong>in</strong>g SISO nonaff<strong>in</strong>e nonl<strong>in</strong>ear<br />

system [8]:<br />

where [ ]<br />

⎧ dξi<br />

⎪ = ξi+<br />

1<br />

i =1, , r−1<br />

dt<br />

⎪<br />

dξr<br />

⎪ = h( ξη , , u)<br />

⎨ dt<br />

⎪ dη<br />

⎪ = q(, ξη, u)<br />

⎪ dt<br />

⎪ ⎩ y = ξ1<br />

, ,<br />

T r<br />

ξ = ξ1 ξ r<br />

∈ Rξ<br />

⊂ ,<br />

(1)<br />

n−r<br />

η∈R η<br />

⊂ are<br />

system states and u ∈Ωu<br />

⊂ , y ∈ are system <strong>in</strong>put<br />

and output respectively. h(, ξη, u)<br />

is a smooth partially<br />

known function, and q(, ξη , u)<br />

is a smooth partially<br />

known vector field.<br />

The control objective is to design an adaptive neural<br />

network controller for a class of SISO nonaff<strong>in</strong>e<br />

nonl<strong>in</strong>ear systems (1) such that the system output follows<br />

a desired trajectory while all signals <strong>in</strong> the closed-loop<br />

system rema<strong>in</strong> bounded.<br />

∂h(, ξη, u)<br />

Assumption 1: The function hu<br />

(, ξη , u)<br />

=<br />

∂u<br />

is nonzero and bounded for all (, ξη, u) ∈ × ×<br />

R<br />

R<br />

.<br />

This implies that h (, ξη , u)<br />

is strictly either positive or<br />

u<br />

ξ<br />

η<br />

negative for all ( ξη , , u) ∈ × ×<br />

R<br />

R<br />

.Without loss of<br />

generality, it is assumed that it exists a constant c such<br />

that hu<br />

(, ξη , u) ≥ c > 0.<br />

Def<strong>in</strong>e the reference vector<br />

( r−1)<br />

T r<br />

y = ( y y y ) ∈R<br />

ξ<br />

d d d d<br />

The reference signal y d<br />

and its time derivative are<br />

assumed to be smooth and bounded. We also def<strong>in</strong>e the<br />

track<strong>in</strong>g error as<br />

e= yd<br />

− y<br />

and correspond<strong>in</strong>g error vector as<br />

( r−1)<br />

T r<br />

e = (,, e e e ) ∈ R .<br />

Assumption 2: When the desired output y d<br />

and its r-<br />

order derivative are of known bound, there exists a<br />

positive constant bd<br />

to satisfy<br />

(1) ( r−1)<br />

T<br />

( yd yd yd ) ≤ bd<br />

Then the error equation is as follows:<br />

η<br />

(2)<br />

( r)<br />

e = A0 e + b⎡<br />

⎣yd<br />

−h(, ξη, u)<br />

⎤<br />

⎦ (3)<br />

⎡ 0 1 0 0⎤<br />

⎡0⎤<br />

⎢<br />

0 0 1 0<br />

⎥<br />

⎢<br />

<br />

⎢<br />

⎥<br />

0<br />

⎥<br />

⎢ ⎥<br />

where A0<br />

= ⎢ ⎥<br />

, b = ⎢0⎥<br />

.<br />

⎢ ⎥<br />

⎢ ⎥<br />

⎢ 0 0 0 1⎥<br />

⎢<br />

⎥<br />

⎢<br />

⎣ 0 0 0 0 0⎥<br />

⎦<br />

⎢<br />

r × r ⎣1⎥<br />

⎦ r × 1<br />

A b is controllable, then there will exist a<br />

Obviously, ( , 0 )<br />

constant matrix [ , , ]<br />

T<br />

0 1 r 1<br />

T<br />

c<br />

K = k k k −<br />

which makes<br />

eigenvalues of matrix A = A0<br />

− bK all have negative<br />

real part. Thus, for any given positive def<strong>in</strong>ite symmetric<br />

matrix Q , there exists a unique positive def<strong>in</strong>ite<br />

symmetric solution P to the follow<strong>in</strong>g Lyapunov<br />

algebraic equation:<br />

A P+ PA = − Q<br />

(4)<br />

T<br />

c<br />

Def<strong>in</strong>e a signal<br />

T<br />

( r)<br />

T<br />

⎛b Pe ⎞<br />

ν= yd<br />

+ K e + λtanh⎜ ⎟<br />

⎝ Ξ ⎠<br />

where tanh( •) ∈− ( 1,1) is the hyperbolic tangent function,<br />

Ξ,λ<br />

are the positive design parameters, when error<br />

T<br />

⎛bPe⎞ e →+<br />

∞ , the value of tanh ⎜ ⎟ → + ∞ , and when<br />

⎝ Ξ ⎠<br />

T<br />

⎛b Pe ⎞<br />

error e →-∞ the value of tanh ⎜ ⎟ → - ∞ .<br />

⎝ Ξ ⎠<br />

T<br />

⎛b Pe ⎞<br />

When e → 0 , tanh ⎜ ⎟ → 0 .The term<br />

⎝ Ξ ⎠<br />

T<br />

⎛b Pe ⎞<br />

λ tanh ⎜ ⎟ is a smooth approximation of the<br />

⎝ Ξ ⎠<br />

T<br />

discont<strong>in</strong>uous term sign( b Pe )<br />

c<br />

λ usually used <strong>in</strong> robust<br />

© 2013 ACADEMY PUBLISHER


1490 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

control. So, λ is selected larger than the magnitude of the<br />

uncerta<strong>in</strong>ty and it will affect the convergence rate of the<br />

track<strong>in</strong>g error, and Ξ is chosen very small to best<br />

approximate the sign function and it will affect the size<br />

of the residual set to which the track<strong>in</strong>g error will<br />

converge. The sign function is not used here to avoid<br />

problems associated with it as chatter<strong>in</strong>g and solutions<br />

existence.<br />

By add<strong>in</strong>g and subtract<strong>in</strong>g ν <strong>in</strong> (3), we obta<strong>in</strong><br />

T<br />

T<br />

bPe<br />

e ⎛ ⎞<br />

= ( A0 −bK ) e −bλ<br />

tanh ⎜ ⎟−b[ h( ξη , , u)<br />

−v]<br />

(5)<br />

⎝ Ξ ⎠<br />

From the fact that the signal v does not explicitly<br />

depend upon the control <strong>in</strong>put u and Assumption 1, the<br />

partial derivative of h(, ξη , u)<br />

− v with respect to the<br />

<strong>in</strong>put u satisfies<br />

( ξη )<br />

∂ h(, , u) −v ∂h(, ξη, u)<br />

= > 0<br />

∂u<br />

∂u<br />

Thus accord<strong>in</strong>g to the implicit function theorem, there<br />

exists some ideal controller u * ( ξην , , ) satisfy<strong>in</strong>g the<br />

follow<strong>in</strong>g equality for all (, ξη,) v ∈ × ×<br />

R<br />

R<br />

:<br />

ξ<br />

η<br />

(6)<br />

*<br />

h(, ξη, u (, ξη ,)) v − v = 0<br />

(7)<br />

Therefore, if the control <strong>in</strong>put u is chosen as the ideal<br />

controller u<br />

* (, ξη ,) v , the closed-loop error dynamic (5) is<br />

reduced to<br />

T<br />

T<br />

b Pe<br />

e ⎛ ⎞<br />

= ( A0 −bK ) e −bλ<br />

tanh ⎜ ⎟ (8)<br />

⎝ Ξ ⎠<br />

Consider<strong>in</strong>g the follow<strong>in</strong>g positive function to the<br />

error dynamic:<br />

V<br />

T<br />

= e Pe<br />

(9)<br />

Us<strong>in</strong>g (4) and (8), the time derivative of (9) becomes<br />

T<br />

T T b Pe<br />

V ⎛ ⎞<br />

=−e Qe −2λb Pe tanh⎜ ⎟ (10)<br />

⎝ Ξ ⎠<br />

T<br />

⎛b Pe ⎞<br />

Because the term b T Pe and tanh ⎜ ⎟ always<br />

⎝ Ξ ⎠<br />

have same sign, we conclude that V<br />

≤ 0 , and only<br />

when e = 0 , V = 0 , which means lim | e | = 0 .<br />

t→∞<br />

III. ZERO DYNAMICS<br />

If system (1) is controlled by the <strong>in</strong>put u, the state<br />

vector η is completely unobservable from the output,<br />

then the subsystem<br />

dη<br />

q(0, , u(0, , v(0, )))<br />

dt = η η η (11)<br />

is addressed as the zero dynamic.<br />

Assumption 3: Zero dynamics (11) is exponentially<br />

stable, and the function q( ξη , , u)<br />

is Lipschitz <strong>in</strong>ξ . There<br />

exists Lipschitz constants L ξ<br />

and L<br />

q<br />

such that<br />

q(, ξη, u) − q(0, η, u ≤ L ξ + Lq<br />

(12)<br />

where u = u(0, η η<br />

, v(0, η ))) .<br />

By Lyapunov converse theorem, there is a Lyapunov<br />

function V ( ) 0<br />

η which satisfies<br />

η<br />

2 2<br />

1<br />

V0( )<br />

2<br />

ξ<br />

σ η ≤ η ≤ σ η (13)<br />

∂V0<br />

( η)<br />

q(0, η)<br />

≤−σ3<br />

η<br />

∂η<br />

∂V ( η)<br />

0<br />

∂η<br />

≤ σ<br />

Where σ , i = 1,2,3,4 are positive constant.<br />

i<br />

4<br />

η<br />

IV. DESIGN OF CONTROLLER<br />

2<br />

(14)<br />

(15)<br />

In control eng<strong>in</strong>eer<strong>in</strong>g, radial basis function (RBF)<br />

NNs are usually used as a tool for model<strong>in</strong>g nonl<strong>in</strong>ear<br />

functions because of their good capabilities <strong>in</strong> function<br />

approximation. RBFNN represents a class of l<strong>in</strong>early<br />

parameterized approximations and can be replaced by any<br />

other l<strong>in</strong>early parameterized approximations such as<br />

spl<strong>in</strong>e functions or fuzzy systems. Moreover, nonl<strong>in</strong>early<br />

parameterized approximations, such as multilayer neural<br />

network (MNN), can be l<strong>in</strong>earized as l<strong>in</strong>early<br />

parameterized approximations, with the higher order<br />

terms of Taylor series expansions be<strong>in</strong>g taken as part of<br />

the model<strong>in</strong>g error.<br />

In this paper, the follow<strong>in</strong>g RBF NN based on GGAP-<br />

RBF [20] algorithm which can avoid to select <strong>in</strong>itial<br />

neural network parameters and nodes number of hidden<br />

T<br />

layer artificially uz ( ) = φ ( z)<br />

θ is used to approximate<br />

the ideal controller<br />

1<br />

* T T<br />

u ( z ) , where z = ⎡ ⎣ ξ , η , v⎤<br />

⎦ ,<br />

φ( z) = ( φ ( z), , φ ( z)) T is the basic function vector, and<br />

M<br />

θ = ( θ1, , θ ) T<br />

M<br />

is the adjustable parameter. It has been<br />

proven that neural network can approximate any smooth<br />

q<br />

function over a compact set ΩZ<br />

⊂ R to arbitrarily any<br />

accuracy as<br />

( ) = φ ( ) θ + δ( ) (16)<br />

* T *<br />

u z z z<br />

with bounded function approximation error δ ( z)<br />

satisfy<strong>in</strong>g δ ( z)<br />

≤ δ .Where<br />

vector which m<strong>in</strong>imizes the function δ ( z)<br />

*<br />

θ is an ideal parameter<br />

T<br />

. In this paper,<br />

we assume that the used neural network does not violate<br />

the universal approximation property on the compact set<br />

Ω<br />

Z<br />

, which is assumed large enough so that the variable<br />

z rema<strong>in</strong>s <strong>in</strong>side it under closed-loop control.<br />

Let us def<strong>in</strong>e the control error between the controllers<br />

uz ( ) and u<br />

* ( z ) as<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1491<br />

* T<br />

e = u ( z) − u( z) = φ ( z) θ + δ( z)<br />

(17)<br />

u<br />

*<br />

where θ = θ −θ<br />

is the parameter estimation error vector.<br />

Accord<strong>in</strong>g to the mean value theorem, there exist<br />

constant 0< α < 1, h(, ξη , u)<br />

can be described as<br />

( )<br />

h ξηu h ξη u h u z u z (18)<br />

* *<br />

(, , ) = (, , ) +<br />

u<br />

() − ()<br />

λ<br />

where<br />

h =∂h(, ξη , u) ∂u|<br />

uλ<br />

u=<br />

uλ<br />

uλ = αu z + − α u z<br />

*<br />

( ) (1 ) ( )<br />

By substitut<strong>in</strong>g (5) <strong>in</strong>to the equation (18) and consider<strong>in</strong>g<br />

(7), we get<br />

T<br />

bPe<br />

*<br />

e<br />

⎛ ⎞<br />

= Ac<br />

e −bλtanh ⎜ ⎟−b⎡<br />

⎣h( ξη , , u ) −ν⎤<br />

⎦−<br />

⎝ Ξ ⎠<br />

*<br />

−bhu<br />

( u( z) −u ( z)<br />

)<br />

(19)<br />

λ<br />

T<br />

⎛bPe⎞<br />

*<br />

= Ae c −bλ<br />

tanh ⎜ ⎟−bhu<br />

( u( z) −u ( z)<br />

)<br />

λ<br />

⎝ Ξ ⎠<br />

T<br />

Consider<strong>in</strong>g Ac<br />

= A0<br />

− bK , then (19) can be rewritten as<br />

T<br />

( r) T ⎛bPe⎞<br />

*<br />

e + K e + λ tanh ⎜ ⎟ = h ( u ( z) − u( z)<br />

u ) = h e (20)<br />

λ<br />

uλ<br />

u<br />

⎝ Ξ ⎠<br />

We notice here that u<br />

* ( z)<br />

is an unknown quantity, so<br />

the signal e u<br />

def<strong>in</strong>ed <strong>in</strong> (17) is not available. Eq. (20) will<br />

be used to overcome the difficulty. Indeed, from (20), we<br />

see that even if the signal e is not available for<br />

measurement, the quantity h uλ<br />

e u<br />

is measureable. This fact<br />

will be exploited <strong>in</strong> the design of the parameters adaptive<br />

law.<br />

In order to obta<strong>in</strong> the update law ofθ , we consider a<br />

quadratic cost function def<strong>in</strong>ed as<br />

u<br />

1 2 1 * T<br />

J ( ( ) ( ) ) 2<br />

θ<br />

= eu<br />

= u z − φ z θ (21)<br />

2 2<br />

By apply<strong>in</strong>g the gradient descent method, we obta<strong>in</strong> as an<br />

adaptive law for the parameters θ<br />

θ = - γ∇ θ<br />

J ( θ) = γφ( ze ) u<br />

(22)<br />

From (22), we know e u is not available, the adaptive<br />

law (22) cannot be implemented. In order to render (22)<br />

computable, from Eq. (20), we select the design<br />

parameter γ = γ θ<br />

hu<br />

λ<br />

, where γ<br />

θ<br />

is a positive constant. We<br />

have<br />

θ = γ φ( zh ) e<br />

θ<br />

γφ<br />

⎧⎪<br />

uλ<br />

u<br />

λ<br />

( r)<br />

T<br />

=<br />

θ<br />

( z) ⎨e + K e + tanh<br />

⎪⎩<br />

⎛<br />

⎜<br />

⎝<br />

T<br />

bPe<br />

Ξ<br />

⎞⎫⎪<br />

⎟⎬<br />

⎠⎪⎭<br />

(23)<br />

At the same time, <strong>in</strong> order to improve the robustness of<br />

adaptive law <strong>in</strong> the presence of the approximation error,<br />

we modify it by <strong>in</strong>troduc<strong>in</strong>g a σ -modification term as<br />

follows:<br />

T<br />

<br />

⎧⎪<br />

( r)<br />

T<br />

⎛b Pe ⎞⎫⎪<br />

θ = γθφ( z) ⎨e + K e + λ tanh⎜<br />

⎟⎬−γ θσθ<br />

(24)<br />

⎪⎩<br />

⎝ Ξ ⎠⎪⎭<br />

whereσ is a small positive constant<br />

S<strong>in</strong>ce the function of the σ -modification adaptive law<br />

is to avoid parameter drift, it does not need to be active<br />

when the estimated parameters are with<strong>in</strong> some<br />

acceptable bound. The system stability relies entirely on<br />

the neural network because the proposed adaptive<br />

controller <strong>in</strong> the paper is only composed of a neural<br />

network part without additional control terms. The term<br />

T<br />

⎛b Pe ⎞<br />

λ tanh ⎜ ⎟<strong>in</strong> the parameter adaptive law (24) plays,<br />

⎝ Ξ ⎠<br />

<strong>in</strong> some way, the role of a robustify<strong>in</strong>g control term. Thus<br />

by select<strong>in</strong>g a large positive value for the design<br />

parameter λ and a small positive value for the<br />

parameter Ξ , the robustness of the controller can be<br />

improved.<br />

V. STABILITY AND CONVERGENCE ANALYSIS OF<br />

CONTROL SYSTEM<br />

In order to analysis the convergence of neural network<br />

weights, we firstly consider the follow<strong>in</strong>g positive<br />

function:<br />

V θ<br />

1<br />

= T<br />

θ θ<br />

(25)<br />

2 γ<br />

Us<strong>in</strong>g (17), (20) and (24), the time derivative of (25)<br />

can be written as<br />

Consider<strong>in</strong>g the <strong>in</strong>equalities<br />

θ<br />

( z hu<br />

eu<br />

)<br />

T<br />

V<br />

θ<br />

= - θ φ( ) -σθ<br />

λ<br />

T<br />

T<br />

= - φ ( z)<br />

θhu<br />

e<br />

λ u<br />

+ σθ<br />

θ<br />

T<br />

=− h e + h δ ( z)<br />

e + σθ<br />

θ<br />

2<br />

uλ<br />

u uλ<br />

u<br />

T σ σ σ<br />

σθ θ =− θ − θ + θ + θ<br />

2 2 2<br />

σ 2 σ *<br />

2<br />

≤− θ + θ<br />

2 2<br />

2 2<br />

2<br />

(26)<br />

(27)<br />

2 1 2 1 2 1<br />

− e ( ) ( ) ( ( )) 2<br />

u<br />

+ δ z eu = − eu + δ z − eu<br />

−δ<br />

z<br />

2 2 2<br />

(28)<br />

1 2 1 2<br />

≤− eu<br />

+ δ ( z))<br />

2 2<br />

Consider<strong>in</strong>g (27) and (28), Eq. (26) can be bounded as<br />

1 2<br />

2 1 2 *<br />

2<br />

V σ σ<br />

θ<br />

≤− hu eu + hu<br />

δ ( z)<br />

− θ + θ (29)<br />

λ<br />

λ<br />

2 2 2 2<br />

Because the functions δ ( z)<br />

and hu<br />

λ<br />

are bounded <strong>in</strong> this<br />

paper, and the parameters θ * are constants, so we can<br />

def<strong>in</strong>e a positive constant bound ψ as<br />

⎛1<br />

2 ⎞ σ *<br />

2<br />

ψ = sup ⎜ hu<br />

δ ( z)<br />

θ<br />

λ ⎟+<br />

(30)<br />

t ⎝2 ⎠ 2<br />

Then<br />

© 2013 ACADEMY PUBLISHER


1492 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

V 1 1<br />

2 V 2 h e<br />

θ<br />

≤− ρ<br />

θ<br />

+ ψ −<br />

u λ u<br />

≤− ρV<br />

+ ψ<br />

θ<br />

2<br />

(31)<br />

where ρ = σγ<br />

θ<br />

Eq. (31) implies that for V<br />

ψ<br />

θ<br />

> , V<br />

0 ρ θ<br />

<<br />

and, therefore, θ is bounded. By <strong>in</strong>tegrat<strong>in</strong>g (31), we can<br />

establish that:<br />

From (32), we have<br />

ψ<br />

θ θ γ<br />

ρ<br />

2 2<br />

− t<br />

≤ (0) e ρ + 2<br />

θ<br />

(32)<br />

(33)<br />

−0.5ρt<br />

θ ≤ θ(0) e + 2γθψ ρ<br />

Us<strong>in</strong>g (33) and the fact that δ ( z)<br />

and hu<br />

λ<br />

are bounded,<br />

we can write<br />

T<br />

(<br />

+ )<br />

βξη ( , ) hu<br />

φ ( z) θ δ( z)<br />

λ<br />

T<br />

≤ βξη ( , ) hu<br />

φ ( z) θ+ βξη ( , ) hu<br />

δ( z)<br />

λ<br />

λ<br />

T<br />

≤ βξη ( , ) h φ ( z) θ + <br />

uλ<br />

+ βξη ( , ) h δ( z)<br />

uλ<br />

−0.<br />

5ρt<br />

T<br />

≤ βξη ( , ) h φ ( z) θ(0)<br />

e<br />

uλ<br />

T<br />

+ βξη ( , ) h φ ( z) 2 γψ ρ+<br />

<br />

uλ<br />

+ βξη ( , ) h δ( z)<br />

uλ<br />

≤ ψ e + ψ<br />

−0.5ρt<br />

0 1<br />

θ<br />

(34)<br />

+ <br />

Where ψ<br />

0,<br />

ψ<br />

1<br />

are some f<strong>in</strong>ite positive constants.<br />

Lemma 1: The follow<strong>in</strong>g <strong>in</strong>equality holds for all<br />

Ξ> 0 and ς ∈ R with K = 0.2785 .<br />

c<br />

⎛ς<br />

⎞<br />

0≤ ς −ς<br />

⋅tanh⎜<br />

⎟≤ KcΞ<br />

⎝Ξ<br />

⎠<br />

(35)<br />

Theorem 1: Suppose that Assumption1-3 are satisfied<br />

for the system (1), then the neural network controller and<br />

adaptation law given by (24) guarantees the convergence<br />

of the neural network parameters and to be uniformly<br />

ultimately bounded of all the signal <strong>in</strong> the closed-loop<br />

system.<br />

Proof: Consider the Lyapunov function candidate:<br />

V( e, η) = e T Pe +μV<br />

( η ) (36)<br />

Where μ > 0 is the design parameter. Consider<strong>in</strong>g (4),<br />

(19), (20), (34) and lemma 1, differentiat<strong>in</strong>g V( e, η ) with<br />

respect to time, we obta<strong>in</strong><br />

0<br />

T<br />

T T T bPe<br />

Ve <br />

⎛ ⎞<br />

(,) η = e ( Ac<br />

P+ PAc)<br />

e− 2bPeλ<br />

tanh⎜<br />

⎟+<br />

<br />

⎝ Ξ ⎠<br />

T * dV0<br />

() η<br />

+2 bPehu<br />

( u− u)<br />

+ μ<br />

λ<br />

dt<br />

T<br />

T T<br />

⎛bPe⎞<br />

dV0<br />

() η<br />

=−eQe− 2bPeλtanh<br />

⎜ ⎟+ μ + <br />

⎝ Ξ ⎠ dt<br />

T<br />

( φ θ+<br />

δ )<br />

T<br />

+2 bPeh ( z) ( z)<br />

uλ<br />

T<br />

T T<br />

⎛bPe⎞ dV0<br />

() η<br />

≤−eQe−2 bPeλ<br />

tan h⎜<br />

⎟ ++ μ + <br />

⎝ Ξ ⎠ dt<br />

T<br />

−0.5<br />

t<br />

+ 2 bPe ψ e ρ + ψ<br />

( 0 1)<br />

(37)<br />

If the design parameter λ is large enough to make<br />

λ ≥ ψ 1<br />

and consider<strong>in</strong>g assumption 4, we have<br />

<br />

T T −0.5ρt<br />

Ve ( , η) eQe 2 bPeψ<br />

e +2ψ<br />

K<br />

0 1 c<br />

≤− + Ξ+ <br />

<br />

∂V<br />

( η)<br />

[ q(0, η, u ) q( ξ, η, u) q(0, η, u )<br />

η<br />

η<br />

]<br />

0<br />

+ μ<br />

+ −<br />

∂η<br />

T<br />

2<br />

e Qe μσ<br />

3<br />

μσ<br />

4Lξ<br />

μσ<br />

4Lq<br />

≤ − − η + ξ η + η + <br />

(38)<br />

T<br />

+ 2 b Pe ψ e + 2ψ<br />

K Ξ<br />

Then<br />

−0.5ρt<br />

0 1<br />

Consider<strong>in</strong>g assumption 2 and<br />

c<br />

T −0.5ρt 2 T<br />

2<br />

2 −ρt<br />

ψ0 ≤ + ψ0<br />

2 b Pe e 0.5 e 2 b P e<br />

ξ ≤ e + y y y ≤ e + b<br />

(1) ( r−1)<br />

T<br />

(<br />

d d<br />

<br />

d<br />

)<br />

d<br />

( λ )<br />

Ve ( , η) ≤- ( Q) −0.5<br />

e − + <br />

Us<strong>in</strong>g the <strong>in</strong>equality<br />

2 2<br />

m<strong>in</strong><br />

μσ3<br />

η<br />

+ μσ L e η + μσ L b η + <br />

4 ξ<br />

4<br />

ξ d<br />

T<br />

2<br />

2 −ρt<br />

4 q<br />

η<br />

0 1 c<br />

+ μσ L + 2 b P ψ e + 2ψ<br />

K Ξ<br />

4 ξ 4 ξ 1 4 ξ<br />

2 2ε1<br />

(39)<br />

1 2 1<br />

2<br />

μσ L e η ≤ μσ L ε η + μσ L e (40)<br />

μσ<br />

( ) ( ( )) 2 2<br />

Lb<br />

ξ d<br />

Lq μσ ε Lb<br />

ξ d<br />

Lq<br />

1<br />

+ η ≤ + η + (41)<br />

4 4 2 2<br />

4ε<br />

2<br />

Then (39) satisfies<br />

V<br />

( e, η)<br />

⎛<br />

1 ⎞ 2<br />

≤- ⎜λm<strong>in</strong> ( Q) −0.5− μσ4Lξ<br />

⎟ e + <br />

⎝<br />

2 ε1<br />

⎠<br />

⎡ 1<br />

2<br />

⎤ 2<br />

−μ⎢σ3 − σ4Lξε1 − μ( σ4ε2( Lξbd<br />

+ Lq)<br />

)<br />

2<br />

⎥ η +<br />

⎣<br />

⎦<br />

T<br />

2<br />

1<br />

+ 2 bP ψ e + 2ψ<br />

KΞ+<br />

2 −ρt<br />

0 1 c 2<br />

4ε<br />

2<br />

(42)<br />

where ε1,<br />

ε<br />

2<br />

are suitable positive constants. We<br />

adjust ε1,<br />

ε<br />

2<br />

to<br />

1<br />

make σ ( ( )) 2<br />

3<br />

σ4Lξε1 μ σ4ε2<br />

Lξbd<br />

Lq<br />

− − + > 0 .<br />

2<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1493<br />

Suppos<strong>in</strong>g<br />

select<strong>in</strong>g μ =<br />

1<br />

T<br />

2<br />

2 −ρt<br />

ε = + 2 bP ψ0e + 2ψ1K c<br />

Ξ , and<br />

4ε<br />

2<br />

2<br />

1⎛<br />

1 ⎞<br />

⎜σ 3<br />

− σ4Lξ<br />

ε1⎟<br />

2⎝<br />

2 ⎠<br />

, then<br />

( σε<br />

4 2( Lb<br />

ξ d<br />

+ Lq)<br />

)<br />

1<br />

2<br />

V<br />

⎛<br />

⎞<br />

( e, η) ≤−⎜λm<strong>in</strong> ( Q) −0.5− μσ4Lξ<br />

⎟ e + <br />

⎝<br />

2 ε1<br />

⎠<br />

Adjust<strong>in</strong>g Q to make<br />

⎛ 1 ⎞<br />

3 4 1<br />

1<br />

⎜σ − σ Lξ<br />

ε ⎟<br />

2<br />

2<br />

−<br />

⎝<br />

⎠<br />

η + ε<br />

2<br />

4<br />

( σε<br />

4 2( Lb<br />

ξ d<br />

+ Lq)<br />

)<br />

1<br />

λ ( ) −0.5− μσ > 0.<br />

m<strong>in</strong><br />

Q<br />

4L ξ<br />

2ε1<br />

2<br />

2<br />

(43)<br />

From the above equation, we can know that track<strong>in</strong>g<br />

error and <strong>in</strong>ternal states η are all uniformly ultimately<br />

bounded.<br />

Besides,<br />

s<strong>in</strong>ce ξ ≤ e + y y y ≤ e + b , then<br />

(1) ( r−1)<br />

T<br />

(<br />

d d<br />

<br />

d<br />

)<br />

d<br />

the state ξ is uniformly ultimately bounded too. This<br />

completes the proof.<br />

VI. SIMULATION RESULTS<br />

In this part, the follow<strong>in</strong>g SISO nonaff<strong>in</strong>e nonl<strong>in</strong>ear<br />

system with zero dynamics is simulated to illustrate the<br />

effectiveness of the proposed adaptive neural network<br />

track<strong>in</strong>g controller. The nonaff<strong>in</strong>e nonl<strong>in</strong>ear system is<br />

described as follows:<br />

ξ = ξ<br />

1 2<br />

2<br />

(( ) )( )<br />

ξ =−2 ξ −η −1 ξ −η −η − 0.2η<br />

+ <br />

2 1 1 2 2 1 2<br />

⎡ 1 3 ⎤<br />

+ ( 2 + s<strong>in</strong> ([ ξ1−η1][ ξ2 − η2]<br />

))<br />

⎢u+ u + s<strong>in</strong>( u)<br />

3 ⎥ (44)<br />

⎣<br />

⎦<br />

η1 = η2<br />

η =−2η − 0.2η + ξ<br />

2 1 2 1<br />

y = ξ<br />

1<br />

The control objective is to force the system output y<br />

to track the desired trajectory yd<br />

= 2s<strong>in</strong>t+ cos ( 0.5t).The<br />

simulation parameters are selected as follows:<br />

15 5<br />

Q = diag[10,10] , P = ⎡ ⎤<br />

⎢<br />

5 5 ⎥ , K = [ 1, 2]<br />

T<br />

, Ξ = 0.01 ,<br />

⎣ ⎦<br />

λ = 10 , γ = 11 , σ = 0.02 .<br />

θ<br />

T<br />

The output of RBFNN controller is uz ( ) = φ ( z)<br />

θ . The<br />

basis function vector is φ( z) = ( φ1<br />

( z) φ ( )) T<br />

M<br />

z , where<br />

T<br />

( z μ ) ( z μ )<br />

⎡− −<br />

i<br />

− ⎤<br />

i<br />

φi<br />

( z) = exp ⎢<br />

⎥, i = 1, , M . M is the<br />

2<br />

⎢⎣<br />

σ<br />

i ⎥⎦<br />

number of hidden layer nodes which is stable at the 33<br />

nodes by tra<strong>in</strong><strong>in</strong>g on-l<strong>in</strong>e us<strong>in</strong>g the GGAP-RBF<br />

algorithm.<br />

Accord<strong>in</strong>g to (23), the control law is<br />

T<br />

uz ( ) = φ ( z)<br />

θ<br />

θ =− 11 φ( z) e + e+ 2e + 10 tanh 100 × (5e+<br />

5 e<br />

)<br />

− 11×<br />

0.02θ<br />

{ ( )}<br />

The system <strong>in</strong>itial conditions are ξ = [ ]<br />

(0) 1 2 T<br />

.The<br />

simulation results us<strong>in</strong>g MATLAB are shown <strong>in</strong> Fig1, 2,<br />

3, 4.<br />

Figure 1. Plots of output track<strong>in</strong>g of system<br />

Figure 1 shows the result of output track<strong>in</strong>g, and the<br />

control <strong>in</strong>put signal is shown <strong>in</strong> Figure 2. The grow<strong>in</strong>g<br />

and prun<strong>in</strong>g automatically of hidden layer nodes are<br />

shown <strong>in</strong> Figure 3.<br />

Figure 2. Plots of Control <strong>in</strong>put<br />

Figure 3. Node Number of Hidden Layer<br />

© 2013 ACADEMY PUBLISHER


1494 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 4. Norm of the weight vector θ<br />

Figure 4 shows the weights is always bounded <strong>in</strong><br />

whole control process though the structure and<br />

parameters of neural network is adjusted on l<strong>in</strong>e. It can be<br />

seen that the actual trajectories converge rapidly to the<br />

desired ones. The computer simulation results show that<br />

the adaptive neural network controller can perform<br />

successful control and achieve desired performance.<br />

VII. CONCLUSIONS<br />

A new adaptive neural network track<strong>in</strong>g control<br />

algorithm is presented for a class of SISO nonaff<strong>in</strong>e<br />

nonl<strong>in</strong>ear systems with zero dynamics <strong>in</strong> this paper. The<br />

method does not assume boundedness on the time<br />

derivative of a control effectiveness term, and only need<br />

sign known and boundedness of the control effectiveness<br />

term. The update law of neural network adjustable<br />

parameters is obta<strong>in</strong>ed by the gradient descent algorithm.<br />

The overall adaptive scheme guarantees that all signals<br />

<strong>in</strong>volved are uniformly ultimately bounded and the output<br />

of the closed-loop system tracks the desired output<br />

trajectory. Simulation results demonstrate the feasibility<br />

of the proposed control scheme.<br />

ACKNOWLEDGMENT<br />

It is a project supported by Prov<strong>in</strong>cial Natural Science<br />

Foundation of Hunan, Ch<strong>in</strong>a (Grant No.09JJ3094), the<br />

Research Foundation of Education Bureau of Hunan<br />

Prov<strong>in</strong>ce, Ch<strong>in</strong>a (Grant No.09B022), the Great Item of<br />

United Prov<strong>in</strong>ces Natural Science Foundation of Hunan,<br />

Ch<strong>in</strong>a (Grant No.09JJ8006), the Planned Science and<br />

Technology Project of Hunan Prov<strong>in</strong>ce, Ch<strong>in</strong>a (Grant<br />

No.2011FJ3126). Supported by the Construct Program of<br />

the Key Discipl<strong>in</strong>e <strong>in</strong> Hunan Prov<strong>in</strong>ce: Control Science<br />

and Eng<strong>in</strong>eer<strong>in</strong>g Science and Technology Innovation<br />

Team of Hunan Prov<strong>in</strong>ce: Complex Network Control.<br />

REFERENCES<br />

[1] Zheng C, Jagannathan S, “Geneeralized Hamilton-jacobibellman<br />

formulation based neural network control of aff<strong>in</strong>e<br />

nonl<strong>in</strong>ear discrete-time systems”, IEEE Transactions on<br />

Neural Networks, vol. 19, pp. 90-106, 2008.<br />

[2] Pang H P, Chen X, “Global robust optimal slid<strong>in</strong>g mode<br />

control for uncerta<strong>in</strong> aff<strong>in</strong>e nonl<strong>in</strong>ear systems”, Journal of<br />

Systems Eng<strong>in</strong>eer<strong>in</strong>g and Electronics, vol. 20, 838-843,<br />

2009.<br />

[3] Hu H, Liu G R, Tang H Z, Guo Peng, “Robust output<br />

track<strong>in</strong>g control for mismatched uncerta<strong>in</strong>ties nonl<strong>in</strong>ear<br />

systems”, Natural Science Journal of Xiangtan University,<br />

vol. 32, pp. 108-111, 2010.<br />

[4] Tie-Shan Li, D. Wang, G. Feng, S. C. Tong, “A DSC<br />

approach to robust adaptive NN track<strong>in</strong>g control for strictfeedback<br />

nonl<strong>in</strong>ear systems”, IEEE Transactions on<br />

systems, man, and cybernetics-part B: cybernetics, vol. 40,<br />

pp. 915-927, 2010.<br />

[5] Salim L, Thierry M G, “Adaptive fuzzy control of a class<br />

of SISO nonaff<strong>in</strong>e nonl<strong>in</strong>ear systems”, Fuzzy Sets and<br />

Systems, vol. 158, pp. 1126-1137, 2007.<br />

[6] Huang H X, Nuan T, “Application of adaptive fuzzy<br />

slid<strong>in</strong>g mode control based on GA <strong>in</strong> position<strong>in</strong>g servo<br />

system of the permanent magnetic l<strong>in</strong>ear motors”, Natural<br />

Science Journal of Xiangtan University, vol. 32, pp. 94-98,<br />

2010.<br />

[7] H. Du, S. S. Ge, J. K. Liu, “Adaptive neural network<br />

output feedback control for a class of non-aff<strong>in</strong>e nonl<strong>in</strong>ear<br />

systems with unmodelled dynamic”, IET Control Theory<br />

& Application, vol. 5, pp. 465-477, 2010.<br />

[8] Bong-Jun Yang, Anthony J. Calise. Adaptive control of a<br />

class of nonaff<strong>in</strong>e systems us<strong>in</strong>g neural networks. IEEE<br />

Transactions on Neural Network, vol. 18, pp. 1149-1159,<br />

2007<br />

[9] Hu H, Liu G R, Liu D B, Guo P, “Output feedback<br />

track<strong>in</strong>g control for a class of uncerta<strong>in</strong> nonl<strong>in</strong>ear MIMO<br />

systems us<strong>in</strong>g neural network”, Control Theory &<br />

Applications, vol. 27, pp. 382-386, 2010<br />

[10] Ge S S, Zhang J, “Neural-network control of nonaff<strong>in</strong>e<br />

nonl<strong>in</strong>ear system with zero dynamics by state and output<br />

feedback”, IEEE Transaction on neural networks, vol. 14,<br />

pp. 900-918, 2003<br />

[11] Qiu J B, Feng G, Gao H J, “Asynchronous Outputfeedback<br />

control of network nonl<strong>in</strong>ear systems with<br />

multiple packet dropouts: T-S fuzzy aff<strong>in</strong>e model-based<br />

approach”, IEEE Transaction on Fuzzy Systems, vol. 19,<br />

pp. 1014-1030, 2011<br />

[12] L<strong>in</strong> C.M, Chen T.Y, “Self-organiz<strong>in</strong>g CMAC control for a<br />

class of MIMO uncerta<strong>in</strong> nonl<strong>in</strong>ear systems”,.IEEE<br />

Transaction on neural networks, vol. 20, pp. 1377-1384,<br />

2009.<br />

[13] S. Blazic, I. Skrjanc, D. Matko, “Globally stable direct<br />

fuzzy model reference adaptive control”, Fuzzy Sets and<br />

Systems, vol. 139, pp. 3-33, 2003.<br />

[14] Wang W Y, Chien Y S, Lee T T., “Observer-based T-S<br />

fuzzy control for a class of general nonaff<strong>in</strong>e nonl<strong>in</strong>ear<br />

systems us<strong>in</strong>g generalized projecton-update laws”, IEEE<br />

Transactions on fuzzy systems, vol. 19, pp. 493-503, 2011.<br />

[15] Jianm<strong>in</strong>g Lian, Yonggon Lee, Stanislaw H. Zak, “Variable<br />

neural direct adaptive robust control of uncerta<strong>in</strong> systems”,<br />

IEEE Transactions on Automatic Control, vol. 53, 11, pp.<br />

2658-2664, 2008.<br />

[16] S.Labiod, M.S.Boucherit, “Direct stable fuzzy adaptive<br />

control of a class of MIMO nonl<strong>in</strong>ear systems”, Fuzzy sets<br />

and systems, vol. 151, pp. 59-77, 2005.<br />

[17] N. Golea, A. Golea, K. benmahammed, “Stable <strong>in</strong>direct<br />

fuzzy adaptive control”, Fuzzy sets and systems, vol1.137,<br />

pp. 353-366, 2003.<br />

[18] J<strong>in</strong>peng Yu, B<strong>in</strong>g Chen, Haisheng Yu, “Position track<strong>in</strong>g<br />

control of <strong>in</strong>duction motors via adaptive fuzzy<br />

backstepp<strong>in</strong>g” Energy Conversion and Management, vol51,<br />

pp. 2345-2352, 2010.<br />

[19] Karimi B. Menhaj M B, Karimi G M, Saboori I,<br />

“Decentralized adaptive control of large-scale aff<strong>in</strong>e and<br />

nonaff<strong>in</strong>e nonl<strong>in</strong>ear systems”, IEEE Transactions on<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1495<br />

Instrumentation and Measurement, vol. 8, pp. 2459-2467,<br />

2009.<br />

[20] Huang G B, Saratchandran, Sundararajan N, “A<br />

Generalized Grow<strong>in</strong>g and Prun<strong>in</strong>g RBF (GGP-RBF)<br />

Neural Network for Function Approximation”, IEEE<br />

Transactions on Neural Networks, vol. 16, pp. 57-67, 2005<br />

[21] J.-H. Park, G.-T. Park, S.-H. Kim, C.-J. Moon, “Direct<br />

adaptive self-structur<strong>in</strong>g fuzzy controller for nonaff<strong>in</strong>e<br />

nonl<strong>in</strong>ear systems”, Fuzzy sets and systems, vol. 153, pp.<br />

429-445, 2005.<br />

[22] J.-H. Park, S.-H. Kim, C.-J. Moon, “Adaptive neural<br />

control for strict-feedback nonl<strong>in</strong>ear systems without<br />

backstepp<strong>in</strong>g”, IEEE Transactions on Neural Networks,<br />

vol. 20, 7, pp. 1204-1209, 2009.<br />

[23] H.-X, Li, S.C. Tong, “A hybrid adaptive fuzzy control for<br />

a class of nonl<strong>in</strong>ear MIMO systems”, IEEE Transactions<br />

on Fuzzy Systems, vol. 11, pp. 24-34, 2003.<br />

[24] G.Nurnberger, “Approximation by spl<strong>in</strong>e functions, “New<br />

York: Spr<strong>in</strong>ger-Verlag, 1999,<br />

[25] Pepe P, “Input-to-state stabilization of stabilizable, timedelay,<br />

control-aff<strong>in</strong>e, nonl<strong>in</strong>ear systems”, IEEE<br />

Transactions on automatic control, vol. 54, pp. 1688-1693,<br />

2009.<br />

Hui HU is a lecturer of Department of electrical and<br />

<strong>in</strong>formation eng<strong>in</strong>eer<strong>in</strong>g, Hunan <strong>in</strong>stitute of eng<strong>in</strong>eer<strong>in</strong>g. Dr.Hu<br />

received the B.S. degree <strong>in</strong> electronics and <strong>in</strong>formation<br />

eng<strong>in</strong>eer<strong>in</strong>g from Hunan University of Science and Technology<br />

<strong>in</strong> 2001.And received the M.S. degree <strong>in</strong> power electronics and<br />

drives from Xiangtan University <strong>in</strong> 2004.And received the Ph.<br />

D degree <strong>in</strong> control theory and control eng<strong>in</strong>eer<strong>in</strong>g from Hunan<br />

University <strong>in</strong> 2010. Her research <strong>in</strong>terests <strong>in</strong>clude nonl<strong>in</strong>ear<br />

systems track<strong>in</strong>g control, MIMO systems control, uncerta<strong>in</strong><br />

nonl<strong>in</strong>ear system control and <strong>in</strong>telligent control.<br />

Peng GUO is a lecturer of Department of Computer and<br />

Science, Hunan <strong>in</strong>stitute of eng<strong>in</strong>eer<strong>in</strong>g. He received the B.S.<br />

degree <strong>in</strong> electronics and <strong>in</strong>formation eng<strong>in</strong>eer<strong>in</strong>g from Hunan<br />

University of Science and Technology <strong>in</strong> 2000, and received the<br />

M.S. degree <strong>in</strong> computer science from Hunan University <strong>in</strong><br />

2006. His research <strong>in</strong>terests <strong>in</strong>clude <strong>in</strong>telligent control and<br />

comput<strong>in</strong>g theory, multimedia comput<strong>in</strong>g and network<strong>in</strong>g and<br />

agent technology.<br />

© 2013 ACADEMY PUBLISHER


1496 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Improved Feasible SQP Algorithm for Nonl<strong>in</strong>ear<br />

Programs with Equality Constra<strong>in</strong>ed Sub-<br />

Problems<br />

Zhijun Luo 1 , Guohua Chen 3 and Simei Luo 4<br />

Department of Mathematics & Applied Mathematics, Hunan University of Humanities, Science and Technology, Loudi,<br />

Ch<strong>in</strong>a<br />

Email: ldlzj123@163.com<br />

Zhib<strong>in</strong> Zhu 2<br />

School of Mathematics and Comput<strong>in</strong>g Science, Guil<strong>in</strong> University of Electronic Technology, Guil<strong>in</strong>, Ch<strong>in</strong>a<br />

Email: zhu_zhib<strong>in</strong>@163.com<br />

Abstract—This paper proposed an improved feasible<br />

sequential quadratic programm<strong>in</strong>g (FSQP) method for<br />

nonl<strong>in</strong>ear programs. As compared with the exist<strong>in</strong>g SQP<br />

methods which required solv<strong>in</strong>g the QP sub-problem with<br />

<strong>in</strong>equality constra<strong>in</strong>ts <strong>in</strong> s<strong>in</strong>gle iteration, <strong>in</strong> order to obta<strong>in</strong><br />

the feasible direction, the method of this paper is only<br />

necessary to solve an equality constra<strong>in</strong>ed quadratic<br />

programm<strong>in</strong>g sub-problems. Comb<strong>in</strong>ed the generalized<br />

projection technique, a height-order correction direction is<br />

yielded by explicit formulas, which can avoids Maratos<br />

effect. Furthermore, under some mild assumptions, the<br />

algorithm is globally convergent and its rate of convergence<br />

is one-step superl<strong>in</strong>early. Numerical results reported show<br />

that the algorithm <strong>in</strong> this paper is effective.<br />

Index Terms—Nonl<strong>in</strong>ear programs, FSQP method, Equality<br />

constra<strong>in</strong>ed quadratic programm<strong>in</strong>g, Global convergence,<br />

Superl<strong>in</strong>ear convergence rate<br />

I. INTRODUCTION<br />

Consider the follow<strong>in</strong>g nonl<strong>in</strong>ear programs<br />

m<strong>in</strong> f( x)<br />

s.. t g ( x) ≤0, j∈ I = {1,2, , m},<br />

j<br />

Where f ( x), g ( ): n<br />

j<br />

x R → R( j∈I)<br />

are cont<strong>in</strong>uously<br />

differentiable functions. Denote the feasible set for (1) by<br />

n<br />

X = { x∈R | g<br />

j<br />

( x) ≤0, j∈ I}<br />

.<br />

The Lagrangian function associated with (1) is def<strong>in</strong>ed<br />

as follows:<br />

Lx ( , λ) f( x) λ g( x)<br />

m<br />

= +∑<br />

j=<br />

1<br />

A po<strong>in</strong>t x ∈ X is said to be a KKT po<strong>in</strong>t of (1), if it is<br />

satisfies the equalities<br />

This work was supported <strong>in</strong> part by the National Natural Science<br />

Foundation (11061011) of Ch<strong>in</strong>a, and the Educational Reform Research<br />

Fund of Hunan University of Humanities, Science and Technology<br />

(NO.RKJGY1030), correspond<strong>in</strong>g author, E-mail: ldlzj123@163.com .<br />

j<br />

j<br />

(1)<br />

m<br />

∇ f( x) + λ ∇ g ( x) = 0,<br />

j=<br />

1<br />

λ g ( x) = 0, j∈I,<br />

j<br />

j<br />

∑<br />

where λ = ( λ1<br />

, , λ ) T<br />

m<br />

is nonnegative, and λ is said to<br />

be the correspond<strong>in</strong>g KKT multiplier vector.<br />

Method of Sequential Quadratic Programm<strong>in</strong>g (SQP)<br />

is an important method for solv<strong>in</strong>g nonl<strong>in</strong>early<br />

constra<strong>in</strong>ed optimization [1, 2, 18]. It generates<br />

iteratively the ma<strong>in</strong> search direction d 0<br />

by solv<strong>in</strong>g the<br />

follow<strong>in</strong>g quadratic programm<strong>in</strong>g (QP) sub-problem:<br />

j<br />

T 1 T<br />

m<strong>in</strong> ∇ f( x)<br />

d + d Hd<br />

2<br />

T<br />

s.. t g ( x) + ∇g ( x) d ≤0, j∈I,<br />

j<br />

n n<br />

where H ∈ R × is a symmetric positive def<strong>in</strong>ite matrix.<br />

However, such type SQP algorithms have two serious<br />

shortcom<strong>in</strong>gs:<br />

1) SQP algorithms require that the relate QP subproblems<br />

(2) must be consistency;<br />

2) There exists Matatos effect.<br />

Many efforts have been made to overcome the<br />

shortcom<strong>in</strong>gs through modify<strong>in</strong>g the quadratic subproblem<br />

(2) and the direction d [4, 5, 7, 8]. Some<br />

algorithms solve the problem (1) by us<strong>in</strong>g the idea of<br />

filter method or trust-region [13, 16, 17].<br />

For the problem (2), it is also a hot topic to solve the<br />

QP problem like (2) <strong>in</strong> the field of optimization. By us<strong>in</strong>g<br />

the idea of active constra<strong>in</strong>ts set, some algorithms solve<br />

step by step a series of correspond<strong>in</strong>g QP problems with<br />

only equality constra<strong>in</strong>ts to obta<strong>in</strong> the optimum solution<br />

to the QP sub-problem (2). P. Spellucci [6] proposed a<br />

new method, the d 0<br />

is obta<strong>in</strong>ed by solv<strong>in</strong>g QP subproblem<br />

with only equality constra<strong>in</strong>ts:<br />

j<br />

j<br />

(2)<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1496-1503


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1497<br />

T 1 T<br />

m<strong>in</strong> ∇ f( x)<br />

d + d Hd<br />

2<br />

T<br />

s.. t g ( x) +∇ g ( x) d = 0, j∈A⊆<br />

I,<br />

j<br />

j<br />

where the so-called work<strong>in</strong>g set A ⊆ I is suitably<br />

determ<strong>in</strong>ed. If d 0<br />

= 0 and λ ≥ 0 ( λ is said to be the<br />

correspond<strong>in</strong>g KKT multiplier vector.), the algorithm<br />

stops. The most advantage of these algorithms is merely<br />

necessary to solve QP sub-problems with only equality<br />

constra<strong>in</strong>ts. However, if d<br />

0<br />

= 0 , but λ < 0 , the algorithm<br />

will not implement successfully. In [10], proposed an<br />

SQP method for general constra<strong>in</strong>ed optimization. Firstly,<br />

make use of the technique which handle the general<br />

constra<strong>in</strong>ed optimization as an <strong>in</strong>equality parametric<br />

programm<strong>in</strong>g, then, consider a new quadratic<br />

programm<strong>in</strong>g with only equality constra<strong>in</strong>ts as follow:<br />

T 1 T<br />

m<strong>in</strong> ∇ f( x)<br />

d + d Hd<br />

2<br />

T<br />

s.. t g ( x) +∇ g ( x) d =−m<strong>in</strong>{0, π ( x)}, j∈J( x).<br />

j<br />

j<br />

Where π ( x)<br />

is a suitable vector, J ( x ) is a suitable<br />

approximate active set. But the QP problems may no<br />

solution under some conditions. Recently, Zhu [14]<br />

Consider the follow<strong>in</strong>g QP sub-problem:<br />

T 1 T<br />

m<strong>in</strong> ∇ f( x)<br />

d + d Hd<br />

2<br />

T<br />

s.. t p ( x) +∇ g ( x) d = 0, j∈L.<br />

j<br />

j<br />

where p ( x ) is a suitable vector, L is a suitable<br />

j<br />

approximate active, which guarantees to hold that if<br />

d<br />

0<br />

= 0 , then x is a KKT po<strong>in</strong>t of (1), i.e., if d<br />

0<br />

= 0 , then<br />

it holds that λ ≥ 0 . Depended strictly on the strict<br />

complementarity, which is rather strong and difficult for<br />

test<strong>in</strong>g, the superl<strong>in</strong>ear convergence properties of the<br />

SQP algorithm are obta<strong>in</strong>ed. For avoid<strong>in</strong>g the superl<strong>in</strong>ear<br />

convergence depend strictly on the strict complementarity,<br />

Another some SQP algorithms (see [15]) have been<br />

proposed, however it is regretful that these algorithms are<br />

<strong>in</strong>feasible SQP type and nonmonotone. In [16], a feasible<br />

SQP algorithm is proposed. Us<strong>in</strong>g generalized projection<br />

technique, the superl<strong>in</strong>ear convergence properties are still<br />

obta<strong>in</strong>ed under weaker conditions without the strict<br />

complementarity.<br />

We will develop an improved feasible SQP method for<br />

solv<strong>in</strong>g optimization problems based on the one <strong>in</strong> [14].<br />

The traditional FSQP algorithms, <strong>in</strong> order to prevent<br />

iterates from leav<strong>in</strong>g the feasible set, and avoid Maratos<br />

effect, it needs to solve two or three QP sub-problems<br />

like (2). In our algorithm, per s<strong>in</strong>gle iteration, it is only<br />

necessary to solve an equality constra<strong>in</strong>ed quadratic<br />

programm<strong>in</strong>g, which is very similar to (4). Obviously, it<br />

is simpler to solve the equality constra<strong>in</strong>ed QP problem<br />

than to solve the QP problem with <strong>in</strong>equality constra<strong>in</strong>ts.<br />

In order to void the Maratos effect, comb<strong>in</strong>ed the<br />

generalized projection technique, a height-order<br />

correction direction is computed by an explicit formula,<br />

and it plays an important role <strong>in</strong> avoid<strong>in</strong>g the strict<br />

(3)<br />

(4)<br />

complementarity. Furthermore, its global and superl<strong>in</strong>ear<br />

convergence rate is obta<strong>in</strong>ed under some suitable<br />

conditions.<br />

This paper is organized as follows: In Section II, we<br />

state the algorithm; the well-def<strong>in</strong>ed of our approach is<br />

also discussed, the accountability of which allows us to<br />

present global convergence guarantees under common<br />

conditions <strong>in</strong> Section III, while <strong>in</strong> Section IV we deal<br />

with superl<strong>in</strong>ear convergence. F<strong>in</strong>ally, <strong>in</strong> Section V,<br />

numerical experiments are implemented.<br />

II. DESCRIPTION OF ALGORITHM<br />

The active constra<strong>in</strong>ts set of (1) is denoted as follows:<br />

I( x) = { j∈ I | g ( x) = 0, j∈ I}.<br />

(5)<br />

Now, the follow<strong>in</strong>g algorithm is proposed for solv<strong>in</strong>g<br />

the problem (1).<br />

Algorithm A:<br />

Step 0 Initialization:<br />

Given a start<strong>in</strong>g po<strong>in</strong>t<br />

0<br />

x ∈ X , and an <strong>in</strong>itial<br />

n n<br />

symmetric positive def<strong>in</strong>ite matrix H 0<br />

∈ R × . Choose<br />

1<br />

parameters ε0<br />

∈(0,1), α∈(0, ), τ ∈ (2,3) . Set k = 0 ;<br />

2<br />

Step 1. Computation of an approximate active set J<br />

k<br />

.<br />

Step 1.1. For the current po<strong>in</strong>t<br />

0<br />

j<br />

k<br />

x<br />

k<br />

ε ( x ) = ε ∈ (0,1).<br />

i<br />

∈ X , set i = 0,<br />

Step 1.2. If det( A ( x k ) T A( x k )) ≥ ε ( x<br />

k ) , let<br />

i i i<br />

k k k<br />

Jk<br />

= J( x ), Ak<br />

= A( x ), i( x ) = i , and go to Step 2.<br />

Otherwise go to Step 1.3, where<br />

k k k<br />

J ( x ) = { j∈I | −ε<br />

( x ) ≤ g ( x ) ≤0},<br />

i i j<br />

k k k<br />

A( x ) = ( ∇g ( x ), j∈J ( x )).<br />

i i i<br />

k 1 k<br />

Step 1.3. Let i = i+ 1, εi( x ) = εi<br />

− 1( x ) , and go to<br />

2<br />

Step1. 2.<br />

k<br />

Step 2. Computation of the vector d<br />

0<br />

.<br />

Step 2.1<br />

B A A A v v j J B f x<br />

T −1<br />

T k k k<br />

k<br />

= (<br />

k k) k<br />

, = (<br />

j, ∈<br />

k) = −<br />

k∇<br />

( ),<br />

k k<br />

⎧ , 0<br />

k ⎪ − vj<br />

vj<br />

<<br />

k k<br />

pj = ⎨<br />

p = ( pj, j∈Jk).<br />

k k<br />

⎪⎩ g<br />

j( x ), vj<br />

≥ 0<br />

Step 2.2 Solve the follow<strong>in</strong>g equality constra<strong>in</strong>ed QP<br />

k<br />

Sub problem at x :<br />

k T 1 T<br />

m<strong>in</strong> ∇ f( x ) d + d Hkd<br />

2<br />

k k T<br />

s. t. p +∇ g ( x ) d = 0, j∈J<br />

.<br />

j j k<br />

k<br />

Let d0<br />

be the KKT po<strong>in</strong>t of (8), and<br />

k k<br />

b = ( b , j∈J<br />

) be the correspond<strong>in</strong>g multiplier vector.<br />

j<br />

k<br />

k<br />

If d<br />

0<br />

= 0 , STOP. Otherwise, CONTINUE;<br />

(6)<br />

(7)<br />

(8)<br />

© 2013 ACADEMY PUBLISHER


1498 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Step 3<br />

Computation of the feasible direction with descent<br />

Where<br />

δ<br />

ek<br />

k<br />

d :<br />

k k T −1<br />

d = d0 − δ<br />

kAk( Ak Ak)<br />

ek<br />

(9)<br />

T | Jk<br />

|<br />

= (1, ,1) ∈R<br />

, and<br />

|| d || ( d ) H d<br />

k k T k<br />

0 0 k 0 k T −1<br />

T k<br />

k<br />

= , μ =−( Ak Ak) Ak∇f( x )<br />

kT k<br />

2 | μ ek<br />

||| d0<br />

|| + 1<br />

Step 4. Computation of the high-order revised direction<br />

k<br />

d :<br />

where<br />

d A A A d e g x d (10)<br />

k T −1<br />

k k k<br />

=− ( ) (||<br />

0<br />

|| τ<br />

k k k k<br />

+<br />

J<br />

( + )),<br />

k<br />

k k k k k k T k<br />

g<br />

( x + d ) = g ( x + d ) −g ( x ) −∇g ( x ) d .<br />

J J J<br />

k k k J k<br />

Step 5. L<strong>in</strong>e search:<br />

Compute t k<br />

, the first number t <strong>in</strong> the sequence<br />

1 1 1<br />

{1, , , ,...}<br />

satisfy<strong>in</strong>g<br />

2 4 8<br />

2<br />

f ( x k + td k + t d k ) ≤ f( x k ) + αt∇f( x k ) T d<br />

k , (11)<br />

g x td t d j I<br />

(12)<br />

k k 2 k<br />

j<br />

( + + ) ≤0, ∈ .<br />

Step 6. Update:<br />

Obta<strong>in</strong> H<br />

k +<br />

by updat<strong>in</strong>g the positive def<strong>in</strong>ite matrix<br />

1<br />

H k<br />

us<strong>in</strong>g some quasi-Newton formulas. Set<br />

k 1 k k 2 k<br />

x + = x + t d + t d , and k = k+ 1 . Go back to step 1.<br />

k<br />

Throughout this paper, follow<strong>in</strong>g basic assumptions<br />

are assumed.<br />

H2.1 The feasible set X ≠Φ, and functions f ( x ),<br />

g<br />

j<br />

( x),<br />

j∈ I are twice cont<strong>in</strong>uously differentiable.<br />

H2.2 ∀ x ∈ X , the vectors { ∇g ( x), j∈I( x)}<br />

are<br />

l<strong>in</strong>early <strong>in</strong>dependent.<br />

Lemma 2.1 Suppose that H2.1and H2.2 hold, then<br />

1) For any iteration, there is no <strong>in</strong>f<strong>in</strong>ite cycle <strong>in</strong> step 1.<br />

2) If a sequence { x k } of po<strong>in</strong>ts has an accumulation<br />

po<strong>in</strong>t, then there exists a constant _ ε > 0<br />

ε<br />

kik ,<br />

_<br />

> ε for k large enough.<br />

j<br />

such that<br />

Proof.<br />

1) Suppose that the desired conclusion is false, that is<br />

to say, there exists some k, such that there is an <strong>in</strong>f<strong>in</strong>ite<br />

cycle <strong>in</strong> Step 1, then we obta<strong>in</strong>, ∀ i = 1, 2, , that Aki<br />

,<br />

is<br />

not of full rank, i.e., it holds that<br />

det( A A ) = 0, i = 1,2, , (13)<br />

T<br />

ki , ki ,<br />

And by (6), we can know that Jki<br />

, + 1<br />

⊆ Jki<br />

,<br />

. S<strong>in</strong>ce there<br />

are only f<strong>in</strong>itely many choices for J<br />

ki ,<br />

⊆ I , it is sure that<br />

~<br />

J ≡ J L for i large enough. From (6) and (13),<br />

ki , + 1 ki , k<br />

with i →∞, we obta<strong>in</strong><br />

~<br />

L k<br />

k = I ( x ), det( A A ) = 0.<br />

T<br />

k k<br />

I( x ) I( x )<br />

This is a contradiction to H 2.2, which shows that the<br />

statement is true.<br />

2) Suppose K is an <strong>in</strong>f<strong>in</strong>ite <strong>in</strong>dex set such that<br />

*<br />

{ x } → x . We suppose that the conclusion is false,<br />

k k∈K<br />

i.e., there exists<br />

for<br />

~<br />

L<br />

k<br />

Let<br />

~<br />

'<br />

'<br />

K ⊆ K K<br />

(| | =∞ ) , such that<br />

ε<br />

ki<br />

→ k∈K k →∞<br />

'<br />

,<br />

0, , .<br />

k<br />

Lk = Jk, i k −1. From the def<strong>in</strong>ition of ε<br />

ki , k<br />

, it holds,<br />

k∈<br />

K ' ,<br />

k large enough, that<br />

~<br />

T T k<br />

~ ~ ε<br />

ki , k j k<br />

Lk<br />

Lk<br />

det( A A ) = 0, −2 ≤ g ( x ) ≤0, j∈ L . (14)<br />

S<strong>in</strong>ce there are only f<strong>in</strong>itely many choices for sets<br />

⊆ I , it is sure that there exists<br />

such that<br />

~ ~<br />

''<br />

k<br />

, ( )<br />

'' ' ''<br />

K ⊆ K (| K | =∞ ) ,<br />

L ≡ L k∈ K , for k large enough.<br />

Denote ~ *<br />

A = { ∇g ( x )| j∈ L<br />

~<br />

} , then, let<br />

from (14), it holds that<br />

j<br />

~ T ~ ~<br />

* *<br />

=<br />

j<br />

= ∈ ⊆<br />

k∈K '' , k →∞ ,<br />

det( A A) 0, g ( x ) 0, j L I( x ).<br />

This is a contradiction to H 2.2, too, which shows that<br />

the statement is true.<br />

Lemma 2.2 For the QP sub-problem (8) at x<br />

k , if<br />

k<br />

d<br />

0<br />

= 0 , then x k<br />

k<br />

is a KKT po<strong>in</strong>t of (1). If d0 ≠ 0 , then<br />

k<br />

x computed <strong>in</strong> step 4 is a feasible direction with descent<br />

k<br />

of (1) at x .<br />

Proof.<br />

By the KKT conditions of QP sub-problem (8), we<br />

have<br />

k k k<br />

∇ f( x ) + Hkd0<br />

+ Akb<br />

= 0,<br />

k k T k<br />

p +∇ g ( x ) d = 0, j∈J<br />

,<br />

j j 0<br />

k<br />

k<br />

If d<br />

0<br />

= 0 , we obta<strong>in</strong><br />

k k k<br />

∇ f ( x ) + A b = 0, p = 0, j∈<br />

J ,<br />

k j k<br />

k<br />

Thereby, from (7) and x ∈ X,<br />

∀ k implies that<br />

k<br />

k<br />

g ( x ) = 0, v ≥0, j∈<br />

J .<br />

j j k<br />

b k B k k<br />

k<br />

f x v<br />

In addition, we have =− ∇ ( ) = , <strong>in</strong> a word,<br />

we obta<strong>in</strong><br />

k k<br />

∇ f ( x ) + A b<br />

k k<br />

= 0, g ( x ) = 0, b ≥0, j∈<br />

J ,<br />

k j j k<br />

k<br />

Let bj<br />

= 0, j∈ I \ Jk<br />

, which shows that x k is a KKT<br />

po<strong>in</strong>t of (1).<br />

k<br />

If d0 ≠ 0 , we have<br />

k T k T k k<br />

g ( x ) d = A d = −p − δ e ,<br />

So,<br />

Jk<br />

k k k<br />

k T k k T k kT k<br />

∇ f ( x ) d = − ( d ) H d + b p ,<br />

0 0 k 0<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1499<br />

∇ f ( x ) d =∇f( x ) d −δ<br />

∇f( x ) A ( A A ) e<br />

k T k k T k k T T −1<br />

0 k k k k k<br />

1 k T k kT k 1 k T k<br />

≤− ( d0 ) Hkd0 + b p ≤− ( d0)<br />

Hkd0 < 0.<br />

2 2<br />

Thereby, we know that d<br />

k is a feasible descent<br />

k<br />

direction of (1) at x .<br />

III. GLOBAL CONVERGENCE OF ALGORITHM<br />

In this section, firstly, it is shown that Algorithm A<br />

given <strong>in</strong> section 2 is well-def<strong>in</strong>ed, that is to say, for every<br />

k, that the l<strong>in</strong>e search at Step 5 is always successful<br />

Lemma 3.1 The l<strong>in</strong>e search <strong>in</strong> step 5 yields a stepsize<br />

1 i<br />

t<br />

k<br />

= ( ) for some f<strong>in</strong>ite i = i( k)<br />

.<br />

2<br />

Proof.<br />

It is a well-known result accord<strong>in</strong>g to Lemma 2.2. For<br />

(11),<br />

k k 2 k k k T k<br />

s f( x + td + t d<br />

) − f( x ) −αt∇f( x ) d<br />

k T k 2 k k T k<br />

=∇ f ( x ) ( td + t d<br />

) + o( t) −αt∇f( x ) d<br />

k T k<br />

= (1 −α) t∇ f( x ) d + o( t).<br />

For (12), if<br />

k k<br />

j∉ I( x ), gj<br />

( x ) < 0;<br />

k k k T k<br />

j∈ I( x ), gj( x ) = 0, ∇ gj( x ) d < 0,<br />

so we have<br />

k k 2 k k T k 2 k<br />

g<br />

j<br />

( x + td + t d<br />

) =∇ f( x ) ( td + t d<br />

) + o( t)<br />

k T k<br />

= αt∇ g<br />

j<br />

( x ) d + O( t).<br />

In the sequel, the global convergence of Algorithm A<br />

is shown. For this reason, we make the follow<strong>in</strong>g<br />

additional assumption.<br />

H3.1 { x k } is bounded, which is the sequence<br />

generated by the algorithm, and there exist constants<br />

2 T<br />

2<br />

b≥ a > 0 , such that a|| y|| ≤ y Hk<br />

y ≤ b|| y||<br />

, for all k<br />

n<br />

and all y∈ R .<br />

S<strong>in</strong>ce there are only f<strong>in</strong>itely many choices for sets<br />

k k k k k<br />

Jk<br />

⊆ I , and the sequence { d0, d1<br />

, d , v , b } is bounded,<br />

we can assume without loss of generality that there exists<br />

a subsequence K, such that<br />

x → x , H → H , d →d , d →d , d<br />

→d<br />

,<br />

b b v v J J k K<br />

k * k * k * k *<br />

k * 0 0<br />

k * k *<br />

→ , → ,<br />

k<br />

≡ ≠ Φ, ∈ ,<br />

where J is a constant set.<br />

(15)<br />

Theorem 3.2 The algorithm either stops at the KKT<br />

k<br />

po<strong>in</strong>t x of the problem (1) <strong>in</strong> f<strong>in</strong>ite number of steps, or<br />

generates an <strong>in</strong>f<strong>in</strong>ite sequence { x k } any accumulation<br />

*<br />

po<strong>in</strong>t x of which is a KKT po<strong>in</strong>t of the problem (1).<br />

Proof.<br />

The first statement is easy to show, s<strong>in</strong>ce the only<br />

stopp<strong>in</strong>g po<strong>in</strong>t is <strong>in</strong> step 3. Thus, assume that the<br />

algorithm generates an <strong>in</strong>f<strong>in</strong>ite sequence { x k }, and (15)<br />

holds. Accord<strong>in</strong>g to Lemma 2.2, it is only necessary to<br />

*<br />

prove that d =<br />

0<br />

0<br />

. Suppose by contradiction that<br />

*<br />

d0 ≠ 0 .<br />

Then, from Lemma 2.2, it is obvious that d * is welldef<strong>in</strong>ed,<br />

and it holds that<br />

* T * * T * *<br />

∇ f ( x ) d < 0, ∇ g<br />

j<br />

( x ) d < 0, j∈I( x ) ⊆ J (16)<br />

Thus, from (16), it is easy to see that the step-size t k<br />

obta<strong>in</strong>ed <strong>in</strong> step 5 are bounded away from zero on<br />

K , i.<br />

e.<br />

t ≥ t* = <strong>in</strong>f{ t , k∈ K} > 0, k∈ K.<br />

(17)<br />

k<br />

k<br />

In addition, from (11) and Lemma 2.2, it is obvious<br />

k<br />

that { f ( x )} is monotonous decreas<strong>in</strong>g. So, accord<strong>in</strong>g to<br />

*<br />

assumption H 2.1, the fact that { x<br />

k } → x implies that<br />

k<br />

*<br />

f( x ) → f( x ), k →∞ .<br />

(18)<br />

So, from (11), (16), (17), it holds that<br />

k *<br />

k T k<br />

0= lim( f ( x ) − f( x )) ≤lim( αt ∇f( x ) d )<br />

x∈K<br />

x∈K<br />

1<br />

* T *<br />

≤ αt*<br />

∇ f( x ) d < 0,<br />

2<br />

k<br />

which is a contradiction thus lim d0<br />

= 0 . Thus, x * is a<br />

x→∞<br />

KKT po<strong>in</strong>t of (1).<br />

IV. THE RATE OF CONVERGENCE<br />

Now we discuss the convergent rate of the algorithm,<br />

and prove that the sequence { x<br />

k } generated by the<br />

algorithm is one-step super-l<strong>in</strong>early convergent under<br />

some mild conditions without the strict complementarily.<br />

For this purpose, we add some regularity hypothesis.<br />

H 4.1 The sequence { x<br />

k } generated by Algorithm A is<br />

bounded, and possess an accumulation po<strong>in</strong>t x * , such<br />

* *<br />

that the KKT pair ( x , u ) satisfies the strong secondorder<br />

sufficiency conditions, i.e.,<br />

T 2 * *<br />

d ∇<br />

xxL( x , u ) d > 0,<br />

n<br />

* T<br />

∀d∈Ω<br />

{ d∈R : d ≠ 0, ∇ gI<br />

+<br />

( x ) d = 0},<br />

+<br />

*<br />

Lxu ( , ) = f( x) + ug( x), I = { j∈ I: u > 0}.<br />

∑<br />

j∈I<br />

j j j<br />

Lemma 4.1 Suppose that assumptions H 2.1-H 3.1 hold,<br />

then,<br />

1) There exists a constant ζ > 0 , such that<br />

T −1<br />

|| ( Ak<br />

Ak) || ≤ ζ ;<br />

2) lim d k 0<br />

= 0; lim d k = 0; lim d<br />

k = 0;<br />

k→∞ k→∞ k→∞<br />

3)<br />

k k k k 2<br />

|| d || ∼|| d0<br />

||, || d<br />

|| = O(|| d || ),<br />

.<br />

k k k 3 k k 2<br />

|| d − d0||= O(|| d0<br />

|| ), || d<br />

|| = O(|| d || ).<br />

Proof.<br />

1) By contradiction, suppose that sequence<br />

T 1<br />

{|| ( Ak<br />

Ak) − ||} is unbounded, then there exists an <strong>in</strong>f<strong>in</strong>ite<br />

subset K, such that<br />

T −1<br />

|| ( A A ) || →∞, ( k∈<br />

K).<br />

k<br />

k<br />

K<br />

k<br />

© 2013 ACADEMY PUBLISHER


1500 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

In view of the boundedness of { x k } and J<br />

k<br />

be<strong>in</strong>g a<br />

subset of the f<strong>in</strong>ite set I = {1, 2, , m}<br />

as well as<br />

Lemma 2.1, we know that there exists an <strong>in</strong>f<strong>in</strong>ite <strong>in</strong>dex<br />

'<br />

set K ⊆ K such that<br />

' '<br />

T<br />

k k k k<br />

k<br />

x → x, J ≡ J , ∀k∈K , det( A A ) ≥ε, ε ≥ ε.<br />

As a result,<br />

T<br />

lim( ) ( T<br />

A A =∇g x) ∇g ( x),<br />

'<br />

k∈K<br />

k k '<br />

'<br />

J J<br />

T<br />

det( ∇g <br />

'( x) ∇g '( x)) ≥ ε > 0.<br />

J<br />

J<br />

T −1<br />

Hence, we obta<strong>in</strong> T<br />

|| ( A ) || || <br />

k<br />

Ak → ∇g '( x) ∇ g '( x) ||,<br />

J J<br />

T −1<br />

this contradict || ( Ak<br />

Ak) || →∞, ( k∈ K).<br />

So the first<br />

conclusion 1) follows.<br />

k<br />

2) We firstly show that lim d0<br />

= 0 .<br />

k →∞<br />

k<br />

We suppose by contradiction that lim d0<br />

≠ 0, then<br />

k →∞<br />

there exist an <strong>in</strong>f<strong>in</strong>ite <strong>in</strong>dex set K and a constant σ > 0<br />

k<br />

such that || d0<br />

|| > σ holds for all k∈<br />

K.<br />

Tak<strong>in</strong>g notice<br />

of the boundedness of { x<br />

k } , by tak<strong>in</strong>g a subsequence if<br />

necessary, we may suppose that<br />

k <br />

'<br />

x → x, Jk<br />

≡ J , ∀k∈<br />

K.<br />

Us<strong>in</strong>g Taylor expansion, we analyze the first search<br />

<strong>in</strong>equality of Step 5, comb<strong>in</strong><strong>in</strong>g the proof of Theorem 3.2,<br />

k<br />

the fact that x → x * ,( k →∞ ) implies that it is true.<br />

k<br />

k<br />

The proof of limd<br />

= 0; limd = 0 are elementary<br />

k→∞<br />

k→∞<br />

from the result of 1) as well as formulas (9) and (10).<br />

3) The proof of 3) is elementary from the formulas (9),<br />

(10) and assumption H2.1.<br />

Lemma 4.2. Let H2.1 to H4.1 holds,<br />

k+<br />

1 k<br />

lim || x − x || = 0 . Thereby, the entire sequence { x<br />

k }<br />

k →∞<br />

* k<br />

converges to x i.e. x → x * , k →∞ .<br />

Proof.<br />

From the Lemma 4.1, it is easy to see that<br />

k+<br />

1 k k 2 k<br />

lim || x − x || = lim(|| tkd + tkd<br />

||)<br />

k→∞<br />

k→∞<br />

k<br />

k<br />

≤ lim(|| d || + || d<br />

||) = 0<br />

k →∞<br />

Moreover, together with Theorem 1.1.5 <strong>in</strong> [4], it shows<br />

k<br />

that x → x * , k →∞<br />

Lemma 4.3 It holds, for k large enough, that<br />

* k<br />

* k *<br />

1) J<br />

k<br />

≡ I( x ) I* , b → uI = ( u ,<br />

* j<br />

j∈I* ), v →( uj, j∈I*<br />

)<br />

k k T k<br />

2) I + ⊆ Lk = { j∈ Jk : g<br />

j( x ) +∇ g<br />

j( x ) d0<br />

= 0} ⊆ Jk.<br />

Proof.<br />

1) Prove J<br />

k<br />

≡ I*<br />

.<br />

On one hand, from Lemma 2.1, we know, for k large<br />

enough, that I *<br />

⊆ J k<br />

. On the other hand, if it doesn’t<br />

hold that J<br />

k<br />

⊆ I*<br />

, then there exist constants j 0<br />

and<br />

β > 0 , such that<br />

*<br />

g<br />

j<br />

( x ) ≤− β < 0, j<br />

0<br />

0<br />

∈ Jk.<br />

k<br />

So, accord<strong>in</strong>g to d 0<br />

→ 0 and the functions g ( x ),<br />

j<br />

( j∈<br />

I ) are cont<strong>in</strong>uously differentiable, for k large<br />

k<br />

enough, if v < 0 , we have<br />

j0<br />

k * T k k * T k<br />

+∇<br />

j0 0<br />

=−<br />

j<br />

+∇<br />

0 j0<br />

0<br />

p ( x ) g ( x ) d v g ( x ) d<br />

j0<br />

1 k<br />

≥− v<br />

j<br />

> 0.<br />

0<br />

2<br />

Otherwise,<br />

k * T k<br />

p ( x ) +∇g ( )<br />

j<br />

j<br />

x d<br />

0<br />

0<br />

0<br />

k * T k 1<br />

k<br />

= g<br />

j<br />

( x ) +∇g ( )<br />

0 j<br />

x d<br />

0 0<br />

≤− β < 0, ( vj<br />

≥0)<br />

0<br />

2<br />

which is contradictory with (8) and the fact j 0<br />

∈ J k<br />

. So,<br />

J<br />

k<br />

≡ I*<br />

(for k large enough).<br />

k<br />

* k *<br />

Prove that b → uI = ( u ,<br />

* j<br />

j∈I* ), v →( uj, j∈ I*<br />

).<br />

k *<br />

For the v →( uj<br />

, j∈I*<br />

) statement, we have the<br />

k<br />

follow<strong>in</strong>g results from the def<strong>in</strong>ition of v ,<br />

k * T −1 T *<br />

v →−−B∇ f( x ) =−( A A ) A ∇ f( x )<br />

* * * *<br />

In addition, s<strong>in</strong>ce x * is a KKT po<strong>in</strong>t of (1), it is<br />

evident that<br />

* *<br />

∇ f( x ) + Au .<br />

* I<br />

= 0, u<br />

* I<br />

= −B * *<br />

∇ f( x )<br />

T −1 T *<br />

i.e. uI<br />

=−( A<br />

* *<br />

A* ) A*<br />

∇ f( x ).<br />

k<br />

Otherwise, from (8), the fact that d0 → 0 implies that<br />

k k k k<br />

*<br />

∇ f ( x ) + Hkd0 + Akb = 0, b →−B*<br />

∇ f( x ) = uI<br />

.<br />

*<br />

The claim holds.<br />

2) For<br />

Furthermore, it has<br />

*<br />

lim( k k<br />

x , d ) ( x , 0)<br />

0<br />

k →∞<br />

k *<br />

uI+ uI+<br />

x→∞<br />

= , we have<br />

Lk<br />

*<br />

⊆ I( x ) .<br />

lim = > 0 , so the proof is<br />

f<strong>in</strong>ished.<br />

In order to obta<strong>in</strong> super-l<strong>in</strong>ear convergence, a crucial<br />

requirement is that a unit step size is used <strong>in</strong> a<br />

neighborhood of the solution. This can be achieved if the<br />

follow<strong>in</strong>g assumption is satisfied.<br />

H4.2 Let<br />

2 k k k k<br />

|| (<br />

xxLx ( , uJ ) H) || (|| ||)<br />

k k<br />

d o d<br />

∇ − = , where<br />

= +∑ .<br />

k<br />

k<br />

Lxu ( , ) f( x) u g( x)<br />

Jk<br />

Jk<br />

j<br />

j∈Jk<br />

Lemma 4.4 Suppose that Assumption H 2.1 to H 4.2<br />

are all satisfied. Then, the step size <strong>in</strong> Algorithm A<br />

always one, i.e. tk<br />

≡ 1, if k is large enough.<br />

Proof.<br />

It is only necessary to prove that<br />

f ( x k + d k + d k ) ≤ f( x k ) + α∇f( x k ) T d<br />

k , (19)<br />

k k k<br />

g ( x + d + d ) ≤0, j∈I.<br />

(20)<br />

j<br />

*<br />

For (12) if j ∈ I \ I we have g ( ) 0<br />

*<br />

j<br />

x < ,<br />

k k<br />

k<br />

*<br />

( x , d , d ) →( x , 0, 0)( k →∞ ), then, it is easy to<br />

obta<strong>in</strong> g ( k k k<br />

j<br />

x + d + d ) ≤0<br />

holds.<br />

If j ∈ I*<br />

we have<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1501<br />

g ( x + d + d ) = g ( x + d ) +∇ g ( x + d ) d + O(|| d<br />

|| )<br />

k k k k k k k T k k 2<br />

j j j<br />

k k k T k k<br />

gj<br />

x + d +∇ gj<br />

x d + O d<br />

k<br />

d k<br />

+ O d<br />

2<br />

k k k T k k<br />

gj<br />

x + d +∇ gj<br />

x d<br />

+ O d<br />

k<br />

d<br />

= ( ) ( ) (|| |||| ||) (|| || )<br />

= ( ) ( ) (|| |||| ||).<br />

In addition, from (9) and (10),<br />

k T k k T k<br />

∇ g<br />

j<br />

( x ) d =∇g j( x ) d0<br />

− δ<br />

k,<br />

k T<br />

k<br />

( ) <br />

k τ<br />

k k<br />

∇ g<br />

j<br />

x d = −|| d0<br />

|| − g<br />

j( x + d )<br />

k k T k<br />

+ g<br />

j( x ) +∇g j( x ) d ,<br />

so, for τ ∈ (2,3) we have<br />

k k k<br />

gj<br />

( x + d + d<br />

)<br />

= − || d || + g ( x ) +∇g ( x ) d − δ + O(|| d |||| d<br />

||)<br />

k τ k k T k k k<br />

0 j j 0 k<br />

k τ<br />

k k<br />

0<br />

(21)<br />

≤− || d || + O(|| d |||| d ||) ≤0.<br />

Hence, the second <strong>in</strong>equalities of (20) hold for t = 1<br />

and k is sufficiently large.<br />

The next objective is to show the first <strong>in</strong>equality of (19)<br />

holds. From Taylor expansion and tak<strong>in</strong>g <strong>in</strong>to account<br />

Lemma 4.1 and Lemma 4.3, we have<br />

k k k k k T k<br />

s f( x + d + d<br />

) − f( x ) + α∇f( x ) d<br />

k T k k 1 k T 2 k T k<br />

= ∇ f ( x ) ( d + d ) + ( d ) ∇ f( x ) d (22)<br />

2<br />

k T k k 2<br />

−α∇ f( x ) d + o(|| d || ).<br />

On the other hand, from the KKT condition of (8) and<br />

the active set L<br />

k<br />

def<strong>in</strong>ed by Lemma 4.3 one has<br />

∑<br />

∇ f( x ) =−H d − u ∇g ( x )<br />

k k k k<br />

k 0<br />

j j<br />

j∈Lk<br />

k k k k 2<br />

=−Hd k<br />

−∑<br />

uj∇ g<br />

j( x) + o(|| d || ),<br />

j∈Lk<br />

So, from (23) and Lemma 4.3, we have<br />

∇f( x ) d<br />

k T k<br />

∑<br />

k T k k k T k<br />

( d ) Hkd uj g<br />

j( x ) d<br />

k 2<br />

o(|| d || )<br />

j∈Lk<br />

k<br />

d<br />

T k k k T k<br />

Hkd ∑ uj g<br />

j<br />

x d0<br />

o<br />

k<br />

d<br />

2<br />

j∈Lk<br />

=− − ∇ +<br />

= −( ) − ∇ ( ) + (|| || )<br />

k T k<br />

k<br />

∇ f( x ) ( d + d<br />

)<br />

∑<br />

k T k k k T k<br />

k<br />

k 2<br />

k j j<br />

j∈Lk<br />

=−( d ) H d − u ∇ g ( x ) ( d + d ) + o(|| d || ),<br />

Aga<strong>in</strong>, from (21) and Taylor expansion, it is clear that<br />

k 2<br />

k k k<br />

o(|| d || ) = gj( x + d + d<br />

)<br />

1<br />

g x +∇ g x d + d<br />

+ d ∇ g x d + o d<br />

2<br />

where j∈<br />

L , then, we obta<strong>in</strong><br />

(23)<br />

(24)<br />

(25)<br />

k k T k k k T 2 k T k k 2<br />

=<br />

j( )<br />

j( ) ( ) ( )<br />

j( ) (|| || )<br />

k<br />

∑<br />

k k T k<br />

k<br />

− u ∇ g ( x ) ( d + d<br />

)<br />

j j<br />

j∈Lk<br />

k k T<br />

∑ uj<br />

g<br />

j( x )<br />

j∈Lk<br />

1 ⎛ ( )<br />

2 T ⎞<br />

k T k (<br />

k )<br />

k (||<br />

k ||<br />

2<br />

+ d uj<br />

g<br />

j<br />

x d o d ),<br />

2 ⎜∑<br />

∇ ⎟<br />

+<br />

j∈Lk<br />

= ∇<br />

From (25) and (26), we have<br />

⎝<br />

k T k<br />

k<br />

∇ f( x ) ( d + d<br />

)<br />

k T k k k<br />

=−( d ) H d − u ∇g ( x )<br />

1<br />

k j j<br />

j∈Lk<br />

⎛<br />

k T k 2 k T k k 2<br />

+ ( d ) j j( ) (|| || )<br />

2 ⎜<br />

u ∇ g x ⎟<br />

d + o d<br />

j∈Lk<br />

⎝<br />

∑<br />

∑<br />

Substitut<strong>in</strong>g (27) and (24) <strong>in</strong>to (22), it holds that<br />

1 k T k k k<br />

s ( α − )( d ) Hkd + (1 −α) ∑ ujg j( x )<br />

2<br />

1 ⎛<br />

⎞<br />

2<br />

⎜ ∑<br />

⎟<br />

⎝<br />

j∈Lk<br />

⎠<br />

1 k T k k k<br />

=( α − )( d ) Hkd + (1 −α) ∑ ujg j( x )<br />

2<br />

⎠<br />

⎞<br />

⎠<br />

j∈Lk<br />

(26)<br />

(27)<br />

+<br />

k T<br />

( d )<br />

T<br />

2 k k 2 k<br />

k k 2<br />

∇ f ( x ) + u ∇ g ( x ) − H d + o(|| d || )<br />

j j k<br />

j∈Lk<br />

1 k T 2 k k k k 2<br />

+ ( d ) ( ∇ L( x , uJ<br />

) − H ) (|| || ).<br />

k k<br />

d + o d<br />

2<br />

Then, together assumption H 3.1 and H 4.2 as well as<br />

k k<br />

ug( x) ≤ 0, shows that<br />

j<br />

j<br />

1 1<br />

s ≤ α − a d + o d ≤ α∈<br />

2 2<br />

Hence, the <strong>in</strong>equality of (19) holds.<br />

k 2 k 2<br />

( ) || || (|| || ) 0. ( (0, )).<br />

Furthermore, <strong>in</strong> a way similar to the proof of Theorem<br />

5.2 <strong>in</strong> [5] and <strong>in</strong> [19, Theorem 2.3], we may obta<strong>in</strong> the<br />

follow<strong>in</strong>g theorem:<br />

Theorem 4.5 Under all above-mentioned assumptions,<br />

the algorithm is superl<strong>in</strong>early convergent, i.e., the<br />

sequence { x k } generated by the algorithm satisfies that<br />

1 * *<br />

|| k<br />

k<br />

x + − x || = o(|| x − x ||).<br />

Proof.<br />

From Lemma 4.1 and Lemma 4.4, we can know that<br />

the sequence { x<br />

k } yielded by Algorithm A has the form<br />

of<br />

k 1 k k<br />

k<br />

x + = x + d + d<br />

k k k<br />

k<br />

k<br />

= x + d0 + ( d + d −d0)<br />

k<br />

k k<br />

x + d + d<br />

.<br />

0<br />

k<br />

where k<br />

k<br />

( k<br />

d = d + d − d ) (for k large enough) and<br />

k<br />

k 3<br />

d O d0<br />

0<br />

|| || = (|| || ) . Consequently, we can obta<strong>in</strong> the<br />

result together with Ref. [5] and [19].<br />

V. NUMERICAL RESULTS<br />

© 2013 ACADEMY PUBLISHER


1502 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

In this section, we carry out numerical experiments<br />

based on the Algorithm A. The code of the proposed<br />

algorithm is written by us<strong>in</strong>g MATLAB 7.0 and utilized<br />

the optimization toolbox. The results show that the<br />

algorithm is effective. Dur<strong>in</strong>g the numerical experiments,<br />

it is chosen at random some parameters as follows:<br />

ε = 0.5, α = 0.25, τ = 2.25, H = I,<br />

0 0<br />

where I is the n× n unit matrix. H<br />

k<br />

is updated by the<br />

BFGS formula [2].<br />

k k<br />

H = k+ 1<br />

BFGS( H<br />

k, s , y ),<br />

Where,<br />

^<br />

k k+<br />

1 k k k k<br />

= − = θ + −θ<br />

k<br />

s x x , y y (1 ) H s ,<br />

^<br />

m<br />

k k+ 1 k k k+<br />

1<br />

k<br />

=∇ −∇ + ∑ j<br />

∇<br />

j<br />

−∇<br />

j<br />

j = 1<br />

y f( x ) f( x ) u ( g ( x ) g ( x )),<br />

kT<br />

⎧1, if y s k<br />

≥ 0.2( s k<br />

) T<br />

H k<br />

k<br />

s ,<br />

⎪<br />

θ =<br />

k T k<br />

⎨ 0.8( s ) Hk<br />

s<br />

⎪ , otherwise.<br />

kT<br />

k T k<br />

( ) k<br />

⎪⎩ s Hk<br />

s − y s<br />

In the implementation, the stopp<strong>in</strong>g criterion of Step 2<br />

k −8<br />

is changed to “If || d || ≤ 10 , STOP.”<br />

0<br />

TABLE I.<br />

THE DETAIL INFORMATION OF NUMERICAL EXPERIMENTS<br />

NO. n, m NT CPU<br />

HS12 2, 1 10 0<br />

HS43 4, 3 17 10<br />

HS66 3, 8 14 0<br />

HS100 7, 4 18 62<br />

HS113 10, 8 45 50<br />

NO.<br />

HS12<br />

HS43<br />

HS66<br />

HS100<br />

HS113<br />

TABLE II.<br />

THE APPROXIMATE OPTIMAL SOLUTION<br />

*<br />

x FOR TABLE I<br />

*<br />

x<br />

the approximate optimal solution<br />

(1.999999999995731, 3.000000000011285) T<br />

(0.000000000000000, 1.000000000000000,<br />

2.000000000000000, −1.000000000000000) T<br />

(0.184126482757009, 1.202167866986839,<br />

3.327322301935746) T<br />

(2.330499372903103, 1.951372372923884,<br />

-0.477541392886392, 4.365726233574537,<br />

-0.624486970384889, 1.038131018506466,<br />

1.594226711671913) T<br />

(2.171996371254668, 2.363682973701174,<br />

8.773925738481299, 5.095984487967813,<br />

0.990654764957730, 1.430573978920189,<br />

1.321644208159091, 9.828725807883636,<br />

8.280091670090108, 8.375926663907775) T<br />

This algorithm has been tested on some problems from<br />

Ref.[20], a feasible <strong>in</strong>itial po<strong>in</strong>t is either provided or<br />

obta<strong>in</strong>ed easily for each problem. The results are<br />

summarized <strong>in</strong> Table 1 to Tabe 4. The columns of this<br />

table have the follow<strong>in</strong>g mean<strong>in</strong>gs:<br />

No.: the number of the test problem <strong>in</strong> [20];<br />

n: the number of variables;<br />

m: the number of <strong>in</strong>equality constra<strong>in</strong>ts;<br />

NT: the number of iterations;<br />

CPU: the total time taken by the process (unit:<br />

millisecond) ;<br />

FV: the f<strong>in</strong>al value of the objective function.<br />

TABLE III.<br />

THE APPROXIMATE VALUE OF THE DIRECTION<br />

k<br />

d<br />

0<br />

FOR TABLE I<br />

k<br />

|| d ||<br />

NO. n, m<br />

0<br />

HS12 2, 1 7.329773437334 E-09<br />

HS43 4, 3 5.473511535838 E-09<br />

HS66 3, 8 8.327832675386 E-09<br />

HS100 7, 4 8.595133692328 E-09<br />

HS113 10, 8 6.056765632745 E-09<br />

TABLE IV.<br />

THE FINAL VALUE OF THE OBJECTIVE FUNCTION FOR TABLE I<br />

NO.<br />

FV<br />

HS12 -29.999999999999705<br />

HS43 -44.000000000000000<br />

HS66 0.518163274181542<br />

HS100<br />

6.806300573744022e+002<br />

HS113 24.306209068179822<br />

VI. CONCLUSION<br />

This paper proposed an improved feasible sequential<br />

quadratic programm<strong>in</strong>g (FSQP) method for nonl<strong>in</strong>ear<br />

programs. As compared with the exist<strong>in</strong>g SQP methods<br />

which required solv<strong>in</strong>g the QP sub-problem with<br />

<strong>in</strong>equality constra<strong>in</strong>ts <strong>in</strong> s<strong>in</strong>gle iteration, <strong>in</strong> order to obta<strong>in</strong><br />

the feasible direction, the method of this paper is only<br />

necessary to solve an equality constra<strong>in</strong>ed quadratic<br />

programm<strong>in</strong>g sub-problems. Comb<strong>in</strong>ed the generalized<br />

projection technique, a height-order correction direction<br />

is yielded by explicit formulas, which can avoids Maratos<br />

effect. Furthermore, under some mild assumptions, the<br />

algorithm is globally convergent and its rate of<br />

convergence is one-step super-l<strong>in</strong>early. Numerical results<br />

reported show that the algorithm <strong>in</strong> this paper is effective.<br />

ACKNOWLEDGMENT<br />

The author would like to thank the editors, whose<br />

constructive comments led to a considerable revision of<br />

the orig<strong>in</strong>al paper.<br />

REFERENCES<br />

[1] S. P. Han. “Superl<strong>in</strong>early Convergent Variable Metric<br />

Algorithm for General Nonl<strong>in</strong>ear Programm<strong>in</strong>g Problems”,<br />

Mathematical Programm<strong>in</strong>g, Berl<strong>in</strong>, vol.11 (1), pp. 263–<br />

282, December 1976.<br />

[2] M. J. D. Powell. “A Fast Algorithm for Nonl<strong>in</strong>early<br />

Constra<strong>in</strong>ed Optimization Calculations”, In: Waston, G.A.<br />

(ed). Numerical Analysis. Spr<strong>in</strong>ger, Berl<strong>in</strong>, pp. 144–157,<br />

1978.<br />

[3] P. T. Boggs, J. W. Tolle. “A Strategy for Global<br />

Convergence <strong>in</strong> a Sequential Quadratic Programm<strong>in</strong>g<br />

Algorithm”, SIAM J. Num. Anal., Philadelphia, vol. 26 (1),<br />

pp. 600–623, June 1989.<br />

[4] E. R. Panier, A. L. Tits. “On Comb<strong>in</strong><strong>in</strong>g Feasibility,<br />

Descent and Superl<strong>in</strong>ear Convergence <strong>in</strong> Inequality<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1503<br />

Constra<strong>in</strong>ed Optimization”, Mathematical Programm<strong>in</strong>g,<br />

Berl<strong>in</strong>, vol. 59, pp. 261–276, 1993.<br />

[5] J.F. B<strong>in</strong>nans, G. Launay. “Sequential quadratic<br />

programm<strong>in</strong>g with penalization the displacement”, SIAM J.<br />

Optimization, Philadelphia, vol. 5 (4), pp. 796–812, 1995.<br />

[6] P. Spellucci. “An SQP Method for General Nonl<strong>in</strong>ear<br />

Programs Us<strong>in</strong>g Only Equality Constra<strong>in</strong>ed Subproblems”,<br />

Mathematical Programm<strong>in</strong>g, Berl<strong>in</strong>, vol. 82 (3), pp. 413–<br />

448, August 1998.<br />

[7] C. T. Lawarence, and A.L.Tits. “A Computationally<br />

Efficient Feasible Sequential Quadratic Programm<strong>in</strong>g<br />

Algorithm”, SIAM J.Optim., Philadelphia, vol. 11, pp.<br />

1092–1118, 2001.<br />

[8] L. Qi, Y. F. Yang. “Globally and Superl<strong>in</strong>early Convergent<br />

QP-free Algorithm for Nonl<strong>in</strong>ear Constra<strong>in</strong>ed<br />

Optimization”, Journal of Optimization Theory and<br />

Applications, Berl<strong>in</strong>, vol. 113 (2), pp. 297–323, May 2002.<br />

(7)<br />

[9] J.B.Jian, C.M.Tang. “An SQP Feasible Descent Algorithm<br />

for Nonl<strong>in</strong>ear Inequality Constra<strong>in</strong>ed Optimization without<br />

Strict Complementarity”, An International Journal<br />

Computers and Mathematics with application, vol. 49, pp.<br />

223–238, 2005.<br />

[10] Z.J. Luo, Z.B. Zhu, L.R Wang, and A.J Ren. “An SQP<br />

algorithm with equality constra<strong>in</strong>ed sub-problems for<br />

general constra<strong>in</strong>ed optimization”, International Journal of<br />

Pure and Applied Mathematics, vol. 39 (1): pp. 125-138,<br />

2007.<br />

[11] Richard H. Byrd, Frank E. Curtis, and Jorge Nocedal.<br />

“Infeasibility Detection and SQP Methods for Nonl<strong>in</strong>ear<br />

Optimization”, SIAM J. Optim. Vol. 20 (5), pp. 2281-2299,<br />

2010.<br />

[12] A. F. Izmailov and M. V. Solodov. “A Truncated SQP<br />

Method Based on Inexact Interior-Po<strong>in</strong>t Solutions of Subproblems”,<br />

SIAM J. Optim. Vol. 20 (5), pp. 2584-2613,<br />

2010.<br />

[13] C.G. Shen, W.J. Xue and X.D. Chen. “Global convergence<br />

of a robust filter SQP algorithm”, European Journal of<br />

Operational Research, vol. 206 (1), pp. 34–45, 2010.<br />

[14] Z. B. Zhu, W.D. Zhang, and Z.J. Geng. “A feasible SQP<br />

method for nonl<strong>in</strong>ear programm<strong>in</strong>g”, Applied Mathematics<br />

and Computation, vol. 215, pp. 3956–3969, 2010.<br />

[15] Z. J. Luo, G. H. Chen, and L. R. Wang, "A Modified<br />

Sequence Quadratic Programm<strong>in</strong>g Method for Nonl<strong>in</strong>ear<br />

Programm<strong>in</strong>g, " cso, pp.458-461, 2011 Fourth<br />

International Jo<strong>in</strong>t Conference on Computational Sciences<br />

and Optimization, 2011.<br />

[16] C. Gu, D.T. Zhu. “A non-monotone l<strong>in</strong>e search<br />

multidimensional filter-SQP method for general nonl<strong>in</strong>ear<br />

programm<strong>in</strong>g”, Numerical Algorithms, vol. 56 (4),<br />

pp.537–559, 2011.<br />

[17] C.L. Hao, X.W. Liu. “A trust-region filter-SQP method for<br />

mathematical programs with l<strong>in</strong>ear complementarity<br />

constra<strong>in</strong>ts”, Journal of Industrial and Management<br />

Optimization, vol. 7 (4), pp. 1041–1055, 2011.<br />

[18] C.L. Hao, X.W. Liu. “Global convergence of an SQP<br />

algorithm for nonl<strong>in</strong>ear optimization with over determ<strong>in</strong>ed<br />

constra<strong>in</strong>ts”, Numerical algebra control and optimization,<br />

vol. 2 (1), pp. 19–29, 2012.<br />

[19] J.B. Jian. “Two extension models of SQP and SSLE<br />

algorithms for optimization and their superl<strong>in</strong>ear and<br />

quadratical convergence”, Applied Mathematics--A<br />

Journal of Ch<strong>in</strong>ese Universities, Set. A, vol. 16 (4),<br />

pp.435-444, 2001.<br />

[20] W. Hock, K. Schittkowski, Test examples for nonl<strong>in</strong>ear<br />

programm<strong>in</strong>g codes, Lecture Notes <strong>in</strong> Economics and<br />

Mathematical Systems, vol. 187, Spr<strong>in</strong>ger, Berl<strong>in</strong>, 1981.<br />

© 2013 ACADEMY PUBLISHER


1504 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

F<strong>in</strong>ite Element Analysis Based Design of Mobile<br />

Robot for Remov<strong>in</strong>g Plug Oil Well<br />

Xiaojie Tian<br />

College of Mechanical and Electronic Eng<strong>in</strong>eer<strong>in</strong>g, Ch<strong>in</strong>a University of Petroleum, Dongy<strong>in</strong>g, Ch<strong>in</strong>a<br />

Email: tianxj20050101@163.com<br />

Yonghong Liu, Rongju L<strong>in</strong>, Baop<strong>in</strong>g Cai, Zengkai Liu, Rui Zhang<br />

College of Mechanical and Electronic Eng<strong>in</strong>eer<strong>in</strong>g, Ch<strong>in</strong>a University of Petroleum, Dongy<strong>in</strong>g, Ch<strong>in</strong>a<br />

Email: liuyh@upc.edu.cn, 1440644797@qq.com, caibaop<strong>in</strong>g987@163.com, liuzengk@163.com, flyrockgod@163.com<br />

Abstract—In order to develop the mobile robot for remov<strong>in</strong>g<br />

the plug oil well, the robot was designed based on the wheeltype<br />

and leg-type robot mechanism. A well function<strong>in</strong>g<br />

prototype has been manufactured. To demonstrate the<br />

validity and the benefit of the mobile robot, support<strong>in</strong>g<br />

mechanism and guid<strong>in</strong>g rod were chosen to design based on<br />

the FEM. The mathematical model of the support<strong>in</strong>g<br />

mechanism is established and the mechanical property is<br />

analyzed us<strong>in</strong>g the FEM. The deformation and stress of<br />

some components of the support<strong>in</strong>g mechanism and the<br />

guid<strong>in</strong>g rod is <strong>in</strong>vestigated. The results show that the<br />

support<strong>in</strong>g mechanism and the guid<strong>in</strong>g rod have excellent<br />

performance with little displacement and small stress under<br />

work<strong>in</strong>g condition. The strength and rigidity of support<strong>in</strong>g<br />

mechanism and the guid<strong>in</strong>g rod are good enough to ensure<br />

the reliability of the whole robot mechanism.<br />

Index Terms—Mobile robot; Oil well; FEM; Support<strong>in</strong>g<br />

mechanism<br />

I. INTRODUCTION<br />

Mobile robots have been widely used to carry out<br />

manifold tasks such as <strong>in</strong>dustrial applications, planetary<br />

exploration, rescue operation and medical services <strong>in</strong><br />

recent years. In the oil and gas field, there are a lot of<br />

pipes that need to be detected and rescued, which<br />

promote the development of the mobile robots.<br />

Most reservoirs <strong>in</strong> the oil field are low permeability<br />

because of oil reservoirs pollution, scale formation,<br />

paraff<strong>in</strong> deposit and so on. The low permeability usually<br />

causes the reduction of oil production [1, 2]. Accord<strong>in</strong>gly<br />

the technology of remov<strong>in</strong>g plug oil well has become a<br />

important guarantee to protect oil reservoirs, improve oil<br />

production and oil recovery ratio [3]. The technology of<br />

remov<strong>in</strong>g plug oil well manly <strong>in</strong>cludes the chemical<br />

remov<strong>in</strong>g plug oil well and physical remov<strong>in</strong>g plug oil<br />

well. The plug removal technology with electrical pulse<br />

for oil reservoir is a new method developed to solve the<br />

problem of oil well plugg<strong>in</strong>g. It uses a mobile robot<br />

Correspond<strong>in</strong>g author. Tel.: +86 546 8392303; Fax: +86 546<br />

8393620. Email addresses: liuyhupc@126.com, liuyh@upc.edu.cn<br />

(Y.H. Liu)<br />

putt<strong>in</strong>g positive and negative electrodes <strong>in</strong>to the<br />

perforation and loads discharge pulse on them generated<br />

by pulse power. Ow<strong>in</strong>g to the special work condition of<br />

the mobile robot, the design of the robot is very important.<br />

Accord<strong>in</strong>g to a locomotive mechanism to achieve the<br />

desired mobility, mobile robots may be split <strong>in</strong>to<br />

follow<strong>in</strong>g categories: leg-type, track-type and wheel-type<br />

mobile robots. While the leg-type mobile robot ensures<br />

the most superior adaptability to all k<strong>in</strong>ds of<br />

environments, its mechanism is quite complicated<br />

because active control algorithms equipped with<br />

additional actuators and sensors are required to steadily<br />

ma<strong>in</strong>ta<strong>in</strong> its balance, which <strong>in</strong>evitably leads to slow<br />

movement and poor energy efficiency [4, 5]. The tracktype<br />

mobile robot provides acceptable mobility on an offroad<br />

environment by virtue of its <strong>in</strong>herently stable<br />

mechanism. However, the excessive friction is lost dur<strong>in</strong>g<br />

chang<strong>in</strong>g a direction, which also results <strong>in</strong> poor energy<br />

efficiency [6]. Compared to other alternatives, the wheeltype<br />

mobile robot can be developed <strong>in</strong> the simplest<br />

configuration. Therefore the fast movement as well as<br />

good energy efficiency is guaranteed without any<br />

complicated control strategy. However, its adaptability to<br />

an environment does not seem to be sufficiently good and<br />

its mobility is restricted depend<strong>in</strong>g on both the type and<br />

the size of encountered obstacle [7].<br />

Therefore, it is not surpris<strong>in</strong>g that high mobility on<br />

various environments have been a primary factor among<br />

others when evaluation the performance of the mobile<br />

robot. Li Peng et al. [8] proposed an adaptive mobile<br />

robot which had the adaptability to the change of pipe<br />

diameters. When the robot encounters a step, the adaptive<br />

mobile mechanism of the robot will change its work<strong>in</strong>g<br />

mode to surmount the obstacle. Compared to classical<br />

screw-driven robots, this robot does not employ the l<strong>in</strong>ktype<br />

configuration, but only uses one actuator to solve the<br />

low capability of surmount<strong>in</strong>g obstacle. The observed<br />

rotation problem of the support<strong>in</strong>g parts is solved by the<br />

k<strong>in</strong>ematical analysis of the robot. Joshi et al. [9] designed<br />

a spherical mobile robot, roll<strong>in</strong>g on a plane with the help<br />

of two <strong>in</strong>ternal rotors and work<strong>in</strong>g on the pr<strong>in</strong>ciple of<br />

conservation of angular momentum. The robot is a classic<br />

nonholonomic system. The k<strong>in</strong>ematic model of the<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1504-1511


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1505<br />

system is developed us<strong>in</strong>g quaternion for the description<br />

of the orientation of the robot. The model is fully<br />

controllable and can be taken from any arbitrary<br />

configuration to any arbitrary configuration with<strong>in</strong> the<br />

unit 3-sphere <strong>in</strong> the quaternion space. Kim et al. [10]<br />

presented an optimal design of a wheel-type mobile robot<br />

hav<strong>in</strong>g high mobile stability as well as excellent<br />

adaptability while climb<strong>in</strong>g stairs. The Taguchi method<br />

is adopted as an optimization tool and the sensitivity<br />

analysis with respect to design parameters is carried out<br />

to provide an <strong>in</strong>sight to their effects on the performance<br />

criterion under k<strong>in</strong>ematic constra<strong>in</strong>s which are imposed to<br />

avoid undesired <strong>in</strong>terference between a mobile robot and<br />

stairs. Aracil et al. [11] proposed the parallel robots for<br />

autonomous climb<strong>in</strong>g along tubular structures and studied<br />

the dynamics of some different configurations. The<br />

parallel robot is based on the application of the Gough-<br />

Stewart (G-S) platform. Technical specifications of the<br />

system are presented and the control scheme is analyzed.<br />

Several experiments have been carried out and the<br />

analysis of the results has checked the high capacity of<br />

the parallel robot to climb on tubular structures with<br />

unknown trajectories.<br />

Based on the wheel-type mobile mechanism, an<br />

optimal design of the mobile robot for remov<strong>in</strong>g the plug<br />

oil well is presented. A well function<strong>in</strong>g prototype has<br />

been manufactured. Section 2 describes the structure of<br />

the mobile robot <strong>in</strong>clud<strong>in</strong>g micro-step walk<strong>in</strong>g<br />

mechanism, revolv<strong>in</strong>g measur<strong>in</strong>g mechanism, and EDM<br />

remov<strong>in</strong>g plug mechanism. Section 3 presents the<br />

mathematical and FEM models for the support<strong>in</strong>g<br />

mechanism. Section 4 gives the analysis results. And<br />

Section 5 summarized the paper.<br />

II. STRUCTURE PRINCIPLE OF THE ROBOT<br />

A. The Whole Mobile Robot System<br />

To remove the plug oil well, the technology of EDM<br />

(electrical discharge mach<strong>in</strong><strong>in</strong>g) remov<strong>in</strong>g plug well is<br />

proposed <strong>in</strong> this paper. And the mobile robot is developed<br />

for this technology. The wheel-type robot has the<br />

simplest configuration and the fast movement. The legtype<br />

mobile robot has the most superior adaptability to all<br />

k<strong>in</strong>ds of environments. Based on the merits of the wheeltype<br />

and leg-type robot, the mobile robot mechanism is<br />

designed to use <strong>in</strong> the oil pipe. Consider<strong>in</strong>g the rigors<br />

environments of the oil pipe, the configuration of the<br />

mechanism should be simple, small sizes, flexibility and<br />

reliability. Therefore the prototype of mobile robot has<br />

been manufactured <strong>in</strong> the laboratory. The whole mobile<br />

robot system for remov<strong>in</strong>g the plug oil well is shown <strong>in</strong><br />

Fig.1 (a).<br />

As shown <strong>in</strong> Fig.1 (b), the mobile mechanism is ma<strong>in</strong>ly<br />

composed of micro-step walk<strong>in</strong>g mechanism, revolv<strong>in</strong>g<br />

measur<strong>in</strong>g mechanism, and EDM remov<strong>in</strong>g plug<br />

mechanism. When the oil pipe is plugged, the mov<strong>in</strong>g<br />

robot is tripped <strong>in</strong>to the oil pipe under several kilometers<br />

by the drawworks. Once the robot arrives at the<br />

designated position, the drawwoks will stop work<strong>in</strong>g.<br />

Then the micro-step walk<strong>in</strong>g mechanism will start<br />

mov<strong>in</strong>g to search for the perforat<strong>in</strong>g position because the<br />

designed position is not the perforat<strong>in</strong>g position exactly.<br />

The robot crawls along the <strong>in</strong>ner surface of the oil pipe by<br />

the micro-step walk<strong>in</strong>g mechanism; and the revolv<strong>in</strong>g<br />

measur<strong>in</strong>g mechanism rotates to detect the perforat<strong>in</strong>g<br />

position accord<strong>in</strong>g to the sensors at the same time. Once<br />

the perforat<strong>in</strong>g position is detected, the robot will stop<br />

mov<strong>in</strong>g and halted <strong>in</strong> the oil pipe. And then the EDM<br />

remov<strong>in</strong>g plug mechanism will remove the plugged<br />

objects under the enormous discharge energy. Moreover<br />

the movement of robot is controlled by the remote control<br />

system and the whole work<strong>in</strong>g process can be monitored<br />

on the ground.<br />

Figure 1. Schematic diagram of the mobile robot.<br />

B. Micro-step Walk<strong>in</strong>g Mechanism<br />

The micro-step walk<strong>in</strong>g mechanism is one of the ma<strong>in</strong><br />

members of the mobile robot. It can enable the mobile<br />

robot walk and stop <strong>in</strong> any position of the vertical oil pipe.<br />

It also can guide and centralize the robot <strong>in</strong> the pipe.<br />

Moreover it can be adaptive to different diameters of the<br />

pipe.<br />

Figure 2. Micro-step walk<strong>in</strong>g mechanism<br />

As shown <strong>in</strong> Fig 2, the micro-step walk<strong>in</strong>g mechanism<br />

conta<strong>in</strong>s two sets of adaptive guid<strong>in</strong>g mechanism,<br />

support<strong>in</strong>g mechanism and electric telescopic rod. Based<br />

on the pr<strong>in</strong>ciple of slider-crank mechanism, the adaptive<br />

guid<strong>in</strong>g mechanism has four cranks distributed for 90°<br />

that are opened by the slider push<strong>in</strong>g at the effect of the<br />

pretighten<strong>in</strong>g force of spr<strong>in</strong>g. It can be self-adaptive to<br />

different diameters of pipe. The tension wheels are<br />

© 2013 ACADEMY PUBLISHER


1506 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

<strong>in</strong>stalled on the adaptive guid<strong>in</strong>g mechanism to reduce<br />

the friction force and help the robot tripped <strong>in</strong>to the oil<br />

pipe smoothly. The support<strong>in</strong>g mechanism is composed<br />

of four support<strong>in</strong>g legs distributed for 90° and controlled<br />

by the electric telescopic rod. The electric telescopic rod<br />

can push the support<strong>in</strong>g legs of the support<strong>in</strong>g<br />

mechanism on to the <strong>in</strong>ner surface of the pipe. And the<br />

friction force between support<strong>in</strong>g legs and pipe is large<br />

enough to ensure the robot hover<strong>in</strong>g steadily for a long<br />

time. The electric telescopic rod also can control the<br />

distance per step while the robot walk<strong>in</strong>g, which is<br />

changed by controll<strong>in</strong>g its telescopic direction and turnon<br />

time.<br />

C. Revolv<strong>in</strong>g Measur<strong>in</strong>g Mechanism<br />

The revolv<strong>in</strong>g measur<strong>in</strong>g mechanism is responsible for<br />

detect<strong>in</strong>g the perforat<strong>in</strong>g location <strong>in</strong> the oil well and can<br />

revolve 360° <strong>in</strong> the pipe, which makes the measur<strong>in</strong>g<br />

sensor detect the circumferential surface of the pipe. The<br />

revolv<strong>in</strong>g mechanism is manly composed of step motor,<br />

support<strong>in</strong>g bear<strong>in</strong>g, shaft coupl<strong>in</strong>g and conduct<strong>in</strong>g slip<br />

r<strong>in</strong>g, as shown <strong>in</strong> Fig 3(a). It can be revolved by the step<br />

motor and transmitted motion by the shaft coupl<strong>in</strong>g. The<br />

conduct<strong>in</strong>g slip r<strong>in</strong>g is an important part to transmit the<br />

signals among the revolv<strong>in</strong>g parts with the non-revolv<strong>in</strong>g<br />

parts. There are four connect<strong>in</strong>g rods between the step<br />

motor and the conduct<strong>in</strong>g slip r<strong>in</strong>g. This can ensure the<br />

steady and centralization of the revolv<strong>in</strong>g measur<strong>in</strong>g<br />

mechanism.<br />

current. The EDM remov<strong>in</strong>g plug mechanism feeds on<br />

the tool electrode wire used for remov<strong>in</strong>g plug<br />

cont<strong>in</strong>uously. This can compensate the removed tool<br />

electrode dur<strong>in</strong>g the plug remov<strong>in</strong>g process. In one word<br />

the revolv<strong>in</strong>g measur<strong>in</strong>g mechanism should have higher<br />

position<strong>in</strong>g accuracy to ascerta<strong>in</strong> the detection of the<br />

perforat<strong>in</strong>g location.<br />

III. MECHANICAL MODEL FOR THE SUPPORTING<br />

MECHANISM<br />

A. Mathematical Model<strong>in</strong>g<br />

It is worthwhile to consider the static analysis on the<br />

robot mechanism so as to meet the requirement of the<br />

strength and rigidity of the whole mechanism. The<br />

support<strong>in</strong>g mechanism is composed of four pairs of<br />

support<strong>in</strong>g legs distributed for 90°, the upper support<strong>in</strong>g<br />

plate, and the lower support<strong>in</strong>g plate. The upper<br />

support<strong>in</strong>g plate is fixed with the electric telescopic rod<br />

by nut, whose position could not be moved. However the<br />

lower support<strong>in</strong>g plate is mobile, which is fixed with the<br />

central pole of the electric telescopic rod by nut. Through<br />

adjust<strong>in</strong>g the nut of the lower support<strong>in</strong>g plate, the mobile<br />

robot can be adaptive to various diameters of pipe. The<br />

central pole of electric telescopic rod moves up and down<br />

by controll<strong>in</strong>g the power on and off of the electric<br />

telescopic rod. Therefore the support<strong>in</strong>g mechanism can<br />

be opened to the pipe wall and enable the whole mobile<br />

robot stop <strong>in</strong> the vertical oil pipe.<br />

Figure 3.<br />

(a) Remov<strong>in</strong>g measur<strong>in</strong>g mechanism; (b) EDM remov<strong>in</strong>g<br />

plug mechanism.<br />

Moreover the lower part of the revolv<strong>in</strong>g measur<strong>in</strong>g<br />

mechanism is attached with the measur<strong>in</strong>g sensor and the<br />

EDM remov<strong>in</strong>g plug mechanism distributed<br />

symmetrically, as shown <strong>in</strong> Fig 3(b). When the<br />

perforat<strong>in</strong>g location is detected, the revolv<strong>in</strong>g measur<strong>in</strong>g<br />

mechanism will rotate 180° and the EDM remov<strong>in</strong>g plug<br />

mechanism is <strong>in</strong> alignment with the perforat<strong>in</strong>g location<br />

exactly. The measur<strong>in</strong>g work is ma<strong>in</strong>ly depend<strong>in</strong>g on the<br />

electric eddy current sensor which is a non-contact<strong>in</strong>g<br />

sensor and produces the output signals accord<strong>in</strong>g to the<br />

eddy current. So the remov<strong>in</strong>g plug work can be carried<br />

out. The remov<strong>in</strong>g plug work is ma<strong>in</strong>ly completed by the<br />

electric discharge between the electrodes. And the power<br />

supply on the ground provides the discharge voltage and<br />

Figure 4. Mathematical model<strong>in</strong>g of the support<strong>in</strong>g mechanism (a)<br />

simplified model of the support<strong>in</strong>g mechanism; (b) mechanical analysis<br />

of connect<strong>in</strong>g p<strong>in</strong> A.<br />

The support<strong>in</strong>g mechanism is the most important<br />

component <strong>in</strong> the whole robot mechanism and ensures the<br />

stability of the whole mechanism. It endures the gravity<br />

of the whole mechanism, the support<strong>in</strong>g force of the pipe<br />

wall and the friction force. In order to analyze the<br />

<strong>in</strong>teraction forces between the support<strong>in</strong>g mechanism and<br />

the pipe wall dur<strong>in</strong>g the EDM remov<strong>in</strong>g plug mechanism<br />

work<strong>in</strong>g condition, we established the mathematical<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1507<br />

model. Consider<strong>in</strong>g the symmetry of the mechanism, the<br />

mathematical model is simplified as shown <strong>in</strong> Fig. 4(a).<br />

The support<strong>in</strong>g leg could be simplified to the two-force<br />

bar [12-14]. The force on the p<strong>in</strong> A that is contacted with<br />

the pipe wall is analyzed <strong>in</strong> Fig. 4(b). Accord<strong>in</strong>g to the<br />

pr<strong>in</strong>ciple of force balance, the force can be expressed as<br />

∑ F ( 0) = F x + Fy<br />

= 0<br />

(1)<br />

( ) − F × ( θ + θ ) L<br />

F x = F2 × L × s<strong>in</strong> θ 1 1 s<strong>in</strong> 1 2 × (2)<br />

( )<br />

F y = f × F2 × cos θ 2<br />

(3)<br />

F = F s<strong>in</strong>( )<br />

(4)<br />

1 0 2 θ2<br />

Where F is the resultant force; F 0 is the force produced<br />

by the spr<strong>in</strong>g on the lower support<strong>in</strong>g plate; F 1 is the<br />

support<strong>in</strong>g force of the support<strong>in</strong>g leg; F 2 is the force on<br />

the support<strong>in</strong>g mechanism by the pipe wall, L is the<br />

length of the upper support<strong>in</strong>g leg, f is the friction<br />

coefficient between pipe wall and support<strong>in</strong>g mechanism;<br />

θ 1 is the angle of the upper support<strong>in</strong>g leg to the<br />

horizontal l<strong>in</strong>e; θ 2 is the angle of the lower support<strong>in</strong>g leg<br />

to the horizontal l<strong>in</strong>e.<br />

The force on the support<strong>in</strong>g mechanism by the pipe<br />

wall F 2 can be achieved by Equation (1), (2), (3) and (4)<br />

and expressed as<br />

F0<br />

s<strong>in</strong>( θ1<br />

+ θ2)<br />

F2<br />

= (5)<br />

2(s<strong>in</strong>θ<br />

− f cosθ<br />

)<br />

From Equation (5), the force on the support<strong>in</strong>g<br />

mechanism by the pipe wall F 2 is related to the force<br />

produced by the spr<strong>in</strong>g on the lower support<strong>in</strong>g plate F 0<br />

and the angle of the upper support<strong>in</strong>g leg to the horizontal<br />

l<strong>in</strong>e θ 1 , the angle of the lower support<strong>in</strong>g leg to the<br />

horizontal l<strong>in</strong>e θ 2 . And it has the maximum value only<br />

when the sum of θ 1 and θ 2 is the largest and s<strong>in</strong>θ 1 is<br />

almost equal to cosθ 2 .<br />

B. FEM Modell<strong>in</strong>g<br />

FEM software is used to simulate and analyze stress<br />

and deformation of the support<strong>in</strong>g mechanism to ensure<br />

the strength and rigidity of the whole robot mechanism.<br />

When the mobile robot arrives at the perforation position,<br />

the electric telescopic rod is power on and the support<strong>in</strong>g<br />

legs are supported onto the pipe wall. The whole robot<br />

mechanism is hovered <strong>in</strong> the oil pipe steadily and the<br />

EDM plug mechanism starts to work. Therefore the<br />

support<strong>in</strong>g mechanism should have enough support<strong>in</strong>g<br />

force to support the whole mechanism. The forces on the<br />

support<strong>in</strong>g mechanism are ma<strong>in</strong>ly the electromagnetic<br />

force, the gravity and the act<strong>in</strong>g force with the pipe wall.<br />

Therefore the electromagnetic force and the gravity can<br />

be simplified to the force acted on the upper and lower<br />

support<strong>in</strong>g plates only.<br />

The f<strong>in</strong>ite element model of the support<strong>in</strong>g mechanism<br />

is established us<strong>in</strong>g the 3-D model<strong>in</strong>g element SOLID98<br />

as shown <strong>in</strong> Fig. 5. The high precision element SOLID98<br />

is adopted to analyze the stress and deformation. It is<br />

1<br />

2<br />

because that the SOLID98 element is a ten nodes<br />

Tetrahedral element and more suitable for produc<strong>in</strong>g the<br />

irregular shape grid [15, 16]. In addition, the guid<strong>in</strong>g rod<br />

is <strong>in</strong>troduced to be analyzed the stress and deformation<br />

based on FEM. The guid<strong>in</strong>g rod is throughout the<br />

support<strong>in</strong>g mechanism (shown <strong>in</strong> Fig. 1 (b)) and places<br />

an important role at the aspect of guid<strong>in</strong>g and support<strong>in</strong>g<br />

the whole robot mechanism. Its strength and rigidity can<br />

ensure the stability of the whole robot mechanism.<br />

Sta<strong>in</strong>less steel and alum<strong>in</strong>ium alloy are considered for<br />

simulation <strong>in</strong> the FEM models because the support<strong>in</strong>g<br />

mechanism is manufactured with sta<strong>in</strong>less steel and the<br />

guid<strong>in</strong>g rod is manufactured with alum<strong>in</strong>ium alloy. The<br />

sta<strong>in</strong>less steel has the merit of high strength and the<br />

alum<strong>in</strong>ium alloy has the merit of light weight [17, 18].<br />

The boundary conditions are fixed on the models and<br />

static analyses are performed <strong>in</strong> sequence <strong>in</strong> order to<br />

obta<strong>in</strong> the analysis results of the stress and deformation of<br />

the components.<br />

Figure 5. FEM model of the support<strong>in</strong>g mechanism<br />

IV. RESULTS AND DISCUSSION<br />

A. Displacement and Stress of the Upper Support<strong>in</strong>g<br />

Plate<br />

The upper support<strong>in</strong>g plate is round and has four<br />

connect<strong>in</strong>g p<strong>in</strong>s with the upper support<strong>in</strong>g legs. And it is<br />

stationary fixed with the electric telescopic rod. So it<br />

manly bears the forces of the upper support<strong>in</strong>g legs when<br />

the support<strong>in</strong>g mechanism is supported on to the pipe<br />

wall. Under the effect of the electromagnetic force and<br />

gravity, the displacement of the upper support<strong>in</strong>g plate is<br />

shown <strong>in</strong> Fig. 6 (a). The maximal deformation emerges at<br />

the connect<strong>in</strong>g po<strong>in</strong>ts with the upper support<strong>in</strong>g legs. This<br />

is ma<strong>in</strong>ly ow<strong>in</strong>g to the weight of the whole mechanism<br />

that ultimately caused the connect<strong>in</strong>g po<strong>in</strong>ts buckled.<br />

Therefore the rigidity of the connect<strong>in</strong>g po<strong>in</strong>ts should be<br />

improved. And the manufacture of the connect<strong>in</strong>g po<strong>in</strong>ts<br />

could adopt the special mach<strong>in</strong><strong>in</strong>g technology or the<br />

material used could be the high strength materials<br />

different from the round support<strong>in</strong>g plate. The stress of<br />

the upper support<strong>in</strong>g plate is shown <strong>in</strong> Fig. 6 (b). It can be<br />

seen that the stress value of the upper support<strong>in</strong>g plate is<br />

very small and the maximum value is only 8.85Mpa,<br />

which only emerges <strong>in</strong> m<strong>in</strong>or places. The stress value is<br />

© 2013 ACADEMY PUBLISHER


1508 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

much smaller than the allowable stress of material.<br />

Therefore the thickness of the upper plate can be reduced<br />

properly.<br />

places with the pipe wall. The stress between upper<br />

support<strong>in</strong>g leg and lower support<strong>in</strong>g leg is also very large.<br />

Therefore the materials with high strength and light<br />

weight will be a better chose for the upper support<strong>in</strong>g<br />

legs.<br />

Figure 6. Simulation results of the upper support<strong>in</strong>g plate (a)<br />

displacement (b) stress.<br />

B. Displacement and Stress of the Upper Support<strong>in</strong>g Leg<br />

The support and steady effect of the support<strong>in</strong>g<br />

mechanism ma<strong>in</strong>ly depends on the upper and lower<br />

support<strong>in</strong>g legs support<strong>in</strong>g on to the pipe wall. The upper<br />

support<strong>in</strong>g leg is connected to the lower support<strong>in</strong>g leg by<br />

p<strong>in</strong>s. So the upper leg moves with the movement of the<br />

lower leg. Therefore the force of upper support<strong>in</strong>g leg<br />

ma<strong>in</strong>ly comes from the lower support<strong>in</strong>g leg.<br />

In this FEM analysis it is supported that the<br />

displacement between the upper support<strong>in</strong>g leg and the<br />

<strong>in</strong>ner pipe wall is zero. And the maximal displacement of<br />

the upper support<strong>in</strong>g leg emerges at the <strong>in</strong>termediate<br />

section as shown <strong>in</strong> Fig. 7 (a). It is concluded that the<br />

upper support<strong>in</strong>g leg is liable to produce bend<strong>in</strong>g<br />

deformation and the material of the upper support<strong>in</strong>g leg<br />

can be chosen to the better material with high strength.<br />

Obviously, the upper support<strong>in</strong>g leg is a ma<strong>in</strong>ly forc<strong>in</strong>g<br />

component and bears the effect of electromagnetic force.<br />

So the support<strong>in</strong>g arm could produce larger stress as<br />

shown <strong>in</strong> Fig. 7 (b). And the greatest stress value is to<br />

56Mpa which also meets the strength requirement. The<br />

greatest stress is ma<strong>in</strong>ly distributed <strong>in</strong> the contact<strong>in</strong>g<br />

Figure 7. Simulation results of the upper support<strong>in</strong>g leg (a)<br />

displacement (b) stress.<br />

C. Displacement and Stress of the Lower Support<strong>in</strong>g Leg<br />

The lower support<strong>in</strong>g leg is another important<br />

support<strong>in</strong>g component of the support<strong>in</strong>g mechanism. It is<br />

connected with the lower support<strong>in</strong>g plate and moves by<br />

the push<strong>in</strong>g of the lower plate. Therefore the force of<br />

lower support<strong>in</strong>g leg ma<strong>in</strong>ly comes from the lower<br />

support<strong>in</strong>g plate. The shape of the lower support<strong>in</strong>g leg is<br />

different from the upper one. It is used to support the<br />

upper leg.<br />

The lower support<strong>in</strong>g leg could be regarded as a two<br />

force bar whose force is <strong>in</strong> the direction of its application.<br />

Therefore the deformation of the lower support<strong>in</strong>g leg is<br />

<strong>in</strong> the direction of its application. As shown <strong>in</strong> Fig. 8 (a),<br />

the maximal displacement of the lower support<strong>in</strong>g leg<br />

emerges at the connect<strong>in</strong>g jo<strong>in</strong>t with the lower support<strong>in</strong>g<br />

plate. The lower support<strong>in</strong>g leg is ma<strong>in</strong>ly under the effect<br />

of the compressive force com<strong>in</strong>g from the lower plate<br />

because it moves with the movement of the lower<br />

support<strong>in</strong>g plate. As shown <strong>in</strong> Fig. 8 (b), the maximum<br />

stress is produced at the p<strong>in</strong>s connect<strong>in</strong>g place. The stress<br />

is a little greater due to the effect of the electromagnetic<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1509<br />

force by the lower support<strong>in</strong>g plate. And the greatest<br />

value is 48.8Mpa which also meets the strength<br />

requirement. In general, the size of the lower support<strong>in</strong>g<br />

leg is suitable and the displacement and the stress based<br />

on FEM are <strong>in</strong> the reasonable scope.<br />

uniformly at about 0.56Mpa. But the maximal stress<br />

value of is to 56.1Mpa. This only emerges at the<br />

connect<strong>in</strong>g place. Also the stress concentration appears at<br />

the sharp angle. Therefore, the high rigidity material<br />

should be chosen to mach<strong>in</strong>e this part. And the sharp<br />

angle should be filleted to reduce the stress concentration<br />

dur<strong>in</strong>g mach<strong>in</strong><strong>in</strong>g.<br />

Figure 8. Simulation results of the lower support<strong>in</strong>g leg (a)<br />

displacement (b) stress.<br />

D. Displacement and Stress of the Lower Support<strong>in</strong>g<br />

Plate<br />

Compar<strong>in</strong>g to the upper support<strong>in</strong>g plate, the lower<br />

support<strong>in</strong>g plate has a smaller size and is moveable. It is<br />

fixed with the central pole of the electric telescopic rod<br />

and moves up and down by controll<strong>in</strong>g the power on and<br />

off of the electric telescopic rod. Under the movement of<br />

the lower support<strong>in</strong>g plate, the support<strong>in</strong>g mechanism can<br />

be adaptive to many sizes of pipe. So it manly bears the<br />

electromagnetic force from the electric telescopic rod<br />

when the support<strong>in</strong>g mechanism is supported on to the<br />

pipe wall.<br />

The maximal deformation of the lower support<strong>in</strong>g<br />

plate emerged at the centre as shown <strong>in</strong> Fig. 9 (a), which<br />

is differently from the deformation of upper support<strong>in</strong>g<br />

plate. This is because that the electromagnetic force and<br />

gravity is directly put on the centre of the lower<br />

support<strong>in</strong>g plate. Therefore the lower support<strong>in</strong>g plate<br />

should have sufficient rigidity. As shown <strong>in</strong> Fig. 9 (b) the<br />

stress of the lower support<strong>in</strong>g plate is almost distributed<br />

Figure 9. Simulation results of the lower support<strong>in</strong>g plate (a)<br />

displacement (b) stress.<br />

E. Displacement and Stress of the Guid<strong>in</strong>g Rod<br />

The guid<strong>in</strong>g rod is located at the upper part of the<br />

whole robot and throughout the support<strong>in</strong>g mechanism.<br />

It is a centre rod to hold the stability and the verticality of<br />

the whole mechanism. It also bears the weight of the<br />

whole mechanism and belongs to a bear<strong>in</strong>g bar. There are<br />

two holes on the guid<strong>in</strong>g rod as shown <strong>in</strong> Fig. 10. The<br />

upper one is used to fix the cables and the lower one is<br />

used to <strong>in</strong>stall the spr<strong>in</strong>g reta<strong>in</strong>er r<strong>in</strong>g. When the robot <strong>in</strong><br />

tripped <strong>in</strong>to the oil pipe, the guid<strong>in</strong>g rod bears the pull<strong>in</strong>g<br />

force of the cable and the gravity of the whole<br />

mechanism; when the robot is hovered <strong>in</strong> the oil pipe, it<br />

manly bears the gravity.<br />

Before develop<strong>in</strong>g the mathematical optimum model<br />

of the guid<strong>in</strong>g rod, the follow<strong>in</strong>g assumption are made<br />

that the gravity of the whole robot is changed <strong>in</strong>to the<br />

compressive force that is acted on the outside of the<br />

guid<strong>in</strong>g rod lower part. So the 10kg force was acted on<br />

© 2013 ACADEMY PUBLISHER


1510 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

the guid<strong>in</strong>g rod. Accord<strong>in</strong>g to the static analysis, the<br />

deformation and stress of the guid<strong>in</strong>g rod is shown <strong>in</strong> Fig.<br />

10 (a) and Fig. 10 (b). The guid<strong>in</strong>g rod ma<strong>in</strong>ly bears a<br />

tensile force and the deformation <strong>in</strong>creases gradually<br />

from the up to down. F<strong>in</strong>ally, the deformation is up to the<br />

maximum value of 0.0021mm at the lower part of the<br />

guid<strong>in</strong>g rod. The material of the guid<strong>in</strong>g rod should have<br />

enough tension strength. At the <strong>in</strong>termediate section of<br />

the guid<strong>in</strong>g rod, the stress value is almost the same.<br />

However, at the two ends the stress value is a little<br />

smaller. And the maximal stress of 8.96Mpa emerges at<br />

the lower part. The maximum stress value is smaller than<br />

the allowable stress of alum<strong>in</strong>um alloy. Therefore it can<br />

meet the requirements of strength and rigidity.<br />

value of deformation <strong>in</strong>creases from 0.0015mm to<br />

0.00526mm as the force <strong>in</strong>crease from 5Kg to 25Kg.<br />

However, the deformation value is very small, which has<br />

no <strong>in</strong>fluence to the whole mechanism.<br />

Deformation (mm)<br />

0.016<br />

0.014<br />

0.012<br />

0.01<br />

0.008<br />

0.006<br />

0.004<br />

0.002<br />

0<br />

ø6<br />

ø8<br />

ø10<br />

ø12<br />

5 10 15 20 25<br />

Force(Kg)<br />

Figure 11. Simulation results of the guid<strong>in</strong>g rod deformation under<br />

different forces<br />

Figure 10. Simulation results of the guid<strong>in</strong>g rod (a) displacement (b)<br />

stress.<br />

The simulation results of the guid<strong>in</strong>g rod under the<br />

force of 10Kg have been obta<strong>in</strong>ed above. Consider<strong>in</strong>g the<br />

work<strong>in</strong>g condition, different forces has been acted on the<br />

guid<strong>in</strong>g rod to study its deformation. Also the diameter of<br />

the guid<strong>in</strong>g rod is changed from 6mm to 12mm. The<br />

deformation of different sizes guid<strong>in</strong>g rod under the force<br />

of 5Kg to 25Kg is shown <strong>in</strong> Fig. 11. The deformation<br />

<strong>in</strong>creases with the <strong>in</strong>creas<strong>in</strong>g of the force l<strong>in</strong>early at the<br />

same guid<strong>in</strong>g rod diameter. With the <strong>in</strong>creas<strong>in</strong>g of the<br />

diameter, the deformation is also <strong>in</strong>creas<strong>in</strong>g. Moreover<br />

the deformation difference with different sizes is more<br />

obvious when the force is very large. The maximum<br />

V. CONCLUSIONS<br />

A mobile robot for remov<strong>in</strong>g the plug oil well is<br />

presented <strong>in</strong> this work and the prototype has been<br />

manufactured. The mechanical model and FEM model of<br />

the support<strong>in</strong>g mechanism is established. The<br />

deformation and stress of the upper support<strong>in</strong>g plate, the<br />

upper support<strong>in</strong>g leg, the lower support<strong>in</strong>g leg, the lower<br />

support<strong>in</strong>g plate and the guid<strong>in</strong>g rod are analyzed.<br />

(1) The mobile robot for mov<strong>in</strong>g the plug oil well is<br />

designed based on the wheel-type and leg-type mobile<br />

mechanism and adaptive to various pipe sizes. The robot<br />

has the merits of simple structure, easy operation, good<br />

adaptability and reliability.<br />

(2) The Mathematical model of the support<strong>in</strong>g<br />

mechanism is established accord<strong>in</strong>g to the force balance<br />

under the EDM remov<strong>in</strong>g plug mechanism work<strong>in</strong>g<br />

condition. The force of the support<strong>in</strong>g mechanism with<br />

the pipe wall can be obta<strong>in</strong>ed.<br />

(3) Based on the FEM, some components of the<br />

support<strong>in</strong>g mechanism are analyzed. The results of f<strong>in</strong>ite<br />

element analysis <strong>in</strong>dicate that the maximum deformation<br />

of upper support<strong>in</strong>g plate emerges at the p<strong>in</strong>s connect<strong>in</strong>g<br />

place, the maximum deformation of upper support<strong>in</strong>g leg<br />

emerges at the <strong>in</strong>termittent section, the maximum<br />

deformation of lower support<strong>in</strong>g leg emerges at the p<strong>in</strong>s<br />

connect<strong>in</strong>g place and the maximum deformation of lower<br />

support<strong>in</strong>g plate emerges at the centre. And the stress of<br />

the components is all at the range of the allowable stress<br />

of materials.<br />

(4) The guid<strong>in</strong>g rod of the robot is also analyzed<br />

based on the FEM. And the results prove that the guid<strong>in</strong>g<br />

rod has a small deformation and allowable stress value. It<br />

can meet the requirements of strength and rigidity. The<br />

whole robot mechanism has a good performance.<br />

ACKNOWLEDGMENT<br />

The authors wish to acknowledge the f<strong>in</strong>ancial support<br />

of National High-Technology Research and Development<br />

Program of Ch<strong>in</strong>a (No.2007AA09A101), National<br />

Natural Science Foundation of Ch<strong>in</strong>a (No.50874115),<br />

Taishan Scholar project of Shandong Prov<strong>in</strong>ce<br />

(TS20110823), Science and Technology Development<br />

Project of Shandong Prov<strong>in</strong>ce (2011GHY11520) and<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1511<br />

Fundamental Research Funds for the Central Universities<br />

(11CX04031A).<br />

REFERENCES<br />

[1] S. Straqiotti, Q. Andersen, O. Karlsen, “Mill<strong>in</strong>g of<br />

Permanent Bridge Plug Successfully Performed on<br />

Wirel<strong>in</strong>e,” Offshore Europe Oil and Gas Conference and<br />

Exhibition 2009, OE 2009, pp. 512-521, September 2009.<br />

[2] M. Adams, N. Turner, P. Pollard, “A Study of Annulus<br />

Lubrication for Oil Well Completion Us<strong>in</strong>g Scale Model<br />

Tests,” OCEANS 2008, September 2008, doi:<br />

10.1109/OCEANS.2008.5151961.<br />

[3] D. Guan, Z. Yang, Y. Zhang, F. Sun, Y, Shen, “Diagnosis<br />

of Reasons for Oil Well Plugg<strong>in</strong>g and Chemical Remedial<br />

Treatment Tests at Two Oilfields <strong>in</strong> Bohai Bay,” Xian<br />

Shiyou Xueyuan Xuebao. vol. 24, pp. 35-37, 2002.<br />

[4] J. Wu, J. Wang, Z. You, “An Overview of Dynamic<br />

Parameter Identification of Robots,” Rob. Comput. Integr.<br />

Manuf. vol. 26, pp. 414-419, 2010. doi:<br />

10.1016/j.rcim.2010.03.013.<br />

[5] F. Chernousko, “Modell<strong>in</strong>g of Snake-Like Locomotion,”<br />

Autom. Syst. vol. 164, pp. 415-434, 2005. doi:<br />

10.1016/j.amc.2004.06.057.<br />

[6] T. Wang, C. Chevallereau, “Stability Analysis and Time-<br />

Vary<strong>in</strong>g Walk<strong>in</strong>g Control for an Under-Actuated Planar<br />

Biped Robot,” Rob. Autom. Syst. vol. 59, pp. 444-456,<br />

2011. doi: 10.1016/j.robot.2011.03.002.<br />

[7] R. Sigqwart, P. Lamon, T. Estier, M. Lauria, R. Piquet,<br />

“Innovative Design for Wheeled Locomotion <strong>in</strong> Rough<br />

Terra<strong>in</strong>,” Rob. Autom. Syst. vol. 40, pp. 151-162, 2002. doi:<br />

10.1016/S0921-8890(02)00240-3.<br />

[8] P. Li, S. Ma, B. Li, Y. Wang, “Design and Motion<br />

Analysis of an <strong>in</strong>-Pipe Robot with Adaptability to Pipe<br />

Diameters,” Jixie Gongcheng Xuebao. vol. 45, pp. 154-161,<br />

2009. doi: 10.3901/JME.2009.01.154.<br />

[9] V. Joshi, R. Banavar, R. Hippalqaonkar, “Design and<br />

Analysis of a Spherical Mobile Robot,” Mech. Mach.<br />

Theory. vol. 45, pp. 130-136, 2010. doi:<br />

10.1016/j.mechmachtheory.2009.04.003.<br />

[10] D. Kim, H. Heeseung, S. Hwa, K. Jongwon, “Optimal<br />

Design and K<strong>in</strong>etic Analysis of a Stair-Climb<strong>in</strong>g Mobile<br />

Robot with Rocker-Bogie Mechanism,” Mech. Mach.<br />

Theory. vol. 50, pp. 90-108, 2012. doi:<br />

10.1016/j.mechmachtheory.2011.11.013.<br />

[11] R. Aracil, R. Saltarén, O. Re<strong>in</strong>oso, “Parallel Robots for<br />

Autonomous Climb<strong>in</strong>g along Tubular Structures,” Rob.<br />

Autom. Syst. vol. 42, pp. 125-134, 2003. doi:<br />

10.1016/S0921-8890(02)00360-3<br />

[12] Z. Li, S. Ma, B. Li, M. Wang, Y. Wang, “Analysis of the<br />

Constra<strong>in</strong>t Relation Between Ground and Selfadaptive<br />

Mobile Mechanism of a Transformable Wheel-Track<br />

Robot,” Sci. Ch<strong>in</strong>a Technol. Sci. vol. 54, pp. 610-624,<br />

2011. doi: 10.1007/s11431-010-4228-5<br />

[13] P.G. Austrem, “Us<strong>in</strong>g EUREQA for end-user UML model<br />

Development through Design Patterns,” J. Softw. vol. 6, pp.<br />

690-704, 2011. doi: 10.4304/jsw.6.4.690-704<br />

[14] X. Feng, J. Cheng, “Research of Distribution of<br />

Temperature Field <strong>in</strong> Process of Shap<strong>in</strong>g,” J. Softw. vol. 6,<br />

73-77, 2011. doi: 10.4304/jsw.6.1.72-77.<br />

[15] K. Wang, W. Wang, H. Zhang, “Analysis of Gait and<br />

Mechanical Property of Wall-Climb<strong>in</strong>g Caterpillar Robot,”<br />

J. Comput. vol. 7, pp. 706–715, 2012. doi:<br />

10.4304/jcp.7.3.706-715<br />

[16] B. Cai, Y. Liu, X. Tian, Z. Wang, F. Wang, H. Li, et al<br />

“Optimization of Submersible Solenoid Valves for Subsea<br />

Blowout Preventers,” IEEE Trans. Magn., vol. 47, pp.<br />

451–458, 2011. doi: 10.1109/TMAG.2010.2100825<br />

[17] X. Du, B. Song, G. Pan, “Fluid Dynamics and Motion<br />

Simulation of Underwater Glide Vehicle,” Mechanika, vol.<br />

17, pp. 363–367, 2011<br />

[18] Q. Zhang, M. Li, Z. Liu, X. Wang, Y. Zhang,<br />

“Re<strong>in</strong>forcement Learn<strong>in</strong>g on Robot Path Optimization,” J.<br />

Softw. vol. 7, pp. 657–662, 2012. doi: 10.4304/jsw.7.3.657-<br />

662.<br />

Xiaojie Tian was born <strong>in</strong> Shandong, Ch<strong>in</strong>a, <strong>in</strong> 1985. She<br />

received her B. S. and M. S. degree <strong>in</strong> Mechanical Eng<strong>in</strong>eer<strong>in</strong>g<br />

from Ch<strong>in</strong>a University of Petroleum <strong>in</strong> 2008 and 2010<br />

respectively. Currently, she is a Ph.D. candidate <strong>in</strong><br />

Electromechanics Eng<strong>in</strong>eer<strong>in</strong>g <strong>in</strong> Ch<strong>in</strong>a University of Petroleum,<br />

Ch<strong>in</strong>a. Her recent research <strong>in</strong>terest is the cas<strong>in</strong>g cutt<strong>in</strong>g tool<br />

system.<br />

Yonghong Liu was born <strong>in</strong> Anhui, Ch<strong>in</strong>a, <strong>in</strong> 1965. He received<br />

his Ph.D. degree <strong>in</strong> Mechanical Manufacture from Harb<strong>in</strong><br />

Institute of Technology, Harb<strong>in</strong>, Ch<strong>in</strong>a, <strong>in</strong> 1996.<br />

He is currently a professor and doctoral supervisor <strong>in</strong> College<br />

of Mechanical and Electronic, Ch<strong>in</strong>a University of Petroleum,<br />

Ch<strong>in</strong>a. He has published over 120 papers <strong>in</strong> some <strong>in</strong>ternational<br />

or national journals and conferences. His current research<br />

<strong>in</strong>terests <strong>in</strong>clude EDM of ceramics, expansion sand screen for<br />

sand control and control system of subsea drill<strong>in</strong>g equipments.<br />

Dr. Liu is a member of Ch<strong>in</strong>a Nontraditional Mach<strong>in</strong><strong>in</strong>g<br />

Committee and Nontraditional Mach<strong>in</strong><strong>in</strong>g Association of<br />

Shandong Prov<strong>in</strong>ce. He is Prom<strong>in</strong>ent Young and Middle-aged<br />

Specialist of Shandong Prov<strong>in</strong>ce and selected <strong>in</strong> New Century<br />

National Hundred, Thousand and Ten Thousand Talent Project.<br />

Rongju L<strong>in</strong> was born <strong>in</strong> Fujian, Ch<strong>in</strong>a, <strong>in</strong> 1988. He<br />

received his B. S. degree <strong>in</strong> Mach<strong>in</strong>ery Design and<br />

Manufactur<strong>in</strong>g and its Automation from Ch<strong>in</strong>a University<br />

of Petroleum <strong>in</strong> 2010. Currently, he is a postgraduate<br />

student <strong>in</strong> Mechanical Eng<strong>in</strong>eer<strong>in</strong>g <strong>in</strong> Ch<strong>in</strong>a University of<br />

Petroleum, Ch<strong>in</strong>a. His recent research <strong>in</strong>terest is<br />

numerical control system of cas<strong>in</strong>g cutt<strong>in</strong>g tool.<br />

Baop<strong>in</strong>g Cai was born <strong>in</strong> Hebei, P. R. Ch<strong>in</strong>a, <strong>in</strong> 1982. He<br />

received his B. S. and M. S. degree <strong>in</strong> Electromechanics<br />

Eng<strong>in</strong>eer<strong>in</strong>g from Ch<strong>in</strong>a University of Petroleum <strong>in</strong> 2006 and<br />

2008 respectively. Currently, he is a Ph.D. candidate <strong>in</strong><br />

Electromechanics Eng<strong>in</strong>eer<strong>in</strong>g <strong>in</strong> Ch<strong>in</strong>a University of Petroleum,<br />

Ch<strong>in</strong>a. His recent research <strong>in</strong>terest is control system of subsea<br />

drill<strong>in</strong>g equipments.<br />

© 2013 ACADEMY PUBLISHER


1512 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Contour Error Coupled-Control Strategy based on<br />

L<strong>in</strong>e Interpolation and Curve Interpolation<br />

Guoyong Zhao<br />

Department of Mechanical Eng<strong>in</strong>eer<strong>in</strong>g, Shandong University of Technology, Zibo, Ch<strong>in</strong>a<br />

Email: zgy709@126.com<br />

Hongj<strong>in</strong>g An and Q<strong>in</strong>gzhi Zhao<br />

Department of Mechanical Eng<strong>in</strong>eer<strong>in</strong>g, Shandong University of Technology, Zibo, Ch<strong>in</strong>a<br />

Email: anhongj<strong>in</strong>g2006@163.com, zhaoq<strong>in</strong>gzhi@sdut.edu.cn<br />

Abstract—In practical mach<strong>in</strong><strong>in</strong>g, the multi-axis actual<br />

dynamic performances don’t match well, which reduces the<br />

profile precision greatly. The computer numerical control<br />

(CNC) mach<strong>in</strong>e tools contour error coupled-control strategy<br />

based on l<strong>in</strong>e <strong>in</strong>terpolation and curve <strong>in</strong>terpolation is<br />

developed <strong>in</strong> the paper. After analyze the conventional CNC<br />

contour error control scheme, put forward the contour<br />

error coupled-control scheme based on l<strong>in</strong>e <strong>in</strong>terpolation<br />

and curve <strong>in</strong>terpolation; Then br<strong>in</strong>g forward the contour<br />

error comput<strong>in</strong>g models based on l<strong>in</strong>e <strong>in</strong>terpolation and<br />

curve <strong>in</strong>terpolation; Furthermore, add the obta<strong>in</strong>ed contour<br />

error to the follow<strong>in</strong>g error of current sampl<strong>in</strong>g period, and<br />

send the results to CNC PID position controller to calculate<br />

position controlled quantity <strong>in</strong> order to compensate contour<br />

error. The contour error compensation control<br />

experimentation results show that the developed approach<br />

can reduce contour error effectively and enhance profile<br />

precision further.<br />

Index Terms—mach<strong>in</strong>e tools, contour error, complex parts,<br />

l<strong>in</strong>ear <strong>in</strong>terpolation, curve <strong>in</strong>terpolation<br />

I. INTRODUCTION<br />

In manufactur<strong>in</strong>g fields many parts have complex<br />

profile, and the profile <strong>in</strong>cludes analytic curve, piecewise<br />

curve, list<strong>in</strong>g curve and so on [1, 2]. In general, multiaxis<br />

CNC mach<strong>in</strong>e tools are adopted to process these<br />

complex parts, after approximat<strong>in</strong>g complex cutter<br />

position track <strong>in</strong>struction curve with straightway [3, 4].<br />

To multi-axis CNC mach<strong>in</strong>e tools, the profile precision is<br />

the important factor to determ<strong>in</strong>e its mach<strong>in</strong><strong>in</strong>g accuracy<br />

[5, 6]. But the profile precision relates with the match<strong>in</strong>g<br />

degree of all the l<strong>in</strong>ked axes dynamic performances, and<br />

is decided by both each-axis position accuracy and the<br />

multi-axis l<strong>in</strong>ked accuracy [7, 8]. Because CNC mach<strong>in</strong>e<br />

tools have complicated servo drive equipments, and the<br />

CNC system parameters may change <strong>in</strong> practical<br />

mach<strong>in</strong><strong>in</strong>g, the multi-axis actual dynamic performances<br />

This project is supported by the National Natural Science<br />

Foundation of Ch<strong>in</strong>a (No. 51105236), and the Shandong Prov<strong>in</strong>ce<br />

Promotive research fund for excellent young and middle-aged scientists<br />

of Ch<strong>in</strong>a (No. BS2011ZZ014).<br />

Correspond<strong>in</strong>g author: Guoyong Zhao, zgy709@126.com<br />

don’t match well, this reduces the profile precision [9, 10,<br />

11]. In contrast to the advanced s<strong>in</strong>gle-axis servo<br />

controller, the cross-coupled-controller is more effective<br />

to enhance profile precision [12, 13, 14], which computes<br />

the contour error and compensates each axis servo motor<br />

on each sampl<strong>in</strong>g period [15].<br />

Some research results <strong>in</strong> po<strong>in</strong>t have been achieved<br />

recently. For <strong>in</strong>stance, after <strong>in</strong>troduc<strong>in</strong>g contour error<br />

transfer function, Syh-Shiuh Yeh transforms the multiaxis<br />

cross-coupled control to a s<strong>in</strong>gle-<strong>in</strong>put-s<strong>in</strong>gle-output<br />

system, and def<strong>in</strong>es the distance of actual cutter position<br />

to the tangent on reference curve current position as<br />

contour error [16]. Myung-Hoon LEE puts forward a<br />

multi-axis contour controller based on a contour error<br />

vector us<strong>in</strong>g parametric curve <strong>in</strong>terpolation, which is a<br />

vector from the actual tool position to the nearest po<strong>in</strong>t on<br />

the desired path [17]. Peng Chao-Chung <strong>in</strong>troduces a new<br />

contour <strong>in</strong>dex (CI) aimed to arc and l<strong>in</strong>e profile, which<br />

can be looked as an equivalent contour error such that a<br />

reduction <strong>in</strong> CI implies a reduction <strong>in</strong> contour error [18].<br />

Aimed to profile curve <strong>in</strong> plane and space, Gen Lirong<br />

and Wang Baoren look the distance of actual position to<br />

the l<strong>in</strong>e which l<strong>in</strong>ks the dots of the current and the last<br />

sampl<strong>in</strong>g period as the current contour error respectively<br />

[19-20]. Zhao Ximei and Guo Q<strong>in</strong>gd<strong>in</strong>g achieve threeaxis<br />

l<strong>in</strong>ked contour error control on basis of calculat<strong>in</strong>g<br />

XY, YZ, XZ axes plane coupl<strong>in</strong>g model [21]. Liu Yi and<br />

Cong Shuang develop a Frenet coord<strong>in</strong>ate frame on a<br />

desired trajectory as the task coord<strong>in</strong>ate frame, and the<br />

contour error is computed by the normal component of<br />

track<strong>in</strong>g error <strong>in</strong> the task coord<strong>in</strong>ate frame [22]. Zhao<br />

Guoyong def<strong>in</strong>es the distance between the actual cutter<br />

position and the nearest <strong>in</strong>terpolation dot on cutter path<br />

curve as contour error on each sampl<strong>in</strong>g period [23].<br />

However, because of <strong>in</strong>ertia and frictional force, the<br />

hysteresis phenomena exist <strong>in</strong> truly CNC mach<strong>in</strong>e tool<br />

each axis movement, which is difficult to be foreseen<br />

accurately. As a result, the calculation error is uneasy to<br />

control if the hysteresis time is much longer than a<br />

sampl<strong>in</strong>g period.<br />

Consequently, <strong>in</strong> the CNC mach<strong>in</strong><strong>in</strong>g on complex parts,<br />

how to compute contour error with high precision and<br />

distribute contour error correction quantity to enhance<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1512-1519


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1513<br />

profile accuracy on each sampl<strong>in</strong>g period, has been a<br />

crucial problem for the researchers to settle. The CNC<br />

mach<strong>in</strong>e tools contour error coupled-control strategy<br />

based on l<strong>in</strong>e <strong>in</strong>terpolation and curve <strong>in</strong>terpolation is<br />

developed <strong>in</strong> the paper, which is with stable calculation<br />

error, high comput<strong>in</strong>g precision and satisfied real-time<br />

characteristic. Above all, analyze the conventional CNC<br />

contour error control scheme; Secondly, put forward the<br />

contour error coupled-control scheme based on l<strong>in</strong>e<br />

<strong>in</strong>terpolation and curve <strong>in</strong>terpolation; Thirdly, br<strong>in</strong>g<br />

forward the contour error comput<strong>in</strong>g models based on<br />

l<strong>in</strong>e <strong>in</strong>terpolation and curve <strong>in</strong>terpolation; Then add the<br />

obta<strong>in</strong>ed contour error to the follow<strong>in</strong>g error of current<br />

sampl<strong>in</strong>g period, and send the results to CNC PID<br />

position controller to calculate position controlled<br />

quantity <strong>in</strong> order to compensate contour error; F<strong>in</strong>ally, the<br />

contour error compensation control experimentations are<br />

done on the three-axis l<strong>in</strong>ked CNC test table.<br />

II. CONVENTIONAL CNC CONTOUR ERROR CONTROL<br />

SCHEME<br />

A. Def<strong>in</strong>ition of Contour Error<br />

The contour error is def<strong>in</strong>ed as the distance between<br />

the actual cutter trajectory and desired trajectory on the<br />

direction of trajectory normal. Consider<strong>in</strong>g a 2D arbitrary<br />

curve shown <strong>in</strong> Figure 1, let P* be the desired position<br />

vector, P be the actual position vector correspond<strong>in</strong>g to<br />

P* on the desired contour, P 1 be position vector on the<br />

desired contour along the direction of curve normal that is<br />

closest to P, L be the tangent through P* on the desired<br />

contour, and θ be the angle between L and X axis. Then<br />

E is the follow<strong>in</strong>g error between actual position and the<br />

<strong>in</strong>stantaneous desired position of the cutter, i.e.,<br />

*<br />

E = P − P. (1)<br />

Let E x be the part along X axis and E y along Y axis of E.<br />

And the contour error can be expressed as:<br />

ε = P − P. (2)<br />

1<br />

Let vector P plumbs tangent L on po<strong>in</strong>t P 1 *, when the<br />

follow<strong>in</strong>g error E is small on low federate. The contour<br />

error ε is approximately equal to ε * , i.e.,<br />

ε ≈ ε = − =− + . (3)<br />

* P1<br />

* P ExCx EyCy<br />

where C x and C y are computed by the follow<strong>in</strong>g equations:<br />

c<br />

c<br />

y<br />

x<br />

= s<strong>in</strong> θ − E / (2 ρ)<br />

(4)<br />

x<br />

= cos θ + E / (2 ρ)<br />

(5)<br />

where ρ is the <strong>in</strong>stantaneous radius of curvature.<br />

y<br />

Figure 1. Def<strong>in</strong>ition of contour error<br />

B. The Conventional CNC Contour Mach<strong>in</strong><strong>in</strong>g Scheme<br />

Contour error is the maximal <strong>in</strong>fluence factor <strong>in</strong> CNC<br />

mach<strong>in</strong>e system. When mach<strong>in</strong><strong>in</strong>g on complex profile<br />

parts, conventionally, CAD/CAM systems have to<br />

segment a complex curve <strong>in</strong>to a huge number of small<br />

l<strong>in</strong>ear segments and send them to CNC systems for l<strong>in</strong>ear<br />

<strong>in</strong>terpolation mach<strong>in</strong><strong>in</strong>g. But the l<strong>in</strong>ear <strong>in</strong>terpolation<br />

approach isn’t able to achieve high speed and high<br />

accuracy at the same time. Conventional CNC contour<br />

mach<strong>in</strong><strong>in</strong>g scheme usually adopts position feedback<br />

controller to m<strong>in</strong>imize follow<strong>in</strong>g error, adopts feed<br />

forward controller to m<strong>in</strong>imize track<strong>in</strong>g lag and contour<br />

deviation. In conventional cross-coupled control, the<br />

equation (3), which approximately computes contour<br />

error ε accord<strong>in</strong>g to E, is adopted to establish the<br />

contour error model. Then the cross-coupled controller<br />

computes and distributes the correction signals to<br />

<strong>in</strong>dividual axis through some PID control algorithms. The<br />

cross-coupled control system is a multivariable, nonl<strong>in</strong>ear<br />

and time-vary<strong>in</strong>g system, so it is very difficult to compute<br />

ε , θ and ρ . What is more, the approach to compute ε<br />

is only suited to condition when follow<strong>in</strong>g error E is<br />

small <strong>in</strong> the low feed rate. Especially, this approach is<br />

difficult to compute contour error on multi-axes motion.<br />

So there are some difficulties <strong>in</strong> apply<strong>in</strong>g the approach to<br />

practical NC mach<strong>in</strong><strong>in</strong>g. The conventional two-axis CNC<br />

contour control scheme is shown <strong>in</strong> Figure 2.<br />

III. CONTOUR ERROR COUPLED-CONTROL SCHEME BASED<br />

ON LINE INTERPOLATION AND CURVE INTERPOLATION<br />

After analyz<strong>in</strong>g the conventional two-axis CNC<br />

contour mach<strong>in</strong><strong>in</strong>g scheme, put forward the contour error<br />

coupled-control scheme based on l<strong>in</strong>e <strong>in</strong>terpolation and<br />

curve <strong>in</strong>terpolation. As shown <strong>in</strong> Figure 3, firstly, adopt<br />

the l<strong>in</strong>ear <strong>in</strong>terpolation or curve <strong>in</strong>terpolation on the<br />

complex parts cutter path <strong>in</strong>struction curve, and measure<br />

the real worktable position; Secondly, compute the<br />

contour error based on <strong>in</strong>terpolation dots and actual<br />

worktable position; Thirdly, compute the contour error<br />

correction quantity for x, y, z axes, and output the<br />

correction quantity to the x, y, z axes drivers and<br />

worktable.<br />

© 2013 ACADEMY PUBLISHER


1514 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

obta<strong>in</strong><strong>in</strong>g RM and RN , the contour error ε is<br />

calculated accord<strong>in</strong>g to two k<strong>in</strong>ds of conditions.<br />

Figure 2. Conventional two-axis NC contour mach<strong>in</strong><strong>in</strong>g scheme<br />

IV. CONTOUR ERROR COMPUTING MODELS BASED ON<br />

LINE INTERPOLATION AND CURVE INTERPOLATION<br />

A. Contour Error Comput<strong>in</strong>g Model Based on L<strong>in</strong>e<br />

Interpolation<br />

The key idea of the developed contour error comput<strong>in</strong>g<br />

model is as followed: After approximat<strong>in</strong>g complex parts<br />

cutter position track <strong>in</strong>struction curve with straightway<br />

accord<strong>in</strong>g to equi-error method, calculate the current<br />

actual cutter position coord<strong>in</strong>ates ow<strong>in</strong>g to the position<br />

measure feedback from each axis and worktable on each<br />

l<strong>in</strong>e <strong>in</strong>terpolation sampl<strong>in</strong>g period; Compute the<br />

m<strong>in</strong>imum distance from current actual cutter position to<br />

cutter position track <strong>in</strong>struction curve accord<strong>in</strong>g to the<br />

actual cutter position dots and the approximate nodes, <strong>in</strong><br />

other words, to calculate the contour error.<br />

As shown <strong>in</strong> Figure 4, the contour error comput<strong>in</strong>g<br />

model is expla<strong>in</strong>ed more detailedly. Suppose to<br />

approximate part cutter track <strong>in</strong>struction curve L under<br />

the precision requirement with straightway AB, BC…,<br />

and def<strong>in</strong>e the actual cutter position as dot R on certa<strong>in</strong><br />

sampl<strong>in</strong>g period. Above all, obta<strong>in</strong> the three approximate<br />

nodes A, B, C nearest to actual cutter position R on the<br />

cutter position <strong>in</strong>struction curve L, and then calculate the<br />

distance RM , RN from actual cutter position R to<br />

straightway AB, BC. It is noticed that the calculation is<br />

complicated if transform the distance from dot to l<strong>in</strong>e, to<br />

the maximum distance from dot to plane pencil through<br />

the l<strong>in</strong>e. Consequently, the vector method with the space<br />

analytic geometry and vector algebra theory is adopted to<br />

compute the distance RM , RN from dot R to<br />

straightway AB, BC:<br />

AB×<br />

AR<br />

RM = . (6)<br />

AB<br />

BC × BR<br />

RN = . (7)<br />

BC<br />

The coord<strong>in</strong>ates of both approximate nodes A, B, C<br />

and actual cutter position R are known, so the<br />

calculations of Equation (6) and (7) are simple. After<br />

(8):<br />

Figure 3. Contour error coupled-control scheme based on l<strong>in</strong>e<br />

<strong>in</strong>terpolation and curve <strong>in</strong>terpolation<br />

If RM<br />

≤<br />

RN<br />

, obta<strong>in</strong> the contour error with Equation<br />

ε ≈ RM . (8)<br />

As shown <strong>in</strong> Figure 4, the approximate error ST is<br />

constant, suppose the <strong>in</strong>tersection po<strong>in</strong>t of RM and curve<br />

L be dot P, then the calculation error of Equation (8) is<br />

MP.<br />

Because MP ≤ ST , the calculation error of contour<br />

error comput<strong>in</strong>g model is less than or equal to<br />

approximate error.<br />

If RM > RN , obta<strong>in</strong> the contour error with Equation<br />

(9):<br />

ε ≈ RN . (9)<br />

In like manner, the calculation error of contour error<br />

comput<strong>in</strong>g model is less than or equal to approximate<br />

error.<br />

x<br />

A<br />

M<br />

z S<br />

N<br />

R<br />

L<br />

o<br />

T<br />

Figure 4. The contour error comput<strong>in</strong>g model based on l<strong>in</strong>e<br />

<strong>in</strong>terpolation<br />

B. NURBS Curve Interpolation Approach<br />

NURBS can express free and analytical curve and<br />

surface unified with the advantages of smoothness and<br />

local controllability, and has been applied <strong>in</strong> the<br />

CAD/CAM fields successfully. So it’s significant to<br />

<strong>in</strong>vestigate the NURBS curve direct <strong>in</strong>terpolator <strong>in</strong> the<br />

CNC fields. At present except the FANUC and Siemens<br />

y<br />

P<br />

B<br />

C<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1515<br />

CNC system with the NURBS curve direct <strong>in</strong>terpolator,<br />

most of the CNC systems only have l<strong>in</strong>ear <strong>in</strong>terpolation<br />

and arc <strong>in</strong>terpolation function. The NURBS curve<br />

<strong>in</strong>terpolation CNC mach<strong>in</strong><strong>in</strong>g flow is shown <strong>in</strong> Figure 5.<br />

du v<br />

=<br />

dt dP( u)/<br />

du<br />

=<br />

v<br />

. . .<br />

2 2 2<br />

( x) + ( y) + ( z)<br />

. (13)<br />

2<br />

du<br />

dt<br />

dv/<br />

dt<br />

= −<br />

2 . . .<br />

2 2 2<br />

( x) + ( y) + ( z)<br />

. .. . .. . ..<br />

2<br />

v xx+ y y+<br />

zz<br />

( )<br />

. . .<br />

2 2 2 2<br />

(( x) + ( y) + ( z) )<br />

(14)<br />

Figure 5. The NURBS curve <strong>in</strong>terpolation CNC mach<strong>in</strong><strong>in</strong>g flow<br />

The NURBS curve representation is given by<br />

Pu ( ) =<br />

n<br />

∑<br />

i=<br />

0<br />

n<br />

∑<br />

i=<br />

0<br />

where V<br />

i<br />

is the control po<strong>in</strong>t,<br />

Bik ,<br />

( u)<br />

WV<br />

i i<br />

. (10)<br />

B ( u)<br />

W<br />

ik ,<br />

i<br />

W<br />

i<br />

is its weight<strong>in</strong>g factor.<br />

By manipulat<strong>in</strong>g the values of control po<strong>in</strong>ts and weights<br />

factor, a wise variety of part shapes can be designed us<strong>in</strong>g<br />

NURBS. Each po<strong>in</strong>t on the curve is correspond<strong>in</strong>g to a<br />

certa<strong>in</strong> knot parameter u .<br />

In the I th <strong>in</strong>terpolation period, NURBS curve<br />

<strong>in</strong>terpolator computes the po<strong>in</strong>t Pu (<br />

i + 1)<br />

and send<br />

Pu (<br />

i+ 1) − Pu (<br />

i)<br />

as feed <strong>in</strong>crement to servo controller.<br />

How to determ<strong>in</strong>e successive values of u<br />

i+ 1<br />

such that<br />

appropriate feed <strong>in</strong>crement length can be accurately<br />

generated is important and complicated <strong>in</strong> NURBS curve<br />

<strong>in</strong>terpolation.<br />

Taylor’s second-order expansion is <strong>in</strong>troduced <strong>in</strong> the<br />

NURBS curve <strong>in</strong>terpolation algorithm <strong>in</strong> this paper aimed<br />

at the demands of high speed, high accuracy and realtime.<br />

The procedure for determ<strong>in</strong><strong>in</strong>g successive values of<br />

u is summarized <strong>in</strong> the follow<strong>in</strong>g.<br />

Let the NURBS curve be def<strong>in</strong>ed as<br />

Pu ( ) = ( xu ( ), yu ( ), zu ( ))' , then the knot factor u<br />

i+ 1<br />

<strong>in</strong><br />

i +1 <strong>in</strong>terpolation period can be obta<strong>in</strong>ed:<br />

2 2<br />

du ΔT d u<br />

i+ 1 i u= ui<br />

2 u=<br />

ui<br />

u ≈ u +Δ T + . (11)<br />

dt 2 dt<br />

As shown <strong>in</strong> Equation (11), the key is to compute du<br />

dt<br />

and real-time. Def<strong>in</strong>e the feed rate along the NURBS<br />

curve as:<br />

Therefore,<br />

ds dP(<br />

u)<br />

dP(<br />

u)<br />

v = = = ×<br />

dt dt du<br />

du<br />

dt<br />

. (12)<br />

Substitut<strong>in</strong>g the computed du and<br />

dt<br />

Equation (11), u<br />

i+ 1<br />

will be obta<strong>in</strong>ed.<br />

2<br />

du<br />

dt<br />

2<br />

above <strong>in</strong>to<br />

C. Contour Error Comput<strong>in</strong>g Model Based on Curve<br />

Interpolation<br />

Conventionally, CAD/CAM systems have to segment a<br />

complex curve <strong>in</strong>to a huge number of small l<strong>in</strong>ear<br />

segments and send them to CNC systems for l<strong>in</strong>ear<br />

<strong>in</strong>terpolation mach<strong>in</strong><strong>in</strong>g. However, the experimental<br />

results show this approach can’t achieve high speed and<br />

high accuracy at the same time. Especially, the<br />

<strong>in</strong>terpolation dots aren’t on the track<strong>in</strong>g curve. To<br />

overcome this problem, curve direct <strong>in</strong>terpolation has to<br />

be adopted. Furthermore, accord<strong>in</strong>g to <strong>in</strong>terpolation dots<br />

<strong>in</strong> reference profile, a “three dots arc algorithm” contour<br />

error comput<strong>in</strong>g model is developed to calculate the<br />

m<strong>in</strong>imal distance between actual dot and complex profile<br />

<strong>in</strong> each sampl<strong>in</strong>g period.<br />

As shown <strong>in</strong> Figure 6, suppose the reference curve be<br />

L and cutter actual position be M (M x , M y , M z ) <strong>in</strong> some<br />

sampl<strong>in</strong>g period. Firstly, f<strong>in</strong>d the nearest <strong>in</strong>terpolation<br />

po<strong>in</strong>t C i from M on the curve, and suppose the two<br />

adjacent <strong>in</strong>terpolation dots from C i be C i-1 and C i+1 po<strong>in</strong>ts.<br />

It is noteworth<strong>in</strong>ess that all of the three dots are on curve<br />

L. Secondly, suppose the centre of the circle through C i-1 ,<br />

C i and C i+1 be po<strong>in</strong>t O (O x , O y , O z ), and the radius be r.<br />

Compute the contour error with Eq. (15):<br />

ε = r− OM = r−<br />

( M − O ) + ( M − O ) + ( M −O<br />

)<br />

2 2 2<br />

x x y y z z<br />

. (15)<br />

where, the contour error ε is along the OM<br />

direction.<br />

F<strong>in</strong>ally, decompose vector ε along x, y and z<br />

coord<strong>in</strong>ate axis<br />

ε<br />

x<br />

= ε ∗<br />

M<br />

x<br />

− O<br />

( M − O ) + ( M − O ) + ( M −O<br />

)<br />

2 2 2<br />

x x y y z z<br />

x<br />

. (16)<br />

© 2013 ACADEMY PUBLISHER


1516 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

ε<br />

y<br />

= ε ∗<br />

M<br />

y<br />

− O<br />

( M − O ) + ( M − O ) + ( M −O<br />

)<br />

2 2 2<br />

x x y y z z<br />

y<br />

. (17)<br />

ε<br />

z<br />

= ε ∗<br />

M<br />

z<br />

− O<br />

( M − O ) + ( M − O ) + ( M −O<br />

)<br />

2 2 2<br />

x x y y z z<br />

z<br />

. (18)<br />

In conclusion, the contour error comput<strong>in</strong>g model<br />

approximates curve L <strong>in</strong> locality with arc properly, so<br />

higher precision will be achieved.<br />

V. CONTOUR ERROR COMPENSATION APPROACH<br />

Except for the three PID position controller for X axis,<br />

Y axis and Z axis, Myung-Hoon LEE sets up an<br />

additional PID contour error controller [17]. The<br />

calculation approach is rather complicated. In the paper<br />

the contour error control compensation approach is<br />

developed, which adds the obta<strong>in</strong>ed contour error to the<br />

follow<strong>in</strong>g error of current sampl<strong>in</strong>g period, and sends the<br />

result to CNC PID position controller to calculate<br />

position controlled quantity. The CNC contour error<br />

calculation and compensation program flow chart is<br />

shown <strong>in</strong> Figure 7.<br />

L<br />

Ci-1<br />

M<br />

O<br />

Ci<br />

r<br />

Ci+1<br />

Figure 6. The contour error comput<strong>in</strong>g model based on curve<br />

<strong>in</strong>terpolation<br />

Firstly, after receiv<strong>in</strong>g the N th mach<strong>in</strong><strong>in</strong>g program<br />

segment cod<strong>in</strong>g and pretreatment results on the K th<br />

sampl<strong>in</strong>g period, <strong>in</strong>terpolate and obta<strong>in</strong> follow<strong>in</strong>g error E x ,<br />

E y , E z ; Secondly, adopt the contour error comput<strong>in</strong>g<br />

model, and calculate contour error ε with Equation (8),<br />

Equation (9) or Equation (15) ; Thirdly, decompose ε to<br />

ε<br />

x<br />

, ε<br />

y<br />

, ε<br />

z<br />

along X, Y, Z coord<strong>in</strong>ate axes, and compute<br />

each axis optimal displacement of current sampl<strong>in</strong>g<br />

period after contour error compensation, which is μ ,<br />

μ , μ ; F<strong>in</strong>ally, <strong>in</strong>put the μ , μ ,<br />

y<br />

z<br />

x<br />

y<br />

μ<br />

z<br />

to X, Y, Z<br />

coord<strong>in</strong>ate axes PID position controller respectively, and<br />

compute the correction quantity to control X, Y, Z<br />

coord<strong>in</strong>ate axes servo motors.<br />

x<br />

Figure 7. The CNC contour error calculation and compensation program<br />

flow chart<br />

VI. EXPERIMENTATIONS ON CONTOUR ERROR<br />

COMPENSATION CONTROL<br />

A. The Three-axis L<strong>in</strong>ked CNC Test Table<br />

The three-axis l<strong>in</strong>ked CNC test table hardware<br />

structure is shown <strong>in</strong> Figure 8. The CNC controller is<br />

made up of PC and programmable DSP movement<br />

control card. The PC and DSP movement control card<br />

communicate through USB2.0.<br />

The PC acts as the man-mach<strong>in</strong>e <strong>in</strong>terface, which<br />

implements <strong>in</strong>struction control, code compilation, states<br />

display and other functions; And the <strong>in</strong>terpolation,<br />

position control and contour error compensation control<br />

function are carried out on the programmable DSP<br />

movement control card. The Panasonic servo drivers and<br />

motors are adopted <strong>in</strong> the X, Y, Z axes. Both the<br />

<strong>in</strong>terpolation period and sampl<strong>in</strong>g period are 4 ms.<br />

Figure 8. The three-axis l<strong>in</strong>ked CNC test table hardware structure<br />

B. The Contrast Experimentations on Contour Error<br />

Compensation<br />

Interpolate and mach<strong>in</strong>e a block of three order<br />

NURBS curve. The control knots are:<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1517<br />

A (15, 0, 15)<br />

B (15, 15, 15)<br />

C (0, 15, 0)<br />

D (-15, 15, -15)<br />

E (-15, 0, -15)<br />

F (-15, -15, -15)<br />

G (0, -15, 0)<br />

H (15, -15, 15)<br />

I (15, 0, 15) ;<br />

The scale factors are:<br />

(1, 0.6, 1, 0.5, 1, 0.5, 1, 0.6, 1) ;<br />

The knot vector is:<br />

(0, 0, 0, 0, 0.25, 0.375, 0.5, 0.625, 0.75, 1, 1, 1, 1).<br />

Firstly, <strong>in</strong>terpolate and mach<strong>in</strong>e this NURBS profile<br />

when not adopt<strong>in</strong>g the <strong>in</strong>troduced contour error coupledcontrol<br />

approach. The ideal profile curve and real profile<br />

are shown <strong>in</strong> Figure 9, where the contour error is<br />

magnified 12 times to display. The contour error when<br />

mach<strong>in</strong><strong>in</strong>g the curve is shown <strong>in</strong> Figure 10. From Figure<br />

10 it can be seen, the maximal contour error is near to<br />

0.104mm.<br />

Figure 11. The profile when adopt<strong>in</strong>g the <strong>in</strong>troduced contour error<br />

coupled-control approach based on l<strong>in</strong>ear <strong>in</strong>terpolation<br />

F<strong>in</strong>ally, <strong>in</strong>terpolate and mach<strong>in</strong>e this NURBS profile<br />

when adopt<strong>in</strong>g the <strong>in</strong>troduced contour error coupledcontrol<br />

approach based on curve <strong>in</strong>terpolation. The ideal<br />

profile curve and real profile are shown <strong>in</strong> Figure 13,<br />

where the contour error is magnified 12 times to display.<br />

The contour error when mach<strong>in</strong><strong>in</strong>g the curve is shown <strong>in</strong><br />

Figure 14. From Figure 14 it can be seen, the maximal<br />

contour error is near to 0.044mm.<br />

Figure 9. The profile when not adopt<strong>in</strong>g the <strong>in</strong>troduced contour error<br />

coupled-control approach<br />

Figure 12. The contour error when adopt<strong>in</strong>g the <strong>in</strong>troduced contour<br />

error coupled-control approach based on l<strong>in</strong>ear <strong>in</strong>terpolation<br />

Figure 10. The contour error when not adopt<strong>in</strong>g the <strong>in</strong>troduced<br />

contour error coupled-control approach<br />

Secondly, <strong>in</strong>terpolate and mach<strong>in</strong>e this NURBS<br />

profile when adopt<strong>in</strong>g the <strong>in</strong>troduced contour error<br />

coupled-control approach based on l<strong>in</strong>ear <strong>in</strong>terpolation.<br />

The ideal profile curve and real profile are shown <strong>in</strong><br />

Figure 11, where the contour error is magnified 12 times<br />

to display. The contour error when mach<strong>in</strong><strong>in</strong>g the curve is<br />

shown <strong>in</strong> Figure 12. From Figure 12 it can be seen, the<br />

maximal contour error is near to 0.054mm.<br />

Figure 13. The profile when adopt<strong>in</strong>g the <strong>in</strong>troduced contour error<br />

coupled-control approach based on curve <strong>in</strong>terpolation<br />

© 2013 ACADEMY PUBLISHER


1518 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 14. The contour error when adopt<strong>in</strong>g the <strong>in</strong>troduced contour<br />

error coupled-control approach based on curve <strong>in</strong>terpolation<br />

VII. CONCLUSIONS<br />

The CNC mach<strong>in</strong>e tools contour error coupled-control<br />

strategy based on l<strong>in</strong>e <strong>in</strong>terpolation and curve<br />

<strong>in</strong>terpolation is developed <strong>in</strong> the paper, which is with<br />

stable calculation error, high comput<strong>in</strong>g precision and<br />

satisfied real-time characteristic.<br />

For one th<strong>in</strong>g, br<strong>in</strong>g forward the contour error<br />

comput<strong>in</strong>g model based on l<strong>in</strong>e <strong>in</strong>terpolation and the<br />

contour error comput<strong>in</strong>g model based on curve<br />

<strong>in</strong>terpolation; For another th<strong>in</strong>g, add the obta<strong>in</strong>ed contour<br />

error to the follow<strong>in</strong>g error of current sampl<strong>in</strong>g period,<br />

and send the results to CNC PID position controller to<br />

calculate position controlled quantity. The contour error<br />

compensation control experimentation results show that<br />

the developed approach can reduce contour error<br />

effectively and enhance profile precision further.<br />

ACKNOWLEDGMENT<br />

The authors are grateful to the Project of the National<br />

Natural Science Foundation of Ch<strong>in</strong>a (No. 51105236),<br />

and the Shandong Prov<strong>in</strong>ce Promotive research fund for<br />

excellent young and middle-aged scientists of Ch<strong>in</strong>a<br />

(No.BS2011ZZ014).<br />

REFERENCES<br />

[1] Song Bao, Zhou Yunfei, “Research of the Multi-axis<br />

Integrated Control”, Mach<strong>in</strong>e Tool & Hydraulics, vol. 10,<br />

pp. 141-143, July 2004.<br />

[2] Ke-Han Su, M<strong>in</strong>g-Yang Cheng, “Contour<strong>in</strong>g accuracy<br />

improvement us<strong>in</strong>g cross-coupled control and position<br />

error Compensator”, International Journal of Mach<strong>in</strong>e<br />

Tools and Manufacture, vol. 48, pp. 1444-1453, April 2008.<br />

[3] M<strong>in</strong>g-Yang Cheng, Ke-Han Su, Shu-Feng Wang, “Contour<br />

error reduction for free-Form contour follow<strong>in</strong>g tasks of<br />

biaxial motion control systems”, Robotics and Computer-<br />

Integrated Manufactur<strong>in</strong>g, vol. 25, pp. 323-333, May 2009.<br />

[4] Q.Zhong, Y.Shi, J.Mo, “A L<strong>in</strong>ear Cross-Coupled Control<br />

System for High-Speed Mach<strong>in</strong><strong>in</strong>g”, International Journal<br />

of Advanced Manufactur<strong>in</strong>g Technology, vol. 19, pp. 558-<br />

563, May 2002.<br />

[5] Li Shengyi, Zhang Yunzhou, Zhang M<strong>in</strong>gliang, “Cross-<br />

Coupled Algorithm Based Servo Control of Ultra precision<br />

CNC Mach<strong>in</strong>e Tool”, MANUFACTURING TECHNOLO<br />

-GY & MACHINE TOOL, vol. 7, pp. 10-12, March 2000.<br />

[6] Huan Ji, Ma Weim<strong>in</strong>, “Method for Calculat<strong>in</strong>g the<br />

Dynamic Path Error of NC Mach<strong>in</strong>e Tools Based on<br />

MATLAB”, Journal of Beij<strong>in</strong>g University of Aeronautics<br />

and Astronautics, vol. 4, pp. 299-302, April 2003.<br />

[7] Ernesto, Charlie A, Farouki, Rida T, “High-speed<br />

corner<strong>in</strong>g by CNC mach<strong>in</strong>es under prescribed bounds on<br />

axis accelerations and toolpath contour error”,<br />

International Journal of Advanced Manufactur<strong>in</strong>g<br />

Technology, vol. 58, pp. 327-338, May 2012.<br />

[8] Wang Li-Mei, Yang Qi, Sun Yi-Biao, “Iterative learn<strong>in</strong>g<br />

cross-coupled control for XY table based on real-time<br />

contour error estimation”, Advanced Materials Research,<br />

vol. 383-390, pp. 7054-7059, July 2012.<br />

[9] Huo Feng, Poo Aun-Neow, “Free-form two-dimensional<br />

contour error estimation based on NURBS <strong>in</strong>terpolation”,<br />

Applied Mechanics and Materials, vol. 157-158, pp. 236-<br />

240, May 2012.<br />

[10] Conway Jeremy R, Ernesto Charlie A, Farouki, Rida T,<br />

“Performance analysis of cross-coupled controllers for<br />

CNC mach<strong>in</strong>es based upon precise real-time contour error<br />

measurement”, International Journal of Mach<strong>in</strong>e Tools and<br />

Manufacture, vol. 52, pp. 30-39, July 2012.<br />

[11] Huo Feng, Xi Xue-Cheng, Poo Aun-Neow, “Generalized<br />

Taylor series expansion for free-form two-dimensional<br />

contour error compensation”, International Journal of<br />

Mach<strong>in</strong>e Tools and Manufacture, vol. 53, pp. 91-99, March<br />

2012.<br />

[12] Möhr<strong>in</strong>g H.-C, Gümmer O, Fischer R, “Active error<br />

compensation <strong>in</strong> contour-controlled gr<strong>in</strong>d<strong>in</strong>g”, CIRP<br />

Annals - Manufactur<strong>in</strong>g Technology, vol. 60, pp. 429-432,<br />

April 2011.<br />

[13] Wang Sheng-Bao, Liu Xiao-Hong, “New cross-coupl<strong>in</strong>g<br />

control of <strong>in</strong>dependent l<strong>in</strong>ear contour errors based on<br />

backlash”, Materials Science Forum, vol. 663-665, pp.<br />

902-905, July 2011.<br />

[14] El Khalick M. A., Uchiyama Naoki, “Contour<strong>in</strong>g<br />

controller design based on iterative contour error<br />

estimation for three-dimensional mach<strong>in</strong><strong>in</strong>g”, Robotics and<br />

Computer-Integrated Manufactur<strong>in</strong>g, vol. 27, pp. 802-807,<br />

May 2011.<br />

[15] Ernesto Charlie A., Farouki Rida T, “Solution of <strong>in</strong>verse<br />

dynamics problems for contour error m<strong>in</strong>imization <strong>in</strong> CNC<br />

mach<strong>in</strong>es”, International Journal of Advanced<br />

Manufactur<strong>in</strong>g Technology, vol. 49, pp. 589-604, May<br />

2010.<br />

[16] Syh-Shiuh Yeh, Pau-Lo Hsu, “Analysis and Design of<br />

Integrated Control for Multi-Axis Motion Systems”, IEEE<br />

TRANSACTIONS ON CONTROL SYSTEMS<br />

TECHNOLOGY, vol. 11, pp. 375-382, March 2003.<br />

[17] Myung-Hoon LEE, Seung-Han YANG, Young-Suk KIM,<br />

“A multi-axis contour error controller for free form<br />

Curves”, JSME International Journal, vol. 47, pp. 144-149,<br />

April 2004.<br />

[18] Peng Chao-Chung, Chen Chieh-Li, “Biaxial contour<strong>in</strong>g<br />

control with friction dynamics us<strong>in</strong>g a contour <strong>in</strong>dex<br />

approach”, International Journal of Mach<strong>in</strong>e Tools and<br />

Manufacture, vol. 47, pp. 1542-1555, May 2007.<br />

[19] Geng Lirong, Zhou Kai, “Research on Real Time<br />

Compensation Method Based on Time Series Predictive<br />

Technology for Contour Error of CNC Mach<strong>in</strong>e Tool”,<br />

Manufactur<strong>in</strong>g Technology & Mach<strong>in</strong>e Tool, vol. 6, pp.<br />

22-25, July 2004.<br />

[20] Wang Baoren, Wang Jie, Zhang Chengrui, “Contour error<br />

vector model and its application to CNC systems”,<br />

Computer Integrated Manufactur<strong>in</strong>g Systems, vol. 16, pp.<br />

1401-1407, May 2010.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1519<br />

[21] Zhao Ximei, Guo Q<strong>in</strong>gd<strong>in</strong>g, “Zero Phase Adaptive Robust<br />

Cross Coupl<strong>in</strong>g Control for NC Mach<strong>in</strong>e Multiple L<strong>in</strong>ked<br />

Servo Motor”, Proceed<strong>in</strong>gs of the CSEE, vol. 28, pp. 129-<br />

133, April 2008.<br />

[22] Liu Yi, Cong Shuang, “Optimal Contour<strong>in</strong>g Control Based<br />

on Task Coord<strong>in</strong>ate Frame and Its Simulation”, Journal of<br />

System Simulation, vol. 21, pp. 3381- 3386, March 2009.<br />

[23] ZHAO Guo-yong, ZHAO Fu-l<strong>in</strong>g, XU Zhi-xiang, “Highprecision<br />

cross-coupled control approach based on NURBS<br />

curve <strong>in</strong>terpolator”, Journal of Dalian University of<br />

Technology, vol. 48, pp. 210-214, July 2008.<br />

Guoyong Zhao was born <strong>in</strong> Shandong, Ch<strong>in</strong>a <strong>in</strong> 1976. He has a<br />

Ph.D. <strong>in</strong> Mechanical and Electronic Eng<strong>in</strong>eer<strong>in</strong>g (2008) from<br />

Dalian University of Technology, Dalian, Ch<strong>in</strong>a. His ma<strong>in</strong><br />

<strong>in</strong>terest is mechanical manufactur<strong>in</strong>g and automation<br />

technology.<br />

Hongj<strong>in</strong>g An was born <strong>in</strong> Hebei, Ch<strong>in</strong>a <strong>in</strong> 1987. She is a master<br />

postgraduate majored <strong>in</strong> mechanical manufactur<strong>in</strong>g and<br />

automation <strong>in</strong> Shandong University of Technology, Zibo, Ch<strong>in</strong>a.<br />

Her ma<strong>in</strong> <strong>in</strong>terest is mechanical manufactur<strong>in</strong>g and automation<br />

technology.<br />

Q<strong>in</strong>gzhi Zhao was born <strong>in</strong> Shandong, Ch<strong>in</strong>a <strong>in</strong> 1962. He has a<br />

Ph.D. <strong>in</strong> mechanical manufactur<strong>in</strong>g and automation (2005) from<br />

Nanj<strong>in</strong>g University of Aeronautics and Astronautics, Nanj<strong>in</strong>g,<br />

Ch<strong>in</strong>a. His ma<strong>in</strong> <strong>in</strong>terest is mechanical manufactur<strong>in</strong>g and<br />

automation technology.<br />

© 2013 ACADEMY PUBLISHER


1520 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Research of Leaf Quality Based on Snowflake<br />

Theory<br />

Lihui Zhou<br />

College of Sciences, Hebei United University, Tangshan, Hebei, Ch<strong>in</strong>a<br />

Email: zhoulh324@163.com<br />

Jiajia Sun, Juanjuan An and Jun Long<br />

College of Sciences, Hebei United University, Tangshan, Hebei, Ch<strong>in</strong>a<br />

Email: zhoulh324@163.com<br />

Abstract—To study the leaves quality, this paper proposed<br />

two efficient models to analyze leaf quality, which classify<br />

leaves based on different shapes, leaf shapes were classified<br />

from the macro and micro perspectives respectively. In the<br />

two perspectives, <strong>in</strong>fluential factors were extracted and<br />

analyzed by factor analysis and K-means cluster<strong>in</strong>g. After<br />

compar<strong>in</strong>g cluster<strong>in</strong>g result with actual classification result,<br />

misjudgment probability is found to be very low. In the<br />

second model, snowflake model theory was proposed. The<br />

theory is high similarity between snow structure and tree<br />

structure, and the formation of the branch copies the<br />

exterior characteristics of the backbone. Then the growth<br />

process of a tree was simulated, after calculat<strong>in</strong>g the<br />

number of smallest branches through programm<strong>in</strong>g, the<br />

total number of leaves could be calculated out. To estimate<br />

the tree leaf weight, two steps were divided. First step was to<br />

estimate the number of leaves us<strong>in</strong>g the snow theory. Second<br />

step was to estimate the area of s<strong>in</strong>gle leaf. F<strong>in</strong>ally, the area<br />

measurement model to flat leaf was set up to measure the<br />

area of the curly leaf, which was divid<strong>in</strong>g the whole curly<br />

leaf <strong>in</strong>to small pieces.<br />

Index Terms—factor analysis, snowflake theory,<br />

misjudgment probability, error evaluation<br />

I. INTRODUCTION<br />

Leaves are the material basis of photosynthesis, the<br />

“green factory” produc<strong>in</strong>g nutrients, and the medium of<br />

transpiration [1, 2]. It is not only the important factors of<br />

the growth of trees, yields of leaves and species<br />

characteristics, but also the important means for<br />

reasonable cultivation and management of trees and<br />

detection of occurrence and development of plant<br />

diseases and <strong>in</strong>sect pests [3, 4]. So leaf area is the<br />

constant consideration <strong>in</strong> the physiological and<br />

biochemical research, genetic breed<strong>in</strong>g, cultivation, etc.,<br />

of trees [5]. In trees cultivation, leaf area <strong>in</strong>dex is<br />

commonly used to weigh the trees group's growth, which<br />

is used as the referential <strong>in</strong>dex for determ<strong>in</strong><strong>in</strong>g cultivation<br />

measures [6, 7]. In addition, the determ<strong>in</strong>ation of leaf<br />

area ate by pests is the important content of study<strong>in</strong>g pest<br />

damage loss. And accurate measurement of leaf area is<br />

the premise of study<strong>in</strong>g leaf area [8].<br />

There has been a variety of algorithm for determ<strong>in</strong><strong>in</strong>g<br />

surface area of a s<strong>in</strong>gle leaf. Direct measurements have<br />

been made by many scholars with <strong>in</strong>strument<br />

measurement method, paper draw<strong>in</strong>g method, digital<br />

image process<strong>in</strong>g method [11, 12], experience formula<br />

and volume method. Leaves are divided <strong>in</strong>to two types,<br />

i.e., needle-leaved tree and broad-leaved tree, for which<br />

different methods should be taken to measure surface<br />

area of their leaves. The measurement of leaf surface area<br />

with <strong>in</strong>strument method is simple and quick <strong>in</strong> operation.<br />

Structure used <strong>in</strong> the measurement could be divided <strong>in</strong>to<br />

two types: one is leaf area structure and another is<br />

planimeter [13]. In paper draw<strong>in</strong>g method, leaves are<br />

spread out on flat paper with well-distributed coord<strong>in</strong>ates<br />

and outl<strong>in</strong>e of the leaves are drawn on the paper [14, 15].<br />

After that grids occupied by each leaf are counted to<br />

calculate surface area of respective leaf. A full grid is<br />

counted as an area unit and less than a full grid is counted<br />

accord<strong>in</strong>g to the proportion occupied by the leaf <strong>in</strong> the<br />

grid, i.e., 1 2,1 4 etc.<br />

There is a variety of shapes for leaves [16]. Leaves are<br />

the largest organ of trees exposed to air, with the largest<br />

contact area to outside environment. Therefore,<br />

environmental conditions have a significant impact on<br />

shape and structure of leaves. In the evolutionary process<br />

trees adapt<strong>in</strong>g to different ecological environment, a<br />

variety of ecological types of leaves is shaped. In dry<br />

climate and drought environment with the lack of<br />

moisture <strong>in</strong> soil, <strong>in</strong> order to adapt to drought environment,<br />

the leaf structure characteristics of trees grow<strong>in</strong>g <strong>in</strong> arid<br />

regions is work<strong>in</strong>g towards two aspects of development,<br />

i.e., reduc<strong>in</strong>g transpiration and sav<strong>in</strong>g water [17, 18].<br />

Thus leaves of those trees are usually small to reduce<br />

transpiration of leaf area.<br />

Stout branches could withstand larger pressure, and<br />

farther the branches are away from the branch nodes the<br />

shorter and th<strong>in</strong>ner they are [7]. The th<strong>in</strong>ner the branches<br />

are, the lighter the weight born by the branches is and the<br />

smaller the leaves are. The longer the length to branch<br />

nodes on the same height to the ground is, the bigger the<br />

shapes of leaves are [8, 9]. Compared with leaves on<br />

branches from the same class of branch nodes, leaves on<br />

branches lower to the ground are bigger to enhance<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1520-1527


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1521<br />

photosynthesis for weak sunlight they receive [10, 11].<br />

Therefore, the distribution of leaves on trees and branches<br />

affects the shape of leaves.<br />

In 1999, experts have made research <strong>in</strong>to branch<strong>in</strong>g<br />

angle of trees with statistical method, found<strong>in</strong>g that<br />

branch<strong>in</strong>g phenotypes of trees is the mutual effect of<br />

genetics and environment [12, 13]. Tree species us<strong>in</strong>g 30 0<br />

as basic branch<strong>in</strong>g system <strong>in</strong>cludes: P<strong>in</strong>nata, Spend Pear,<br />

Sap<strong>in</strong>dus , Hong Kong Quebracho, Chung Yeung Wood,<br />

etc. Tree species us<strong>in</strong>g 60 0 as basic branch<strong>in</strong>g system<br />

<strong>in</strong>cludes: White Lam , Phoenix Wood , Crabapple Tree ,<br />

Large Leaves Shi Li, etc. Tree species us<strong>in</strong>g 90 0 as basic<br />

branch<strong>in</strong>g system <strong>in</strong>cludes: Ha<strong>in</strong>an Indus, Homalium<br />

Ha<strong>in</strong>anense, Gentianales [14, 19, 20]. The bigger the<br />

branch<strong>in</strong>g angles of the trees are, the larger the leaves are.<br />

Accord<strong>in</strong>g to statistical data analysis, the bigger the<br />

branch<strong>in</strong>g angles are, the larger the crown of the trees are.<br />

Because the sunlight sh<strong>in</strong><strong>in</strong>g <strong>in</strong>tensity of the lower leaves<br />

is weak, <strong>in</strong> order to <strong>in</strong>crease photosynthesis, the shape of<br />

leaves become larger. So the shape of crown of trees<br />

affects the shape of leaves. The shape of leaves (general<br />

characteristics) is correlated to the outl<strong>in</strong>e and branch<strong>in</strong>g<br />

structure of trees.<br />

In recent years, the use of mathematical model to<br />

predict leaf area has become a very common method [7,<br />

17, 20]. With l<strong>in</strong>ear model, Robert Rogers Thomas M.<br />

H<strong>in</strong>ckley has made a research <strong>in</strong>to the relationship<br />

between leaf weight and area of oak species and sapwood<br />

produced <strong>in</strong> the same year by the same tree (expressed<br />

with CSA). Accord<strong>in</strong>g to the research, the relationship is<br />

highly correlated <strong>in</strong> yellow oaks and white oaks. Through<br />

the research <strong>in</strong>to the relationship between leaf area and<br />

chest diameter of arbors and shrubs, Kittredge has<br />

successful completed the fitt<strong>in</strong>g of leaf area and chest<br />

diameter regression equation. With BP artificial neural<br />

network, related work has effectively predicted the<br />

cucamultion volume of stand<strong>in</strong>g forest <strong>in</strong> Greater<br />

Kh<strong>in</strong>gan Range <strong>in</strong> [3, 13]. BP neural network method has<br />

been used to solve the problem of leaf shape<br />

classification, result<strong>in</strong>g <strong>in</strong> an accuracy of 86.67%.<br />

However, mathematical model is seldom used to <strong>in</strong>-depth<br />

research of leaf shape classification.<br />

To study the leaves quality, this paper proposed two<br />

efficient models to analyze leaf quality, which classify<br />

leaves based on different shapes, leaf shapes were<br />

classified from the macro and micro perspectives<br />

respectively. In the two perspectives, <strong>in</strong>fluential factors<br />

were extracted and analyzed by factor analysis and K-<br />

means cluster<strong>in</strong>g. After compar<strong>in</strong>g cluster<strong>in</strong>g result with<br />

actual classification result, misjudgment probability is<br />

found to be very low. The second model is based on<br />

snowflake theory, which is high similarity between snow<br />

structure and tree structure, and the formation of the<br />

branch copies the exterior characteristics of the backbone.<br />

Then the growth process of a tree was simulated, after<br />

calculat<strong>in</strong>g the number of smallest branches through<br />

programm<strong>in</strong>g, the total number of leaves could be<br />

calculated out. To estimate the tree leaf weight, two steps<br />

were divided. First step was to estimate the number of<br />

leaves us<strong>in</strong>g the snow theory. Second step was to<br />

estimate the area of s<strong>in</strong>gle leaf. F<strong>in</strong>ally, the area<br />

measurement model to flat leaf was set up to measure the<br />

area of the curly leaf, which was divid<strong>in</strong>g the whole curly<br />

leaf <strong>in</strong>to small pieces<br />

II. PROPOSED CLASSIFICATION MODEL<br />

A. Terms Expla<strong>in</strong>ed<br />

• Ground Diameter: Diameter of the trunk about 20cm<br />

from the ground.<br />

• Breast Diameter: Diameter of the trunk about 1.3m<br />

from the ground.<br />

• Clear length: height of trunk below m<strong>in</strong>imum<br />

branches of the crown.<br />

• Crown of a Tree: The part above the trunk of an arbor<br />

tree bear<strong>in</strong>g branches and leaves, like a crown.<br />

• Class 1 branch: Class 1 branch is the framework of a<br />

tree, the length and special arrangement of which plays<br />

a dom<strong>in</strong>ant role <strong>in</strong> shap<strong>in</strong>g the tree. It has a certa<strong>in</strong><br />

grow<strong>in</strong>g position and azimuth attributes on the trunk.<br />

• Node Sections: Sections divid<strong>in</strong>g by nodes on class 1<br />

branch.<br />

• Section Spac<strong>in</strong>g: Distance between each layer of class 1<br />

branches.<br />

• Azimuth: The horizontal angle between each class 1<br />

branch and horizontal plane <strong>in</strong> verticality to the trunk.<br />

• Branch Angle: Vertical angle between each class 1<br />

branch and vertical plane parallel to the surface of the<br />

trunk.<br />

• Curvature: Curv<strong>in</strong>g degree of class 1 branches.<br />

• Physiological Age: is a concept compar<strong>in</strong>g with growth<br />

age, represent<strong>in</strong>g plant life vitality, and could be<br />

dist<strong>in</strong>guished accord<strong>in</strong>g to the change of the structure<br />

of plant shapes. When the physiological age of the<br />

lateral branch is the same to that of the trunk, it is<br />

called “repeated growth” phenomenon, which accord<br />

with our hypothesis <strong>in</strong> snowflake theory.<br />

B. The Classification Model of Leaves 1<br />

For trees, there are <strong>in</strong>ternal and external causes<br />

affect<strong>in</strong>g their leaves shape, but the <strong>in</strong>ternal and external<br />

causes all have a variety of factors, such as for <strong>in</strong>ternal<br />

causes there are genes, ways of transportation, and<br />

mutation, etc.; for external causes there are sunsh<strong>in</strong>e,<br />

moisture, temperature, change of worms, and soil etc.<br />

Therefore, classification for leaves shapes is a complex<br />

and delicate job. Our analysis is ma<strong>in</strong>ly carried out from<br />

two perspectives, i.e., macro and micro perspectives.<br />

The theoretical result shows that the shape of leaves is<br />

not only determ<strong>in</strong>ed by their growth genes but also<br />

affected by growth environment, growth shape and<br />

growth scale of the trees. From this perspective, certa<strong>in</strong><br />

<strong>in</strong>fluential factors of the shape of tree leaves could be<br />

chosen as the <strong>in</strong>dexes. Accord<strong>in</strong>g to relevant material,<br />

factors describ<strong>in</strong>g shapes of trees <strong>in</strong>clude: ground<br />

diameter, breast diameter, tree height, clear height,<br />

average crown diameter, south-north crown length, eastwest<br />

crown length, layers, <strong>in</strong>ternodes spac<strong>in</strong>g, etc.<br />

Accord<strong>in</strong>g to the n<strong>in</strong>e factors cluster analysis is made on<br />

trees to classify the similar growth shapes <strong>in</strong>to one<br />

© 2013 ACADEMY PUBLISHER


1522 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

category. But it just makes a rough analysis on leaves<br />

shapes, so the next step is ref<strong>in</strong>ed analysis.<br />

C. Classification Model of Leaves 2<br />

Then factor analysis is made on tree leaf shapes with<strong>in</strong><br />

one category to calculate factor score, which is used for<br />

cluster<strong>in</strong>g. This k<strong>in</strong>d of cluster<strong>in</strong>g analysis method is<br />

ref<strong>in</strong>ed. We know that there are several dozens of factors<br />

describ<strong>in</strong>g leaf shapes, such as leaf shape, leaf width, leaf<br />

length, leaf ve<strong>in</strong>, etc., but we know that the length of<br />

ve<strong>in</strong>s <strong>in</strong> a certa<strong>in</strong> extent determ<strong>in</strong>es leaf length and leaf<br />

width. And some factors could be completely described<br />

by other factors, so we use the method of reduc<strong>in</strong>g<br />

dimension firstly and then cluster<strong>in</strong>g. We use factor<br />

analysis to reduce the dimension of <strong>in</strong>fluential factors to<br />

get factor score for cluster<strong>in</strong>g. This method not only can<br />

dist<strong>in</strong>guish well leaf shapes, but also can reduce the<br />

complexity of the analyzed problem.<br />

The mathematical model for factor analysis is as<br />

follows:<br />

⎧X1 = a11F1 + a12F2 + + a1 mFm<br />

+ ε1<br />

⎪X2 = a21F1+ a22F2 + + a2 mFm<br />

+ ε<br />

2<br />

⎨<br />

, (1)<br />

⎪<br />

<br />

⎪<br />

⎩XP = aP 1F1 + aP2F2<br />

+ + aPmFm + ε<br />

P<br />

represented with matrix:<br />

⎡X1 ⎤ ⎡a11 a12 a1 m ⎤ ⎡F1<br />

⎤ ⎡ε1<br />

⎤<br />

⎢<br />

X<br />

⎥ ⎢ ⎥<br />

2<br />

a21 a22 a<br />

⎢<br />

2m<br />

F<br />

⎥ ⎢<br />

2<br />

ε<br />

⎥<br />

⎢ ⎥ ⎢<br />

<br />

2<br />

= ⎥ ⎢ ⎥+<br />

⎢ ⎥ .<br />

⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢<br />

⎥<br />

⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥<br />

⎣X P⎦ ⎣aP1 aP2<br />

aPm⎦<br />

⎣Fm<br />

⎦ ⎣ε<br />

P⎦<br />

Simply recorded as:<br />

And meet:<br />

1) m≤ P;<br />

2) cov ( F, ε ) = 0 ;<br />

X = AF + ε . (2)<br />

⎡1 0 ⎤<br />

3) D( F)<br />

=<br />

⎢ ⎥<br />

⎢<br />

<br />

⎥<br />

= Im<br />

;<br />

⎢⎣0 1 ⎥⎦<br />

F , , F is unrelated and variance are 1.<br />

1 m<br />

2<br />

⎡σ<br />

1<br />

0 ⎤<br />

⎢ ⎥<br />

4) D ( ε ) = ⎢ ⎥ .<br />

⎢<br />

2<br />

0 σ ⎥<br />

⎣ <br />

P ⎦<br />

ε<br />

1,<br />

,ε P<br />

denote unrelated and different variance.<br />

Among them is the P dimensional random vector as<br />

unobservable volume, comprised by P <strong>in</strong>dexes got <strong>in</strong><br />

F = F , F ′ is called common<br />

actual observation. ( )<br />

factor of ( )<br />

1<br />

,<br />

m<br />

X = X , , 1<br />

X ′<br />

P<br />

the above-mentioned<br />

<strong>in</strong>tegrated variable. A is factor load<strong>in</strong>g matrix, on which<br />

maximum variance rotation is made with variance, so that<br />

the structure of A simplified. In other words, the square<br />

value of every column elements of load<strong>in</strong>g matrix is<br />

made to polarization 0 or 1 or the more dispersed the<br />

contribution rate of public factor is the better is the result.<br />

Variables got from factor analysis are represented as<br />

l<strong>in</strong>ear comb<strong>in</strong>ation of public factors:<br />

Xi = ai1F1+ ai2F2 + + aimFm<br />

+ εi<br />

i = 1,2, ,P<br />

(3)<br />

But usually when public factors are used to represent<br />

the orig<strong>in</strong>al variables, it is more convenient to describe<br />

the characteristics of research object. Therefore, public<br />

factors are represented as l<strong>in</strong>ear comb<strong>in</strong>ation of variables,<br />

i.e., the factor score function, namely<br />

F′= β X + β X + + β X<br />

j j1 1 j2 2 jP P<br />

j= 1,2, ,m<br />

(4)<br />

We calculated m factor score for each left samples.<br />

Use the score of these m factors as a variable value to<br />

cluster different leaves with the method of K-means<br />

Cluster.<br />

D. Cluster<strong>in</strong>g Error Estimation<br />

We have given the evaluation method for judg<strong>in</strong>g<br />

cluster<strong>in</strong>g effect. Usually we use back substitution<br />

misjudgment probability and cross misjudgment<br />

probability. If the number of misjudg<strong>in</strong>g samples belong<br />

to G 1 as belong to G2<br />

is N<br />

1<br />

, and the number of<br />

misjudg<strong>in</strong>g samples belong to G 2 as belong to G 1 is N<br />

2<br />

,<br />

the total number of samples of the two general<br />

classifications is n ,Then misjudgment probability is:<br />

N1+<br />

N2<br />

p = (5)<br />

n<br />

Back substitution misjudgment probability<br />

Set G<br />

1<br />

, G<br />

2<br />

as two general classifications,<br />

X , , 1<br />

X<br />

m<br />

and Y , , 1<br />

Yn<br />

are tra<strong>in</strong><strong>in</strong>g samples from<br />

G<br />

1<br />

, G<br />

2<br />

respectively, with all the tra<strong>in</strong><strong>in</strong>g samples used as<br />

m+ n new samples, which is substituted gradually <strong>in</strong>to<br />

established criterion for judg<strong>in</strong>g the ownership of the new<br />

samples. The process is called back substitution. If the<br />

number of misjudg<strong>in</strong>g samples belong to G 1<br />

as belong<br />

to G<br />

2<br />

is N<br />

1<br />

, and the number of misjudg<strong>in</strong>g samples<br />

belong to G 2<br />

as belong to G 1<br />

is N<br />

2<br />

, then misjudgment<br />

probability is:<br />

N1+<br />

N2<br />

pˆ<br />

=<br />

m+<br />

n<br />

Cross judgment probability<br />

Back to generation misjudgment probability is to<br />

elim<strong>in</strong>ate a sample every time, and use the rest<br />

of m+ n− 1 tra<strong>in</strong><strong>in</strong>g samples to establish a criterion for<br />

judgment, then use established criterion to make<br />

judgment on deleted samples. The above-mentioned<br />

analysis is made on each sample of those tra<strong>in</strong><strong>in</strong>g samples,<br />

and uses its misjudgment proportion as the misjudgment<br />

probability. The specific procedure is as follows:<br />

1) From tra<strong>in</strong><strong>in</strong>g samples <strong>in</strong> general classification G 1 ,<br />

elim<strong>in</strong>ate one of the samples, and use the rest of the<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1523<br />

samples m − 1 plus all samples <strong>in</strong> G2<br />

to establish<br />

discrim<strong>in</strong>ate function;<br />

2) Use the established discrim<strong>in</strong>ate function to make<br />

judgment on elim<strong>in</strong>ated samples;<br />

3) Repeat steps 1), 2) until the samples <strong>in</strong> G 1 <strong>in</strong> turn<br />

be deleted and judged. The number of misjudged samples<br />

is recorded as m<br />

12<br />

;<br />

4) Repeat steps 1), 2), 3) for samples <strong>in</strong> G 2 , until all of<br />

the samples <strong>in</strong> G 2 <strong>in</strong> turn be deleted and discrim<strong>in</strong>ated.<br />

The number of misjudged samples is recorded as n<br />

21<br />

. So<br />

cross misjudgment probability is estimated:<br />

m12 + n21<br />

pˆ<br />

=<br />

(6)<br />

m+<br />

n<br />

If cluster<strong>in</strong>g result is bad, the follow<strong>in</strong>g several aspects<br />

of optimization could be carried out. 1) Increase sample<br />

capacity; 2) Increase new <strong>in</strong>dex variables; 3) If statistical<br />

data is wrong, rediscover data.<br />

III. PROPOSED MODEL BASED ON SNOWFLAKE THEORY<br />

A. Snowflake Theory<br />

Each snowflake on the whole is a hexagonal star, <strong>in</strong><br />

which there are six trunks, and then each trunk has small<br />

branches, and smaller branches grow<strong>in</strong>g on small<br />

branches, and so on, as shown <strong>in</strong> figure 1 below. The<br />

process of shap<strong>in</strong>g snowflake is copy<strong>in</strong>g part and the<br />

whole sections of it constantly. The process with the<br />

above mentioned of growth characteristics is called<br />

snowflake theory.<br />

Figure 1. Snowflake<br />

We already know <strong>in</strong> the above that each tree species<br />

has its own particular branch<strong>in</strong>g angle. We th<strong>in</strong>k of tree<br />

trunk as straight, and from another perspective, we could<br />

see it as a lateral branch. We all know that each lateral<br />

branch has the function of branch<strong>in</strong>g, and all of the lateral<br />

branches have the same status. Each layer of the branches<br />

will branch <strong>in</strong> accordance with certa<strong>in</strong> similar rule.<br />

Accord<strong>in</strong>g to this growth rule, we simulate the outl<strong>in</strong>e of<br />

a tree, as shown <strong>in</strong> Fig. 2.<br />

Figure 2. The Tree of Computer Simulation<br />

Accord<strong>in</strong>g to the ideas of snowflake theory, the growth<br />

process of trees is established until it reaches the state of<br />

the tree for observation. The laws of chang<strong>in</strong>g between<br />

the state of a certa<strong>in</strong> level of branch<strong>in</strong>g and the state of its<br />

sub-level of branch<strong>in</strong>g should be found out to for the<br />

recursion relationship of programm<strong>in</strong>g. Among a certa<strong>in</strong><br />

level of branch the ma<strong>in</strong> parameters are the quantity of<br />

branches, number of sections, <strong>in</strong>terval of sections,<br />

azimuth, <strong>in</strong>cluded angle of branch<strong>in</strong>g, curvature, length<br />

of branches, and stem. In [1] three ways of branch<strong>in</strong>g<br />

have been mentioned, i.e., s<strong>in</strong>gle axis branch<strong>in</strong>g, false<br />

b<strong>in</strong>ary branch<strong>in</strong>g and merg<strong>in</strong>g axis branch<strong>in</strong>g. To<br />

simulate the growth of a tree, which way of branch<strong>in</strong>g it<br />

belongs to should be found .Then after f<strong>in</strong>d<strong>in</strong>g out the<br />

law of its branch<strong>in</strong>g, computer could be used to simulate<br />

out its growth process.<br />

B. Ways for Branch<strong>in</strong>g<br />

We have known that the growth process of trees has<br />

the characteristics of self-adaptive, uncerta<strong>in</strong>ty,<br />

emergency, f<strong>in</strong>ality and open<strong>in</strong>g. Different k<strong>in</strong>ds of trees<br />

have different ways of branch<strong>in</strong>g, and the law of copy<strong>in</strong>g<br />

is different. So we will analyze ways of branch<strong>in</strong>g.<br />

Roughly there are three ways of branch<strong>in</strong>g for trees:<br />

• S<strong>in</strong>gle axis branch<strong>in</strong>g: The apical bud of the tree<br />

constantly grows up vigorously, shap<strong>in</strong>g the stout trunk.<br />

And lateral buds also grow <strong>in</strong>to the lateral branch, on<br />

which sub-branches grow aga<strong>in</strong>, as shown <strong>in</strong> figure 3<br />

below. The trunk of s<strong>in</strong>gle axis branch<strong>in</strong>g is<br />

comparatively straight, and the growth of other branches<br />

at all levels is not so vigorous as it. Poplar, metasequoia,<br />

etc., are all with<strong>in</strong> the group of s<strong>in</strong>gle axis branch<strong>in</strong>g.<br />

False b<strong>in</strong>ary branch<strong>in</strong>g: The apical bud of the tree<br />

stops grow<strong>in</strong>g after shap<strong>in</strong>g a branch. Close to the branch<br />

two opposite auxiliary buds simultaneously grow <strong>in</strong>to a<br />

pair of opposite lateral branches. Then the apical bud and<br />

auxiliary buds on the two opposite lateral branches repeat<br />

the same grow<strong>in</strong>g process, as shown <strong>in</strong> the figure below.<br />

Clove, carnation and horse chestnut, etc., are all with<strong>in</strong><br />

the group of false b<strong>in</strong>ary branch<strong>in</strong>g.<br />

© 2013 ACADEMY PUBLISHER


1524 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 3. S<strong>in</strong>gle Axis Branch<strong>in</strong>g<br />

• In the growth process of the trees, the branch<strong>in</strong>g<br />

angle of float from a certa<strong>in</strong> range.<br />

• In the growth process of the trees, along with the<br />

<strong>in</strong>crease of the layer of branch<strong>in</strong>g, branches become<br />

tapered, and length of branches gradually becomes short.<br />

From a macro po<strong>in</strong>t of View l, trees have one th<strong>in</strong>g <strong>in</strong><br />

common <strong>in</strong> the composition of it’s shape and structure,<br />

namely the basic construct<strong>in</strong>g element of trees are trunks,<br />

branches and leaves. The structur<strong>in</strong>g of each basic<br />

element is follow<strong>in</strong>g a same way: the trunk gives birth to<br />

the first layer of branches, which <strong>in</strong> turn gives birth to the<br />

second layer of branches, and so on. The process of<br />

giv<strong>in</strong>g birth eventually comes to leaves. In the occurrence<br />

and development process of the shape of the trees,<br />

organizations similar to the exist<strong>in</strong>g organizations are<br />

constantly copied and added to the exist<strong>in</strong>g ones.<br />

Based on the above-mentioned clon<strong>in</strong>g process, eight<br />

basic parameters are used to be def<strong>in</strong>ed the structure of<br />

branches, as shown <strong>in</strong> Table 1.<br />

TABLE I.<br />

EIGHT BASIC PARAMETERS<br />

Figure 4. False B<strong>in</strong>ary Branch<strong>in</strong>g<br />

Merg<strong>in</strong>g axis branch<strong>in</strong>g: The growth rate of apical bud<br />

of the tree slows down or the apical is dead or become<br />

flower bud. The auxiliary bud immediately under the<br />

apical bud replaces the growth of the apical bud to shape<br />

a branch. After that the apical bud of the branch stops<br />

grow<strong>in</strong>g and replaced by the auxiliary bud immediately<br />

under it. The growth process is repeated. The length of<br />

node section of merg<strong>in</strong>g axis branch<strong>in</strong>g is comparatively<br />

short, often with a tortuous shape, as shown <strong>in</strong> the figure<br />

below. Apple, pear, peach and apricot trees, etc., are all<br />

with<strong>in</strong> the group of merg<strong>in</strong>g axis branch<strong>in</strong>g.<br />

Layer Layers of tree [2, 8]<br />

H Height of branches [0.0, 1.0]<br />

R Bottom radius of branches [0.0, 1.0]<br />

Alfa Branch<strong>in</strong>g angle [0, 90 0 ]<br />

K Rattion of top and bottom radius [0.0, 1.0]<br />

P Height of branch<strong>in</strong>g po<strong>in</strong>t [0.0, 1.0]<br />

Q<br />

Attennuation of thickness of<br />

branches<br />

[0.0, 1.0]<br />

M Attennuation of lenght of branches [0.0, 1.0]<br />

Because of the <strong>in</strong>fluence from many k<strong>in</strong>ds of factors<br />

such as gravity, w<strong>in</strong>d and sunsh<strong>in</strong>e, etc., In the process of<br />

their growth, the growth shape of trees <strong>in</strong> nature has got<br />

great uncerta<strong>in</strong>ty and randomness. In order to describe<br />

shapes of trees more vividly, <strong>in</strong> the process of<br />

establish<strong>in</strong>g mathematical model stochastic function is<br />

<strong>in</strong>troduced. Follow<strong>in</strong>g is a maple tree simulated with a<br />

computer model, as shown <strong>in</strong> Fig. 6 and Fig. 7:<br />

Figure 5. Merg<strong>in</strong>g Axis Branch<strong>in</strong>g<br />

C. Establishment of Models<br />

Model assumptions are as follows:<br />

• In the growth process of the trees, abundant nutrients<br />

are supplied for the growth of each auxiliary bud.<br />

• In the growth process of the trees, no lateral branch<br />

dies.<br />

• Environmental factors shouldn’t <strong>in</strong>crease (decrease)<br />

to the highest (lowest) po<strong>in</strong>t so that to block the normal<br />

growth of the plants.<br />

Figure 6. Simulation of maple.<br />

From the simulation render<strong>in</strong>g with computer, we can<br />

f<strong>in</strong>d out that the similarity degree between the simulated<br />

image and maple tree <strong>in</strong> real life is very high. Visibly, the<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1525<br />

reliability of estimat<strong>in</strong>g leaves number with the use of<br />

snowflake theory is very high.<br />

curvature angle follow<strong>in</strong>g the ve<strong>in</strong> is very small, and we<br />

divide leaves with this k<strong>in</strong>d of features as shown <strong>in</strong> figure<br />

6(This is divided along the ve<strong>in</strong>s on the leaves), with the<br />

hypothesis that the rectangle divided out by us is <strong>in</strong> a<br />

plane.<br />

Figure 7. simulation of maple tree<br />

IV. SINGLE LEAF AREA ESTIMATION<br />

Ideas of model: we have classified leaf shapes <strong>in</strong> the<br />

above, so when we want to establish the model for leaf<br />

area estimation, we can f<strong>in</strong>d a representative leaf for<br />

analysis. In the process of analysis, ma<strong>in</strong>ly ideas of<br />

<strong>in</strong>tegration are used, <strong>in</strong> which, a reasonable division is<br />

given to leaves <strong>in</strong> different shapes <strong>in</strong> order to divided<br />

them <strong>in</strong>to graphics, of which areas can be calculated for<br />

analysis; Also considerations are gave to the bend<strong>in</strong>g<br />

problem of edges of leaves when the ve<strong>in</strong>s become closer<br />

to the central l<strong>in</strong>e at the middle of the leaves. For the<br />

calculation of this model each leave is segmented along<br />

with the ve<strong>in</strong>s of the leave.<br />

A. Flat Leaf<br />

Take a typical leaf, and draw its shape on a piece of a<br />

coord<strong>in</strong>ate paper. Take some po<strong>in</strong>ts from the draw<strong>in</strong>g and<br />

make a fitt<strong>in</strong>g to work out the leaf outl<strong>in</strong>e function with<br />

Least squares method. We can get the function images as<br />

shown <strong>in</strong> figure 8.Then we can calculate the leaf area S<br />

with curvil<strong>in</strong>ear <strong>in</strong>tegral:<br />

x2 x2<br />

∫ 1( ) ∫ 2( )<br />

(7)<br />

S = f x dx − f x dx<br />

x1 x1<br />

Figure 8. The simulation of flat leaf<br />

B. Curv<strong>in</strong>g Leaf<br />

Through observation we can f<strong>in</strong>d out that most of the<br />

curv<strong>in</strong>g of a leaf follows the ve<strong>in</strong> and towards the middle<br />

l<strong>in</strong>e, and the curv<strong>in</strong>g is gentle. The appearance of a bigger<br />

arc of curv<strong>in</strong>g is unusual, so we suppose that the<br />

Figure 9. The division of curv<strong>in</strong>g leaf<br />

This model can only make a rough estimation of the<br />

area of the curv<strong>in</strong>g leaf, and can only have an analysis on<br />

leaves with specific curv<strong>in</strong>g characteristics.<br />

C. Results of Model<br />

N is the number of the leaves on the tree;<br />

S is the area of a s<strong>in</strong>gle leaf;<br />

ρ is the surface density ;<br />

M is the weight of leaves on the maple tree.<br />

As for the maple used as an example, the number of<br />

the leaves simulated by computer belongs to<br />

[ 2187 , 2357 ].<br />

Accord<strong>in</strong>g to statistical data: the area of a s<strong>in</strong>gle leaf is<br />

about 52cm 2 , and the surface density is about 0.17g/cm 2 .<br />

Through calculation:<br />

M = ρ ⋅S⋅ N<br />

(8)<br />

The weight of the leaves on the maple tree is 19.3kg to<br />

20.8kg.<br />

We have used the method of factor analysis for<br />

cluster<strong>in</strong>g of leaf shapes to reduce the number of<br />

variables and simplify our research workload. We use a<br />

few public factors to expla<strong>in</strong> complicated relationships<br />

exist<strong>in</strong>g <strong>in</strong> more variables <strong>in</strong> observation. We use<br />

snowflake model to catch the law tree growth, well<br />

estimat<strong>in</strong>g the leaves quality of a tree. For the calculation<br />

the area of a s<strong>in</strong>gle leaf, not only the comparatively flat<br />

leaves are considered, but also the calculation of the area<br />

of leaf surface when there is the problem of surface<br />

curv<strong>in</strong>g.<br />

However because of time constra<strong>in</strong>ts, we couldn’t f<strong>in</strong>d<br />

out large amount of data for verify<strong>in</strong>g our theory.<br />

V. CONCLUSION<br />

Our ma<strong>in</strong> objective is about leaves quality research.<br />

First, we classify leaves based on different shapes, then<br />

simulate the processes of leaf growth and calculate total<br />

leaves per tree. Accord<strong>in</strong>g to the area and density of a<br />

leaf, we can easily estimate leaves weight of a tree.<br />

In the process of leaf shape classification, we firstly<br />

analyze the diversification of leaf shape. From the genetic<br />

© 2013 ACADEMY PUBLISHER


1526 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

perspective, exist<strong>in</strong>g research data shows that long term<br />

environment impact changes the gene of tree and this is<br />

the most essential factor affected the shape of leaf. On the<br />

other hand, the open branch angle, DBH, knot spac<strong>in</strong>g,<br />

crown diameter, clear length and tree height of tree will<br />

affect the shape of leaf. Dur<strong>in</strong>g the research, we found<br />

that the position of leaf also affects leaf shape. E.g., the<br />

smaller tip Angle will be the smaller leaf shape of the top<br />

branch. In the classification of leaf shape, if we directly<br />

classify leaf shapes accord<strong>in</strong>g to the parameters of the<br />

leaf structure, it will be complicated. Dur<strong>in</strong>g analysis, we<br />

found the method that is us<strong>in</strong>g some <strong>in</strong>dexes to classify<br />

leaf shape at first, and then classify<strong>in</strong>g leaf forms aga<strong>in</strong><br />

based on the structure of leaf. The method will reduce<br />

work load <strong>in</strong> the leaf shape classification, meanwhile, get<br />

a better result.<br />

In the weight estimate of tree leaf, we divide <strong>in</strong>to two<br />

steps. First step, we estimate the number of leaves.<br />

Dur<strong>in</strong>g research, we found and built the snow model<br />

theory that is high similarity between snow structure and<br />

tree structure (Therefore we get conclusion). The<br />

formation of the branch copies the exterior characteristics<br />

of the backbone. In the experimental simulation,<br />

simulated maple tree is highly similar with the actual<br />

sample at the aspects of crown diameter, breast diameter,<br />

number of branches, length and thickness of branches and<br />

so on. This suggests that the snow theory can be applied<br />

<strong>in</strong> the three growth simulation and it can be used <strong>in</strong> tree<br />

growth model <strong>in</strong> the future. Second step is estimat<strong>in</strong>g<br />

area of s<strong>in</strong>gle leaf previous methods of the leaf area<br />

estimation are direct measurement method and<br />

mathematical model analysis. However, those methods<br />

cannot measure curvature leaves. We had the<br />

correspond<strong>in</strong>g improvement. Firstly, we set up area<br />

measurement model to flat leaf. Then the area of the curly<br />

leaf was measured, which is divid<strong>in</strong>g the whole curly leaf<br />

<strong>in</strong>to small pieces. F<strong>in</strong>ally, we calculate total area of all<br />

small pieces to get result. The measurement of the curly<br />

leaf has especially mean<strong>in</strong>g because many factors <strong>in</strong><br />

nature can <strong>in</strong>fluence of leaf form.<br />

ACKNOWLEDGMENT<br />

The fund<strong>in</strong>g organizations are Hebei Higher Social<br />

Science Research 2011 Annual Fund (No. SZ2011518)<br />

and Tangshan Municipal Bureau of Science and<br />

Technology research and development guide plan (No.<br />

111302013b, No. 111102033b).<br />

REFERENCES<br />

[1] Xu Guoxiang, Statistical forecast<strong>in</strong>g and decision- mak<strong>in</strong>g,<br />

1 st ed., Shanghai: Shanghai F<strong>in</strong>ance University Press, 1998,<br />

pp.85-89.<br />

[2] Du Zifang, Sampl<strong>in</strong>g Techniques and Practices, 1 st ed.,<br />

Beij<strong>in</strong>g: Q<strong>in</strong>ghua University Press, 2004, pp.123-124.<br />

[3] Yang Guiyuan, Huang Yili, Mathematical Model<strong>in</strong>g,Hefei:<br />

Ch<strong>in</strong>a science and technology university Press, 2008,<br />

pp.75-79.<br />

[4] He Shu, “Application of SOM Neural Network on leaves’<br />

shape classification,” <strong>in</strong> Computer development and<br />

application, vol. 17, pp. 31–33, 2003.<br />

[5] Xia Shanzhi, Zhu Xujia, “Review of the measur<strong>in</strong>g method<br />

<strong>in</strong> leaf area”, <strong>in</strong> Forestry survey and design, 2009, pp.15-<br />

17.<br />

[6] Jiang Youxu, Zang Runguo, “A prelim<strong>in</strong>ary analysis on<br />

elementary architecture of tropical trees <strong>in</strong> the topical<br />

arboretum of Jian Feng l<strong>in</strong>g”, <strong>in</strong> Resource Scienc, vol. 21,<br />

1997<br />

[7] Zhang Chuny<strong>in</strong>g, Guo J<strong>in</strong>gfeng, Liu Lu, “P-Graph and Its<br />

Application,” unpublished.<br />

[8] Zhou Lihui, Wang Hong, Du Lip<strong>in</strong>g, “A Balanced<br />

Relationship Analysis Between Ch<strong>in</strong>ese Economic Growth<br />

and the Iron and Steel Production Based on Time Series,”<br />

International Conference on E-Bus<strong>in</strong>ess and E-<br />

Government, vol.2, pp. 192-196 , August 2010<br />

[9] Zhang Chuny<strong>in</strong>g, Guo J<strong>in</strong>gfeng, Chen Xiao, “Research on<br />

random walk rough match<strong>in</strong>g algorithm of attribute subgraph”,<br />

International Conference on Advanced Materials<br />

and Computer Science, pp. 297-302, October 2011.<br />

[10] Liu Fengchun, Zhang Chuny<strong>in</strong>g, “λ-Operations on Packet<br />

Sets and the Significance of Application”, unpublished.<br />

[11] Thomas G C, John J E, “Algometric equations for four<br />

valuable trop i.cal tree species”, <strong>in</strong> Forest Ecology and<br />

Management, 2006, pp.351 - 360.<br />

[12] Zhou Lihui, “Analysis about the Effectiveness Evaluation<br />

of Ch<strong>in</strong>a’s Real Estate Enterprises based on DEA model”,<br />

International Conference on Eng<strong>in</strong>eer<strong>in</strong>g and Bus<strong>in</strong>ess<br />

Management, vol.1, pp. 1384-1387, October, 2011.<br />

[13] Yibo Tan, Zhonghui Zhao, “The Ma<strong>in</strong> Methods for<br />

Determ<strong>in</strong><strong>in</strong>g Leaf Area Index”, <strong>in</strong> Forest Inventory And<br />

Plann<strong>in</strong>g, 2008, pp. 33.<br />

[14] Yan Gao, Chengjun Zhang and Liyan Zhang,<br />

“Comparative Analysis of Three GARCH Models Based<br />

on MCMC”, The 2nd International Conference on<br />

Information Comput<strong>in</strong>g and Applications, vol., pp. 284-<br />

286, September, 2011.<br />

[15] Gao Yan, Wan X<strong>in</strong>ghuo, Liu Qiume, “Study of the<br />

Spillover Effect Based on the B<strong>in</strong>ary GED-GARCH<br />

Recent Advance <strong>in</strong> Statistics Application and Related<br />

Areas”, Conference Proceed<strong>in</strong>gs of The 4th International<br />

Institute of Stastistics & Management Eng<strong>in</strong>eer<strong>in</strong>g<br />

Symposium, vol.2, pp. 134-134, July, 2011.<br />

[16] Yan Gao, Chengjun Zhang and Liyan Zhang, “Comparison<br />

of GARCH Models based on Different Distributions,”<br />

unpublished.<br />

[17] Zhou Lihui, “The Pr<strong>in</strong>cipal Component Analysis about<br />

Three-dimensional time series data Of Ch<strong>in</strong>ese <strong>in</strong>formation<br />

process”, International Conference on E-Bus<strong>in</strong>ess and E-<br />

Government, vol.2, pp. 4901-4904, July, 2010.<br />

[18] Zhang Chuny<strong>in</strong>g, Guo J<strong>in</strong>gfeng, Chen Xiao, “Research on<br />

random walk rough match<strong>in</strong>g algorithm of attribute subgraph”,<br />

International Conference on Advanced Materials<br />

and Computer Science, pp. 297-302, May, 2011.<br />

[19] Aim<strong>in</strong> Yang, Chunfeng Liu, J<strong>in</strong>cai Chang and Li Feng,<br />

“TOPSIS-Based Numerical Computation Methodology for<br />

Intuitionistic Fuzzy Multiple Attribute Decision Mak<strong>in</strong>g”,<br />

<strong>in</strong> Nformation-an International Interdiscipl<strong>in</strong>ary Journal,<br />

2010, pp. 3169-3174<br />

[20] Zhang Chuny<strong>in</strong>g, Wang J<strong>in</strong>g, “Multi-relational Bayesian<br />

classification algorithm with rough set”, 7th International<br />

Conference on Fuzzy Systems and Knowledge Discovery,<br />

pp. 1565-1568, August, 2010.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1527<br />

Lihui Zhou was born <strong>in</strong> Tangshan of Hebei prov<strong>in</strong>ce, on<br />

November 12, 1980. She got Master Degree of Econometrics <strong>in</strong><br />

Southwestern University of F<strong>in</strong>ance and Economics <strong>in</strong> July,<br />

2006, which is <strong>in</strong> Sichun prov<strong>in</strong>ce, <strong>in</strong> ch<strong>in</strong>a. Her major field of<br />

study is multivariate statistical analysis.<br />

She has been work<strong>in</strong>g <strong>in</strong> School of Science, Hebei United<br />

University s<strong>in</strong>ce September, 2006, which located <strong>in</strong> X<strong>in</strong> Hua<br />

Street 46, Tangshan, Hebei, P. R. Ch<strong>in</strong>a. Now her Current<br />

<strong>in</strong>terests are the application of the qu<strong>in</strong>tile regression model.<br />

Jiajia Sun was born <strong>in</strong> Shijiazhuang of Hebei prov<strong>in</strong>ce, on July<br />

8, 1986. She is a junior student of Hebei United University. Her<br />

major is mathematical statistics.<br />

Juanjuan An was born <strong>in</strong> X<strong>in</strong>gtai of Hebei prov<strong>in</strong>ce, on May<br />

20, 1986. She is a junior student of Hebei United University.<br />

Her major is mathematical statistics.<br />

Jun Long was born <strong>in</strong> Zhengzhou of Henan prov<strong>in</strong>ce, on<br />

August 14, 1985. He is a junior student of Hebei United<br />

University. His major is <strong>in</strong>formation science.<br />

© 2013 ACADEMY PUBLISHER


1528 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Oscillation Criteria for Second Order Nonl<strong>in</strong>ear<br />

Neutral Perturbed Dynamic Equations on Time<br />

Scales<br />

Xiup<strong>in</strong>g Yu<br />

Department of Mathematics and Physics, Hebei Institute of Architecture and Civil Eng<strong>in</strong>eer<strong>in</strong>g, Zhangjiakou, Ch<strong>in</strong>a<br />

Email: xiup<strong>in</strong>g66@163.com<br />

Hua Du<br />

Information Science and Eng<strong>in</strong>eer<strong>in</strong>g College, Hebei North University, Zhangjiakou, Ch<strong>in</strong>a<br />

Email: dhhappy88@126.com<br />

Hongyu Yang<br />

Department of Mechanic and Eng<strong>in</strong>eer<strong>in</strong>g, Zhangjiakou Vocational Technology Institute, Zhangjiakou, Ch<strong>in</strong>a<br />

Email: yanghy88@s<strong>in</strong>a.com<br />

Abstract—To <strong>in</strong>vestigate the oscillatory and asymptotic<br />

behavior for a certa<strong>in</strong> class of second order nonl<strong>in</strong>ear<br />

neutral perturbed dynamic equations on time scales. By<br />

employ<strong>in</strong>g the time scales theory and some necessary<br />

analytic techniques, and <strong>in</strong>troduc<strong>in</strong>g the class of parameter<br />

functions and generalized Riccati transformation, some new<br />

sufficient conditions for oscillation of such dynamic<br />

equations on time scales were established. The results not<br />

only improve and extend some known results <strong>in</strong> the<br />

literature, but also unify the oscillation of second order<br />

nonl<strong>in</strong>ear neutral perturbed differential equations and<br />

second order nonl<strong>in</strong>ear neutral perturbed difference<br />

equations. In particular, the results are essentially new<br />

under the relaxed conditions for the parameter function.<br />

Some examples are given to illustrate the ma<strong>in</strong> results.<br />

Dynamic equations on time scales are widely used <strong>in</strong> many<br />

fields such as computer, electrical eng<strong>in</strong>eer<strong>in</strong>g, population<br />

dynamics, and neural network, etc.<br />

Index Terms—oscillation, nonl<strong>in</strong>ear neutral perturbed<br />

dynamic equation, time scales, Riccati transformation.<br />

I. INTRODUCTION<br />

The theory of time scales, which has recently received<br />

a lot of attention, was <strong>in</strong>troduced by Stefan Higher <strong>in</strong> his<br />

Ph.D. thesis [1] <strong>in</strong> 1988 <strong>in</strong> order to unify cont<strong>in</strong>uous and<br />

discrete analysis. Not only can this theory of so-called<br />

“dynamic equations” unify the theories of differential<br />

equations and of difference equations, but also it is able<br />

to extend these classical cases “<strong>in</strong> between”, e.g., to socalled<br />

q-difference equations. Several authors have<br />

expounded on various aspects of this new theory, see the<br />

survey paper by Agarwal [2] and references cited there<strong>in</strong>.<br />

A book on the subject of time scales by Bohner and<br />

Peterson [3] summarizes and organizes much of the time<br />

scale calculus. A time scales T is an arbitrary nonempty<br />

closed subset of the real numbers . There are many<br />

<strong>in</strong>terest<strong>in</strong>g time scales and they give rise to plenty of<br />

applications, the cases when the time scale is equal to<br />

reals or the <strong>in</strong>tegers represent the classical theories of<br />

differential and of difference equ-ations. Another useful<br />

+∞<br />

time scale a time scale P<br />

, n 0[( na b), na ( b) a]<br />

ab∪<br />

=<br />

+ + + is<br />

wi-dely used to study population <strong>in</strong> biological<br />

communities, electric circuit and so on [3].<br />

In recent years, there has been much research activity<br />

concern<strong>in</strong>g the oscillation and nonoscillation of solutions<br />

of some dynamic equations on time scales, and we refer<br />

the reader to the papers [4-17] and references cited<br />

there<strong>in</strong>. Regard<strong>in</strong>g neutral dynamic equations, Argarwal<br />

et al [6] considered the second order neutral delay<br />

dynamic quation<br />

Δ<br />

{ ( t)[( xt ( ) ctxt ( ) ( )) ] γ Δ<br />

α + − τ } + ftxt ( , ( − δ)) = 0. (1)<br />

where γ > 0 is an odd positive <strong>in</strong>teger, τ andδ are position<br />

constants, α Δ () t > 0, and proved that the oscillation<br />

of (1) is equivalent to the oscillation of a first order delay<br />

dynamic <strong>in</strong>equality. Saker [7] considered (1) where γ ≥ 1 ,<br />

is an odd positive <strong>in</strong>teger, the condition α Δ () t > 0is<br />

abolished and established some new sufficient conditions<br />

for oscillation of (1). However the results established <strong>in</strong><br />

[6-7] are only valid for the time scales ,<br />

, or h<br />

, q <br />

,<br />

<br />

where q = { t: t = q k<br />

, k∈ , q > 1} .<br />

Sah<strong>in</strong>er et al [8] considered the general equation<br />

Δ γ Δ<br />

{ α( t)[( xt ( ) + ctx ( ) ( τ( t)) ] } + ftx ( , ( δ( t))) = 0 . (2)<br />

on a time scale T , where γ ≥ 1 and τ () t ≤t, δ () t ≤ t, and<br />

followed the argument <strong>in</strong> [6-7] by reduc<strong>in</strong>g the oscillation<br />

of (2) to the oscillation of a first order delay dynamic<br />

<strong>in</strong>equality and established some sufficient conditions for<br />

the oscillation. However one can easily see that the two<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1528-1535


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1529<br />

examples presented <strong>in</strong> [8] to illustrate the ma<strong>in</strong> results are<br />

valid only when T= and cannot be applied when T = .<br />

Agarwal, O′Regan and Saker [3]considered (2) where γ ≥<br />

1 is an odd positive <strong>in</strong>teger and α Δ () t > 0, and established<br />

some new oscillation criteria by employ<strong>in</strong>g the Riccati<br />

transformation technique which can be applied on any<br />

time scale T and improved the results <strong>in</strong> [6, 8].<br />

Bohner and Saker [9] considered perturbed nonl<strong>in</strong>ear<br />

dynadynamic equation<br />

Δ<br />

{ ( t)(( x( t)) ) γ Δ<br />

} F( t, x σ ) G( t, x σ Δ<br />

α<br />

+ = , x ). (3)<br />

on a time scales T . Where γ > 0 is an odd positive<br />

<strong>in</strong>teger, us<strong>in</strong>g Riccati transformation techniques, they<br />

obta<strong>in</strong>ed some sufficient conditions for the solution to be<br />

oscillatory or converge to zero.<br />

Follow<strong>in</strong>g this trend, we shall study the oscillation for<br />

the second-order neutral nonl<strong>in</strong>ear perturbed dynamic<br />

equations of the form<br />

and<br />

Δ γ<br />

{ α( t)(( x( t) + c( t) x( τ( t))) ) }<br />

Δ<br />

+ F( tx , ( δ( t))) = Gtx ( , ( δ( t)), x),<br />

Δ γ<br />

{ α( t)(( x( t) − c( t) x( τ( t))) ) }<br />

Δ<br />

+ F( tx , ( δ( t))) = Gtx ( , ( δ( t)), x).<br />

on an arbitrary time scales T , where γ is a quotient of<br />

positive odd <strong>in</strong>teger, α, c is a positive real-valued rdcont<strong>in</strong>uous<br />

function def<strong>in</strong>ed on a time scales T and the<br />

follow<strong>in</strong>g conditions are satisfied:<br />

+∞<br />

1 γ<br />

(H1) 0 ≤ct<br />

( ) ≤ c < 1,<br />

t ( α( t))<br />

0 ∫ Δ =∞, for all t ∈ T ;<br />

t<br />

0<br />

(H2) τ , δ : T → T satisfies τ () t ≤ t,<br />

for all t ∈ T , either<br />

δ () t ≥ t or δ () t ≤ t for all suffici-ently large t , and<br />

lim τ ( t)<br />

= lim δ ( t)<br />

=∞;<br />

t→∞<br />

t→∞<br />

(H3) pq , : T → are rd-cont<strong>in</strong>uous function, such that<br />

qt () − pt () > 0, for all t ∈ T ;<br />

2<br />

(H4) F : T× →<br />

and G : T× →<br />

are functions<br />

such that uF(, t u ) > 0and uG(, t u, v ) > 0, for all u ∈ −<br />

{0} , v ∈ , t ∈ T ;<br />

(H5) F(, tu) u γ<br />

≥ qt (), and Gtuv (, , ) u γ<br />

≤ pt () for all<br />

uv∈ , −{0}<br />

, t ∈ T .<br />

We note that <strong>in</strong> all the above results the conditions<br />

0 ≤ ct ( ) < 1, γ ≥ 1 and δ () t ≤ t are required. And some<br />

authors utilized the kernel function ( t−<br />

s<br />

) m<br />

Δ<br />

Δ<br />

(4)<br />

(5)<br />

or the general<br />

class of functions H (, ts)<br />

and obta<strong>in</strong>ed some oscillation<br />

Δs<br />

criteria, but the condition H ( ts , ) ≤ 0 is required. In this<br />

paper the study is free of these restrictions and conta<strong>in</strong>s<br />

the cases when 0< γ < 1, δ ( t) ≥t,<br />

and − 1 < ct ( ) ≤ 0 . In<br />

particular, by utiliz<strong>in</strong>g the general class of functions<br />

H (, ts ), we shall derive some sufficient conditions for<br />

the solutions of (4) and (5) to be oscillatory or converge<br />

Δs<br />

to zero when the condition H (, t s) ≤ 0is relaxed. Our<br />

results are different from the exist<strong>in</strong>g results for neutral<br />

equations on time scales that were established <strong>in</strong> [6-11,<br />

13-17]. Also, we give some examples to illustrate the<br />

ma<strong>in</strong> results.<br />

S<strong>in</strong>ce we are <strong>in</strong>terested <strong>in</strong> the oscillatory and asymptotic<br />

behavior of solutions near <strong>in</strong>f<strong>in</strong>ity, we assume that<br />

sup T = ∞ , and def<strong>in</strong>e the time scale <strong>in</strong>terval [ t 0<br />

, ∞)<br />

T<br />

by<br />

[ t , ∞ ) : = [ t , ∞)<br />

∩ T . By a solution of (4), we mean a<br />

0 T 0<br />

nontrivial real-valued function x (t) satisfy<strong>in</strong>g (4)<br />

for t ≥ t . A solution x (t) of (4) is said to be oscillatory if<br />

0<br />

it is neither eventually positive nor eventually negative,<br />

otherwise it is called nonoscillatory. Equation (4) is said<br />

to be oscillatory if all its solutions are oscillatory. Our<br />

attention is restricted to those solutions of (4) which exist<br />

on some half l<strong>in</strong>e[ t 0<br />

, ∞)<br />

and satisfy sup{| xt ( ) |: t≥ t x<br />

} > 0 ,<br />

for any t ≥ t .<br />

x 0<br />

The paper is organized as follows. In next section, we<br />

present some basic formula and lemma concern<strong>in</strong>g the<br />

calculus on time scales. In Section 3, we will use Riccati<br />

transformation techniques and the general class of<br />

functions H (, ts)<br />

and give some sufficient conditions for<br />

the oscillatory behavior of solutions of (4) and (5). In last<br />

section, we give some examples to illustrate our ma<strong>in</strong><br />

results.<br />

Through this paper, we let<br />

γ<br />

d () t = max[0, d()], t Q() t = ( q() t − p())(1 t −c( δ ())), t<br />

+<br />

∫ Δs<br />

α () s<br />

d () t = max[0, − d()], t ρ(, t u): =<br />

,<br />

−<br />

() s<br />

and for sufficiently largeT ∗ ,<br />

δ () t 1 γ<br />

u<br />

t 1 γ<br />

∫ Δs<br />

α<br />

u<br />

1, δ ( t) t,<br />

∗<br />

⎧<br />

≥<br />

β (, tT ) = ⎨ γ ∗<br />

⎩ρ<br />

(, tT ), δ() t ≤ t.<br />

II. SOME PRELIMINARIES ON TIME SCALES<br />

A time scales T is an arbitrary nonempty closed subset<br />

of the real numbers . In this paper, we only consider<br />

time scales <strong>in</strong>terval of form [ t 0<br />

, ∞)<br />

T<br />

, on T we def<strong>in</strong>e the<br />

forward jump operatorσ and the gra<strong>in</strong><strong>in</strong>ess μ by<br />

{ }<br />

σ (): t = <strong>in</strong>f s∈ T : s > t and μ(): t = σ () t − t.<br />

A po<strong>in</strong>t t ∈ T with σ () t = tis called right-dense, while t<br />

is referred to as be<strong>in</strong>g right-scattered if σ () t > t . A<br />

function f : T → is said to be rd-cont<strong>in</strong>uous if it is<br />

cont<strong>in</strong>u-ous at each right-dense po<strong>in</strong>t and if there exists a<br />

left limit <strong>in</strong> all left-dense po<strong>in</strong>ts. The ( Δ derivative) f Δ of<br />

f is def<strong>in</strong>ed by<br />

Δ f ( σ ( t)) − f( s)<br />

f () t = lim , where Ut () = T \{ σ ()} t .<br />

σ () t − s<br />

s→t<br />

sU ∈ () t<br />

© 2013 ACADEMY PUBLISHER


1530 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

The derivative and the forward jump operator are<br />

related by the useful formula<br />

σ<br />

f f μ f<br />

Δ<br />

σ<br />

= + , where f : = f σ.<br />

We will also make use of the follow<strong>in</strong>g product and<br />

quotient rules for the derivative of the product f g and the<br />

quotient f g( gg σ ≠ 0) of two differentiable functions f<br />

and g :<br />

Δ<br />

⎛ f ⎞ f g−<br />

f g<br />

( f g) Δ = f Δ g+ f σ<br />

g<br />

Δ<br />

, and ⎜ ⎟ =<br />

⎝ g ⎠ gg σ<br />

Δ<br />

Δ<br />

. (6)<br />

By us<strong>in</strong>g the product rule, the derivative of f () t =<br />

( t − α) m<br />

for m ∈ andα ∈ T can be calculated as<br />

m−1<br />

Δ<br />

v<br />

m−v−1<br />

() = ( σ() −α)( −α) .<br />

v=<br />

0<br />

f t ∑ t t<br />

(7)<br />

For a, b∈ T and a differentiable function f , the<br />

Cauchy <strong>in</strong>tegral of f Δ is def<strong>in</strong>ed by<br />

b Δ<br />

∫a f () t Δ t = f( b) − f( a)<br />

.<br />

The <strong>in</strong>tegration by parts formula follows from (6) and<br />

reads<br />

b Δ<br />

b b σ Δ<br />

∫ f () tgt () Δ t= ftgt () ()| −∫ f tg()<br />

tΔt.<br />

a<br />

To prove our ma<strong>in</strong> results, we will use the formula<br />

1 1<br />

( x γ Δ<br />

( t)) [ hx σ (1 h) x] γ − Δ<br />

= γ + − dhx ( t)<br />

0<br />

a<br />

a<br />

∫ . (8)<br />

which is a simple consequence of Keller′s cha<strong>in</strong> rule [2].<br />

Also, we need the follow<strong>in</strong>g lemma [5].<br />

Lemma 1 Assume A and B are nonnegtive constants, λ<br />

> 1, then<br />

λ<br />

−<br />

− ≤( − 1) .<br />

1<br />

AB λ A λ λ B<br />

λ<br />

The reader is referred to [2] for more detailed and<br />

extensive developments <strong>in</strong> calculus on time scales.<br />

III. MAIN RESULTS<br />

First, we state the oscillation criteria for (4).<br />

Set<br />

yt () = xt () + ctx () ( τ ()). t<br />

(9)<br />

Theorem 1 Assume that (H1) - (H5) hold, Furthermore,<br />

suppose that there exists a positive Δ−differentiable<br />

function g()<br />

t such that for all sufficiently large T ∗<br />

, and<br />

∗<br />

for all δ (T) > T , we have<br />

t<br />

∗<br />

limsup ∫ ( β (, sT ) gsQs () () −<br />

t→∞<br />

T<br />

α( s)(( g ( s)) )<br />

( γ + 1) g ( s)<br />

Δ γ + 1<br />

+<br />

γ+<br />

1 γ<br />

) Δ s =∞.<br />

Then every solution of (4) is oscillatory on [ t , ∞)<br />

0 T<br />

.<br />

(10)<br />

proof Suppose (4) has a nonoscillatory solution x (t).<br />

without loss of generality, there exists some t 1<br />

≥ t 0<br />

,<br />

sufficiently large such that xt () > 0, x( τ ( t)) > 0, x( δ ( t))<br />

> 0 for all t ≥ t . Hence In the view of (9), by (H1) we<br />

1<br />

get yt () > 0. from (4) and by (H2) - (H5), we have that<br />

Δ<br />

( y )) γ<br />

γ<br />

α<br />

Δ<br />

≤ −( q() t − p()) t x ( δ()) t < 0,<br />

and us<strong>in</strong>g the same proof of Theorem 1 [4], there exists<br />

t ≥ t such that for all t ≥ t , we have<br />

2 1<br />

2<br />

Δ<br />

⎧yt () > 0, y () t > 0,<br />

(11)<br />

⎨<br />

Δ<br />

( ( y ) γ Δ<br />

γ<br />

⎩ α ) ≤ −( q( t) − p( t))(1 − c( δ( t))) y ( δ( t)) < 0.<br />

By the def<strong>in</strong>ition of Qt (), we get<br />

Δ<br />

( ( y ) γ<br />

γ<br />

α )<br />

Δ<br />

≤ − Q( t) y ( δ( t)) < 0. (12)<br />

Make the generalized Riccati substitution<br />

Δ γ<br />

α()( t y ()) t<br />

wt () = gt ()<br />

. (13)<br />

γ<br />

y () t<br />

By the product and quotient rules, we have for all t ≥ t2<br />

Δ γ Δ<br />

Δ gt ()( α()( t y())) t ⎛ gt () ⎞<br />

Δ γ<br />

w () t = ( ()( t y ())) t<br />

γ<br />

+⎜ γ ⎟ α<br />

y () t ⎝ y () t ⎠<br />

Δ γ Δ<br />

gt ()( α()( t y()))<br />

t<br />

= +<br />

γ<br />

y () t<br />

Δ<br />

γ Δ<br />

g () t g()( t y ()) t<br />

Δ γ σ<br />

( −<br />

)( α( t)( y ( t)) ) .<br />

γσ γ γσ<br />

y () t y () t y () t<br />

From (12) - (14), we obta<strong>in</strong><br />

Δ<br />

Δ<br />

⎛ y( δ ( t)) ⎞ g ( t)<br />

σ<br />

w () t ≤− g() t Q() t ⎜ ⎟ + w () t<br />

σ<br />

⎝ yt () ⎠ g () t<br />

σ γ Δ<br />

gtw () ()( t y()) t<br />

−<br />

σ<br />

γ .<br />

g () t y () t<br />

γ<br />

Δ<br />

σ<br />

(14)<br />

(15)<br />

First consider the case when δ () t ≥ t . For all large t,<br />

Δ<br />

from y () t > 0, we have<br />

which implies that<br />

y( δ ( t))<br />

≥ 1 ,<br />

yt ()<br />

Δ<br />

σ γ Δ<br />

Δ<br />

g () t σ g() t w ()( t y ()) t<br />

w () t ≤− g() t Q() t + w () t − . (16)<br />

σ σ γ<br />

g () t g () t y () t<br />

Next consider the case when δ () t ≤ t, for all large t. By<br />

us<strong>in</strong>g α( y<br />

Δ )<br />

γ<br />

is strictly decreas<strong>in</strong>g on [ t 2<br />

, ∞ ) , we can<br />

choose t ≥ t such that δ () t ≥ t , for t ≥ t . Then we<br />

3 2<br />

2<br />

3<br />

obta<strong>in</strong><br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1531<br />

and hence<br />

Δ γ 1 γ<br />

t ( α( sy ) ( s)) )<br />

y() t − y( δ ()) t = ∫<br />

Δs<br />

δ () t<br />

1 γ<br />

α () s<br />

≤<br />

t y t<br />

Δs<br />

α () s<br />

Δ<br />

γ 1 γ t<br />

( αδ ( ( ))( ( δ( ))) ) ∫ ,<br />

δ () t 1 γ<br />

Δ<br />

γ 1 γ<br />

yt () ( αδ ( ())( t y ( δ())))<br />

t t Δs<br />

≤ 1+ ∫ . (17)<br />

δ () t 1 γ<br />

y( δ( t)) y( δ( t)) α ( s)<br />

Also, for t ≥ t , we can see that<br />

3<br />

≥<br />

1 γ<br />

Δ γ<br />

δ () t<br />

y( δ( t)) > y( δ( t)) − y( t ) = s<br />

2 ∫<br />

Δ<br />

t2<br />

1 γ<br />

Δs<br />

α () s<br />

1 γ<br />

Δ<br />

γ δ () t<br />

( αδ ( ( t))( y ( δ( t))) ) ∫ ,<br />

t2<br />

1 γ<br />

and therefore<br />

( αδ ( ( ))( ( δ( ))) )<br />

( α( sy ) ( s)) )<br />

α () s<br />

1 γ<br />

Δ<br />

γ<br />

t y t δ () t s<br />

≤ ⎜∫t2<br />

1 γ<br />

y( δ( t)) α ( s)<br />

From (17) and the above <strong>in</strong>equality, we have<br />

⎛<br />

⎝<br />

Δ<br />

⎞<br />

⎟<br />

⎠<br />

−1<br />

yt () t Δs δ () t Δs<br />

−1<br />

≤ ∫ ( )<br />

t2 1 γ ∫ , (18)<br />

t2<br />

1 γ<br />

y( δ( t)) α ( s) α ( s)<br />

therefore we get the desired <strong>in</strong>equality<br />

y( δ ( t))<br />

≥ ρ(, tt),<br />

for t ≥ t . (19)<br />

2<br />

3<br />

yt ()<br />

Us<strong>in</strong>g (19) <strong>in</strong> (15), when δ () t ≤ t, we get<br />

Δ<br />

Δ<br />

γ<br />

g () t σ<br />

w () t ≤− ρ (, t t ) g() t Q() t + w () t<br />

2<br />

σ<br />

g () t<br />

σ γ Δ<br />

gtw () ()( t y()) t<br />

−<br />

σ<br />

γ .<br />

g () t y () t<br />

From (16), (20) and the def<strong>in</strong>ition of β (, tt)<br />

, we have<br />

2<br />

By (8), we obta<strong>in</strong><br />

Δ<br />

Δ<br />

g () t σ<br />

w () t ≤− β (, t t ) g() t Q() t + w () t<br />

2<br />

σ<br />

g () t<br />

σ γ Δ<br />

gtw () ()( t y()) t<br />

−<br />

σ<br />

γ .<br />

g () t y () t<br />

y t γ hy h y dh y t<br />

γ Δ 1 σ γ−1<br />

Δ<br />

( ( )) = ∫ [ + (1 − ) ] ( )<br />

0<br />

σ γ−1<br />

Δ<br />

⎧γ( y ( t)) y ( t),0< γ ≤1,<br />

≥ ⎨<br />

⎩γ<br />

yt y t γ ≥<br />

γ −1<br />

Δ<br />

( ( )) ( ), 1.<br />

S<strong>in</strong>ce α( y<br />

Δ )<br />

γ<br />

is strictly decreas<strong>in</strong>g on[ t 2<br />

, ∞ ), we get<br />

γ<br />

( y ( t))<br />

Δ<br />

⎧γα<br />

t y t y t<br />

⎪ α () t<br />

≥ ⎨<br />

⎪ γα t y t y t<br />

⎪<br />

⎩ α () t<br />

(<br />

σ 1 γ<br />

( )) (<br />

σ γ−1<br />

( )) (<br />

Δ σ<br />

( ))<br />

1 γ<br />

(<br />

σ 1 γ γ−1<br />

( )) ( ( )) (<br />

Δ σ<br />

( ))<br />

1 γ<br />

.<br />

,0< γ ≤1,<br />

, γ ≥ 1.<br />

(20)<br />

(21)<br />

From the last <strong>in</strong>equality and (21), if 0< γ ≤ 1, we have<br />

Δ<br />

Δ<br />

g () t σ<br />

w () t ≤ − β (, t t ) g() t Q() t + w () t −<br />

2<br />

σ<br />

g () t<br />

σ 11 + γ σ<br />

γ gt ()( w()) t ⎛ y () t ⎞<br />

1 γ σ 1+<br />

1 γ ⎜ ⎟<br />

α ()( t g ()) t ⎝ y()<br />

t ⎠<br />

whereas if γ > 1 , we f<strong>in</strong>d that<br />

Δ<br />

Δ<br />

g () t σ<br />

w () t ≤− β (, t t ) g() t Q() t + w () t<br />

2<br />

σ<br />

g () t<br />

γ gt w t y t<br />

−<br />

α ()( t g ()) t y()<br />

t<br />

σ 11 + γ σ<br />

()( ()) ()<br />

1 γ σ 1+<br />

1 γ .<br />

Δ<br />

And by us<strong>in</strong>g y () t > 0, we obta<strong>in</strong> that<br />

Δ<br />

Δ<br />

g () t<br />

+ σ<br />

w () t ≤− β (, t t ) g() t Q() t + w () t<br />

2<br />

σ<br />

g () t<br />

γ gt ()<br />

−<br />

α ()( t g ()) t<br />

1 γ σ λ<br />

γ<br />

,<br />

σ λ<br />

( w ( t)) ,<br />

where λ : = ( γ + 1) γ . Def<strong>in</strong>e A ≥ 0 and B ≥ 0<br />

by<br />

σ λ<br />

1( γ +1) Δ<br />

λ γ gt ()( w())<br />

t<br />

λ− 1<br />

α ()( t g ()) t<br />

+<br />

A : = , B : = ,<br />

1 γ σ λ 1 λ<br />

α ( t)( g ( t)) λ( γg( t))<br />

then us<strong>in</strong>g Lemma 1, we obta<strong>in</strong><br />

(22)<br />

g<br />

Δ 1<br />

() t ()<br />

()(( ()))<br />

() ( ()) t g Δ t<br />

γ +<br />

σ gt<br />

σ λ α<br />

+<br />

γ<br />

+<br />

w t −<br />

w t ≤<br />

.<br />

σ 1γ σ λ γ+<br />

1 γ<br />

g () t α ()( t g ()) t ( γ + 1) g () t<br />

From the last <strong>in</strong>equality and (22), we have<br />

Δ γ + 1<br />

Δ<br />

α()(( t g ())) t<br />

+<br />

w () t ≤<br />

−β<br />

(, t t ) g() t Q()<br />

t .<br />

γ+<br />

1 γ<br />

2<br />

( γ + 1) g ( t)<br />

Integrat<strong>in</strong>g both sides from t 3<br />

to t, we get<br />

Δ γ + 1<br />

t<br />

α( s)(( g ( s)) )<br />

+<br />

∫ [ β ( s, t ) g( s) Q( s) −<br />

] Δs<br />

t3<br />

2 γ+<br />

1 γ<br />

( γ + 1) g ( s)<br />

≤ wt ( ) −wt ( ) ≤ wt ( ),<br />

3 3<br />

which leads to a contradiction to (10). This completes the<br />

proof.<br />

Corollary 1 Assume that (H1) - (H5) hold, Furthermore,<br />

suppose that for all sufficiently large T ∗ , and for δ ( T ) ><br />

T ∗<br />

,<br />

we have<br />

t<br />

∗ α()<br />

s<br />

limsup ∫ ( sβ<br />

( s, T ) Q( s) − ) Δ s =∞.<br />

t→∞<br />

T<br />

γ+<br />

1 γ<br />

( γ + 1) s<br />

Then every solution of (4) is oscillatory on [ t , ∞)<br />

0 T<br />

.<br />

Corollary 2 Assume that (H1) - (H5) hold, Furthermore,<br />

suppose that for all sufficiently large T ∗ , and for δ ( T ) ><br />

T ∗<br />

,<br />

we have<br />

t<br />

∗<br />

limsup ∫ β ( sT , ) Qs ( ) Δ s=∞.<br />

t→∞<br />

T<br />

© 2013 ACADEMY PUBLISHER


1532 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Then every solution of (4) is oscillatory on [ t , ∞)<br />

0 T<br />

.<br />

We next study a Philos-type oscillation criteria for (4).<br />

First, Let us <strong>in</strong>troduce the class of functions R which<br />

will be extensively used <strong>in</strong> the sequel.<br />

2<br />

Let D= {( ts , ) ∈T : t≥ s≥t}<br />

.The function H ∈ Crd<br />

( D, )<br />

is said to belong to the class R by H ∈R, if<br />

H (,) tt 0, t t<br />

0<br />

= ≥ ; H (, ts) 0, t s t<br />

0<br />

0<br />

> > ≥ , (23)<br />

Δs<br />

and H has a cont<strong>in</strong>uous Δ− partial derivative H (, ts)<br />

with respect to the second variable.<br />

Theorem 2 Assume that (H1) - (H5) hold. Let g (t) be<br />

as def<strong>in</strong>ed <strong>in</strong> Theorem 1, and Hh , ∈C rd<br />

( D, )<br />

such that<br />

H ∈R. Furthermore, suppose that there exists a positive<br />

rd-cont<strong>in</strong>uous function ϕ()<br />

t satisfies<br />

Hts (, )<br />

≤ ϕ()<br />

s , (24)<br />

Htt (, )<br />

0<br />

Δ<br />

Δ g () s h(,)<br />

t s<br />

s γ ( γ+<br />

1)<br />

−H (, t s) − H(, t s) = ( H(, t s))<br />

, (25)<br />

σ<br />

σ<br />

g () s g () s<br />

and for all sufficiently largeT ∗ , we have<br />

1 t<br />

∗<br />

limsup ∫ [ β (, s T ) g() s Q() s H(,)<br />

t s<br />

t→∞<br />

t0<br />

Htt (, )<br />

0<br />

α()( s h (,)) t s<br />

− ] Δ s =∞.<br />

γ + 1<br />

−<br />

γ+<br />

1 γ<br />

( γ + 1) g ( s)<br />

(26)<br />

Then every solution of (4) is oscillatory on [ t , ∞)<br />

0 T<br />

.<br />

Proof Suppose (4) has a nonoscillatory solution x (t),<br />

without loss of generality, say xt () > 0, x( τ ( t)) > 0,<br />

x( δ ( t)) > 0, for all t ≥ t , for some t<br />

1<br />

1<br />

≥ t 0<br />

. By (H2) - (H5),<br />

proceed as <strong>in</strong> the proof of Theorem 1, we get that (11)<br />

holds for all t ≥ t . Aga<strong>in</strong> we def<strong>in</strong>e wt () as <strong>in</strong> the proof of<br />

1<br />

Theorem 1, then there exists t 2<br />

≥ t 1<br />

, sufficiently large such<br />

that for all t<br />

∗<br />

≥ t and for t t ∗<br />

Δ<br />

≥ , (22) holds and let g () t<br />

2<br />

+<br />

Δ<br />

be replaced by g () t <strong>in</strong> (22), thus<br />

Δ<br />

Δ g () t σ<br />

β (, tt) gtQt () () ≤− w() t + w()<br />

t<br />

2<br />

σ<br />

g () t<br />

γ gt ()<br />

−<br />

α ()( t g ()) t<br />

1 γ σ λ<br />

σ λ<br />

( w ( t)) .<br />

(27)<br />

Multiply<strong>in</strong>g both the sides of (27), with t replaced by s,<br />

by H (t, s) and <strong>in</strong>tegrat<strong>in</strong>g with respect to s from t ∗ to t,<br />

we obta<strong>in</strong><br />

t<br />

∫ ∗ Hts (,) β (, st) gsQs () () Δs≤<br />

2<br />

t<br />

Δ<br />

t<br />

Δ<br />

t g () s σ<br />

−∫<br />

∗H (, tsw ) ( s) Δ s+ ∗Hts (, ) w( s)<br />

s<br />

t<br />

∫<br />

Δ<br />

t<br />

σ<br />

g () s<br />

t<br />

γ gs ()<br />

σ λ<br />

−∫<br />

∗ Hts (, ) ( w( s)) Δs.<br />

t<br />

1 γ σ λ<br />

α ()( s g ()) s<br />

Integrat<strong>in</strong>g by parts formula and us<strong>in</strong>g (23) and (25),<br />

we get<br />

t<br />

∗ ∗<br />

∫ ∗ Hts ( , ) β( st , ) gsQs ( ) ( ) Δs≤ Htt ( , ) wt ( ) +<br />

t<br />

2<br />

1 λ<br />

t hts (, )( Hts (, )) σ γ Htsgs (, ) ( )<br />

(28)<br />

−<br />

σ λ<br />

∫ ∗[ w ( s) −<br />

( w ( s)) ] Δs.<br />

t<br />

σ 1 γ σ λ<br />

g () s α ()( s g ()) s<br />

And apply<strong>in</strong>g Lemma 1, we obta<strong>in</strong><br />

1 λ<br />

(, )( (, ))<br />

−<br />

σ γ (, ) ( ) σ λ<br />

w () s −<br />

( w ()) s<br />

σ 1 γ σ λ<br />

h t s H t s Htsgs<br />

g () s α ()( s g ()) s<br />

α<br />

≤<br />

( γ + 1) g ( s)<br />

γ + 1<br />

( h ( t, s)) ( s) −<br />

γ+<br />

1 γ .<br />

From the last <strong>in</strong>equality and (24), (28), we have<br />

1<br />

( h ( t, s)) α( s)<br />

[ (, s t ) g() s Q() s H(,) t s ] Δs<br />

Htt g s<br />

γ + 1<br />

t<br />

−<br />

∫ β<br />

−<br />

t0<br />

2 γ+<br />

1 γ<br />

(, ) ( γ + 1) ( )<br />

0<br />

∗<br />

∗ ∗ t<br />

≤ ϕ( t ) w( t ) + ∫ ϕ( s) β( s, t ) g( s) Q( s) Δ s T , we have<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1533<br />

t<br />

∗<br />

limsup ∫ [ β ( s, T ) g( s)( q( s) − p( s))<br />

t→∞<br />

T<br />

Δ γ + 1<br />

α()(( s g ())) s<br />

+<br />

− ] Δ s =∞.<br />

γ+<br />

1 γ<br />

( γ + 1) g ( s)<br />

(29)<br />

Then every solution of (5) is either oscillatory on [ t , ∞)<br />

0 T<br />

or tends to zero.<br />

proof Suppose that x is an eventually positive solution<br />

of (5), say xt () > 0, x( τ ( t)) > 0, x( δ ( t)) > 0for all t ≥ t for<br />

1<br />

some t ≥ t . We consider only this case, because the<br />

1 0<br />

proof for the case that x is eventually negative is similar.<br />

In the view of (5), by (H2) - (H5), and there exists<br />

t ≥ t such that for all t ≥ t , we have<br />

2 1<br />

2<br />

Δ<br />

( ( z ) γ<br />

γ<br />

α )<br />

Δ<br />

≤−( q( t) − p( t)) x ( δ( t)) < 0 , (30)<br />

γ<br />

then α( z<br />

Δ ) is strictly decreas<strong>in</strong>g on [ t 2<br />

, ∞ ). Hence z (t)<br />

Δ<br />

and z () t are of constant sign eventually. We claim that<br />

x()<br />

t is bounded. If not, there exists { t k<br />

} ⊆ [ t 2<br />

, ∞ ), such<br />

that lim t =∞ ,lim x( t ) =∞,<br />

and<br />

k→∞<br />

k<br />

k→∞<br />

k<br />

x( t ) = max{ x( s): t ≤ s≤<br />

t }.<br />

k<br />

S<strong>in</strong>ce lim τ ( t ) =∞, we can choose a large k such that<br />

k→∞<br />

0<br />

k<br />

τ ( t ) > t , and by (H2), we obta<strong>in</strong> that<br />

k<br />

x( τ( t )) = max{ x( s) : t ≤ s≤τ( t )}<br />

Therefore, for all large k,<br />

k<br />

0<br />

0<br />

≤ max{ x( s) : t ≤ s ≤ t } = x( t ).<br />

z( τ ( t )) ≥ x( t ) −c x( τ ( t )) ≥ (1 − c ) x( t )<br />

k k 0 k<br />

0 k<br />

,<br />

and lim zt ( ) =∞. From (H1) and (30), as <strong>in</strong> the proof of<br />

k→∞<br />

k<br />

Theorem 1 [4], there exists t 3<br />

≥ t 2<br />

such that for all t ≥ t ,<br />

3<br />

we have<br />

In view of (5), (30) and (31), we get<br />

0<br />

k<br />

Δ<br />

zt () > 0, z () t > 0. (31)<br />

Δ<br />

( ( z ) γ<br />

γ<br />

α )<br />

Δ<br />

≤−( q( t) − p( t)) z ( δ( t)) < 0. (32)<br />

Now by us<strong>in</strong>g the same proof of Theorem 1, we get a<br />

contradiction with (29). Thus x (t) is bounded and hence z<br />

(t) is bounded.<br />

Also, by us<strong>in</strong>g (H1) and the same proof of Theorem 1<br />

Δ<br />

<strong>in</strong> [4], there exist t 4 ≥ t 3 such that z () t > 0on [t 4 , ∞).<br />

There are two cases.<br />

Δ<br />

Case 1 zt () > 0 and z () t > 0. As <strong>in</strong> the proof of<br />

Theorem 1, we get a contradiction with (29).<br />

Δ<br />

Case 2 zt () < 0and z ( t) > 0 . We claim lim xt ( ) = 0 .<br />

k<br />

k<br />

k<br />

t→∞<br />

Assume not, then there exists { t } ⊆[ t , ∞)<br />

such that<br />

k 5<br />

lim t =∞,<br />

lim xt ( ) = : b> 0 and x( t ) = max{ x( s):<br />

t ≤ s<br />

k<br />

k<br />

k<br />

0<br />

k→∞<br />

t k<br />

k→∞<br />

≤ }. But, by x( τ ( t )) ≤ x( t ), we get<br />

k<br />

k<br />

0 > zt ( ) ≥ xt ( )(1 −c) →b(1 − c) > 0, as k→∞.<br />

k<br />

k<br />

0 0<br />

Which is a contradiction. This completes the proof.<br />

Corollary 4 Assume that (H1) - (H5) hold, Furthermore,<br />

suppose that for all sufficiently large T ∗ , and for δ ( T ) ><br />

T ∗<br />

,<br />

we have<br />

t<br />

∗<br />

α()<br />

s<br />

limsup ∫ ( sβ<br />

( s, T )( q( s) − p( s)) − ) Δ s =∞.<br />

t→∞<br />

T<br />

γ+<br />

1 γ<br />

( γ + 1) s<br />

Then every solution of (5) is either oscillatory on [ t , ∞)<br />

0 T<br />

or tends to zero.<br />

Corollary 5 Assume that (H1) - (H5) hold, Furthermore,<br />

suppose that for all sufficiently large T ∗ , and for δ ( T ) ><br />

T ∗<br />

,<br />

we have<br />

t<br />

∗<br />

limsup ∫ β (, sT)(() qs − ps ()) Δ s=∞.<br />

t→∞<br />

T<br />

Then every solution of (5) is either oscillatory on [ t , ∞)<br />

0 T<br />

or tends to zero.<br />

We next study a Philos-type oscillation criteria for (5).<br />

Theorem 4 Assume that (H1) - (H5) hold. Let g (t) be<br />

as def<strong>in</strong>ed <strong>in</strong> Theorem 1, and H, h∈C rd<br />

( D, )<br />

such that<br />

H ∈R . Furthermore, suppose that there exists a<br />

positive rd-cont<strong>in</strong>uous function ϕ () t such that (24), (25)<br />

hold, and for all sufficiently largeT ∗ , we have<br />

1 t<br />

∗<br />

limsup ∫ { β ( s, T ) g( s)( q( s) − p( s)) H( t, s)<br />

t→∞<br />

t0<br />

Htt (, )<br />

0<br />

α()( s h (,)) t s<br />

− } Δ s =∞.<br />

γ + 1<br />

−<br />

γ+<br />

1 γ<br />

( γ + 1) g ( s)<br />

(33)<br />

Then every solution of (5) is either oscillatory on [ t , ∞)<br />

0 T<br />

or tends to zero.<br />

Proof Suppose that (5) has a nonoscillatory solution x<br />

(t), without loss of generality, say xt () > 0, x( τ ( t)) > 0,<br />

x( δ ( t)) > 0, for all t ≥ t , for some t<br />

1<br />

1<br />

≥ t 0<br />

. By (H2) - (H5),<br />

we obta<strong>in</strong> that (30) holds for all t ≥ t , and zt () and<br />

1<br />

Δ<br />

z () t are of constant sign eventually. Similar to the proof<br />

of Theorem 3, we claim that x()<br />

t is bounded. If not, there<br />

exists{ t } ⊆[ t , ∞ ), for all large k, there exists t<br />

k 1<br />

2<br />

≥ t 1<br />

, such<br />

that (31) and (32) hold for t ≥ t . Aga<strong>in</strong> we def<strong>in</strong>e wt () as<br />

2<br />

<strong>in</strong> the proof of Theorem 1, then there exists t 3<br />

≥ t 2<br />

,<br />

sufficiently large such that for t<br />

∗<br />

≥ t and for t ≥ t ∗<br />

, we<br />

3<br />

f<strong>in</strong>d<br />

β (, tt) gt ()( qt () − pt ())<br />

3<br />

Δ g () t γ g()<br />

t<br />

≤− w () t + w () t −<br />

( w ()). t<br />

g t t g t<br />

Δ<br />

σ σ λ<br />

σ 1 γ σ λ<br />

() α ()( ())<br />

And similar to the proof of the theorem 3, we obta<strong>in</strong><br />

1 t<br />

∫ [ β ( s, t ) g( s)( q( s) − p( s)) H( t, s)<br />

t<br />

Htt (, )<br />

0 3<br />

0<br />

γ + 1<br />

( h ( t, s)) α( s) −<br />

γ+<br />

1 γ ] s (<br />

∗<br />

ϕ t ) w (<br />

∗<br />

t )<br />

− Δ ≤ +<br />

( γ + 1) g ( s)<br />

(34)<br />

© 2013 ACADEMY PUBLISHER


1534 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

∗<br />

t<br />

ϕ s β s t g s q s p s s<br />

t0 3<br />

∫<br />

() (, ) ()(() − ()) Δ 0on [ t<br />

4<br />

4<br />

, ∞ ) . And then there are<br />

two cases of Theorem 3. As <strong>in</strong> the proof of Theorem 3, if<br />

the case 1 holds, we get a contradiction with (33) ; if the<br />

case 2 holds, we obta<strong>in</strong> lim xt ( ) = 0 . This completes the<br />

t→∞<br />

proof.<br />

In Theorem 4, let g (t) =1 and H ( ts , ) = ( t− s) m<br />

, we<br />

have the follow<strong>in</strong>g result.<br />

Corollary 6 Assume that (H1) - (H5) hold, and m ≥ 1 ,<br />

for all sufficiently largeT ∗ , we have<br />

1 t<br />

m<br />

∗<br />

limsup ( ) ( , )( ( ) ( ))<br />

m ∫ t−s β sT qs − ps Δ s=∞.<br />

t→∞<br />

t0<br />

t<br />

Then every solution of (5) is either oscillatory on [ t , ∞)<br />

0 T<br />

or tends to zero.<br />

IV. EXAMPLES<br />

In this section, we give some examples to illustrate our<br />

ma<strong>in</strong> results. Def<strong>in</strong>e<br />

⎧1 , δ ( t) ≥ t,<br />

ξ () t = ⎨ γ<br />

⎩ρ<br />

(, tt), δ() t ≤ t.<br />

0<br />

∗<br />

∞<br />

1 γ<br />

β (, tT )<br />

Note that ∫ Δ t ( α( t))<br />

=∞, implies lim = 1.<br />

t0<br />

t→∞<br />

ξ () t<br />

Example 1 Consider the nonl<strong>in</strong>ear neutral perturbed<br />

dynamic equation<br />

( t (( x( t) ± x( τ ( t))) ) )<br />

t + 1<br />

Δ<br />

+ F( tx , ( δ( t))) = Gtx ( , ( δ( t)), x),<br />

γ−1 1<br />

Δ γ Δ<br />

(35)<br />

for t ∈[1, ∞)<br />

T<br />

, where γ is the quotient of odd positive<br />

<strong>in</strong>tegers. Let<br />

α<br />

k(1 + δ ( t)) 1<br />

t δ () t ξ()<br />

t t<br />

γ<br />

γ−1 2 γ<br />

() t = t , F(, t u) = ( + + u ) u ,<br />

2 γ<br />

4<br />

γ<br />

γ+<br />

2<br />

1 k(1 + δ ( t))<br />

u<br />

ct () = , Gtuv (, , ) =<br />

,<br />

2 γ<br />

2 2<br />

t+ 1 2 t δ () t ξ()( t u + v + 1)<br />

where k is a positive constant. Then<br />

2<br />

Qt () = k 2 t ξ () t .<br />

t0 t0<br />

1 γ γ 1 γ<br />

S<strong>in</strong>ce ∫ ∞ Δ t ( α( t))<br />

= ∫ ∞ Δ t t<br />

−<br />

=∞, hence the conditions<br />

(H1) - (H5) are clearly satisfied. And,<br />

t<br />

∗<br />

α()<br />

s<br />

limsup ∫ ( sβ<br />

(, sT ) gsQs () () − ) Δs<br />

t→∞<br />

T<br />

γ+<br />

1 γ<br />

( γ + 1) s<br />

k 1<br />

t Δs<br />

= ( − )limsup ,<br />

γ + 1 ∫ =∞<br />

t→∞<br />

T<br />

2 ( γ + 1)<br />

s<br />

t<br />

∗<br />

α()<br />

s<br />

limsup ∫ ( sβ<br />

( sT , ) gs ( )( qs ( ) − ps ( )) − ) Δs<br />

t→∞<br />

T<br />

γ+<br />

1 γ<br />

( γ + 1) s<br />

k 1<br />

t Δs<br />

= ( − )limsup ,<br />

γ + 1 ∫ =∞<br />

t→∞<br />

T<br />

2 ( γ + 1)<br />

s<br />

γ + 1<br />

if k > 2( γ + 1) . Thus it follows from Corollary 1 that<br />

every solution of (35) + is oscillatory on [1, ∞)<br />

T<br />

if k ><br />

γ + 1<br />

2( γ 1) ,<br />

+ and it follows from Corollary 4 that every<br />

solution of (35) − is either oscillatory on [1, ∞)<br />

T<br />

or tends<br />

1<br />

to zero if k > 2( γ 1) γ +<br />

+ .<br />

Example 2 Consider the nonl<strong>in</strong>ear neutral perturbed<br />

dynamic equation<br />

1<br />

t x t − x τ t<br />

2 + s<strong>in</strong> t<br />

Δ<br />

+ F( t, x( δ( t))) = G( t, x( δ( t)), x ).<br />

23 Δ 53 Δ<br />

( (( ( ) ( ( ))) ) )<br />

2<br />

(36)<br />

23 2<br />

for t ∈[2, ∞)<br />

T<br />

, where α() t = t , γ=53, c() t = 1( 2+<br />

s<strong>in</strong> t)<br />

Let<br />

Ftu 1 4 2 5 3<br />

(, ) = ( + ) ,<br />

tξ<br />

() t<br />

t + u u<br />

and<br />

11 3<br />

1 u<br />

Gtuv (, , ) =<br />

.<br />

2 4<br />

2 tξ<br />

( t) ( u + v + 2)<br />

Then qt () − pt () = 12 tξ<br />

() t . The conditions (H1) - (H5)<br />

are clearly satisfied. For all t > s ≥ 2 , let m=2, we have<br />

1 t<br />

2<br />

∗<br />

limsup<br />

2 ∫ ( t− s) β ( sT , )( qs ( ) − ps ( )) Δs<br />

t→∞<br />

2<br />

t<br />

2<br />

1 t ( t−<br />

s)<br />

= limsup<br />

t<br />

2 ∫ Δs<br />

→∞<br />

2<br />

t 2s<br />

1 t s t 1 t−<br />

2<br />

= limsup[ s s ] .<br />

t→∞<br />

2 ∫ Δ +<br />

2 ∫ Δ − =∞<br />

2<br />

t 2 2s t<br />

Thus it follows from Corollary 6 that every solution of<br />

(36) is either oscillatory on [2, ∞)<br />

T<br />

or tends to zero.<br />

IV. CONCLUSIONS<br />

To <strong>in</strong>vestigate the oscillatory and asymptotic behavior<br />

for a certa<strong>in</strong> class of second order nonl<strong>in</strong>ear neutral<br />

perturbed dynamic equations on time scales. This paper<br />

proposed some new sufficient conditions for oscillation<br />

of such dynamic equations on time scales were<br />

established. The results not only improve and extend<br />

some known results <strong>in</strong> the literature, but also unify the<br />

oscillation of second order nonl<strong>in</strong>ear neutral perturbed<br />

differential equations and second order nonl<strong>in</strong>ear neutral<br />

perturbed difference equations. In particular, the results<br />

are essentially new under the relaxed conditions for the<br />

parameter function.<br />

ACKNOWLEDGMENT<br />

if<br />

k<br />

γ + 1<br />

> 2( γ + 1) . Also,<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1535<br />

This work was supported by a grant from the National<br />

Natural Science Foundation of Ch<strong>in</strong>a (11161049) and the<br />

Science Foundation of Zhangjiakou, Ch<strong>in</strong>a (1112027B-1).<br />

REFERENCES<br />

[1] S. Hilger, “Analysis on measure cha<strong>in</strong>s–A unified approach<br />

to cont<strong>in</strong>uous and discrete calculus”, Results Math.,<br />

vol. 18, pp. 18–56, July 1990.<br />

[2] R.P. Agarwal, M. Bohner, D. O’Regan, and A. Peterson,<br />

“Dynamic equations on time scales, a survey”, Comput.<br />

Appl. Math., vol. 141, pp. 1–26, March 2002.<br />

[3] M. Bohner and A. Peterson, Dynamic Equations On Time<br />

Scales: An Introduction with Applications. Birkhauser, CA:<br />

Boston, 2001.<br />

[4] H. Y. Yang, Q., Ge, and X. P. Yu, “Oscillation criteria for<br />

second order nonl<strong>in</strong>ear neutral dynamic equations on time<br />

scales”, Mathematics <strong>in</strong> Practice and Theory, vol. 38, pp.<br />

253–256, September 2008.<br />

[5] D. X. Chen and J. C. Liu, “Oscillation theorems for second<br />

order nonl<strong>in</strong>ear neutral dynamic equations on time scales”,<br />

J. Sys. Sci. & Math. Scis., vol. 9, pp. 1191–1205, September<br />

2010.<br />

[6] P.R. Agarwal, D. O’Regan, and S. H. Saker, “Oscillation<br />

criteria for second-order nonl<strong>in</strong>ear neutral delay dynamic<br />

equations”, Math. Anal. Appl., vol. 300, pp. 203–217,<br />

March 2004.<br />

[7] S. H. Saker, “Oscillation of second-order nonl<strong>in</strong>ear neutral<br />

delay dynamic equations on time scales”, Comput. Appl.<br />

Math., vol. 187, pp. 123–141, May 2006.<br />

[8] Y. Sah<strong>in</strong>er, “Oscillation of second-order neutral delay and<br />

Mixed-type dynamic equations on time scales”, J. Adv.Diff.<br />

Equ., vol. 3, pp. 1–9, May 2006.<br />

[9] M. Bohner, S. H. Saker, “Oscillation Criteria for a<br />

perturbed nonl<strong>in</strong>ear dynamic equations”, Math. Comp.<br />

Modell<strong>in</strong>g, vol. 40, pp. 249–260, August 2004.<br />

[10] J. S. Yang, “Oscillation for a class of second-order<br />

nonl<strong>in</strong>ear dynamic equations on time scales”, J. of Sichuan<br />

University, vol. 48, pp. 278–283, March 2011.<br />

[11] E. Thandapani and V. Piramanantham, “Oscillation criteria<br />

of second order neutral delay dynamic equations with<br />

distributed deviat<strong>in</strong>g arguments”, Electronic J. of Qualitative<br />

Theory of Diff. Equ., vol. 61, pp. 1–15, April 2010.<br />

[12] S. Petr and T. Bevan, “Applications of maximum<br />

pr<strong>in</strong>ciples to dynamic equations on time scales”, J. Diff.<br />

Eqs. & Appl. vol. 16, pp. 373–388, November 2010.<br />

[13] D. Anderson, “Oscillation and nonoscillation criteria for<br />

Two-Dimensional time-scale systems of First-Order<br />

nonl<strong>in</strong>ear dynamic equations. electronic”, J. of Diff. Eqs.<br />

Vol. 24, pp. 1–13, January 2009.<br />

[14] J. S. Yang and B. Fang, “Oscillation criteria of a class of<br />

second-order dynamic equations on time scales”, Appl.<br />

Math. A J. of Ch<strong>in</strong>ese Universities. Vol. 26, pp. 149–157,<br />

June 2011.<br />

[15] J. S. Yang, “Asymptotic behavior of second-order nonl<strong>in</strong>ear<br />

dynamic equations on time scales”, J. Inner Mongolia<br />

University. Vol. 41, pp. 153–156, March 2010.<br />

[16] X. P. Yu, H. Y. Yang and Y. X. Xu, “Oscillation criteria<br />

for second-order neutral nonl<strong>in</strong>ear dynamic equations on<br />

time scales”, Proceed<strong>in</strong>gs of the 5th ICMB, Vol. 1, pp.<br />

353–356, June 2011.<br />

[17] X. P. Yu, H. Y. Yang and J. M. Zhang, “Oscillation criteria<br />

for nonl<strong>in</strong>ear neutral perturbed dynamic equations on time<br />

scales”, Ann. Diff. Eqs., <strong>in</strong> press.<br />

Xiup<strong>in</strong>g Yu was born <strong>in</strong> Yu County, Hebei Prov<strong>in</strong>ce, Ch<strong>in</strong>a<br />

<strong>in</strong> April 1966. She graduated from Hebei Normal University,<br />

Shijiazhuang City, Ch<strong>in</strong>a major<strong>in</strong>g <strong>in</strong> mathematics with a B.S.<br />

degree <strong>in</strong> 1988. And then she earned a Master’s degree <strong>in</strong><br />

applied mathematics from Hebei University, Baod<strong>in</strong>g City,<br />

Ch<strong>in</strong>a <strong>in</strong> 2003.<br />

At present, she teaches <strong>in</strong> Department of Mathematics and<br />

Physics and serves as DIRECTOR of BASIC MATHEMATICS<br />

SECTION <strong>in</strong> Hebei Institute of Architecture and Civil<br />

Eng<strong>in</strong>eer<strong>in</strong>g, Zhangjiakou City, Ch<strong>in</strong>a. In recent years she has<br />

participated <strong>in</strong> quite a few <strong>in</strong>ternational and domestic academic<br />

conferences dur<strong>in</strong>g summer vocations. She was once a major<br />

member of the 5 th International Congress on Mathematical<br />

Biology and the 2 nd International Conference on Information<br />

Comput<strong>in</strong>g and Applications. She has been ma<strong>in</strong>ly engaged <strong>in</strong><br />

functional deferential equation and dynamic system. She has<br />

completed five prov<strong>in</strong>cial-level scientific research projects as<br />

project leader and pr<strong>in</strong>cipal researcher. Her ma<strong>in</strong> achievements<br />

are <strong>in</strong>terval oscillation criteria for high order neutral deferential<br />

equations with cont<strong>in</strong>uous deviat<strong>in</strong>g arguments (Ann. Diff. Eqs.<br />

vol. 22, pp. 411–417, August 2006), and permanence of<br />

population with Holl<strong>in</strong>g II function response <strong>in</strong> air pollution<br />

(Mathematics <strong>in</strong> Practice and Theory, vol. 37, pp. 102–108,<br />

October 2007). Currently, she has a strong <strong>in</strong>terest <strong>in</strong> the<br />

properties and applications of dynamic equations on time scales.<br />

Prof. Yu is a member of the National Functional Differential<br />

Equation Society as well as of the National Biological<br />

Mathematical Society. She also works as a director of Hebei<br />

Applied Statistics Society. Her paper, <strong>in</strong>terval oscillation<br />

criteria for high order neutral deferential equations with<br />

cont<strong>in</strong>uous deviat<strong>in</strong>g arguments, won an excellence award at the<br />

9 th National Functional Differential Equation Conference.<br />

Another paper, permanence of population with Holl<strong>in</strong>g II<br />

function response <strong>in</strong> air pollution got the first prize at the 6 th<br />

Biological Mathematical Conference. The paper, oscillation<br />

criteria for second order neutral nonl<strong>in</strong>ear dynamic equations on<br />

time scales was published <strong>in</strong> Proceed<strong>in</strong>gs of the 5 th ICMB by<br />

World Academic Press.<br />

Hua Du was born <strong>in</strong> Zhangjiakou City, Hebei Prov<strong>in</strong>ce,<br />

Ch<strong>in</strong>a <strong>in</strong> December 1981. She graduated from Hebei Normal<br />

University, Shijiazhuang City, Ch<strong>in</strong>a major<strong>in</strong>g <strong>in</strong> computer<br />

<strong>in</strong>formation technology with a B.S. degree <strong>in</strong> 2006. And then<br />

she earned a Master’s degree <strong>in</strong> computer application from<br />

Capital Normal University, Beij<strong>in</strong>g City, Ch<strong>in</strong>a <strong>in</strong> 2009.<br />

At present, she teaches <strong>in</strong> the Information Science and<br />

Eng<strong>in</strong>eer<strong>in</strong>g College of Hebei North University, Zhangjiakou<br />

City, Ch<strong>in</strong>a. In recent years, she has been ma<strong>in</strong>ly engaged <strong>in</strong><br />

<strong>in</strong>formation management and computer network.<br />

Hongyu Yang was born <strong>in</strong> Kangbao Country, Hebei<br />

Prov<strong>in</strong>ce, Ch<strong>in</strong>a <strong>in</strong> August 1966. He graduated from Hebei<br />

Agricultural University, Baod<strong>in</strong>g City, Ch<strong>in</strong>a major<strong>in</strong>g <strong>in</strong><br />

agricultural machanization with a B.E. degree <strong>in</strong> 1988. And<br />

then he earned a Master’s degree <strong>in</strong> mechanical eng<strong>in</strong>eer<strong>in</strong>g<br />

from Ch<strong>in</strong>ese Agricultural University, Beij<strong>in</strong>g City, Ch<strong>in</strong>a <strong>in</strong><br />

2012.<br />

At present, he teaches <strong>in</strong> Department of Mechanical<br />

Eng<strong>in</strong>eer<strong>in</strong>g and serves as DIRECTOR OF DEPARTMENT OF<br />

MECHANICAL ENGINEERING <strong>in</strong> Zhangjiakou Vocational<br />

Technology Institute, Zhangjiakou, Ch<strong>in</strong>a. In recent years he<br />

has participated <strong>in</strong> quite a few domestic academic conferences<br />

dur<strong>in</strong>g summer vocations. He has been ma<strong>in</strong>ly engaged <strong>in</strong><br />

dynamic system.<br />

© 2013 ACADEMY PUBLISHER


1536 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Improved Quantum Ant Colony Algorithm based<br />

on Bloch Coord<strong>in</strong>ates<br />

Xiaofeng Chen<br />

Software College, Northeastern University, Shenyang, Ch<strong>in</strong>a<br />

Email: neucxf@163.com<br />

X<strong>in</strong>gyou Xia and Ruiyun Yu<br />

Software College, Northeastern University, Shenyang, Ch<strong>in</strong>a<br />

Email: {xiaxy, yury}@mail.neu.edu.cn<br />

Abstract—The Ant Colony Algorithm is an effective method<br />

for solv<strong>in</strong>g comb<strong>in</strong>atorial optimization problems. However,<br />

<strong>in</strong> practical applications, there also exist issues such as slow<br />

convergence speed and easy to fall <strong>in</strong>to local extremum. This<br />

paper proposes an improved Quantum Ant Colony Algorithm<br />

based on Bloch coord<strong>in</strong>ates by comb<strong>in</strong><strong>in</strong>g Quantum<br />

Evolutionary Algorithm with Ant Colony Algorithm. In this<br />

algorithm, the current position <strong>in</strong>formation of ants is represented<br />

by the Bloch spherical coord<strong>in</strong>ates of qubits; position<br />

update, position variation and random behavior of ants are<br />

all achieved with quantum rotation gate. Simulations of<br />

function extremum problem, TSP problem and QoS multicast<br />

rout<strong>in</strong>g problem were conducted, the results <strong>in</strong>dicated<br />

that the algorithm could overcome prematurity, with a faster<br />

convergence speed and higher solution accuracy.<br />

Index Terms—quantum comput<strong>in</strong>g, Ant Colony Algorithm,<br />

Quantum Ant Colony Algorithm<br />

I. INTRODUCTION<br />

Ant Colony Algorithm (ACA) [1] is a heuristic algorithm<br />

for solv<strong>in</strong>g comb<strong>in</strong>atorial optimization or function<br />

optimization problems. It has advantages such as positive<br />

feedback, strong robustness, excellent distributed comput<strong>in</strong>g<br />

mechanism, easy to comb<strong>in</strong>e with other algorithms,<br />

etc., which has been widely used <strong>in</strong> the NP-complete<br />

problem. In recent years, ACA has been applied to the<br />

fields such as knapsack problem [2], Assignment Problem<br />

[3], Job-shop Assignment [4], Sequential Order<strong>in</strong>g<br />

[5], Network Rout<strong>in</strong>g [6], Vehicle Rout<strong>in</strong>g [7], Power<br />

System [8] and Controls Parameter Optimization [9], etc.<br />

and obta<strong>in</strong>ed good effect. Meanwhile, like other swarm<br />

<strong>in</strong>telligence optimization algorithms, ACA also has some<br />

shortcom<strong>in</strong>gs <strong>in</strong> the application process, such as: easy to<br />

fall <strong>in</strong>to local optimization, slow convergence speed, etc.<br />

A quantum ant colony algorithm (QACO), based on<br />

the concept and pr<strong>in</strong>ciples of quantum comput<strong>in</strong>g can<br />

overcome this defect. In [17], a QACO-based edge detection<br />

algorithm was proposed. Quantum bit (qubit) and<br />

quantum rotation gate are <strong>in</strong>troduced <strong>in</strong>to QACO to represent<br />

and update the pheromone respectively. Experiments<br />

and comparisons show that QACO is an efficient<br />

and effective approach <strong>in</strong> image edge detection. In order<br />

to select the optimal parameter, quantum-<strong>in</strong>spired ant<br />

colony optimization is employed to select the parameter<br />

of relevance vector mach<strong>in</strong>e <strong>in</strong> [18]. Quantum-<strong>in</strong>spired<br />

ant colony optimization is well suited to multi-objective<br />

optimization problems with excellent results. By measur<strong>in</strong>g<br />

experimentally the vibration signals of the gear system<br />

at different rotat<strong>in</strong>g speeds for different faults, the<br />

test<strong>in</strong>g signals are obta<strong>in</strong>ed. In [19], a novel parallel ant<br />

colony optimization algorithm based on quantum dynamic<br />

mechanism for travel<strong>in</strong>g salesman problem (PQACO)<br />

was proposed. The use of the improved 3-opt operator<br />

provides this methodology with superior local search<br />

ability. A global optimization method was proposed to<br />

analyze ground state energy of quantum mechanical systems<br />

<strong>in</strong> [20], which It simulates the way that real ants<br />

f<strong>in</strong>d a shortest path from nest to food source and back. To<br />

elim<strong>in</strong>ate system disturbances and noise from the high<br />

levels of data, a novel quantum ant colony optimization<br />

(QACO) algorithm was proposed to select the fault features<br />

[21].<br />

This paper proposed an improved quantum ant colony<br />

algorithm based on the Bloch Spherical Coord<strong>in</strong>ate [11]<br />

(BIQACA), and various solution space transformational<br />

models and fitness functions are planned for different<br />

optimization problems. Algorithm <strong>in</strong> this paper is verified<br />

by function extreme value problem, Travel<strong>in</strong>g Salesman<br />

Problem and QoS multicast rout<strong>in</strong>g problem respectively.<br />

The result of simulation shows that the algorithm not<br />

only expresses high efficiency of quantum comput<strong>in</strong>g,<br />

but also ma<strong>in</strong>ta<strong>in</strong>s the preferable optimiz<strong>in</strong>g and robustness<br />

of colony algorithm.<br />

II. QUANTUM ANT COLONY ALGORITHM (QACA)<br />

Any po<strong>in</strong>t on the Bloch sphere can be identified via θ<br />

and ϕ as: ϕ = [ cosϕ<br />

s<strong>in</strong>θ,s<strong>in</strong>ϕ<br />

s<strong>in</strong>θ,<br />

cosθ<br />

] T . Suppose<br />

there are a total of n ants <strong>in</strong> the ant colony, where each<br />

ant carries a group (m units) of qubits, current position of<br />

ant is represented by Bloch spherical coord<strong>in</strong>ate, correspond<strong>in</strong>g<br />

to approximate solution of optimization problem.<br />

A. Initialize Ant Colony<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1536-1543


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1537<br />

Pi<br />

is set as the location of the ith ant, consider<strong>in</strong>g that<br />

the randomness of cod<strong>in</strong>g for ant colony and constra<strong>in</strong>t<br />

conditions for probability amplitude of the quantum state,<br />

the <strong>in</strong>itialization of BIQACA is expressed as:<br />

j<br />

⎡P<br />

⎤<br />

ix<br />

⎡cosφi1s<strong>in</strong>θi1 cosφi 2s<strong>in</strong>θi2<br />

cosφim s<strong>in</strong>θim<br />

⎤<br />

⎢ j ⎥ ⎢ ⎥<br />

⎢Piy ⎥ =<br />

⎢<br />

s<strong>in</strong>φi1s<strong>in</strong>θi1 s<strong>in</strong>φi 2s<strong>in</strong>θi2<br />

s<strong>in</strong>φim s<strong>in</strong>θim<br />

⎥<br />

(1)<br />

⎢<br />

j<br />

P ⎥ ⎢<br />

iz ⎣ cosθi1 cosθi2<br />

cosθ<br />

⎥<br />

⎣ ⎦<br />

<br />

im ⎦<br />

Where ϕij<br />

= 2πrand<br />

, θ ij = πrand<br />

, rand are random<br />

numbers between (0, 1) ; i ∈ { 1,2,<br />

,<br />

n}<br />

, j ∈ { 1,2,<br />

,<br />

m}<br />

, n<br />

for number of ant; m for number of qubit. 3 coord<strong>in</strong>ates<br />

of qubit are regarded as 3 paratactic genes, and each ant<br />

conta<strong>in</strong>s 3 gene cha<strong>in</strong>s, which are called X-cha<strong>in</strong>, Y-<br />

cha<strong>in</strong> and Z-cha<strong>in</strong> respectively, each gene cha<strong>in</strong> stands<br />

j j j<br />

for an optimal solution P ix , P iy , P iz .<br />

B. Transformation of Solution Space<br />

In the optimization of specific problems <strong>in</strong> BIQACA,<br />

transformation between the unit quantum space and solution<br />

space of optimization problem is needed, mak<strong>in</strong>g<br />

each probability amplitude of qubit on ant correspond to<br />

an optimization variable of solution space. In this paper,<br />

the function extremum problem, TSP problem and QoS<br />

multicast rout<strong>in</strong>g problem are taken as examples to expla<strong>in</strong><br />

the process.<br />

Solution space transformation approach for function<br />

extreme-value problem: propose the doma<strong>in</strong> of def<strong>in</strong>ition<br />

j<br />

of variable X is its solution space [ a j , b j ] , record the jth<br />

qubit <strong>in</strong> P i as [ cos ϕ<br />

] T<br />

ij s<strong>in</strong>θij<br />

,s<strong>in</strong> ϕij<br />

s<strong>in</strong>θij<br />

, cosθij<br />

by us<strong>in</strong>g<br />

l<strong>in</strong>ear transformation, then the correspond<strong>in</strong>g solution<br />

space variable is:<br />

j<br />

⎡X<br />

⎤ 1 cos s<strong>in</strong> 1 cos s<strong>in</strong><br />

ix<br />

⎡ + ϕij θij − ϕij θij<br />

⎤<br />

⎢ j ⎥ 1 ⎢ b<br />

1 s<strong>in</strong> s<strong>in</strong> 1 s<strong>in</strong> s<strong>in</strong><br />

j<br />

X<br />

ϕ<br />

iy<br />

ij<br />

θij ϕij θ ⎥⎡<br />

⎤<br />

⎢ ⎥ = ij<br />

2<br />

⎢<br />

+ −<br />

⎥⎢ a<br />

⎥<br />

⎢<br />

j<br />

j<br />

X<br />

⎥ ⎢ 1+cos θij<br />

1-cosθ<br />

⎥ ⎣ ⎦<br />

⎣ iz ⎦ ⎣<br />

ij ⎦<br />

Solution space transformation approach for TSP problem<br />

and QoS multicast rout<strong>in</strong>g problem: this paper has<br />

designed two-layer transformational model <strong>in</strong> the aspect<br />

of solution space aim<strong>in</strong>g at the specific characteristic of<br />

TSP problem and QoS multicast rout<strong>in</strong>g problem, the<br />

model conta<strong>in</strong>s two transformations--l<strong>in</strong>ear transformation<br />

and lead transformation.<br />

L<strong>in</strong>ear transformation: qubit is transformed from unit<br />

space to lead space. Propose the def<strong>in</strong>itional doma<strong>in</strong> of<br />

j<br />

lead message variable, r , is [0,1] , formula (2) is used to<br />

calculate correspond<strong>in</strong>g lead solution space variable<br />

j j j T<br />

[ τ , τ , τ ] .<br />

ix iy iz<br />

Lead transformation: impact strength of lead message<br />

and <strong>in</strong>spire message to solution could be regulated by<br />

adjust<strong>in</strong>g lead factor and <strong>in</strong>spire factor. Strategy is selected<br />

accord<strong>in</strong>g to lead probability and roulette to carry out<br />

optimal decode. Suppose the current node as i, select<br />

node j as the next visit<strong>in</strong>g node:<br />

(2)<br />

p<br />

k<br />

ij<br />

ω υ<br />

⎧ rij<br />

() t iλij<br />

() t<br />

j∈<br />

allowed<br />

⎪<br />

ω υ<br />

= ⎨ ∑ ris<br />

() t i λis<br />

() t<br />

(3)<br />

⎪⎪<br />

s∈allowedk<br />

⎩0 otherwise<br />

ω υ<br />

where r () t i λ () t is for message of path, r () t stands<br />

ij<br />

ij<br />

for lead message, ω is lead factor; λ () t represents <strong>in</strong>spire<br />

message λ (t)= 1<br />

ij<br />

d ij<br />

ij<br />

, d<br />

ij<br />

means the distance from<br />

node i to node j, υ is <strong>in</strong>spire factor;<br />

allowed = {1, 2, m}<br />

− tabu means the set of available<br />

k<br />

k<br />

node may selected by ant k at the time t; tabu<br />

k<br />

is used to<br />

keep the rout<strong>in</strong>g table which obta<strong>in</strong>ed by transform<strong>in</strong>g ant<br />

k.<br />

C. Def<strong>in</strong>ition of Fitness Function<br />

A variety of fitness function needs to be designed for<br />

different optimal problems, the more fitness it is, the better<br />

solution for <strong>in</strong>dividual.<br />

Fitness function of extreme-value problem: suppose<br />

f ( X i<br />

) as the ith solution, fit( X i<br />

)<br />

ij<br />

is the adaptive value<br />

for the ith solution. m<strong>in</strong> and max denote the m<strong>in</strong>imum<br />

value and maximum value of function, respectively.<br />

⎧ 1<br />

⎪<br />

f( Xi<br />

) ≥ 0<br />

m<strong>in</strong> fit( X ) 1 (<br />

i<br />

)<br />

i<br />

= ⎨ + f X<br />

⎪<br />

⎩1 + abs( f ( X<br />

i)) f ( X<br />

i) < 0<br />

⎧ 1 + f( Xi) f( Xi) ≥ 0<br />

⎪<br />

max fit( X<br />

i<br />

) = ⎨ 1<br />

⎪<br />

1 + f( Xi<br />

) < 0<br />

⎩ abs( f ( X<br />

i<br />

))<br />

TSP fitness function: fitness of <strong>in</strong>dividual<br />

X<br />

i<br />

= { x1, x2, , xm}<br />

of TSP is def<strong>in</strong>ed as the reciprocal of<br />

path length represented by <strong>in</strong>dividual.<br />

fit(<br />

Ti<br />

)<br />

(4)<br />

(5)<br />

1<br />

fit( X<br />

i<br />

) = (6)<br />

DX ( )<br />

Fitness function for multicast rout<strong>in</strong>g problem:<br />

Wc<br />

( Wd<br />

⋅ Φ(<br />

TD − Dmax<br />

) + Wdj<br />

⋅ Φ(<br />

TDJ − DJ max ) + W pl ⋅ Φ(<br />

TPL − PLmax<br />

))<br />

TC<br />

= (7)<br />

where TD, TDJ, TPL and TC represent the delay, delay<br />

jitter, packet loss rate and cost of multicast tree<br />

respectively. Wc=0.5, Wd=0.2, Wdj=0.1 and Wpl=0.2,<br />

represent the proportion of the cost, delay, delay jitter and<br />

packet loss rate <strong>in</strong> the fitness function respectively;<br />

⋅ Φ(X ) is a penalty function, when ⋅X ≤ 0 , ⋅Φ( X ) = 1 , or<br />

else, ⋅Φ( X ) = 0. 5 . It can be seen from the above equation<br />

that, the fitness value is the bigger the better.<br />

D. Ant Position Update<br />

In the solution space of optimal problem, suppose<br />

τ ( X i<br />

) is the strength of pheromone of kth ant at X<br />

i<br />

, <strong>in</strong>itial<br />

moment all set as some constant: η ( X i<br />

) stands for<br />

i<br />

© 2013 ACADEMY PUBLISHER


1538 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

the visibility at X<br />

i<br />

. The basic framework of BIQACA<br />

described as follows:<br />

1) Select<strong>in</strong>g the target position of ant movement<br />

By apply<strong>in</strong>g the pr<strong>in</strong>ciple of randomness, a number of<br />

qubits <strong>in</strong> the current position were randomly selected to<br />

constitute a position update vector S. The transition rule<br />

and transition probability of ant k from position X to<br />

position<br />

where q∈[0, 1] is even-distributed random number, q 0<br />

∈[0, 1] is probability parameter, P is the set of occupied<br />

po<strong>in</strong>ts for ant <strong>in</strong> unit space, X<br />

s<br />

tion as per formula (8) ; α is the update parameter of<br />

pheromone, β is the update parameter of visibility.<br />

2) Realiz<strong>in</strong>g the movement of ant towards target position<br />

via quantum rotation gate<br />

After the ant has selected the target position, its<br />

movement process can be realized by chang<strong>in</strong>g the phase<br />

of qubit it brought for quantum rotation gate. In unit<br />

space, suppose the current position for ant at time t is P<br />

i<br />

,<br />

selected target position is P k , update vector of P i is S,<br />

then the update of phase angle <strong>in</strong>crement at P<br />

i<br />

is<br />

where )}<br />

t+ 1 t+ 1 t t t t+ 1 t t+<br />

1<br />

⎡cosϕij s<strong>in</strong>θ ⎤ ⎡<br />

ij<br />

cosϕij s<strong>in</strong>θ ⎤ ⎡<br />

ij<br />

cos( ϕij +Δ ϕij )s<strong>in</strong>( θij +Δθ<br />

) ⎤<br />

ij<br />

⎢ t+ 1 t+ 1⎥ ⎢ t t ⎥ ⎢ t t+ 1 t t+<br />

1 ⎥<br />

⎢s<strong>in</strong>ϕij s<strong>in</strong>θij ⎥ = U ⎢s<strong>in</strong>ϕij s<strong>in</strong>θij ⎥ = ⎢s<strong>in</strong>( ϕij +Δ ϕij )s<strong>in</strong>( θij +Δθij<br />

) ⎥<br />

⎢<br />

t+ 1 t t t 1<br />

cosθ ⎥ ⎢<br />

ij<br />

cosθ ⎥ ⎢<br />

+<br />

ij<br />

cos( θij θ ) ⎥<br />

⎣ ⎦ ⎣ ⎦ ⎣ +Δ<br />

ij ⎦ (15)<br />

Apparently, U-gate can rotate the phase of qubit by<br />

t 1<br />

ϕ +<br />

t 1<br />

Δ<br />

ij<br />

and Δ θ +<br />

ij<br />

.<br />

3) Adjustment strategy of search space<br />

i<br />

In BIQACA, the search space for each qubit is designed<br />

as [ lowBd ij , upBdij<br />

] , the search space at <strong>in</strong>itializa-<br />

X<br />

s<br />

are:<br />

α<br />

β<br />

⎧arg max{ τ ( X<br />

s) iη<br />

( Xs)} q ≤ q<br />

tion is [ 0.25π<br />

,0.75π<br />

] , dur<strong>in</strong>g optimiz<strong>in</strong>g process of ants,<br />

0<br />

⎪ Xs∈P<br />

X<br />

s<br />

= ⎨ these search spaces are related with the contraction level<br />

⎪ <br />

⎩ Xs<br />

q > q0<br />

(8) of each qubit, and decrease exponentially, which can significantly<br />

improve the solution accuracy of the algorithm.<br />

α<br />

β<br />

τ ( Xs) iη<br />

( Xs)<br />

t+<br />

1<br />

t<br />

pX (<br />

s<br />

) =<br />

α<br />

β<br />

τ ( X<br />

u) η ( X<br />

u)<br />

X<br />

∑ i ,<br />

(9)<br />

⎡lowBd<br />

⎤ ⎡ 1 ⎤⎡ ij<br />

lowBd ⎤<br />

ij<br />

⎢ t+<br />

1 ⎥ = ⎢ t ⎥<br />

ij<br />

⎢ t ⎥ (16)<br />

nL<br />

⎢<br />

s,<br />

Xu∈P<br />

⎣ upBdij<br />

⎥⎦ ⎢⎣nf<br />

⎥⎦⎢⎣upBdij<br />

⎥⎦<br />

where j ∈ { S(1),<br />

S(2),<br />

,<br />

S(<br />

sm)}<br />

, S is the update vector<br />

of ants, nf = 2 is the constriction factor, nL t represents<br />

ij<br />

is the selected target loca-<br />

the contraction level of t-th iteration.<br />

4) Process<strong>in</strong>g of ant position variation<br />

Suppose the current position is P i , update vector of P i<br />

is S, the search space of P i is [ lowBd ij , upBdij<br />

] . Then the<br />

update of phase angle <strong>in</strong>crement at P<br />

i<br />

is:<br />

⎧ Δϕij<br />

= (2rand<br />

−1)(<br />

upBdij<br />

− lowBdij<br />

)<br />

⎨<br />

⎩<br />

Δϕij<br />

= sign(<br />

Δϕij<br />

)( abs(<br />

Δϕij<br />

) + lowBdij<br />

) (17)<br />

⎧ Δθij<br />

= (2rand<br />

−1)(<br />

upBdij<br />

− lowBdij<br />

)<br />

⎨<br />

⎩<br />

Δθij<br />

= sign(<br />

Δθij<br />

)( abs(<br />

Δθij<br />

) + lowBdij<br />

) (18)<br />

( φkj − φij ) × rand<br />

t<br />

⎧⎪<br />

j<br />

φkj ≠φij<br />

Δ φij<br />

= ⎨<br />

(10) 5) Random behavior of ants<br />

⎪⎩ Δ φij φkj = φij<br />

If P i is not improved after cont<strong>in</strong>uous limited-time cycles,<br />

the position should be abandoned, the ants will generate<br />

a new P '<br />

t<br />

t<br />

⎧Δ ϕij<br />

+ 2π Δ ϕij<br />

< −π<br />

t+<br />

1 ⎪<br />

i through random behavior to substtute P i .<br />

t t<br />

Δ ϕij = ⎨ Δ ϕij −π ≤ Δϕij<br />

≤ π (11)<br />

'<br />

⎪ Δ<br />

t<br />

t<br />

⎩ ϕij<br />

− 2π Δ ϕij<br />

> π<br />

ϕij = mean( ϕi<br />

) + Δϕ ij<br />

(19)<br />

'<br />

( θkj − θij ) × rand<br />

t<br />

⎧⎪<br />

j<br />

θkj ≠θ<br />

θij = mean( θi<br />

) + Δθ ij<br />

ij<br />

(20)<br />

Δ θij<br />

= ⎨<br />

(12)<br />

⎪⎩ Δ θij θkj = θij<br />

where i ∈ { 1,2, ,<br />

n}<br />

, j ∈ { S(1),<br />

S(2),<br />

,<br />

S(<br />

sm)}<br />

, S is the<br />

update vector of current position, Δ ϕij<br />

and Δ θij<br />

are updated<br />

us<strong>in</strong>g (17), (18), mean( θ<br />

t<br />

t<br />

⎧Δ θij<br />

+ π Δ θij<br />

< −π<br />

/2<br />

t+<br />

1 ⎪ t t<br />

i ) is the mean value of<br />

Δ θij = ⎨Δ θij −π /2 ≤ Δθij<br />

≤ π /2 (13)<br />

vector of phase angle θ<br />

⎪ Δ<br />

t<br />

t<br />

i at P i .<br />

⎩ θij<br />

− π Δ θij<br />

> π /2<br />

6) Update rules for pheromone <strong>in</strong>tensity and visibility<br />

When the ant completes a traverse, the current position<br />

j ∈ { S(1),<br />

S(2),<br />

,<br />

S(<br />

sm , rand<br />

j<br />

is random num-<br />

is mapped <strong>in</strong>to the solution space of optimal problem<br />

Δ ϕij<br />

, Δ θij<br />

can be obta<strong>in</strong>ed us<strong>in</strong>g from unit space, fitness function is calculated, and the<br />

<strong>in</strong>tensity and visibility of pheromone at current position<br />

should be updated.<br />

⎧τ( X<br />

i) = (1 − ρ) τ( Xi) + ρτ( Xi)<br />

t+ 1 t+ 1 t+ 1 t+ 1 t+ 1 t t+<br />

1<br />

⎨<br />

⎡cos Δϕij cos Δθij −s<strong>in</strong> Δϕij cos Δθij s<strong>in</strong> Δ θij cos( ϕij +Δϕij<br />

) ⎤<br />

⎢ t+ 1 t+ 1 t+ 1 t+ 1 t t+<br />

1 ⎥<br />

⎩ τ ( X<br />

i) = Qfit( X<br />

i)<br />

(21)<br />

U = ⎢s<strong>in</strong> Δϕij cos Δθij cos Δϕij cos Δθij s<strong>in</strong> Δ θs<strong>in</strong>( ϕij +Δϕij<br />

) ⎥<br />

⎢<br />

t+ 1 t t+ 1 t+<br />

1<br />

−s<strong>in</strong> Δθij −tan( ϕij / 2)s<strong>in</strong> Δθij cos Δθ<br />

⎥<br />

⎣ ij ⎦ (14)<br />

ber between [0, 1];<br />

(17), (18).<br />

Update of probability amplitude of qubit based on<br />

quantum rotation gate<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1539<br />

η ( X ) = fit( X )<br />

(22)<br />

i<br />

where (1 −ρ) ∈ [0,1] is the evaporation coefficient of<br />

pheromone, Q is the enhancement coefficient of pheromone.<br />

E. Description of BIQACA<br />

Tak<strong>in</strong>g the function extremum problem as an example,<br />

BIQACA implementation steps are described as follows:<br />

Step 1: Setup relevant parameters such as the number<br />

of ants, maximum number of iterations, number of limits<br />

limit, contraction level<br />

nL<br />

ij<br />

i<br />

, constriction factor nf, Maximum<br />

contraction level MaxL, reset contraction level<br />

resetL, search space [ lowBd ij , upBdij<br />

] , etc.<br />

Step 2: Randomly generate <strong>in</strong>itial position of ants accord<strong>in</strong>g<br />

to (1), transform the solution space accord<strong>in</strong>g to<br />

(2), and calculate the fitness of each ant accord<strong>in</strong>g to (5)<br />

or (6). Update the pheromone <strong>in</strong>tensity and visibility accord<strong>in</strong>g<br />

to (21) and (22).Record the current optimum solution,<br />

i.e. global optimum solution GBest. Initialize the<br />

conceptual vector trial ( i)<br />

= 0 , record the number of nonupdates<br />

at the position of ant.<br />

Step 3: Update the search space [ lowBd ij , upBdij<br />

] accord<strong>in</strong>g<br />

to (16).<br />

Step 4: Select a mov<strong>in</strong>g target for each ant <strong>in</strong> the ant<br />

colony accord<strong>in</strong>g to (8) and (9), then realize the movement<br />

of ants us<strong>in</strong>g quantum rotation gate <strong>in</strong> light of (10),<br />

(12) and (14).<br />

Step 5: For each ant, accord<strong>in</strong>g to mutation probability,<br />

realize the variation of ant’s position us<strong>in</strong>g quantum rotation<br />

gate <strong>in</strong> light of (17) and (18).<br />

Step 6: Transform the solution space accord<strong>in</strong>g to (2),<br />

calculate the fitness of each ant accord<strong>in</strong>g to (5) or (6).<br />

Update the current position if the new position is better<br />

than the current one; otherwise trial ( i)<br />

= trial(<br />

i)<br />

+ 1 , update<br />

contraction level nL ( i,<br />

j)<br />

= nL(<br />

i,<br />

j)<br />

+ 1 , if<br />

nL ( i,<br />

j)<br />

>MaxL, nL ( i,<br />

j)<br />

=resetL.<br />

Step 7: Determ<strong>in</strong>e whether trial (i)<br />

is greater than the<br />

limit, if trial (i)<br />

>limit, abandon the current position of<br />

the i-th ant, and generate a new position accord<strong>in</strong>g to (19),<br />

(20) and (15), perform space transformation <strong>in</strong> light of<br />

(2), calculate the fitness of each ant accord<strong>in</strong>g to (5) or<br />

(6), trial ( i)<br />

= 0 .<br />

Step 8: Update the pheromone <strong>in</strong>tensity and visibility<br />

accord<strong>in</strong>g to (21) and (22). Record the current local optimum<br />

position, Best, and local worst position, Worst.<br />

Step 9: Determ<strong>in</strong>e whether the local optimum position,<br />

Best is greater than the global optimum position, GBest,<br />

if Best>GBest, update the global optimal position, GBest<br />

with local optimum position, Best, otherwise, update the<br />

local worst position, Worst with global optimum position,<br />

GBest.<br />

Step 10: Update the number of iterations t=t+1. If the<br />

current number of iterations t>maxgen or accuracy of<br />

convergence is met, stop the search, output the global<br />

optimum position, or else, turn to Step 3.<br />

III. SIMULATION EXPERIMENT<br />

To verify the effectiveness and feasibility of BIQACA<br />

algorithm, function extremum problem, travel<strong>in</strong>g salesman<br />

problem and multicast rout<strong>in</strong>g problem were selected<br />

for test<strong>in</strong>g. The simulation programs were programed<br />

and implemented <strong>in</strong> MATLAB 2009a, test results were<br />

obta<strong>in</strong>ed <strong>in</strong> a PC with an Intel Core (TM) i5 CPU runn<strong>in</strong>g<br />

at 3.2GHz, and a 2.8GB RAM.<br />

A. Function Extremum Problem<br />

Three <strong>in</strong>ternationally commonly used functions f1~f3<br />

were selected to test BIQACA performance when the<br />

number of <strong>in</strong>dependent variables was 2 and 30 respectively<br />

2 2<br />

f ( x,<br />

y)<br />

= 0.3cos3π x − 0.3cos 4πy<br />

− x − y − 0.3, −1<br />

≤ x,<br />

y 1 (23)<br />

1 ≤<br />

n<br />

f ( x ) = ∑ ( −x<br />

s<strong>in</strong>( x )), − 500 ≤ x 500 (24)<br />

2 i<br />

i<br />

i<br />

i<br />

≤<br />

i=<br />

1<br />

n<br />

∑<br />

2<br />

f3( xi<br />

) = ( xi<br />

−10cos(2π xi<br />

) + 10), −5.12<br />

≤ xi<br />

≤ 5. 12 (25)<br />

i=<br />

1<br />

1) When the number of <strong>in</strong>dependent variables is 2<br />

Test function is f1, the optimization objective is to obta<strong>in</strong><br />

the maximum value.<br />

Algorithm parameters: maximum number of iterations<br />

maxgen=500, number of ants n=20, probability parameter<br />

q<br />

0<br />

=0.5, evaporation coefficient 1−<br />

ρ =0.05, pheromone<br />

update parameter α =1, visibility update parameter β =5,<br />

pheromone enhancement coefficient Q =10, mutation<br />

probability P<br />

m<br />

=0.05; the program was term<strong>in</strong>ated when<br />

the BIQACA algorithm found the optimal solution or had<br />

run for gen=500 iterations. Simulations were conducted<br />

us<strong>in</strong>g the CQACO algorithm and ACO algorithm <strong>in</strong> Ref.<br />

[12] respectively, each algorithm was run for 50 times<br />

<strong>in</strong>dependently under the same conditions, and their optimal<br />

value (Best), optimal mean value (M-best), number<br />

of success and average number of iterations were recorded,<br />

optimization results were compared <strong>in</strong> Table 1.<br />

TABLE I.<br />

COMPARISON OF EXPERIMENTAL RESULTS OF 3 ALGORITHMS WITH TEST<br />

FUNCTION F 1<br />

Func/opt<br />

f 1/<br />

0.24<br />

Status<br />

Algorithm<br />

ACO CQACO BIQACA<br />

Best 0.2400 0.2400 0.2400<br />

M-best 0.1720 0.2388 0.2400<br />

Con-times 42 48 50<br />

Ave-Steps 198.16 84.04 17.06<br />

It can be seen from Table 1 that, BIQACA algorithm’s<br />

optimization efficiency is the highest, its optimization<br />

results is also the greatest, with the success rate of 100%;<br />

followed is CQACO, with a success rate of 96%; the last<br />

is ACO, with a success rate of 84%.<br />

2) When the number of <strong>in</strong>dependent variables is 30<br />

Test functions were f2, f3, optimization goal is to obta<strong>in</strong><br />

the m<strong>in</strong>imum value.<br />

© 2013 ACADEMY PUBLISHER


1540 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

TABLE II.<br />

COMPARISON OF EXPERIMENTAL RESULTS OF 3 ALGORITHMS WITH TEST<br />

FUNCTION F2 AND F3<br />

B. Travel<strong>in</strong>g Salesman Problem<br />

Take symmetric-distance TSP as example, five problems<br />

with different data scale was selected from TSPLIB<br />

database as cases to verify the performance of the algorithm.<br />

Compare the result with Common Genetic Algorithm<br />

(CGA), Common Particle Swarm Optimization<br />

(CPSO) and Common Ant Colony Algorithm (CACA)<br />

respectively.<br />

Algorithm parameters: each algorithm prescribes a<br />

limit to algebra of 100 and population of 50. <strong>in</strong> CGA algorithm,<br />

<strong>in</strong>teger encod<strong>in</strong>g is adopted; <strong>in</strong> CPSO algorithm,<br />

<strong>in</strong>teger encod<strong>in</strong>g is also adopted, <strong>in</strong>ertia factor W =0.5,<br />

self-factor C<br />

1<br />

=0.3, global factor C<br />

2<br />

=0.7; <strong>in</strong> CABC algorithm,<br />

<strong>in</strong>teger encod<strong>in</strong>g adopted as well, other parameters<br />

with the function extreme value problem; In BIQACA<br />

algorithm, transfer factor parameter ω = 1, stimulat<strong>in</strong>g<br />

factor parameter υ = 5, other parameters with the function<br />

extreme value problem.<br />

Then <strong>in</strong> every case, 20 experimental data would be<br />

taken, and table 3 shows contrast of optimization results.<br />

Figure 1 is the Oliver30 Optimization Results and Figure<br />

2 is the EIL51 Optimization Results. Figure 3 shows the<br />

best solution of Oliver30 quantum ant colony algorithm,<br />

the total distance for 424. Figure 4 shows the best solution<br />

of EIL51 quantum ant colony algorithm, the total<br />

distance is 458.<br />

Func/<br />

Opt<br />

f 2/<br />

-12569.5<br />

f 3/<br />

0<br />

Status<br />

Algorithm<br />

OGA/Q LEA BQACA<br />

M-nfun 302116 287365 236613<br />

M-best -12569.454 -12569.454 -12569.487<br />

St.dev 6.447×10 -4 6.831×10 -4 6.5856×10 -6<br />

M-nfun 224710 223803 223230<br />

M-best 0 2.103×10 -18 0<br />

St.dev 0 3.0359×10 -18 0<br />

Algorithm parameters: maximum number of iterations<br />

maxgen=1500, number of ants n=100, other parameters<br />

were the same as test 3.1.1. Simulations were conducted<br />

us<strong>in</strong>g the BIQACA algorithm, as well as the OGA/Q algorithm<br />

<strong>in</strong> Ref. [13] and LEA algorithm <strong>in</strong> Ref. [14] respectively,<br />

each algorithm was run <strong>in</strong>dependently for 50<br />

times under the same conditions, and their average number<br />

of function evaluations (M-nfun), optimal mean value<br />

(M-best) and standard deviation (St. dev) were recorded,<br />

optimization results were compared <strong>in</strong> Table 2.<br />

It can be seen from Table 2 that, the BIQACA algorithm<br />

is obviously superior to the OGA/Q algorithm and<br />

LEA algorithm with respect to optimal mean value, average<br />

number of function evaluations and standard deviation<br />

of function f2, f3; for f3, the BIQACA algorithm and<br />

the OGA/Q algorithm could both f<strong>in</strong>d the optimal solutions.<br />

For function f2, the three algorithms all failed to f<strong>in</strong>d<br />

the optimal solutions, but the solution f<strong>in</strong>d<strong>in</strong>g quality of<br />

BIQACA algorithm is significantly better than that of the<br />

LEA algorithm and OGA/Q algorithm, the standard deviation<br />

obta<strong>in</strong>ed by the BIQACA algorithm is also less than<br />

that of the LEA algorithm and OGA/Q algorithm.<br />

Figure 1. The Oliver30 Optimization Results<br />

Figure 2. The EIL51 Optimization Results<br />

Figure 3. The Oliver30’s Best Solution by us<strong>in</strong>g BIQACA<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1541<br />

Figure 4.<br />

the EIL51’s Best Solution by us<strong>in</strong>g BIQACA<br />

Statistics analysis of data based on table 3: from time<br />

perspective, the average time of CPSO algorithm is<br />

shortest, secondly CGA algorithm, BIQACA algorithm<br />

followed, and CACA algorithm is the last one; from steps<br />

perspective, BIQACA algorithm and CACA algorithm<br />

are at the same level and the convergence rate of them is<br />

more preferable than the other two algorithms; from the<br />

perspective of calculation result, the optimal solution of<br />

BIQACA algorithm and CACA algorithm can reach an<br />

ideal resolution recommended by TSPLIB database when<br />

urban scale is small.<br />

When the urban scale is large, the BIQACA’s optimal<br />

solution can approach to that of CACA algorithm, and its<br />

average solution and standard deviation is better than that<br />

of CPSO algorithm and CGA algorithm. To sum up,<br />

BIQACA algorithm <strong>in</strong> this paper is feasible and effective.<br />

TABLE III.<br />

TSP CALCULATION RESULTS<br />

Test library<br />

Uleysses22<br />

Oliver30<br />

EIL51<br />

EIL76<br />

GR96<br />

algorithm<br />

Optimal Worst solution<br />

value deviation deviation time step<br />

Mean Standard Mean-square Mean Average<br />

solution<br />

CGA 76.9162 93.5551 85.0164 4.3255 18.7098 1.4645 100.0000<br />

CPSO 78.9062 125.7221 105.8074 9.7533 95.1269 0.2646 88.8000<br />

CACA 75.9832 77.3018 76.3748 0.3878 0.1504 1.9651 60.0000<br />

BIQACA 75.9832 76.6314 76.2579 0.2226 0.0496 1.6571 62.0000<br />

CGA 482.6800 639.5484 570.9215 37.2503 1387.5816 2.0194 100.0000<br />

CPSO 729.5129 990.8997 850.9355 84.6154 7159.7655 0.3277 84.7500<br />

CACA 423.7406 429.7853 426.7401 1.4871 2.2115 3.1717 54.1000<br />

BIQACA 423.7406 438.6092 428.8924 3.8389 14.7375 2.2512 50.0500<br />

CGA 558.7636 812.5886 694.0846 60.0962 3611.5476 3.4789 100.0000<br />

CPSO 1055.4600 1252.3856 1146.5343 60.0677 3608.1277 0.4929 93.4500<br />

CACA 440.7957 457.3709 450.5731 4.8484 23.5068 10.0465 60.8000<br />

BIQACA 458.3380 507.1071 492.5977 11.4446 130.9781 5.9311 55.4500<br />

CGA 949.3124 1200.5125 1082.3078 77.0343 5934.2825 5.3974 100.0000<br />

CPSO 1698.2136 2090.3629 1885.3653 106.6634 11377.0827 0.6863 94.6500<br />

CACA 566.8443 576.1675 572.0972 2.8604 8.1822 18.5971 50.4500<br />

BIQACA 628.7805 670.0715 653.8038 11.0728 122.6080 11.8519 59.4000<br />

CGA 1082.0048 1467.8411 1232.7158 98.6122 9724.3659 7.1479 100.0000<br />

CPSO 2274.0041 2885.1164 2567.0244 160.3023 25696.8139 0.8681 90.8500<br />

CACA 544.8082 558.9636 552.8529 4.3274 18.7262 37.43502 63.7500<br />

BIQACA 594.9407 648.2708 626.9822 11.5389 133.1465 22.903469 54.1000<br />

C. QoS Multicast Rout<strong>in</strong>g Problem<br />

In order to compare with the GA algorithm <strong>in</strong> Ref. [15]<br />

and QCMR-ACS <strong>in</strong> Ref. [16], the network architecture<br />

model the same with them was adopted <strong>in</strong> the experiment,<br />

as shown <strong>in</strong> Figure 5.<br />

Figure 5.<br />

8-node network model<br />

In this typical 8-node network model, network can be<br />

represented us<strong>in</strong>g picture G (V, E), where V (D, DJ, PL,<br />

C) represents network node set, E (D, DJ, B, C) represents<br />

l<strong>in</strong>k set, and D, DJ, PL, C and B represent delay<br />

(ms), delay jitter (ms), packet loss rate, cost and bandwidth<br />

(Mb/s) respectively.<br />

The core idea of multicast rout<strong>in</strong>g algorithm is: <strong>in</strong> each<br />

iteration, firstly, qubits pass l<strong>in</strong>ear transformation and<br />

state transition transformation, and complete the conversion<br />

of quantum <strong>in</strong>formation <strong>in</strong> the rout<strong>in</strong>g path; secondly,<br />

use the rout<strong>in</strong>g paths to generate the multicast tree of the<br />

iteration; thirdly, compute the delay, delay jitter, packet<br />

loss rate, bandwidth, and cost of the multicast tree; f<strong>in</strong>ally,<br />

calculate the fitness of the multicast tree.<br />

Multicast tree generation: the orig<strong>in</strong>al multicast tree is<br />

generated us<strong>in</strong>g the vector <strong>in</strong>formation of multiple rout<strong>in</strong>g<br />

paths, and through the conversion from vector to matrix,<br />

the orig<strong>in</strong>al multicast tree was pruned and processed<br />

to obta<strong>in</strong> the multicast tree.<br />

Algorithm parameters: source node s=1, dest<strong>in</strong>ation<br />

node M=[2, 4, 5, 7], maximum number of iterations<br />

maxgen=16, number of ants n=8, mutation probability<br />

P = 0.1.<br />

m<br />

© 2013 ACADEMY PUBLISHER


1542 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Table 4 shows the optimization results of BIQACA algorithm<br />

when D 46 , DJ 8 , B 70 and<br />

max =<br />

max =<br />

m<strong>in</strong> =<br />

PL max = 0.001 were constra<strong>in</strong>ed; Figure 6 shows the cost<br />

convergence curves of multicast tree for three algorithms<br />

(GA, QCMR-ACS, BIQACA)<br />

Route<br />

request<br />

s=1<br />

M=[2, 4,<br />

5, 7]<br />

Figure 6.<br />

TABLE IV.<br />

BIQACA ALGORITHM OPTIMIZATION RESULTS<br />

Optimal<br />

multicast tree<br />

(1, 2), (1, 3),<br />

(3, 4), (3, 5)<br />

(4, 6), (6, 7)<br />

Delay<br />

Delay<br />

jitter<br />

Packet<br />

loss rate<br />

Cost<br />

45 7 0.0001 66<br />

Cost convergence curves of multicast tree for three algorithms<br />

Table 5 shows the optimization results of BIQACA algorithm<br />

when D 50 , DJ 6 , B 70 and<br />

max =<br />

max =<br />

m<strong>in</strong> =<br />

PL max = 0.001 were constra<strong>in</strong>ed; Figure 7 shows the cost<br />

convergence curves of multicast tree for three algorithms<br />

(GA, QCMR-ACS, BIQACA)<br />

Route<br />

request<br />

s=1<br />

M=[2, 4,<br />

5, 7]<br />

Figure 7.<br />

TABLE V.<br />

BIQACA ALGORITHM OPTIMIZATION RESULTS<br />

Optimal<br />

Delay Packet<br />

Delay<br />

multicast tree<br />

jitter loss rate<br />

Cost<br />

(1, 2), (1, 3),<br />

(2, 4), (3, 5)<br />

49 5 0.0002 62<br />

(4, 6), (6, 7)<br />

Cost convergence curves of multicast tree for three algorithms<br />

It can be seen from Figure 6 and Figure 7 that, under<br />

the conditions of the two multicast rout<strong>in</strong>g constra<strong>in</strong>ts,<br />

the three algorithms can all converge to the global optimal<br />

solution, for GA algorithm <strong>in</strong> Ref. [15], evolution<br />

generations dur<strong>in</strong>g convergence were 12 and 14, respectively,<br />

QCMR-ACS algorithm <strong>in</strong> Ref. [16] requires 6 and<br />

9 generations respectively, while the BIQACA algorithm<br />

here<strong>in</strong> requires only 2 generations, its convergence speed<br />

is much faster than that of the GA and QCMR-ACS<br />

based QoS multicast rout<strong>in</strong>g algorithms, thus the feasibility<br />

and effectiveness of the BIQACA algorithm are verified.<br />

IV. CONCLUSION<br />

In this paper, by comb<strong>in</strong><strong>in</strong>g quantum computation and<br />

ant colony algorithm, an improved quantum ant colony<br />

algorithm based on Bloch coord<strong>in</strong>ates is presented, enrich<strong>in</strong>g<br />

the research field of quantum <strong>in</strong>telligence algorithm.<br />

From the perspective of quantum computation, this<br />

algorithm proposes the adjustment strategy of search<br />

space <strong>in</strong> accordance with the exponential decrease method.<br />

A number of qubits at current position of ants are<br />

selected us<strong>in</strong>g the pr<strong>in</strong>ciple of randomness to constitute<br />

the update vector, the position update, position variation<br />

and random behavior of ants are all subject to the constra<strong>in</strong>t<br />

of update vector, thus improv<strong>in</strong>g the convergence<br />

speed of the algorithm. At the same time, the random<br />

behavior of ants <strong>in</strong>troduced can obviously overcome the<br />

prematurity of the algorithm. Different solution space<br />

transformation models and fitness functions are designed<br />

for different optimization problems, where the overall<br />

idea of the algorithm rema<strong>in</strong>s the same, the algorithm has<br />

strong versatility. Research results show that the new<br />

algorithm has certa<strong>in</strong> practical value which can improve<br />

the efficiency and accuracy. Compared with conventional<br />

<strong>in</strong>telligence algorithms, BIQACA has stronger search<br />

capability and higher efficiency, and is appropriate for<br />

complex function optimization and comb<strong>in</strong>atorial optimization<br />

problems. At the same time, as a novel optimization<br />

algorithm, BIQACA is lack of necessary theoretical<br />

proof, experimental verification alone is not comprehensive<br />

enough; further study is needed <strong>in</strong> the future.<br />

REFERENCES<br />

[1] Dorigo M, Maniezzo V, Colorni A.The Ant System: Optimization<br />

by a Colony of Cooperat<strong>in</strong>g A gents.IEEE<br />

Trans.on SMC, vol. 26, no. 1, pp. 28-41, 1996.<br />

[2] Zhi Jun Hu, Rong Li, Ant Colony Optimization Algorithm<br />

for the 0-1 Knapsack Problem Based on Genetic Operators,<br />

Advanced Materials Research, pp. 230-232, 2011<br />

[3] Ch. Piao, X.Han, Y. Wu. Improved ant colony algorithm<br />

for solv<strong>in</strong>g assignment problem, Proceed<strong>in</strong>gs of International<br />

Conference on Computer Application and System<br />

Model<strong>in</strong>g, 2010<br />

[4] L. X<strong>in</strong>g, Y. Chen, A Knowledge-Based Ant Colony Optimization<br />

for Flexible Job Shop Schedul<strong>in</strong>g Problems, Applied<br />

Soft Comput<strong>in</strong>g, vol. 10, no. 3, pp. 888-896, 2010.<br />

[5] L. M. Gambardella1, R. Montemanni, An Enhanced Ant<br />

Colony System for the Sequential Order<strong>in</strong>g Problem, Proceed<strong>in</strong>gs<br />

of the 41st Annual Conference Italian Operational<br />

Research Society, 2010<br />

[6] Hsioa Y. T, Computer network load-balanc<strong>in</strong>g and rout<strong>in</strong>g<br />

by ant colony optimization. Proceed<strong>in</strong>gs of the 12th IEEE<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1543<br />

International Conference on Networks, vol. 1, pp. 313-318,<br />

2004<br />

[7] Q. H. Gu, S. G. J<strong>in</strong>g, Study on Vehicle Rout<strong>in</strong>g and<br />

Schedul<strong>in</strong>g Problems <strong>in</strong> Underground M<strong>in</strong>e Based on<br />

Adaptively ACA, Applied Mechanics and Materials, vol.<br />

157, pp. 1293-1296, 2012<br />

[8] Gomez J. F, Khodr H. M, De Oliveira P M, et al. Ant colony<br />

system algorithm for the plann<strong>in</strong>g of primary distribution<br />

circuits. IEEE Trnas on Power Systems, vol. 19, no. 2,<br />

pp. 996-1004, 2004.<br />

[9] Yu Zhen Yu et al, Regulation of PID Controller Parameters<br />

Based on Ant Colony Optimization Algorithm <strong>in</strong><br />

Bend<strong>in</strong>g Control System, Applied Mechanics and Materials,<br />

pp. 128-129, 205, 2011.<br />

[10] Ajit Narayanan, Mark Moore, Quantum-<strong>in</strong>spired genetic<br />

algorithms, Proceed<strong>in</strong>g of IEEE International Conference<br />

on Evolutionary Computation 1996, 61-66<br />

[11] FENG An-hui, SU Hong-sheng. Improved Quantum Genetic<br />

Algorithm and Its Application. Computer Eng<strong>in</strong>eer<strong>in</strong>g,<br />

vol. 37, no. 5, pp. 199-201, 2011.<br />

[12] Panchi Li. Quantum Ant Colony Optimization with Application.<br />

Proceed<strong>in</strong>g of Sixth International Conference on<br />

Natural Computation (ICNC), vol. 37, no. 6, pp. 2989 –<br />

2993, 2010.<br />

[13] Leung YW, Wang YP. An orthogonal genetic algorithm<br />

with quantization for global numerical optimization. IEEE<br />

Trans. on Evolutionary Computation, vol. 5, no. 1, pp. 41-<br />

53, 2001.<br />

[14] Wang YP, Dang CY. An evolutionary algorithm for global<br />

optimization based on level-set evolution and Lat<strong>in</strong> squares.<br />

IEEE Trans. on Evolutionary Computation, vol. 11, no. 5,<br />

pp. 579-595, 2007.<br />

[15] Wang Z. y<strong>in</strong>g, Shi B. x<strong>in</strong>. Solv<strong>in</strong>g QoS Multicast Rout<strong>in</strong>g<br />

Problem Based on Heuristic Genetic Algorithm, Ch<strong>in</strong>ese J<br />

Computers, vol. 24, no. 1, pp. 55-61, 2001.<br />

[16] YANG Yun, XU Jia, GAO Fei, et al. Multiple QoS Constra<strong>in</strong>ed<br />

Multicast Rout<strong>in</strong>g Algorithm based on ACS.<br />

MINI- MICRO SYST EMS, vol. 27, no. 11, pp. 2030-2035,<br />

2006<br />

[17] Jian Zhang, Jiliu Zhou, Kun He, Huanzhou Li, “Image<br />

edge detection us<strong>in</strong>g quantum ant colony optimization”,<br />

International Journal of Digital Content Technology and its<br />

Applications, vol. 6, no. 11, pp. 187-195, June 2012.<br />

[18] Jiyun Bai, Shiyong Li, “Gear fault diagnosis based on relevance<br />

vector mach<strong>in</strong>e with quantum-<strong>in</strong>spired ant colony<br />

optimization”, Journal of Information and Computational<br />

Science, vol. 7, no. 14, pp. 3169-3175, December 2010.<br />

[19] Xiao-m<strong>in</strong>g You, Sheng Liu, Yu-M<strong>in</strong>g Wang, “Quantum<br />

dynamic mechanism-based parallel ant colony optimization<br />

algorithm”, International Journal of Computational Intelligence<br />

Systems, vol. 3, no. s1, pp. 101-113, December<br />

2010.<br />

[20] Xia Chen, Chen Tang, “Improved ant colony optimization<br />

algorithms for ground state energy of quantum mechanical<br />

systems”, Ch<strong>in</strong>ese Journal of Computational Physics, vol.<br />

27, no. 4, pp. 624-632, July 2010.<br />

[21] L<strong>in</strong>g Wang, Qun Niu, M<strong>in</strong>rei Fei, “A novel quantum ant<br />

colony optimization algorithm and its application to fault<br />

diagnosis”, Transactions of the Institute of Measurement<br />

and Control, vol. 30, no. 3-4, pp. 313-329, August 2008.<br />

© 2013 ACADEMY PUBLISHER


1544 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Image Fusion Method Based on Directional<br />

Contrast-Inspired Unit-L<strong>in</strong>k<strong>in</strong>g Pulse Coupled<br />

Neural Networks <strong>in</strong> Contourlet Doma<strong>in</strong><br />

Xi Cai<br />

Northeastern University at Q<strong>in</strong>huangdao, Q<strong>in</strong>huangdao, Ch<strong>in</strong>a<br />

Email: cicy_2001@163.com<br />

Guang Han<br />

College of Information Science and Eng<strong>in</strong>eer<strong>in</strong>g, Northeastern University, Shenyang, Ch<strong>in</strong>a<br />

Email: a00152738@sohu.com<br />

J<strong>in</strong>kuan Wang*<br />

Northeastern University at Q<strong>in</strong>huangdao, Q<strong>in</strong>huangdao, Ch<strong>in</strong>a<br />

Email: wjk@mail.neuq.edu.cn<br />

Abstract—To take full advantage of global features of source<br />

images, we propose an image fusion method based on<br />

adaptive unit-l<strong>in</strong>k<strong>in</strong>g pulse coupled neural networks<br />

(ULPCNNs) <strong>in</strong> the contourlet doma<strong>in</strong>. Consider<strong>in</strong>g that<br />

each high-frequency subband after the contourlet<br />

decomposition has rich directional <strong>in</strong>formation, we employ<br />

directional contrast of each coefficient as the external<br />

stimulus to <strong>in</strong>spire each neuron. L<strong>in</strong>k<strong>in</strong>g range is also<br />

related to the contrast <strong>in</strong> order to adaptively improve the<br />

global coupl<strong>in</strong>g characteristics of ULPCNNs. In this way,<br />

biological activity of human visual systems to detailed<br />

<strong>in</strong>formation of images can be simulated by the output pulses<br />

of the ULPCNNs. The first fir<strong>in</strong>g time of each neuron is<br />

utilized to determ<strong>in</strong>e the fusion rule for correspond<strong>in</strong>g<br />

detailed coefficients. Experimental results <strong>in</strong>dicate the<br />

superiority of our proposed algorithm, for multifocus<br />

images, remote sens<strong>in</strong>g images, and <strong>in</strong>frared and visible<br />

images, <strong>in</strong> terms of visual effects and objective evaluations.<br />

Index Terms—Image fusion, contourlet transform, unitl<strong>in</strong>k<strong>in</strong>g<br />

pulse coupled neural network<br />

I. INTRODUCTION<br />

Ow<strong>in</strong>g to widespread use of multisensor systems,<br />

much research has been <strong>in</strong>vested to develop the<br />

technology of image fusion. Ord<strong>in</strong>arily, 2-D image fusion<br />

is to merge complementary <strong>in</strong>formation from multiple<br />

images of the same scene, and obta<strong>in</strong> one s<strong>in</strong>gle image of<br />

better quality [1]-[4]. This promotes its <strong>in</strong>creas<strong>in</strong>gly<br />

extensive application <strong>in</strong> digital camera imag<strong>in</strong>g,<br />

battlefield surveillance and remote sens<strong>in</strong>g. As a major<br />

class of image fusion methods, the ones based on<br />

multiscale decomposition (MSD) take <strong>in</strong>to account the<br />

sensitivity of human visual system (HVS) to detailed<br />

* Correspond<strong>in</strong>g author.<br />

<strong>in</strong>formation, and hence receive better fusion results than<br />

other methods [5][6]. To improve the performance, MSD<br />

transforms and fusion rules have become the ma<strong>in</strong> focus<br />

<strong>in</strong> the fusion methods based on MSD [7]-[9].<br />

Typically, MSD transforms <strong>in</strong>clude: pyramid<br />

transform, wavelet transform, curvelet transform, etc.<br />

With further development of MSD theory, a superior twodimensional<br />

representation, contourlet transform was<br />

exploited to overcome limitations of traditional MSD<br />

transforms [10]. Its characteristics of multidirection and<br />

anisotropy make it sensitive to directions and sparse<br />

while represent<strong>in</strong>g objects with edges. Especially,<br />

contourlet transform allows for different and flexible<br />

number of directions at each scale, and hence can capture<br />

detailed <strong>in</strong>formation <strong>in</strong> any arbitrary direction. These<br />

advantages make the contourlet transform quite attractive<br />

to image fusion [11]-[14]. In most contourlet-based<br />

fusion methods, researchers adopt fusion rules to choose<br />

more salient high-frequency <strong>in</strong>formation, for example,<br />

[12] and [13] respectively chose the coefficient with the<br />

maximum region energy and the maximum edge<br />

<strong>in</strong>formation.<br />

However, the traditional fusion rules could not make<br />

good use of global features of images, for they were most<br />

based on features of a s<strong>in</strong>gle pixel or local regions. In our<br />

study, we present a bio-<strong>in</strong>spired salience measure based<br />

on unit-l<strong>in</strong>k<strong>in</strong>g pulse coupled neural networks<br />

(ULPCNNs), and capture the global features of source<br />

images by us<strong>in</strong>g the global coupl<strong>in</strong>g properties of the<br />

ULPCNNs. PCNN orig<strong>in</strong>ated from the experimental<br />

observations of synchronous pulse bursts <strong>in</strong> cat visual<br />

cortex [15], and is capable to simulate biological activity<br />

of HVS; ULPCNN is a simplified version of the basic<br />

PCNN with fewer parameters [16]. When motivated by<br />

external stimuli from images, ULPCNNs can generate<br />

series of b<strong>in</strong>ary pulses conta<strong>in</strong><strong>in</strong>g much <strong>in</strong>formation of<br />

features such as edges, textures, etc.<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1544-1551


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1545<br />

In this paper, we propose an image fusion method<br />

based on directional contrast-stimulated ULPCNNs with<br />

adaptive l<strong>in</strong>k<strong>in</strong>g range <strong>in</strong> the contourlet doma<strong>in</strong> (CT-<br />

ULPCNN). ULPCNN neurons are <strong>in</strong>spired by directional<br />

contrast reveal<strong>in</strong>g the prom<strong>in</strong>ence of each directional<br />

subband, and such a ULPCNN is expected to possess<br />

good sensitivity to directional <strong>in</strong>formation of objects <strong>in</strong><br />

images. The l<strong>in</strong>k<strong>in</strong>g range is also determ<strong>in</strong>ed by<br />

correspond<strong>in</strong>g directional contrast. In this way, the global<br />

coupl<strong>in</strong>g character of the ULPCNN is better represented<br />

than that with constant l<strong>in</strong>k<strong>in</strong>g range, especially for the<br />

strong stimulus. In our fusion rules, the first fir<strong>in</strong>g time of<br />

each neuron is chosen as the salience measure.<br />

Experimental results suggested that CT-ULPCNN has<br />

better fusion results for multifocus images, remote<br />

sens<strong>in</strong>g images, and <strong>in</strong>frared and visible images, which<br />

actually proves the advantages of the proposed method<br />

captur<strong>in</strong>g the prom<strong>in</strong>ent directional features of each<br />

subband <strong>in</strong> the contourlet doma<strong>in</strong>.<br />

The outl<strong>in</strong>e of the rest of the paper is as follows.<br />

Contourlet transform is briefly <strong>in</strong>troduced <strong>in</strong> Section II.<br />

In Section Ⅲ, we describe the theories of basic PCNN<br />

and ULPCNN, respectively. Detailed procedure of CT-<br />

ULPCNN algorithm is proposed <strong>in</strong> Section Ⅳ, and its<br />

effectiveness is certified and analyzed <strong>in</strong> Section Ⅴ .<br />

F<strong>in</strong>ally, conclusion is drawn <strong>in</strong> Section Ⅵ.<br />

II. CONTOURLET TRANSFORM<br />

Contourlet transform is a multi-scale and multidirectional<br />

transform. It was <strong>in</strong>itially developed <strong>in</strong><br />

discrete doma<strong>in</strong>, and hence easy for digital<br />

implementation. Contourlet transform comb<strong>in</strong>es<br />

Laplacian Pyramid (LP) and Directional Filter Bank<br />

(DFB) <strong>in</strong>to a double filter bank structure, so it is also<br />

called Pyramidal Direction Filter Bank (<strong>PDF</strong>B). In<br />

essence, LP is first executed to capture the po<strong>in</strong>t<br />

discont<strong>in</strong>uities, and then followed by DFB to l<strong>in</strong>k po<strong>in</strong>t<br />

discont<strong>in</strong>uities <strong>in</strong>to l<strong>in</strong>ear structures. Fig. 1 shows the<br />

contourlet decomposition <strong>in</strong> the frequency doma<strong>in</strong>, where<br />

shaded parts denote the support regions of correspond<strong>in</strong>g<br />

filters. Dur<strong>in</strong>g the contourlet decomposition, an image is<br />

first decomposed by LP <strong>in</strong>to a low-frequency subband<br />

and mutiple high-frequency subbands, and then each<br />

high-frequency subband is fed <strong>in</strong>to DFB to generate<br />

multiple directional subbands.<br />

In the contourlet transform, the number of directional<br />

n<br />

subbands <strong>in</strong> each scale is usually 2 ( n∈ N)<br />

and quite<br />

flexible when n is set differently. Therefore, the<br />

contourlet transform is able to provide detailed<br />

<strong>in</strong>formation <strong>in</strong> any arbitrary direction, which is its major<br />

advantage over the other MSD transforms. Meanwhile,<br />

after the contourlet decomposition, majority of the<br />

contourlet coefficients of an image are close to zero,<br />

concentrat<strong>in</strong>g the most <strong>in</strong>formation and energy, which<br />

<strong>in</strong>dicates the sparsity of the contourlet transform.<br />

Ⅲ. PCNN AND ULPCNN<br />

A. Basic PCNN<br />

PCNN is a feedback network <strong>in</strong> a s<strong>in</strong>gle layer with<br />

neurons laterally <strong>in</strong>terconnected, which can imitate the<br />

biological characteristics of HVS. Basically, each neuron<br />

consists of a receptive field, a modulation product and a<br />

pulse generator. For the neuron located at ( i, j ) <strong>in</strong> a<br />

PCNN, the receptive field <strong>in</strong>volves a l<strong>in</strong>k<strong>in</strong>g <strong>in</strong>put L ij<br />

and a feed<strong>in</strong>g <strong>in</strong>put F ; The modulation product<br />

ij<br />

comb<strong>in</strong>es F with the biased L to form a total <strong>in</strong>ternal<br />

ij<br />

ij<br />

activity<br />

U ; The generator Y<br />

ij<br />

ij<br />

will produce a pulse (i.e.<br />

fir<strong>in</strong>g) if U ij<br />

exceeds the dynamic threshold θ ij<br />

. When<br />

<strong>in</strong>spired by external stimulus S ij<br />

and <strong>in</strong>fluenced by<br />

signals from neighbor<strong>in</strong>g neurons { Y kl<br />

}<br />

mathematical equations for F ij<br />

,<br />

L ,<br />

ij<br />

, the discrete<br />

U , Y and θ can<br />

ij ij<br />

ij<br />

be described as follows.<br />

−α<br />

F ( n) = e F ( n− 1) + V M Y ( n 1) S<br />

F<br />

ij ij F ∑ − + , (1)<br />

ijkl kl ij<br />

kl<br />

−αL<br />

L ( n) = e L ( n− 1) + V W Y ( n 1)<br />

ij ij L∑ − , (2)<br />

ijkl kl<br />

kl<br />

U ( n) = F ( n) ⋅ (1 +β L ( n))<br />

, (3)<br />

Y ( n)<br />

ij<br />

ij ij ij<br />

1, U ( n) >θ ( n−1),<br />

ij<br />

ij<br />

0 , otherwise ,<br />

= ⎧ ⎨ ⎩<br />

(4)<br />

θ ( n) = e −α θ<br />

θ ( n− 1) + VY ( n)<br />

. (5)<br />

ij ij θ ij<br />

Figure 1. Frame of contourlet decomposition <strong>in</strong> the frequency doma<strong>in</strong>.<br />

Fig. 2 illustrates the basic model for a s<strong>in</strong>gle neuron<br />

located at ( i, j ) <strong>in</strong> a PCNN. Output pulses of neurons <strong>in</strong><br />

the k× l neighborhood centered at ( i, j ) enter <strong>in</strong>to the<br />

neuron at ( i, j ) and then <strong>in</strong>fluence its next output, where<br />

k× l is called l<strong>in</strong>k<strong>in</strong>g range. L ij<br />

receives pulses from<br />

surround<strong>in</strong>g neurons ((2)), and F ij<br />

receives not only the<br />

neighbor<strong>in</strong>g signals but also the external stimulus S ij<br />

© 2013 ACADEMY PUBLISHER


1546 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 2. Basic model for a s<strong>in</strong>gle PCNN neuron.<br />

((1)). U is obta<strong>in</strong>ed by multiply<strong>in</strong>g F with the biased<br />

ij<br />

ij<br />

L ((3)). If U is above the neuromime threshold θ , Y<br />

ij<br />

ij<br />

ij ij<br />

will generate a pulse ((4)), and simultaneously θ ij<br />

will<br />

<strong>in</strong>crease enormously ((5)) to block another pulse <strong>in</strong> the<br />

next iteration. Without an output pulse, θ ij<br />

would decay<br />

exponentially ((5)), until it drops below the <strong>in</strong>ternal<br />

activity and at that time a pulse will be outputted aga<strong>in</strong>.<br />

In this way, these processes run over and over aga<strong>in</strong>. In<br />

(1)-(5), n denotes the iteration times; α F<br />

, α , α and<br />

L θ<br />

V , V , V θ<br />

are attenuation time constants and <strong>in</strong>herent<br />

F<br />

L<br />

voltage potential of F ij<br />

, L and θ , respectively;<br />

ij<br />

ij<br />

W signify synaptic weight strength for F<br />

ijkl<br />

ij<br />

and<br />

M and<br />

ijkl<br />

L ;<br />

ij<br />

β <strong>in</strong>dicates l<strong>in</strong>k<strong>in</strong>g strength determ<strong>in</strong><strong>in</strong>g contribution of<br />

the l<strong>in</strong>k<strong>in</strong>g <strong>in</strong>put to the <strong>in</strong>ternal activity.<br />

B. ULPCNN<br />

PCNN is qualified to imitate the biological features of<br />

HSV and hence apply to image process<strong>in</strong>g [17]-[19];<br />

however, so many parameters <strong>in</strong> the model should be set<br />

dur<strong>in</strong>g use. So far, the relation between model parameters<br />

and network outputs is still ambiguous, and it is really<br />

difficult to determ<strong>in</strong>e the proper PCNN parameters.<br />

Therefore, ULPCNN is presented to simplify the PCNN<br />

by means of decreas<strong>in</strong>g parameters and mak<strong>in</strong>g the<br />

l<strong>in</strong>k<strong>in</strong>g <strong>in</strong>puts of ULPCNN neurons uniform [16]. Fig. 3<br />

displays the simplified model for a s<strong>in</strong>gle ULPCNN<br />

neuron. The processes of a s<strong>in</strong>gle ULPCNN neuron are<br />

displayed as<br />

F ( n)<br />

= S , (6)<br />

ij<br />

∑<br />

1, Y ( n− 1) > 0,<br />

⎧⎪<br />

kl<br />

L ( n)<br />

=<br />

kl<br />

ij ⎨<br />

⎪⎩ 0 , otherwise ,<br />

ij<br />

(7)<br />

U ( n) = F ( n) ⋅ (1 +β L ( n))<br />

, (8)<br />

ij ij ij<br />

Figure 3. Simplified model for a s<strong>in</strong>gle ULPCNN neuron.<br />

Y ( n)<br />

ij<br />

1, U ( n) >θ ( n−1),<br />

ij<br />

ij<br />

= ⎧ ⎨ (9)<br />

⎩<br />

0 , otherwise ,<br />

θ ( n) = e −α θ<br />

θ ( n− 1) + VY ( n)<br />

. (10)<br />

ij ij θ ij<br />

Accord<strong>in</strong>g to (7), if any neuron <strong>in</strong> the k×<br />

l<br />

neighborhood fires, L ij<br />

will have a unity <strong>in</strong>put, and then<br />

the centered neuron will be encouraged to fire. Obviously,<br />

impulse expand<strong>in</strong>g behavior is much clearer and more<br />

controllable with much fewer parameters than the basic<br />

PCNN.<br />

IV. THE PROPOSED IMAGE FUSION METHOD<br />

Consider<strong>in</strong>g that HVS is very sensitive to detailed<br />

<strong>in</strong>formation, researchers commonly employ fusion rules<br />

to choose more significant <strong>in</strong>formation <strong>in</strong> high-frequency<br />

subbands. In our study, we provide a new image fusion<br />

method based on directional contrast-<strong>in</strong>spired ULPCNN<br />

<strong>in</strong> the contourlet doma<strong>in</strong>. Directional features are fed <strong>in</strong>to<br />

ULPCNN to imitate the biological activity of HSV, and<br />

then transmitted <strong>in</strong> the form of pulses. The l<strong>in</strong>k<strong>in</strong>g range<br />

for each neuron is adaptive to correspond<strong>in</strong>g directional<br />

contrast. The first fir<strong>in</strong>g time of each neuron is used to<br />

determ<strong>in</strong>e the decision <strong>in</strong> fusion rules. Because of the<br />

global coupl<strong>in</strong>g characters of the ULPCNNs, global<br />

features of images can be made good use of dur<strong>in</strong>g fusion<br />

<strong>in</strong> our proposed method.<br />

Fig. 4 shows the flowsheet of our proposed method.<br />

Detailed procedure of the CT-ULPCNN method is given<br />

as follows.<br />

• Source images A and B are decomposed by the<br />

A A<br />

contourlet transform to coefficients { a , d } and<br />

,<br />

B<br />

{ a , d }, respectively. Denote the coefficients of<br />

R<br />

B<br />

r,<br />

p<br />

F F<br />

the fused image F by { a , d }. Here, R is the<br />

R r,<br />

p<br />

decomposition level, a X (X=A,B,F) denotes the<br />

R<br />

coefficients <strong>in</strong> the low-frequency subband of<br />

X<br />

image X, and d (X=A,B,F) denotes the<br />

r,<br />

p<br />

R<br />

r p<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1547<br />

Figure 4. Flowsheet of our proposed method.<br />

coefficients <strong>in</strong> the pth directional subband at the<br />

rth (1 ≤ r ≤ R)<br />

scale of image X.<br />

• In each directional subband, directional contrast at<br />

location (, ) i j can be calculated as<br />

Ctr (, i j) = d (, i j) a ( u, v)<br />

. (11)<br />

X X X<br />

r, p r,<br />

p r<br />

X<br />

where a <strong>in</strong>dicates the low-frequency subband at<br />

r<br />

the rth scale of image X, and the coarse<br />

coefficient at location ( uv , ) corresponds to the<br />

X<br />

X<br />

same region as d ,<br />

(, i j ) does. Then Ctr (, i j )<br />

,<br />

r p<br />

is imported as the external stimulus S ij<br />

<strong>in</strong>to the<br />

ULPCNN neuron located at ( i, j ). Its l<strong>in</strong>k<strong>in</strong>g<br />

range is fixed accord<strong>in</strong>g to<br />

k<br />

ij<br />

or l<br />

ij<br />

r p<br />

5,<br />

X<br />

X<br />

Ctr ( i, j) ≥ max( Ctr ) 2 ,<br />

r, p<br />

r,<br />

p<br />

3, otherwise.<br />

= ⎧ ⎨<br />

⎩<br />

(12)<br />

The ULPCNN operates iteratively as (6)-(10),<br />

until all neurons are fired at least once. The first<br />

fir<strong>in</strong>g time of the neuron at location (, i j)<br />

<strong>in</strong> the<br />

pth directional subband at the rth scale of image X<br />

X<br />

should be recorded as T (, i j ) (X=A,B).<br />

,<br />

F F<br />

•<br />

R r,<br />

p<br />

{ a , d } are obta<strong>in</strong>ed by the follow<strong>in</strong>g rules.<br />

For the low-frequency,<br />

r p<br />

( )<br />

F A B<br />

a (, i j) = a (, i j) + a (, i j) 2 , (13)<br />

R R R<br />

For the high-frequency,<br />

d<br />

F<br />

r,<br />

p<br />

(, i j)<br />

A A B<br />

d (, i j), T (, i j) < T (, i j),<br />

⎧ r, p r, p r,<br />

p<br />

= ⎨ (14)<br />

B<br />

⎩<br />

d<br />

r,<br />

p<br />

( i, j), otherwise.<br />

• The fused image F is f<strong>in</strong>ally achieved via<br />

F F<br />

contourlet reconstruction from { a , d }.<br />

R r,<br />

p<br />

V. EXPERIMENTAL RESULTS<br />

To certify the effectiveness of our proposed method,<br />

we have performed the CT-ULPCNN method on many<br />

pairs of images. Consider<strong>in</strong>g limitation of space, we take<br />

three pairs of images (shown <strong>in</strong> Fig. 5) as examples to<br />

provide the experimental results. Fig. 5(a) is a pair of<br />

multifocus images focus<strong>in</strong>g on different objects of the<br />

same scene, Fig. 5(b) displays a pair of remote sens<strong>in</strong>g<br />

images taken from different wavebands, and Fig. 5(c) is<br />

a pair of <strong>in</strong>frared and visible images.<br />

In this section, follow<strong>in</strong>g two sets of tests are designed<br />

to prove the validity of our proposed method. In Test 1,<br />

we highlight the advantage of the adaptive ULPCNNs<br />

model <strong>in</strong> our proposed method by compar<strong>in</strong>g its behavior<br />

to three exist<strong>in</strong>g contourlet-based image fusion<br />

algorithms, <strong>in</strong>clud<strong>in</strong>g CT-Miao [12], CT-Zheng [13], and<br />

CT-Yang [14]. Test 2 demonstrates the prom<strong>in</strong>ence of<br />

the CT-ULPCNN method by its comparison with some<br />

typical MSD-based image fusion methods, namely, the<br />

gradient pyramid-based method (Gradient) [20], the<br />

conventional discrete wavelet transform-based method<br />

(DWT) [21], the curvelet transform-based method<br />

(Curvelet) [22], and the nonsubsampled contourlet<br />

transform-based method (NSCT) [23].<br />

In our experiments, images were all decomposed <strong>in</strong>to<br />

four levels <strong>in</strong> use of the above MSD-based fusion<br />

methods. Especially, for the contourlet-based image<br />

fusion methods, the decomposed four scales were<br />

divided <strong>in</strong>to 4, 4, 8, and 16 directional subbands from<br />

coarse to f<strong>in</strong>e scales, respectively. Furthermore, <strong>in</strong> our<br />

proposed method, parameters were set as α = 0.5 ,<br />

θ<br />

V θ<br />

= 20 and β = 3 .<br />

A. Test 1<br />

Fig. 6-Fig. 8, respectively, provide the fusion results<br />

of pepsi, remote and camp us<strong>in</strong>g the CT-ULPCNN, CT-<br />

Miao, CT-Zheng, and CT-Yang methods. To show more<br />

clearly, we select a section of each result to enlarge.<br />

As can be seen from Fig. 6, for multifocus images, the<br />

CT-Miao, CT-Zheng, and CT-Yang methods all have the<br />

problem of r<strong>in</strong>g artifacts <strong>in</strong> their fusion results, and the<br />

partial result of the CT-Zheng has the severest ghost<br />

image even with a post-process<strong>in</strong>g of consistency<br />

verification (CV) to <strong>in</strong>tentionally reduce the r<strong>in</strong>g<strong>in</strong>g<br />

artifacts; whereas our proposed method possesses a result<br />

with the fewest r<strong>in</strong>g<strong>in</strong>g artifacts, highest contrast and<br />

f<strong>in</strong>est details without the CV.<br />

As seen from Fig. 7, the CT-ULPCNN method still<br />

has the best performance with the smoothest surface <strong>in</strong><br />

the flat regions. However, the result of the CT-Yang<br />

© 2013 ACADEMY PUBLISHER


1548 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

(a) (b) (c)<br />

Figure 5. Three pairs of test images: (a) pepsi, (b) remote and (c) camp.<br />

(a) (b) (c) (d)<br />

(e) (f) (g) (h)<br />

Figure 6. Fusion results of pepsi: (a) our method, (b) CT-Miao, (c) CT-Zheng, (d) CT-Yang,<br />

and (e)-(h) are partial enlargements of (a)-(d), respectively.<br />

method is visually unsatisfactory. This is because the<br />

fusion rule of the CT-Yang method for the lowfrequency<br />

subband is to choose the low-frequency<br />

coefficient with the maximum region variance, and such<br />

a rule makes the fused approximated image unsmooth<br />

when apply<strong>in</strong>g to source images with dist<strong>in</strong>ct basic<br />

illum<strong>in</strong>ations, such as remote sens<strong>in</strong>g images <strong>in</strong> different<br />

wavebands.<br />

Likewise, for the pair of <strong>in</strong>frared and visible images,<br />

the CT-Yang method generates the worst fusion result;<br />

whereas the hot target (i.e. the man) is the most<br />

dist<strong>in</strong>guishable <strong>in</strong> the result of our proposed method (Fig.<br />

8(a)).<br />

Obviously, the CT-ULPCNN achieves superior visual<br />

quality over the other three contourlet-based fusion<br />

methods.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1549<br />

(a) (b) (c) (d)<br />

(e) (f) (g) (h)<br />

Figure 7. Fusion results of remote: (a) our method, (b) CT-Miao, (c) CT-Zheng, (d) CT-Yang,<br />

and (e)-(h) are partial enlargements of (a)-(d), respectively.<br />

(a) (b) (c) (d)<br />

(e) (f) (g) (h)<br />

Figure 8. Fusion results of camp: (a) our method, (b) CT-Miao, (c) CT-Zheng, (d) CT-Yang,<br />

and (e)-(h) are partial enlargements of (a)-(d), respectively.<br />

To evaluate the fusion effects more objectively, we<br />

<strong>in</strong>troduce average gradient (AG), spatial frequency (SF),<br />

mutual <strong>in</strong>formation (MI), Q AB/F [24] and a universal<br />

image quality <strong>in</strong>dex (UIQI) [25] as fusion <strong>in</strong>dices.<br />

Generally, the larger the above five objective <strong>in</strong>dices, the<br />

better the fusion result is.<br />

Table Ⅰ-Ⅲ show the <strong>in</strong>dices for fusion results of the<br />

three pairs of images <strong>in</strong> Fig. 5, respectively. Accord<strong>in</strong>g<br />

to these tables, the results of our method always have the<br />

largest values <strong>in</strong> the average gradient, spatial frequency,<br />

mutual <strong>in</strong>formation, Q AB/F and the universal image<br />

quality <strong>in</strong>dex, no matter for the pair of multifocus images,<br />

or the pair of remote sens<strong>in</strong>g images, or the pair of<br />

<strong>in</strong>frared and visible images. This clearly proves the<br />

superiority of our proposed method on the objective<br />

evaluations.<br />

B. Test 2<br />

We also make a comprehensive comparison of our<br />

proposed method with other four classical MSD-based<br />

fusion methods, <strong>in</strong>clud<strong>in</strong>g the Gradient [20], DWT [21],<br />

Curvelet [22] and NSCT [23].<br />

Because of the limitations of space, we only exhibit<br />

the fusion results of pepsi <strong>in</strong> Fig. 9. Apparently, the<br />

result of the Gradient method has the lowest contrast,<br />

and the Curvelet and the NSCT methods also generate<br />

© 2013 ACADEMY PUBLISHER


1550 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

(a) (b) (c) (d) (e)<br />

(f) (g) (h) (i) (j)<br />

Figure 9. Fusion results of pepsi: (a) our method, (b) Gradient, (c) DWT, (d) Curvelet, (e) NSCT<br />

and (f)-(j) are partial enlargements of (a)-(e), respectively.<br />

results with relatively lower contrast, and the results of<br />

the NSCT and especially the DWT methods have heavy<br />

r<strong>in</strong>g<strong>in</strong>g artifacts; whereas our proposed method produces<br />

a result with the highest contrast and the fewest r<strong>in</strong>g<strong>in</strong>g<br />

artifacts. Visually, the advantage of our proposed method<br />

is prom<strong>in</strong>ent.<br />

Table Ⅳ shows the fusion <strong>in</strong>dices of results by us<strong>in</strong>g<br />

the above five image fusion methods for pepsi. The<br />

result of our proposed method has the largest mutual<br />

<strong>in</strong>formation, Q AB/F , and the universal image quality <strong>in</strong>dex,<br />

except that, it has lower average gradient and spatial<br />

frequency than those of the DWT and the NSCT methods.<br />

This is because that, for pepsi, severe r<strong>in</strong>g<strong>in</strong>g artifacts <strong>in</strong><br />

the results of the DWT (Fig. 9(h)) and the NSCT (Fig.<br />

9(j)) may cause larger values <strong>in</strong> the average gradient and<br />

the spatial frequency.<br />

Experimental results demonstrate that, the superiority<br />

of the proposed method, <strong>in</strong> the field of visual quality and<br />

objective evaluations, is prom<strong>in</strong>ent. This ma<strong>in</strong>ly benefits<br />

from the global coupl<strong>in</strong>g characteristics of the<br />

ULPCNNs model. By us<strong>in</strong>g the features extracted from<br />

the output pulses of the ULPCNNs, the biological<br />

activity of the HVS to detailed <strong>in</strong>formation of images can<br />

be reflected very well.<br />

VI. CONCLUSION<br />

In this paper, we provide a new image fusion<br />

algorithm based on the ULPCNNs <strong>in</strong> the contourlet<br />

doma<strong>in</strong>. Directional contrast is fed <strong>in</strong>to the ULPCNNs to<br />

imitate the biological activity of HVS to directional<br />

<strong>in</strong>formation. L<strong>in</strong>k<strong>in</strong>g range is also determ<strong>in</strong>ed by the<br />

contrast, flexibly mak<strong>in</strong>g good use of global features of<br />

images. Experimental results illum<strong>in</strong>ate that, the CT-<br />

ULPCNN method outperforms the other methods <strong>in</strong> both<br />

the visual and the objective fields.<br />

ACKNOWLEDGMENT<br />

This work was supported by the Fundamental<br />

Research Funds for the Central Universities<br />

(N110323004) and the Natural Science Foundation of<br />

Hebei Prov<strong>in</strong>ce under Grant No.F2012501001.<br />

Method<br />

TABLE I.<br />

FUSION INDICES FOR PEPSI<br />

Metrics<br />

AG SF MI Q AB/F UIQI<br />

CT-ULPCNN 5.6722 13.986 6.7704 0.74015 0.89467<br />

CT-Miao 5.5759 13.923 6.4653 0.73644 0.85769<br />

CT-Zheng 5.4912 13.833 6.2256 0.71153 0.84454<br />

CT-Yang 5.5684 13.933 6.4987 0.73185 0.85492<br />

Method<br />

TABLE II.<br />

FUSION INDICES FOR REMOTE<br />

Metrics<br />

AG SF MI Q AB/F UIQI<br />

CT-ULPCNN 7.0993 15.362 1.6673 0.56055 0.69729<br />

CT-Miao 6.6244 14.646 1.4599 0.53364 0.64608<br />

CT-Zheng 6.6965 14.526 1.4182 0.49636 0.63166<br />

CT-Yang 7.0883 15.037 1.1027 0.46923 0.50629<br />

Method<br />

TABLE III.<br />

FUSION INDICES FOR CAMP<br />

Metrics<br />

AG SF MI Q AB/F UIQI<br />

CT-ULPCNN 7.2227 13.506 1.5600 0.46466 0.63175<br />

CT-Miao 6.8137 12.747 1.3814 0.4067 0.56411<br />

CT-Zheng 6.7682 12.529 1.3594 0.38244 0.55494<br />

CT-Yang 7.0183 13.064 1.5026 0.38959 0.51602<br />

TABLE IV.<br />

FUSION INDICES FOR PEPSI<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1551<br />

Method<br />

Metrics<br />

AG SF MI Q AB/F UIQI<br />

CT-ULPCNN 5.6722 13.986 6.7704 0.74015 0.89467<br />

Gradient 4.7795 11.987 6.135 0.73947 0.88898<br />

DWT 5.8093 14.173 6.3616 0.72958 0.86539<br />

Curvelet 5.6215 13.977 6.5344 0.73633 0.88186<br />

NSCT 7.7004 18.99 6.7607 0.68791 0.78435<br />

REFERENCES<br />

[1] Y. F. Li, X. Y. Feng, and Y. Fan, “Investigation of Shift<br />

Dependency Effects on Multiresolution-Based Image<br />

Fusion Performance,” Journal of Software., vol. 6, no. 3,<br />

pp. 475–482, March 2011.<br />

[2] X. B. J<strong>in</strong>, J. Bao, and J. J. Du, “Image Enhancement Based<br />

on Selective - Ret<strong>in</strong>ex Fusion Algorithm,” Journal of<br />

Software, vol. 7, no. 6, pp. 1187–1194, June 2012.<br />

[3] M. Xu, H. Chen, and P. K. Varshney, “An image fusion<br />

approach based on Markov random fields,” IEEE Trans.<br />

Geosci. Remote Sens., vol. 49, pp. 5116–5127, December<br />

2011.<br />

[4] W. Yao and M. Han, “Improved GIHSA for image fusion<br />

based on parameter optimization,” Int. J. Remote Sens.,<br />

vol. 31, pp. 2717–2728, 2010.<br />

[5] Z. Zhang and R. S. Blum, “A categorization of multiscaledecomposition-based<br />

image fusion schems with a<br />

performance study for a digital camera application,” Proc.<br />

IEEE, vol. 87, pp. 1315–1326, August 1999.<br />

[6] S. Li, B. Yang, and J. Hu, “Performance comparison of<br />

different multi-resolution transforms for image fusion,” Inf.<br />

Fusion, vol. 12, pp. 74–84, April 2011.<br />

[7] X. Cai and G. Han, “Improved Statistical Image Fusion<br />

Method Us<strong>in</strong>g a Cont<strong>in</strong>uous-Valued Blur Factor,” Opt.<br />

Eng., vol. 51, pp. 047004-1–047004-10, 2012.<br />

[8] M. Chandana, S. Amutha, and N. Kumar, “A Hybrid<br />

Multi-focus Medical Image Fusion Based on Wavelet<br />

Transform,” Int. J. Res. Rev. Comput. Sci., vol. 2, pp. 948–<br />

953, August 2011.<br />

[9] B. Zhang, “Study on image fusion based on different<br />

fusion rules of wavelet transform,” <strong>in</strong> 3rd Int. Conf. Adv.<br />

Comput. Theory Eng.,Proc., 2010, pp. 649–653.<br />

[10] M. N. Do and M. Vetterli, “The Contourlet Transform: An<br />

Efficient Directional Multiresolution Image<br />

Representation,” IEEE Trans. Image Process., vol. 14, pp.<br />

2091–2106, December 2005.<br />

[11] X. Cai and W. Zhao, “Discussion upon Effects of<br />

Contourlet Lowpass Filter on Contourlet-Based Image<br />

Fusion Algorithms,” Acta Autom. S<strong>in</strong>., vol. 35, pp. 258–<br />

266, March 2009.<br />

[12] Q. G. Miao and B. S. Wang, “A Novel Image Fusion<br />

Method Us<strong>in</strong>g Contourlet Transform,” <strong>in</strong> IEEE Int. Conf.<br />

Commun. Circuits Sys., 2006, pp. 548–552.<br />

[13] Y. A. Zheng, C. S. Zhu, J. S. Song, and X. H. Zhao,<br />

“Fusion of Multi-band SAR Images Based on Contourlet<br />

Transform.” <strong>in</strong> IEEE Int. Conf. on Inf. Acquis., 2006, pp.<br />

420–424.<br />

[14] L. Yang, B. L. Guo, and W. Ni, “Multifocus Image Fusion<br />

Algorithm Based on Region Statistics <strong>in</strong> Contourlet<br />

Doma<strong>in</strong>,” J. Xi'an Jiaotong Univ., vol. 41, pp. 448–452,<br />

April 2007.<br />

[15] Z. B. Wang, Y. D. Ma, F. Y. Cheng, and L. Z. Yang,<br />

“Review of Pulse-Coupled Neural Networks,” Image Vis.<br />

Comput., vol. 28, pp. 5–13, January 2010.<br />

[16] X. D. Gu, “A New Approach to Image Authentication<br />

us<strong>in</strong>g Local Image Icon of Unit-l<strong>in</strong>k<strong>in</strong>g PCNN,” <strong>in</strong> IEEE<br />

Int. Conf. Neural. Netw., 2006, pp. 1036–1041.<br />

[17] S. Wei, Q. Hong, and M. S. Hou, “Automatic image<br />

segmentation based on PCNN with adaptive threshold<br />

time constant,” Neurocomput., vol. 74, pp. 1485–1491,<br />

April 2011.<br />

[18] J. C. Fu, C. C. Chen, J. W. Chai, S. T. C. Wong, and I. C.<br />

Li, “Image segmentation by EM-based adaptive pulse<br />

coupled neural networks <strong>in</strong> bra<strong>in</strong> magnetic resonance<br />

imag<strong>in</strong>g,” Comput. Med. Imag<strong>in</strong>g Graph., vol. 34, pp.<br />

308–320, June 2010.<br />

[19] D. Agrawal and J. S<strong>in</strong>ghai, “Multifocus image fusion<br />

us<strong>in</strong>g modified pulse coupled neural network for improved<br />

image quality,” IET Image Process., vol. 4, pp. 443–451,<br />

December 2010.<br />

[20] P. J. Burt and R. J. Kolczynski, “Enhanced image capture<br />

through fusion,” <strong>in</strong> Proc. of 4 th Int. Conf. Comput. Vision,<br />

1993, pp. 173–182.<br />

[21] F. Hassa<strong>in</strong>ia, M. I. Magana, F. Langev<strong>in</strong>, and J. P.<br />

Kernevez, “Image fusion by an orthogonal wavelet<br />

transform and comparison with other methods,” <strong>in</strong> 14 th<br />

Annu. Int. Conf. IEEE, 1992, pp. 1246–1247.<br />

[22] H. H. Li, L. Guo, and H. Liu, “Research on image fusion<br />

based on the second generation curvelet transform,” Acta<br />

Opt. S<strong>in</strong>., vol. 26, pp. 657–662, May 2006.<br />

[23] X. B. Qu, G. F. Xie, J. W. Yan, Z. Q. Zhu, and B. G. Chen,<br />

“Image fusion algorithm based on neighbors and cous<strong>in</strong>s<br />

<strong>in</strong>formation <strong>in</strong> nonsubsampled contourlet transform<br />

doma<strong>in</strong>,” <strong>in</strong> Proc. Int. Conf. Wavelet Anal. Pattern<br />

Recognit., 2007, pp. 1797−1802.<br />

[24] V. Petrovic and C. S. Xydeas, “Objective evaluation of<br />

signal-level image fusion performance,” Opt. Eng., vol. 44,<br />

pp. 087003-1–087003-8, August 2005.<br />

[25] G. Piella and H. Heijmans, “A New Quality Metric for<br />

Image Fusion,” <strong>in</strong> IEEE Int. Conf. Image Process., 2003,<br />

pp. 173−176.<br />

Xi Cai received her B.S. and Ph.D. degrees from the School of<br />

Electronic and Information Eng<strong>in</strong>eer<strong>in</strong>g, Beihang University,<br />

Ch<strong>in</strong>a, <strong>in</strong> 2005 and 2011, respectively. Now she is a teacher at<br />

Eng<strong>in</strong>eer<strong>in</strong>g Optimization and Smart Antenna Institute,<br />

Northeastern University at Q<strong>in</strong>huangdao, Ch<strong>in</strong>a. Her research<br />

<strong>in</strong>terests <strong>in</strong>clude image fusion, image registration and object<br />

detection.<br />

Guang Han received his B. Eng. and M. Eng. degrees from the<br />

School of Electronic and Information Eng<strong>in</strong>eer<strong>in</strong>g, Beihang<br />

University, Ch<strong>in</strong>a, <strong>in</strong> 2005 and 2008, respectively. Now he is a<br />

Ph.D. candidate at College of Information Science and<br />

Eng<strong>in</strong>eer<strong>in</strong>g, Northeastern University. His research <strong>in</strong>terests<br />

<strong>in</strong>clude object detection and object track<strong>in</strong>g based on video<br />

sequences.<br />

J<strong>in</strong>kuan Wang received the M.Eng. degree from Northeastern<br />

University, Shenyang, Ch<strong>in</strong>a, <strong>in</strong> 1985, and the Ph.D. degree<br />

from the University of Electro-Communications, Chofu, Japan,<br />

<strong>in</strong> 1993.<br />

In 1990, he jo<strong>in</strong>ed the Institute of Space and Astronautical<br />

Science, Sagamihara, Japan, as a special member. He was an<br />

Eng<strong>in</strong>eer with the Research Department, COSEL Company, <strong>in</strong><br />

1994. He is currently the President of the Northeastern<br />

University at Q<strong>in</strong>huangdao, Hebei, Ch<strong>in</strong>a, where he has been a<br />

Professor s<strong>in</strong>ce 1998. He has been a ma<strong>in</strong> researcher <strong>in</strong> several<br />

National Natural Science Foundation research projects of Ch<strong>in</strong>a.<br />

His ma<strong>in</strong> <strong>in</strong>terests are <strong>in</strong> the areas of <strong>in</strong>telligent control,<br />

adaptive array, wireless sensor networks and image process<strong>in</strong>g.<br />

© 2013 ACADEMY PUBLISHER


1552 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

The Critical Legal Contention under the<br />

Challenge of Information Age and the<br />

Predom<strong>in</strong>ant Social Interests Concern for<br />

Develop<strong>in</strong>g Intelligent Vehicle Telematics <strong>in</strong> the<br />

United States<br />

Fa-Chang Cheng<br />

National Kaohsiung First University of Science and Technology/Graduate Institute of Science and Technology Law,<br />

Kaohsiung City, Taiwan<br />

Email: fachang1@hotmail.com<br />

Wen-Hs<strong>in</strong>g Lai *<br />

National Kaohsiung First University of Science and Technology/Dept. of Computer and Communication Eng<strong>in</strong>eer<strong>in</strong>g,<br />

Kaohsiung City, Taiwan<br />

Email: lwh@nkfust.edu.tw<br />

Abstract—Intelligent Vehicle Telematics has been a<br />

promis<strong>in</strong>g <strong>in</strong>dustry <strong>in</strong> the world. This new development of<br />

telecommunication technology has emerged with some legal<br />

concerns, especially <strong>in</strong> the liability for failure of safety<br />

devises and the protection of <strong>in</strong>formation privacy with<strong>in</strong><br />

Intelligent Vehicle Telematics. The purpose of this article is<br />

to ga<strong>in</strong> experiences from the discussion for these concerns <strong>in</strong><br />

academic papers and related cases with<strong>in</strong> the United States,<br />

<strong>in</strong> order to depict the possible solution for safety related<br />

legal concerns and the protection of <strong>in</strong>formation privacy<br />

which is based upon not only the concern of <strong>in</strong>formation age<br />

but also the concern of national security with regard to<br />

develop<strong>in</strong>g Intelligent Vehicle Telematics. The purpose of<br />

this article is <strong>in</strong>tended to offer some valuable reference to<br />

other countries which are also <strong>in</strong>volv<strong>in</strong>g <strong>in</strong> the development<br />

of <strong>in</strong>telligent Vehicle Telematics.<br />

Index Terms—Intelligent Vehicle Telematics, product<br />

liability, strict liability, <strong>in</strong>formation privacy<br />

I. INTRODUCTION<br />

The Intelligent Vehicle Telematics is highly valued by<br />

the government <strong>in</strong> the world as hav<strong>in</strong>g a lot of beneficial<br />

potential to the transportation <strong>in</strong>frastructure <strong>in</strong> such<br />

sovereignty. The features of safety design are critical to<br />

the Intelligent Vehicle Telematics and have some<br />

significant mean<strong>in</strong>g to the legal <strong>in</strong>frastructure. Those<br />

safety devises may <strong>in</strong>crease the safety of transportation<br />

which benefits to the society as a whole. Conversely; the<br />

failure of such safety devises may cause a lot of trouble.<br />

Manuscript received September 20, 2012; revised September 20,<br />

2012; accepted September 20, 2012.<br />

* Correspond<strong>in</strong>g author<br />

Therefore, the liability for system provider and devise<br />

manufacture (distributor) is one significant safety legal<br />

issue with regard to Intelligent Vehicle Telematics. Apart<br />

from the safety related legal concerns, the protection of<br />

privacy <strong>in</strong> the operation of Intelligent Vehicle Telematics<br />

is also another critical legal issue for Intelligent Vehicle<br />

Telematics. The <strong>in</strong>tention of this article is to <strong>in</strong>troduce<br />

the concept of <strong>in</strong>formation privacy <strong>in</strong> the United States<br />

and br<strong>in</strong>g up the suggestion of how to comprise the<br />

conflictions between protect<strong>in</strong>g <strong>in</strong>formation privacy and<br />

other legal <strong>in</strong>terests. S<strong>in</strong>ce this paper is ma<strong>in</strong>ly talk<strong>in</strong>g<br />

about the concerns from the prospective of the United<br />

States because due to the United states advanc<strong>in</strong>g <strong>in</strong><br />

Intelligent Vehicle Telematics research field, except the<br />

general technology description of Intelligent Vehicle<br />

Telematics, <strong>in</strong>clud<strong>in</strong>g the safety features, <strong>in</strong> the beg<strong>in</strong>n<strong>in</strong>g,<br />

this article will center the discussion on these concerns to<br />

academic papers and related cases with<strong>in</strong> the United<br />

States, <strong>in</strong> order to depict the possible solution for safety<br />

related legal concerns and the protect<strong>in</strong>g privacy concerns<br />

with regard to develop<strong>in</strong>g Intelligent Vehicle Telematics<br />

to other follow<strong>in</strong>g countries.<br />

II. THE TECHNOLOGY OF INTELLIGENT VEHICLE<br />

TELEMATICS AND ITS SAFETY FEATURES<br />

Vehicle Telematics is the <strong>in</strong>tegrated use of<br />

telecommunications and <strong>in</strong>formatics with<strong>in</strong> road vehicles.<br />

The objectives of Intelligent Vehicle Telematics are to<br />

improve safety, reduce traffic congestion, fuel<br />

consumption and carbon dioxide emissions, and <strong>in</strong>crease<br />

comfort and convenience or even enterta<strong>in</strong>ment, and the<br />

future trends focus on mak<strong>in</strong>g automobiles greener,<br />

smarter, and merg<strong>in</strong>g transportation and <strong>in</strong>formation<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1552-1559


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1553<br />

networks [1]. Most vehicle telematics projects were<br />

developed isolate. However, <strong>in</strong> some regions, like<br />

European Commission, have decided to act forwards<br />

harmoniz<strong>in</strong>g the deployment and use of ITS <strong>in</strong> road<br />

transport across Europe by means of the ITS Action Plan<br />

and the European ITS Directive [2].<br />

Wireless communications and network<strong>in</strong>g is a core<br />

enabl<strong>in</strong>g technology for ITSs (<strong>in</strong>telligent transport<br />

systems). A vehicle may communicate with other<br />

vehicles (vehicle-to-vehicle, V2V) or the <strong>in</strong>frastructure<br />

(vehicle-to-<strong>in</strong>frastructure, V2I) by us<strong>in</strong>g Dedicated Short<br />

Range Communication (DSRC), cellular communication,<br />

satellite communication, WiFi, Bluetooth or RFID.<br />

Among them, DSRC is short to medium range wireless<br />

communication promoted by US Department of<br />

Transport and specifically designed for vehicle use. US<br />

Federal Communications Commission (FCC) has<br />

allocated 75MHz <strong>in</strong> the 5.9GHz band for DSRC. Longer<br />

range communications can be accomplished by GSM, 3G,<br />

or WiMAX. It is noted that to prevent accidents, very low<br />

latency and short response times are needed for vehicleto-vehicle<br />

communications [3]. IEEE 802.11p, which is<br />

the groundwork for DSRC, is an IEEE standard to add<br />

wireless access <strong>in</strong> vehicular environments (WAVE). It<br />

def<strong>in</strong>es enhancements to 802.11 to support ITS. That is, it<br />

is specially designed for data exchange among mov<strong>in</strong>g<br />

vehicles and road <strong>in</strong>frastructure.<br />

Generally speak<strong>in</strong>g, <strong>in</strong> vehicle transportation, safety<br />

normally gets top priority, though enterta<strong>in</strong>ment and<br />

convenience have rapidly caught up to safety as the<br />

impetus for new <strong>in</strong>-car electronics development [4].<br />

Examples of many applications of vehicle safety systems<br />

are: Cooperative forward collision warn<strong>in</strong>g, Emergency<br />

brak<strong>in</strong>g notification, Lane or road departure warn<strong>in</strong>g, Precrash<br />

sens<strong>in</strong>g, Curve speed warn<strong>in</strong>g, Right turn assistance,<br />

Give way junction assistance, Traffic signal violation<br />

warn<strong>in</strong>g, Intersection collision warn<strong>in</strong>g, Road / rail<br />

collision warn<strong>in</strong>g, Road condition warn<strong>in</strong>g, Approach<strong>in</strong>g<br />

emergency vehicle warn<strong>in</strong>g, Emergency vehicle signal<br />

pre-emption, Road works warn<strong>in</strong>g, and Motorway merge<br />

assistance [5].<br />

The above safety related application systems or<br />

functions of <strong>in</strong>telligent vehicle system generally focuse<br />

on assist<strong>in</strong>g drivers and prevent<strong>in</strong>g driver errors while<br />

full autonomous, unmanned vehicles are still rema<strong>in</strong>ed as<br />

a research topic. However, these systems which designed<br />

to improve safety may, <strong>in</strong>stead, compete for driver<br />

attention and provide confus<strong>in</strong>g message [6]. That causes<br />

the telematics use becom<strong>in</strong>g a contribut<strong>in</strong>g factor for<br />

crashes, mostly due to multitask<strong>in</strong>g, distraction and<br />

longer duration usage time than conventional <strong>in</strong>-vehicle<br />

tasks [7]. Besides, more and more car <strong>in</strong>novations are<br />

from computer systems and software, and such<br />

complexity br<strong>in</strong>gs with it reliability concerns [8]. Ivan<br />

Berger [9] questioned three grow<strong>in</strong>g challenge for<br />

carmakers. First, the more complex a car electronic<br />

system, the more failure po<strong>in</strong>ts it offers. Second, the<br />

grow<strong>in</strong>g reliance on software raises more risk of fail.<br />

Third, the hardware environment becomes more<br />

demand<strong>in</strong>g because of heat and electromagnetic<br />

<strong>in</strong>terference (EMI).<br />

Some methods have been proposed to solve the safety<br />

concerns. For example, a workload manager is set to help<br />

determ<strong>in</strong>e if a driver is overloaded or distracted [7], and a<br />

structured procedural safety assessment of <strong>in</strong>terven<strong>in</strong>g<br />

systems is proposed [10]. Nevertheless, unless we can<br />

totally understand the driv<strong>in</strong>g behavior [11] - [13],<br />

<strong>in</strong>clud<strong>in</strong>g driver <strong>in</strong>tentions, how people make decisions,<br />

and how people <strong>in</strong>teract with vehicle, and model the<br />

behavior, there are still risks.<br />

In addition, there is privacy concern to aware.<br />

Know<strong>in</strong>g the accurate position and status of vehicles is<br />

the first th<strong>in</strong>g to do to make the transport <strong>in</strong>telligent.<br />

Global Position<strong>in</strong>g System (GPS) is a convenient way to<br />

calculate the <strong>in</strong>formation. However, the accuracy of<br />

standard GPS, which is generally 5 to 10 meters, is not<br />

always enough, and the accuracy and reliability of GPS<br />

are degraded <strong>in</strong> urban environments due to satellite<br />

visibility and multipath effects. Other technologies like<br />

Triangulation Method us<strong>in</strong>g mobile phones or <strong>in</strong>ertial<br />

navigation by the sensors via dead reckon<strong>in</strong>g could be<br />

<strong>in</strong>tegrated to improve the accuracy. Video cameras can<br />

also be fused [14] to help measure traffic flow or the<br />

distance between lane l<strong>in</strong>es. The computer vision<br />

technology can not only be used to look out of the vehicle<br />

to detect and track roads, but simultaneously look <strong>in</strong>side<br />

the vehicle to monitor the attentiveness or <strong>in</strong>tentions of<br />

the driver [15]. Besides camera, multiple Sensors<br />

<strong>in</strong>clud<strong>in</strong>g radar and lidar can be used to help detect<br />

various statistic or mov<strong>in</strong>g on-road obstacles [16]. Us<strong>in</strong>g<br />

standard statistics of telecom switches without extra<br />

effort <strong>in</strong> telecom network is also used to compute the<br />

speeds of vehicles [17]. By us<strong>in</strong>g the above techniques,<br />

accurate position or status <strong>in</strong>formation is obta<strong>in</strong>ed and<br />

then, these <strong>in</strong>formation is generally shared with other<br />

vehicles and <strong>in</strong>frastructure by communication. If privacy<br />

filter<strong>in</strong>g is not applied, serious privacy risk happens.<br />

Some applications like Pay-As-You-Drive Insurance<br />

model [18] have noticed it. The system performs the<br />

premium calculations locally <strong>in</strong> the vehicle, and send<br />

only aggregated data to the <strong>in</strong>surance company without<br />

leak<strong>in</strong>g location <strong>in</strong>formation.<br />

Another trend to aware is that cloud comput<strong>in</strong>g is<br />

expected to play a pivotal role <strong>in</strong> future automotive<br />

telematics services. It particularly makes the security and<br />

privacy <strong>in</strong> clouds an important issue <strong>in</strong> ITS.<br />

III. THE LIABILITY OF SYSTEM PROVIDER AND DEVISE<br />

MANUFACTURE (DISTRIBUTOR) FOR SAFETY LEGAL<br />

CONCERNS<br />

The safety concern for the Intelligent Vehicle<br />

Telematics is by far the most concerned topic both from<br />

the technical and the legal perspective. Discuss<strong>in</strong>g from<br />

the legal perspective for safety concern to Intelligent<br />

Vehicle Telematics, at first sight, there could be three<br />

potential possible k<strong>in</strong>ds of liability, negligence, warranty<br />

<strong>in</strong> contract or strict liability, for the system provider and<br />

four potential possible k<strong>in</strong>ds of liability for devise<br />

manufacture (distributor) with regard to the safety legal<br />

© 2013 ACADEMY PUBLISHER


1554 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

concerns, add<strong>in</strong>g product liability to the three just<br />

mentioned before. The difference between the system<br />

provider and the devise manufacture (distributor) for<br />

potential liability to the safety legal concerns the product<br />

liability because the product liability is only eligible for<br />

the harm done by the tangible product, but not the<br />

services. For the purpose of elucidat<strong>in</strong>g the discussion<br />

here, briefly <strong>in</strong>troduc<strong>in</strong>g the concepts of negligence,<br />

warranty, strict liability and product liability is necessary.<br />

And the assertion of this article will <strong>in</strong>sist that strict<br />

liability theory is most appropriate to those situations<br />

based on the understand<strong>in</strong>g and characteristics of those<br />

legal <strong>in</strong>frastructures s<strong>in</strong>ce there is no real case handed<br />

down related to the safety legal concerns for Intelligent<br />

Vehicle Telematics <strong>in</strong> the United States judicial system.<br />

Regard<strong>in</strong>g this section here, the discussion will be<br />

divided <strong>in</strong>to three parts discussion: the first part of<br />

theories among negligence, warranty, product liability<br />

and strict liability; the second part of compar<strong>in</strong>g among<br />

negligence, warranty, product liability and strict liability<br />

for the culpability; and the third part of the reason to<br />

choose strict liability for the system provider and devise<br />

manufacture (distributor) as the liability solution for the<br />

related safety legal concerns to Intelligent Vehicle<br />

Telematics.<br />

A. The Theories among Negligence, Warranty, Product<br />

Liability and Strict Liability<br />

The first safety liability theory for system provider and<br />

devise manufacture (distributor) to Intelligent Vehicle<br />

Telematics is negligence. Generally speak<strong>in</strong>g, the theory<br />

of negligence is really based upon the idea of fault. To<br />

<strong>in</strong>dicate a defendant is negligent means that the defendant<br />

<strong>in</strong> the case violates the duty of care imputed by the<br />

society. And, except for some specific circumstances, the<br />

standard of care is either based upon the reasonable<br />

person [19] or professional reaction [20] under the<br />

ord<strong>in</strong>ary cases. Another specific feature for the theory of<br />

negligence is the requirement for proximate cause of<br />

which the legal mean<strong>in</strong>g is to def<strong>in</strong>e the amount of<br />

damages. The cause <strong>in</strong> fact between the wrongdoer and<br />

the consequences <strong>in</strong>voked by such wrongdoer is required<br />

<strong>in</strong> every tortious cause of action, the proximate cause is<br />

not a prerequisite for the cause of action <strong>in</strong> torts, for<br />

example the <strong>in</strong>tentional torts or product liability etc. and<br />

the proximate cause is really a means to the policy<br />

concern’s ends [21]. So, <strong>in</strong> order to substantiate <strong>in</strong> a<br />

negligence case, there are four elements need to be<br />

proved: duty of care, breach duty of care, causation<br />

(<strong>in</strong>clud<strong>in</strong>g the cause <strong>in</strong> fact and proximate cause) and<br />

damages.<br />

The second possible legal theory of the liability for<br />

system provider and devise manufacture (distributor)<br />

related to the safety devise for Intelligent Vehicle<br />

Telematics is warranty. Warranty cause of action is<br />

really someth<strong>in</strong>g between the contract theory and the torts<br />

theory. Two k<strong>in</strong>ds of warrant theory fall under this<br />

category; one is called the express warrant, the other is<br />

named the implied warranty. In the express warranty, it<br />

could be the contract liability which needs to prove the<br />

contract privity between the parties <strong>in</strong>volved <strong>in</strong> the<br />

warranty dispute. The express warrant could also be the<br />

torts liability which needs to prove the reliance of the<br />

<strong>in</strong>jured party, even though there is no requirement for<br />

prov<strong>in</strong>g the privity between the parties [22]. And the<br />

adoption of implied warrant theory is, to some extent,<br />

depend<strong>in</strong>g on the will<strong>in</strong>gness of the court and mostly<br />

used <strong>in</strong> the dispute of fitness of the object to its common<br />

application [23].<br />

The third possible legal theory to the mentioned<br />

liability is strict liability. In the strict liability theory,<br />

there is no need to prove the defendant’s fault, the<br />

contract privity, the reliance of the <strong>in</strong>jured or even<br />

pend<strong>in</strong>g on the court’s <strong>in</strong>terference. To prove some basic<br />

facts and establish that these facts results <strong>in</strong> the<br />

consequences is the only requirement to assert the strict<br />

liability. Traditionally, two types of strict liability are<br />

accepted <strong>in</strong> cases: the wild or vicious animal strict<br />

liability and the extremely dangerous activity strict<br />

liability. However, even under this str<strong>in</strong>gent liability,<br />

some exceptions exist to the general rule, like the<br />

comparative negligence of pla<strong>in</strong>tiff [24] or the Act of<br />

God [25].<br />

The last possible legal theory of the liability mentioned<br />

<strong>in</strong> this paragraph for system provider and devise<br />

manufacture (distributor) related to the safety devise for<br />

Intelligent Vehicle Telematics is product liability. The<br />

ma<strong>in</strong> purpose of product liability is to protect the user or<br />

consumer from <strong>in</strong>jured by the product threw <strong>in</strong> the stream<br />

of commerce. Theoretically, this legal theory conta<strong>in</strong>s<br />

three different types of product liability claims:<br />

manufactur<strong>in</strong>g defect, design defect and lack of warn<strong>in</strong>g<br />

[26]. Several possible legal <strong>in</strong>terpretations can del<strong>in</strong>eate<br />

the mean<strong>in</strong>g of product liability. To make the statement<br />

more clear, under the title of product liability, a product<br />

liability case can really be a negligence case [27], a<br />

warrant case [28] or a strict liability case [29]. When a<br />

product liability case is based upon the strict liability<br />

theory, the distributor or the manufacture for the product<br />

would easily be <strong>in</strong>volved <strong>in</strong> such case. The provision <strong>in</strong><br />

the Restatement (Second) of Torts embodies the strict<br />

liability approach. Accord<strong>in</strong>g to Restatement (Second) of<br />

Torts § 402A which is accepted by some of the states <strong>in</strong><br />

the United States, one who sells any product <strong>in</strong> a<br />

defective condition unreasonably dangerous to the user or<br />

consumer or to his property is subject to liability for<br />

physical harm thereby caused to the ultimate user or<br />

consumer, or to his property, even the seller has exercised<br />

all possible care <strong>in</strong> the preparation and sale of his product<br />

or the user (or consumer) has not brought the product<br />

from or entered <strong>in</strong>to any contractual relation with the<br />

seller. Even the Restatement (Second) and follow<strong>in</strong>g<br />

courts take the position that both the manufacture and the<br />

distributor shall bear the strict liability [30], there are still<br />

some jurisdictions which partially follow the Restatement<br />

(Second) would like to prove the breach of duty to the<br />

manufacture which is based upon design defect and lack<br />

of warn<strong>in</strong>g claims <strong>in</strong> a product liability litigation [31].<br />

And just similar to the strict liability, there are also a<br />

couple possible defenses, comparative negligence of<br />

pla<strong>in</strong>tiff [32] and statutory immunity (preemption) [33] or<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1555<br />

unforeseeable misuse of the product [34], could be used<br />

as the defense aga<strong>in</strong>st the product liability. To sum up<br />

the description regard<strong>in</strong>g the product liability, the product<br />

liability is the liability to harm caused by the product<br />

which liability can present either one of the three possible<br />

choices: negligence, breach of warranty or strict liability.<br />

B. The Comparison among Negligence, Warranty,<br />

Product Liability and Strict Liability for the Culpability<br />

of Wrongdoer<br />

From the explanation <strong>in</strong> this previous paragraph, the<br />

conclusion for compar<strong>in</strong>g different legal theories for the<br />

safety related legal dispute can be summarized as the<br />

follow<strong>in</strong>g. First of all, the negligence cause of action is<br />

the most difficult liability to prove because, unlike<br />

warranty or strict liability, the duty of care needs to be<br />

substantiated. And the strict liability might be the easist<br />

legal theory to satisfy <strong>in</strong> the burden of provid<strong>in</strong>g evidence.<br />

As to the warranty cause of action, the liability would<br />

either rely on the contract privity or reliance <strong>in</strong> express<br />

warranty or count on the court <strong>in</strong>tervention <strong>in</strong> implied<br />

contract. To estimate the strength of liability or<br />

culpability, the warranty cause of action seems to stand <strong>in</strong><br />

between of the negligence and the strict liability. The last<br />

possible liability mentioned <strong>in</strong> this article-product<br />

liability, is really a mixture type of theory of liability<br />

among the negligence liability, warranty liability and the<br />

strict liability. Observ<strong>in</strong>g the history of the policy<br />

attitude toward the product liability, the substance to<br />

contend product liability is really sw<strong>in</strong>g<strong>in</strong>g between the<br />

negligence and the strict liability and some commentator<br />

believes the current court attitude <strong>in</strong> apply<strong>in</strong>g the product<br />

liability is more lenient toward the manufacture [35].<br />

C. The Reason for Choos<strong>in</strong>g Strict Liability for the<br />

System Provider and Devise Manufacture (Distributor)<br />

as the Liability Solution for the Related Safety Legal<br />

Concerns to Intelligent Vehicle Telematics<br />

This article would like to <strong>in</strong>dicate that those safety<br />

devises to Intelligent Vehicle Telematics are present<strong>in</strong>g<br />

really high social responsible concerns. Therefore, the<br />

primary policy th<strong>in</strong>k<strong>in</strong>g should be that the manufacture of<br />

these safety devise to Intelligent Vehicle Telematics is<br />

go<strong>in</strong>g to hold the highest legal responsibility under the<br />

current legal theory to the <strong>in</strong>jured person or property<br />

based upon the strict product liability. And the system<br />

provider for the operation of these safety devises to<br />

Intelligent Vehicle Telematics is the same important as<br />

the manufacture. If anyth<strong>in</strong>g goes wrong with the system,<br />

it could cause a catastrophe to the transportation.<br />

Therefore, the system provider for the operation of these<br />

safety devises to Intelligent Vehicle Telematics should<br />

also take the strict liability. The liability for both the<br />

manufacture and the system provider here is noth<strong>in</strong>g like<br />

the liability to the cell phone manufacture or the<br />

communication services provider for the user talk<strong>in</strong>g over<br />

the cell phone while he or she was driv<strong>in</strong>g because the<br />

cell phone is not designed to the protection of<br />

transportation safety and the user who <strong>in</strong>itiates<br />

communication and cause the distraction which results <strong>in</strong><br />

the traffic <strong>in</strong>cident should be responsible for his or her<br />

behavior [36]. As to the distributor between the<br />

manufacture and the user or consumer, because the<br />

distributor doesn’t directly contribute to the safety legal<br />

issue regard<strong>in</strong>g the safety devises with<strong>in</strong> Intelligent<br />

Vehicle Telematics, it is suggested the distributor doesn’t<br />

need to be strictly liable to the <strong>in</strong>jury based upon product<br />

liability by the failure of these safety devises. The<br />

current situation as to different options for liability to the<br />

distributor should rema<strong>in</strong> the same for further<br />

consideration through the case decision <strong>in</strong> the future.<br />

IV. THE PROTECTION OF INFORMATION PRIVACY IN<br />

INTELLIGENT VEHICLE TELEMATICS<br />

As mentioned <strong>in</strong> the beg<strong>in</strong>n<strong>in</strong>g of this article, <strong>in</strong><br />

apply<strong>in</strong>g Intelligent Vehicle Telematics to the real world,<br />

often times, it will acquire, collect or use personal<br />

<strong>in</strong>formation <strong>in</strong> the process of operat<strong>in</strong>g these devises or<br />

systems. This could arouse a lot of concerns to the legal<br />

issue of <strong>in</strong>formation of privacy. In this section, it <strong>in</strong>tends<br />

to <strong>in</strong>troduce the idea of <strong>in</strong>formation privacy <strong>in</strong> the United<br />

States, the protection of this legal <strong>in</strong>terest <strong>in</strong> the United<br />

States. Not only will several <strong>in</strong>cl<strong>in</strong>ed tendencies to the<br />

protection based on the concern of <strong>in</strong>formation age be<br />

<strong>in</strong>dicated here but also is the suggested hierarchy of<br />

methods to build up such protection <strong>in</strong> the legal arena for<br />

Intelligent Vehicle Telematic go<strong>in</strong>g to be discussed. One<br />

additional future possible concern to the protection of<br />

critical <strong>in</strong>frastructure based upon the reason of national<br />

security will also be briefly discussed for the purpose of<br />

this article. The purpose of all these discussions is to<br />

make projection of what would have happened if the<br />

issue of <strong>in</strong>formation privacy emerged once the <strong>in</strong>dustry of<br />

<strong>in</strong>telligent vehicle telematics becomes mature.<br />

A. The Concept of Information Privacy and the<br />

Protection <strong>in</strong> the United States<br />

The protection of “privacy” is not articulated <strong>in</strong> the<br />

Constitution <strong>in</strong> the United States, <strong>in</strong>stead it is <strong>in</strong>terpreted<br />

by the Supreme Court to say “The forgo<strong>in</strong>g cases suggest<br />

that special guarantees <strong>in</strong> the Bill of Rights have<br />

penumbras, formed by emanations from those guarantees<br />

that help give them life and substance. Various<br />

guarantees create zones of privacy.” <strong>in</strong> order to “create”<br />

the protection of privacy [37]. Through the years, the<br />

Supreme Court has recognized several k<strong>in</strong>ds of privacy as<br />

the fundamental human rights [38], for example the right<br />

to marriage, breed<strong>in</strong>g the child etc., but not the<br />

<strong>in</strong>formation privacy. The significant legal mean<strong>in</strong>g of<br />

<strong>in</strong>formation privacy as a non-fundamental human rights<br />

on the Constitutional level is that the right of privacy will<br />

probably be restricted when it directly conflicts with the<br />

protection of other fundamental human rights or<br />

important social rights, for example the freedom of<br />

speech [39]. And it is fairly to say, other than conflict<strong>in</strong>g<br />

with the protection of other fundamental human rights or<br />

important social rights, the protection of <strong>in</strong>formation<br />

privacy is really the balance of <strong>in</strong>terests between the<br />

protection of privacy and other affected legal <strong>in</strong>terests,<br />

except it wouldn’t affect any legal <strong>in</strong>terests, for example,<br />

to the protection aga<strong>in</strong>st unauthorized <strong>in</strong>vasion of<br />

© 2013 ACADEMY PUBLISHER


1556 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

<strong>in</strong>formation privacy. From the experience of the United<br />

States <strong>in</strong> protection of <strong>in</strong>formation privacy, there are three<br />

auspicious preventive and one remedial trends worth to<br />

draw attention. The first preventive trend is to use<br />

<strong>in</strong>formed consent mechanism for reduc<strong>in</strong>g or eradicat<strong>in</strong>g<br />

the controversy of reasonable expectation of privacy.<br />

The second preventive trend is to emphasize the<br />

importance of technology prevention of <strong>in</strong>formation<br />

privacy <strong>in</strong>fr<strong>in</strong>gement. And the last one preventive trend<br />

is to enhance the liability of data collector for notification<br />

of the security breach to the <strong>in</strong>formation provider <strong>in</strong> case<br />

of some special k<strong>in</strong>d of personal <strong>in</strong>formation been<br />

unauthorized disclosed by the third party. As to the<br />

remedial trend related to the protection of <strong>in</strong>formation<br />

privacy for <strong>in</strong>telligent vehicle telematics, the focus will<br />

be the secondary liability to the <strong>in</strong>ternet service provider.<br />

Especially a secondary liability case of <strong>in</strong>ternet service<br />

provider about trademark <strong>in</strong>fr<strong>in</strong>gement <strong>in</strong> recent years is<br />

go<strong>in</strong>g to be discussed here s<strong>in</strong>ce there seems no direct<br />

judicial verdict to address the secondary liability of<br />

<strong>in</strong>formation privacy <strong>in</strong>fr<strong>in</strong>gement to the <strong>in</strong>ternet service<br />

provider.<br />

B. The Three Observations to the Preventive Measure <strong>in</strong><br />

the Protection of Information Privacy<br />

First of all, the best way to elim<strong>in</strong>ate the issue of<br />

whether or how the <strong>in</strong>formation privacy shall be<br />

protected is to receive the consent of personal<br />

<strong>in</strong>formation provider <strong>in</strong> gather<strong>in</strong>g the personal<br />

<strong>in</strong>formation. The legal th<strong>in</strong>k<strong>in</strong>g beh<strong>in</strong>d this is that the<br />

<strong>in</strong>formation privacy is a personal right and can be<br />

reduced or elim<strong>in</strong>ated by way of the consent of the<br />

<strong>in</strong>formation provider. It can be seen from a flood of<br />

statements related to privacy policy with<strong>in</strong> a variety of<br />

contract <strong>in</strong> the United States. Also, this idea of execut<strong>in</strong>g<br />

<strong>in</strong>formed consent appears <strong>in</strong> some federal legislation and<br />

adm<strong>in</strong>istrative regulation. For example, <strong>in</strong> HIPAA<br />

(Health Insurance Portability and Accountability Act)<br />

[40], the Congress require <strong>in</strong> this act that the entities for<br />

health care will basically get the <strong>in</strong>formed consent for any<br />

disclosure of personal medical <strong>in</strong>formation. The new<br />

drug application for biological product and the human<br />

body test for genetic therapy will need the <strong>in</strong>formed<br />

consent from the test or research subject before the<br />

approval of such application or test [41]. And, the<br />

<strong>in</strong>formed consent requirement also happens <strong>in</strong> The<br />

Gramm-Leach-Bliley Act and Privacy of Consumer<br />

F<strong>in</strong>ancial Information, Regulation P for electronic<br />

commerce.<br />

Secondly, beside the <strong>in</strong>formed consent methodology,<br />

to put a high value of technology prevention <strong>in</strong> protect<strong>in</strong>g<br />

<strong>in</strong>formation privacy is the other current trend of<br />

preventive measure for the <strong>in</strong>formation privacy<br />

<strong>in</strong>fr<strong>in</strong>gement. The best example for the emphasis of<br />

technology security is the <strong>in</strong>frastructure for establish<strong>in</strong>g<br />

technology standard <strong>in</strong> American Recovery and<br />

Re<strong>in</strong>vestment Act of 2009 [42]. Generally speak<strong>in</strong>g,<br />

from Subtitle C SEC 3001-3003 <strong>in</strong> American Recovery<br />

and Re<strong>in</strong>vestment Act of 2009, Congress design to<br />

establish the Office of the National Coord<strong>in</strong>ator for<br />

Health Information Technology for the purpose of sett<strong>in</strong>g<br />

up the technology standard, <strong>in</strong>clud<strong>in</strong>g the purpose of<br />

protection <strong>in</strong> <strong>in</strong>formation privacy, <strong>in</strong> order to promote the<br />

electronic medical records system.<br />

The last observed tendency for the issue of protect<strong>in</strong>g<br />

<strong>in</strong>formation privacy is to add the obligation of<br />

notification to who preserves the <strong>in</strong>dividual <strong>in</strong>formation<br />

when such <strong>in</strong>formation has been unauthorized accessed<br />

by the third party. This measurement is a fairly new legal<br />

remedy for the harm to the <strong>in</strong>formation privacy. For<br />

example, the detailed mechanism for how to work the<br />

requirement of notification <strong>in</strong> electronic medical records<br />

security breach is regulated <strong>in</strong> Subtitle D Part I SEC<br />

13400 and 13402 of American Recovery and<br />

Re<strong>in</strong>vestment Act of 2009. There are also other<br />

legislations <strong>in</strong> the United States embrac<strong>in</strong>g the similar<br />

regulation [43].<br />

C. One Potential Prediction to the Secondary Liability to<br />

the Internet Service Provider <strong>in</strong> the Protection of<br />

Information Privacy<br />

Beside the above-mentioned three preventive measures<br />

<strong>in</strong> the protection of <strong>in</strong>formation privacy, the secondary<br />

liability to the <strong>in</strong>ternet service provider for <strong>in</strong>formation<br />

privacy <strong>in</strong>vasion is potentially viable <strong>in</strong> the <strong>in</strong>formation<br />

age, especially <strong>in</strong> case of <strong>in</strong>telligent vehicle telematics.<br />

Until now, there is no general federal or state law to<br />

regulate the secondary liability of the <strong>in</strong>ternet service<br />

provider for <strong>in</strong>formation privacy <strong>in</strong>vasion, At the same<br />

time, even there seems no direct judicial verdict to the<br />

secondary liability of the <strong>in</strong>ternet service provider for<br />

<strong>in</strong>formation privacy <strong>in</strong>vasion <strong>in</strong> the United States; the<br />

article would th<strong>in</strong>k probably one important reason is<br />

because the court of the United States is still struggl<strong>in</strong>g to<br />

del<strong>in</strong>eate the scope of <strong>in</strong>formation privacy with<strong>in</strong> Internet.<br />

But this status quo is by no means to say the protection of<br />

<strong>in</strong>formation privacy with<strong>in</strong> Internet is <strong>in</strong>significant. On<br />

the other hand, ensu<strong>in</strong>g the highly developed technology<br />

of telecommunication and the more dependency of our<br />

society to such technology, the protection of <strong>in</strong>formation<br />

privacy with<strong>in</strong> Internet is deemed to be an important issue<br />

<strong>in</strong> the <strong>in</strong>formation age. Although there is no judicial<br />

decision to the secondary liability of the <strong>in</strong>ternet service<br />

provider for <strong>in</strong>formation privacy <strong>in</strong>vasion at this moment,<br />

the court <strong>in</strong> the United States did make some decision<br />

with regard to the secondary liability to the <strong>in</strong>ternet<br />

service provider <strong>in</strong> recent years and revealed the court’s<br />

leniency to the <strong>in</strong>ternet service provider through the<br />

follow<strong>in</strong>g case related to the trademark <strong>in</strong>fr<strong>in</strong>gement<br />

with<strong>in</strong> Internet. In Tiffany v. Ebay [44], Tiffany file the<br />

suit for multiple causes of action aga<strong>in</strong>st eBay. For the<br />

purpose of this discussion <strong>in</strong> this article, the focus of this<br />

case is centered on the issue of contributory <strong>in</strong>fr<strong>in</strong>gement<br />

of trademark. The facts for this case are relatively simple.<br />

eBay offers the platform for onl<strong>in</strong>e purchases to be<br />

concluded. Tiffany, the high-quality jewelry producer,<br />

was unhappy there are counterfeit<strong>in</strong>g Tiffany jewelry<br />

circulat<strong>in</strong>g on eBay’s onl<strong>in</strong>e purchas<strong>in</strong>g platform and<br />

filed the secondary liability litigation for trademark<br />

<strong>in</strong>fr<strong>in</strong>gement to eBay, even eBay did have taken some<br />

k<strong>in</strong>d of anti-fraud measurement for prevent<strong>in</strong>g the<br />

counterfeited product <strong>in</strong> its operation system. To the<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1557<br />

issue of secondary liability to the trademark <strong>in</strong>fr<strong>in</strong>gement,<br />

based upon the <strong>in</strong>terpretation of the Supreme Court <strong>in</strong><br />

Inwood case [45], the liability lies when “a manufacturer<br />

or distributor <strong>in</strong>tentionally <strong>in</strong>duces another to <strong>in</strong>fr<strong>in</strong>ge a<br />

trademark, or if it cont<strong>in</strong>ues to supply its product to one<br />

whom it knows or has reason to know is engag<strong>in</strong>g <strong>in</strong><br />

trademark <strong>in</strong>fr<strong>in</strong>gement.” eBay def<strong>in</strong>itely did not <strong>in</strong>duce<br />

the trademark <strong>in</strong>fr<strong>in</strong>gement <strong>in</strong> this case, that left the<br />

question to whether eBay was contributory liable to the<br />

trademark <strong>in</strong>fr<strong>in</strong>gement. The court <strong>in</strong> this case discarded<br />

the “reasonable anticipation standard” as the mean<strong>in</strong>g of<br />

“knows or has reason to know”, <strong>in</strong>stead the knowledge<br />

requirement is “a contextual and fact-specific test” judged<br />

by all the surround<strong>in</strong>g circumstances, for example the<br />

specific <strong>in</strong>cident of trademark <strong>in</strong>fr<strong>in</strong>gement, which is a<br />

higher standard than “reasonable anticipation standard”.<br />

In this case, the court concluded that Tiffany could not<br />

satisfy with the high criteria for “knows or has reason to<br />

know” requirement, especially eBay has abovementioned<br />

anti-fraud measurement <strong>in</strong> force, and eBay<br />

was not liable for contributory trademark <strong>in</strong>fr<strong>in</strong>gement.<br />

The Tiffany case demonstrates two k<strong>in</strong>ds of policy<br />

attitude. One observation is that the court <strong>in</strong> the United<br />

States is reluctant to impute the liability to the <strong>in</strong>ternet<br />

service provider probably due to the concern of free flow<br />

of <strong>in</strong>formation. And the other observation is the court<br />

would enhance the mental requirement for the secondary<br />

liability <strong>in</strong>fr<strong>in</strong>ger to some extent, at least near to the<br />

requirement of “willful bl<strong>in</strong>dness” <strong>in</strong>stead of reasonable<br />

anticipation. From the description of shift<strong>in</strong>g attitude to<br />

the secondary liability of the <strong>in</strong>ternet service provider,<br />

this judicial attitude also put the preventive measure to<br />

the protection of <strong>in</strong>formation privacy with<strong>in</strong> Internet <strong>in</strong><br />

the even more important position for such <strong>in</strong>frastructure.<br />

D. The Def<strong>in</strong>ition of Information Privacy and the<br />

Suggested Model Build<strong>in</strong>g Up the Information Privacy<br />

Protection for Intelligent Vehicle Telematics<br />

After understand<strong>in</strong>g the general idea of <strong>in</strong>formation<br />

privacy and the tendency of protect<strong>in</strong>g such legal <strong>in</strong>terest<br />

<strong>in</strong> the United States, how to build the protection<br />

<strong>in</strong>frastructure of <strong>in</strong>formation privacy and strike the<br />

balance with other k<strong>in</strong>ds of conflict<strong>in</strong>g legal <strong>in</strong>terest for<br />

Intelligent Vehicle Telematics operation br<strong>in</strong>gs the<br />

discussion to the next level. With regard to the issue of<br />

protection of <strong>in</strong>formation privacy <strong>in</strong> Intelligent Vehicle<br />

Telematics operation, this article would attempt to divide<br />

it <strong>in</strong>to two different aspects: non-legal –b<strong>in</strong>d<strong>in</strong>g self<br />

regulation and legal measurements for preventive or<br />

remedial purpose to the system operator. First, to the part<br />

of self regulation with<strong>in</strong> the system operator, the<br />

proposed estimation <strong>in</strong> this article is that the self<br />

regulation wouldn’t be able to play any significant role <strong>in</strong><br />

striv<strong>in</strong>g to preserve the legal <strong>in</strong>terest of <strong>in</strong>formation<br />

privacy before the competition <strong>in</strong> market has reached<br />

sufficient status. That is not to say the idea of selfmanagement<br />

for the <strong>in</strong>formation privacy protection is not<br />

important. The statement is just to express the th<strong>in</strong>k<strong>in</strong>g<br />

that to establish the management system for the<br />

protection of <strong>in</strong>formation privacy is not easy compared<br />

with the <strong>in</strong>tellectual property management system<br />

because the concept of <strong>in</strong>formation privacy is further<br />

develop<strong>in</strong>g. So, it is argued <strong>in</strong> this article, <strong>in</strong> this stage,<br />

there is no substantial mean<strong>in</strong>g to emphasize the<br />

mechanism of self regulation. As to the preventive or<br />

remedial legal measurements for the protection of<br />

<strong>in</strong>formation privacy related to the system provider for<br />

Intelligent Vehicle Telematics, the bottom l<strong>in</strong>e is<br />

described as the old say<strong>in</strong>g: “One stitch <strong>in</strong> time safes<br />

n<strong>in</strong>e.”. That leads to the <strong>in</strong>dication that the preventive<br />

measurements of <strong>in</strong>formed consent and technology<br />

prevention are much better than the remedial<br />

measurements (the obligation of notification, civil<br />

liability or even crim<strong>in</strong>al punishment). To sum up the<br />

<strong>in</strong>frastructure for the protection of <strong>in</strong>formation privacy <strong>in</strong><br />

Intelligent Vehicle Telematics, it is fairly to say <strong>in</strong><br />

protect<strong>in</strong>g <strong>in</strong>formation privacy <strong>in</strong> operat<strong>in</strong>g Intelligent<br />

Vehicle Telematics, there is a hierarchy to construct the<br />

protection, from the legal to the non-legal <strong>in</strong> general<br />

concept, from the preventive to the remedial<br />

measurement <strong>in</strong> real practice.<br />

As to the def<strong>in</strong>ition of <strong>in</strong>formation privacy, this really<br />

means the balance of <strong>in</strong>terest. In compar<strong>in</strong>g the different<br />

<strong>in</strong>terests to confirm the legitimacy of <strong>in</strong>formation privacy<br />

<strong>in</strong> the situation of Intelligent Vehicle Teleatics, the safety<br />

concern will def<strong>in</strong>itely get its priority to the <strong>in</strong>formation<br />

privacy concern. To other comparisons between the<br />

protection of <strong>in</strong>formation privacy and proprietary<br />

<strong>in</strong>terests of the system operator, the odds are that the<br />

<strong>in</strong>formation privacy will have a good chance to fight <strong>in</strong><br />

the battlefield of balanc<strong>in</strong>g <strong>in</strong>terests. One problematic<br />

situation of protect<strong>in</strong>g <strong>in</strong>formation privacy with<strong>in</strong> the<br />

environment of <strong>in</strong>telligent vehicle telematics is its<br />

possible <strong>in</strong>teraction with the concept of protect<strong>in</strong>g critical<br />

<strong>in</strong>frastructure. General speak<strong>in</strong>g, under the idea of<br />

protect<strong>in</strong>g critical <strong>in</strong>frastructure, the Bureau of Homeland<br />

Security can acquire and reasonably use the <strong>in</strong>formation<br />

related to the critical <strong>in</strong>frastructure processed by the<br />

private sector or government agencies for the purpose of<br />

anti-terrorism, which <strong>in</strong>formation might be under the<br />

protection of <strong>in</strong>formation privacy [46]. Even under the<br />

balance of <strong>in</strong>terest approach, the legal <strong>in</strong>terest of<br />

<strong>in</strong>formation privacy will be no doubt succumbed to the<br />

<strong>in</strong>terest of national security if these two k<strong>in</strong>ds of <strong>in</strong>terest<br />

directly conflict with each other, the question is whether<br />

the environment of <strong>in</strong>telligent vehicle telematics would<br />

be treated as the critical <strong>in</strong>frastructure and to what extent<br />

of us<strong>in</strong>g the <strong>in</strong>formation conta<strong>in</strong>ed with<strong>in</strong> is reasonable<br />

[47]. The potential impact of critical <strong>in</strong>frastructure<br />

protection to <strong>in</strong>formation privacy protection is unknown<br />

and needs to wait and see. As the protection of<br />

<strong>in</strong>formation privacy is gett<strong>in</strong>g more and more importance<br />

<strong>in</strong> the hierarchy of different k<strong>in</strong>ds of legal <strong>in</strong>terest, the<br />

national security rema<strong>in</strong>s the strongest opposition. What<br />

is the l<strong>in</strong>e need to be drawn between the protection of<br />

national security and <strong>in</strong>formation privacy, especially <strong>in</strong><br />

talk<strong>in</strong>g about the <strong>in</strong>telligent vehicle telematics<br />

environment, cannot be answered until the day comes.<br />

V. CONCLUSION<br />

© 2013 ACADEMY PUBLISHER


1558 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

It often times comes with the legal concern when the<br />

advanced technology seems to promise the society a<br />

better life. And this is exactly what happens to the<br />

Intelligent Vehicle Telematics. These two ma<strong>in</strong>ly legal<br />

concerns which are the liability both for the safety devise<br />

manufacture and the system provider, and also the<br />

protection of <strong>in</strong>formation privacy, under the discussion <strong>in</strong><br />

this article, shall move toward the <strong>in</strong>tensive way to go.<br />

There should be noth<strong>in</strong>g wrong to be cautious about the<br />

new technology after balanc<strong>in</strong>g the benefits and the<br />

potential harm of such technology to reveal that it could<br />

do more harm than good to the society as a whole,<br />

especially such harm is imm<strong>in</strong>ent. And it is suggested <strong>in</strong><br />

this article that the potential harm to the safety devise <strong>in</strong><br />

Intelligent Vehicle Telematics could be a disaster for the<br />

reason of estimat<strong>in</strong>g human life as high-value. And also<br />

the same seriousness to the <strong>in</strong>vasion of <strong>in</strong>formation<br />

privacy would happen especially the unauthorized use or<br />

security breach of the extensive gather<strong>in</strong>g of personal<br />

<strong>in</strong>formation <strong>in</strong> operat<strong>in</strong>g Intelligent Vehicle Telematics<br />

could be fatal to the trend of enhanced protection of<br />

<strong>in</strong>formation privacy. For all the reasons mentioned here,<br />

this article will hold the position that the most restrictive<br />

legal responsibility under the current legal theory shall<br />

apply to these two concerns respectively. But, even the<br />

legal <strong>in</strong>terest of <strong>in</strong>formation privacy is mov<strong>in</strong>g its way<br />

toward the ultimate position which is one k<strong>in</strong>d of the<br />

fundamental human rights, its legal hierarchy still hasn’t<br />

reached that stage yet. And the difficulties and dilemma<br />

to protect the <strong>in</strong>formation privacy <strong>in</strong> the <strong>in</strong>formation age,<br />

especially <strong>in</strong> the <strong>in</strong>telligent vehicle telematics<br />

environment, make the preventive measure to protect the<br />

<strong>in</strong>formation privacy get its priority and alleviate the<br />

secondary liability of the <strong>in</strong>ternet service provider to<br />

some extent. The <strong>in</strong>fluence of national security to the<br />

protection of <strong>in</strong>formation privacy <strong>in</strong> the environment of<br />

<strong>in</strong>telligent vehicle telematics will be the potential<br />

problem need to be resolved s<strong>in</strong>ce there is no direct or<br />

similar judicial decision can be refered. The development<br />

of Intelligent Vehicle Telematics technology is still <strong>in</strong> its<br />

primitive stage. And it is the purpose (<strong>in</strong>tention) of this<br />

article to p<strong>in</strong>po<strong>in</strong>t the legal concerns for Intelligence<br />

Vehicle Telematics <strong>in</strong> front and try to come up the<br />

positive solutions <strong>in</strong> the hope of that the discussion could,<br />

at least, have some referential value for the possible<br />

future policy mak<strong>in</strong>g decision.<br />

REFERENCES<br />

[1] M. Aoyama, “Comput<strong>in</strong>g for the Next-Generation<br />

Automobile,” Computer, vol.45, no. 6, pp. 32-37, 2012.<br />

[2] F. R. Soriano, V. R. Tomás, and M. Pla-Castells,<br />

“Deploy<strong>in</strong>g harmonized ITS services <strong>in</strong> the framework of<br />

EasyWay project: Traffic Management Plan for corridors<br />

and networks,” Euro American Conference on Telematics<br />

and Information Systems (EATIS), pp. 1 – 7, 2012.<br />

[3] J. Blau, “Car Talk,” 2008, Available:<br />

http://spectrum.ieee.org/green-tech/advanced-cars/car-talk.<br />

Accessed 2011 Mar. 22.<br />

[4] W. D. Jones, “Smarter Cars There's an App for That,”<br />

2011, Available: http://spectrum.ieee.org/greentech/advanced-cars/smarter-cars-theres-an-app-for-that/0.<br />

Accessed 2011 April 6.<br />

[5] M. G H. Bell, “Policy issues for the future <strong>in</strong>telligent road<br />

transport <strong>in</strong>frastructure,” IEE Proceed<strong>in</strong>gs - Intelligent<br />

Transport Systems, vol. 153, no. 2, pp. 147 – 155, 2006.<br />

[6] A. Amditis, E. Bertolazzi, M. Bimpas, F. Biral, P. Bosetti,<br />

M. D. Lio, L. Danielsson, A. Gallione, H. L<strong>in</strong>d, A. Saroldi,<br />

and A. Sjögren, “A Holistic Approach to the Integration of<br />

Safety,” IEEE Trans. on Intellignet Transportation System,<br />

vol. 11, no. 3, pp. 554 – 566, 2010.<br />

[7] P. Green, “Driver distraction, telematics design, and<br />

workload managers: Safety issues and solutions,”<br />

International Congress on Transportation Electronics, pp.<br />

165 – 180, 2004.<br />

[8] R. N. Charette, “This Car Runs on Code,” 2009, Available:<br />

http://spectrum.ieee.org/green-tech/advanced-cars/this-carruns-on-code/0.<br />

Accessed 2011 Mar. 23.<br />

[9] I. Berger, “Can You Trust Your Car” 2002, Available:<br />

http://spectrum.ieee.org/green-tech/advanced-cars/can-youtrust-your-car/0.<br />

Accessed 2011 April 6.<br />

[10] O. M. J. Carsten, and L. Nilsson, “Safety Assessment of<br />

Driver Assistance Systems,” European Journal of<br />

Transport and Infrastructure Research, vol. 1, no. 3, pp.<br />

225 – 243, 2001.<br />

[11] M. A. Brackstone, B. Sultan, and M. McDonald, “F<strong>in</strong>d<strong>in</strong>gs<br />

on the Approach Process Between Vehicles - Implications<br />

for Collision Warn<strong>in</strong>g,” Transportation Research Record –<br />

Journal of the Transportation Research Board, vol. 1724,<br />

pp. 21 – 28, 2000.<br />

[12] J. A. Misener, H.-S. J. Tsao, B. Song, and A. Ste<strong>in</strong>feld,<br />

“Emergence of a Cognitive Car-Follow<strong>in</strong>g Driver Model -<br />

Application to Rear-End Crashes with a Stopped Lead<br />

Vehicle,” Transportation Research Record – Journal of the<br />

Transportation Research Board, vol. 1724, pp. 29 – 38,<br />

2000.<br />

[13] A. Smiley, “Behavioral Adaptation, Safety, and Intelligent<br />

Transportation Systems,” Transportation Research Record<br />

– Journal of the Transportation Research Board, vol. 1724,<br />

pp. 47 – 51, 2000.<br />

[14] A. Rae, and O. Basir, “Reduc<strong>in</strong>g Multipath Effects <strong>in</strong><br />

Vehicle Localization by Fus<strong>in</strong>g GPS with Mach<strong>in</strong>e<br />

Vision,” International Conference on Information Fusion,<br />

pp. 2099 – 2106, 2009.<br />

[15] M. M. Trivedi, T. Gandhi, and J. McCall, “Look<strong>in</strong>g-In and<br />

Look<strong>in</strong>g-Out of a Vehicle: Computer-Vision-Based<br />

Enhanced Vehicle Safety,” IEEE Trans. On Intelligent<br />

Transportation Systems, vol. 8, no. 1, pp. 108 – 120, 2007.<br />

[16] H. Cheng, N. Zheng, X. Zhang, J. Q<strong>in</strong>, and H. van de<br />

Weter<strong>in</strong>g, “Interactive Road Situation Analysis for Driver<br />

Assistance and Safety Warn<strong>in</strong>g Systems: Framework and<br />

Algorithms,” IEEE Trans. On Intelligent Transportation<br />

Systems, vol. 8, no. 1, pp. 157 – 167, 2007.<br />

[17] C. C. Huang-Fu, and Y. B. L<strong>in</strong>, “Deriv<strong>in</strong>g Vehicle Speeds<br />

from Standard Statistics of Mobile Telecom Switches,”<br />

IEEE Transactions on Vehicular Technology, vol. 61, no. 7,<br />

pp. 3337–3341, SEPTEMBER 2012.<br />

[18] C. Troncoso, G. Danezis, E. Kosta, J. Balasch, and B.<br />

Preneel, “PriPAYD: Privacy-Friendly Pay-As-You-Drive<br />

Insurance,” IEEE Transactions on Dependable and Secure<br />

Comput<strong>in</strong>g, vol. 8, no. 5, pp. 742 – 755, 2011.<br />

[19] Freeman v. Adams, 63 Cal. App. 225, 1923.<br />

[20] Heath v. Swift W<strong>in</strong>gs. Inc., 252 S.E.2d. 526, 1979.<br />

[21] Synder v. LTG L Lufttechnische, GmbH, 955 S.W.2d 252,<br />

Tenn. 1997.<br />

[22] V. E. Schwartz, K. Kelly, and D. F. Partlett, Prosser, Wade<br />

and Schwartz’s Torts-Cases and Materials. West Group,<br />

721p, 2000.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1559<br />

[23] Henn<strong>in</strong>gsen v. Bloomfield Motors, Inc., 161 A.2d 69, 1960.<br />

[24] Andrade v. Shiers, 564 So.2d 787, La. App. 1990.<br />

[25] Golden v. Amory, 109 N.E.2d 131, 1952.<br />

[26] “Product liability,” Available:<br />

http://en.wikipedia.org/wiki/Product_liability. Accessed<br />

2011 Mar. 23.<br />

[27] MacPherson v. Buick Motor Co., 217 N.Y. 382, 1916.<br />

[28] Henn<strong>in</strong>gsen v. Bloomfield Motors, Inc., 161 A.2d 69, 1960.<br />

[29] Greenman v. Yuba Power Products, Inc., 377 P.2d. 897,<br />

1963.<br />

[30] V. E. Schwartz, K. Kelly, and D. F, Partlett, Prosser, Wade<br />

and Schwartz’s Torts-Cases and Materials. West Group.<br />

794p, 1994.<br />

[31] J. R. Alberts, J. Petersen, and A. L. T. Para, “Survey of<br />

Recent Developments <strong>in</strong> Indiana Product Liability Law,”<br />

Ind. L. Rev. vol. 43, pp. 873– 917, 2010.<br />

[32] Daly v. General Motors Corp., 575 P.2d 1162, 1978.<br />

[33] K<strong>in</strong>g v. Collagen Corp., 983 F.2d 1130, 1993.<br />

[34] Erkson v. Sears, Roebuck & Co., 841 S.W.2d 207, Mo.<br />

App. 1992.<br />

[35] V. L. MacDougall, Oklahoma Practice Product Liability<br />

Law. Thomson West, vol. 8, pp. 1– 2, 2010.<br />

[36] A. F. Amendola, “Can You Hear Me Now: The Myths<br />

Surround<strong>in</strong>g Cell Phone Use While Driv<strong>in</strong>g and<br />

Connecticut’s Failed Attempt at a Remedy,” Conn. L. Rev.<br />

vol. 41, no. 1, pp. 339–379, 2008.<br />

[37] Griswold v. Connecticut, 381 U.S. 479, 1965.<br />

[38] S. L. Emanuel, Constitutional Law. Aspen Law & Bus<strong>in</strong>ess,<br />

152p, 1998-99.<br />

[39] Hall v. Post, 323 N.C. 259, N.C. 1988.<br />

[40] American College of Emergency Physician, “From<br />

Hippocrates to HIPAA: Privacy and Confidentiality <strong>in</strong><br />

Emergency Medic<strong>in</strong>e-PartI: Conceptual, Moral, and legal<br />

foundations,”<br />

Available:<br />

http://www.acep.org/NR/rdonlyres/DE534243-E7D5-<br />

4A51-9827-1D95828DA45C/0/hippocrateshopaaI.pdf.<br />

Accessed 2011 Mar. 29.<br />

[41] L. B. Andrews, M. J. Mehlman, and M. A. Rothste<strong>in</strong>,<br />

Genetics: Ethics, Law and Policy. West Law School. 88,<br />

391-401p, 2002.<br />

[42] “American Recovery and Re<strong>in</strong>vestment Act of 2009,”<br />

Available: http://www.gpo.gov/fdsys/pkg/PLAW-<br />

111publ5/pdf/PLAW-111publ5.pdf. Accessed 2011 Mar.<br />

30.<br />

[43] T. J. Smed<strong>in</strong>ghoff, “Security Breach Notification Law:<br />

Def<strong>in</strong><strong>in</strong>g a New Corporate Obligation,” International<br />

securities law, pp. 11–16, 2006. Available:<br />

http://www.wildman.com/resources/articlespdf/Security_Breach_Notification_Law.pdf.<br />

Accessed<br />

2011 Mar. 30.<br />

[44] Tiffany (NJ) Inc. v. Ebay Inc. 576 F. Supp.2d 463<br />

(S.D.N.Y.), 2008.<br />

[45] Inwood Lab. Inc. v. Ives Lab. Inc. 456 U.S. 844, 1982.<br />

[46] G. M. Steven, “Homeland Security Act of 2002: Critical<br />

Infrastructure Information Act,” Report for Congress<br />

RL31763, pp. 1–16, 2008.<br />

[47] C. Koski, “Committed to Protection Partnership <strong>in</strong><br />

Critical Infrastructure Protection,” Journal of Homeland<br />

Security and Emergency Management, vol. 8, no. 1, 2011.<br />

Fa-Chang Cheng received LL.M. degree from Golden Gate<br />

University and J.D. (Juris Doctor) degree from Ohio Northern<br />

University, U.S.A., <strong>in</strong> 1997 and 2001, respectively.<br />

He is a full-time associate professor <strong>in</strong> Graduate Institute of<br />

Science and Technology Law of National Kaohsiung First<br />

University of Science and Technology. His major research area<br />

is focus<strong>in</strong>g on the legal issues for both Telecommunication and<br />

Biotechnology.<br />

Wen-Hs<strong>in</strong>g Lai received the Ph.D. degrees <strong>in</strong> communication<br />

eng<strong>in</strong>eer<strong>in</strong>g from National Chiao Tung University, Hs<strong>in</strong>chu,<br />

Taiwan, <strong>in</strong> 2003.<br />

In 2006, she became an Assistant Professor of the<br />

Department of Computer and Communication Eng<strong>in</strong>eer<strong>in</strong>g,<br />

National Kaohsiung First University of Science and Technology,<br />

Taiwan. Her major research area is focus<strong>in</strong>g on digital signal<br />

process<strong>in</strong>g.<br />

© 2013 ACADEMY PUBLISHER


1560 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

MPC Controller Performance Evaluation and<br />

Tun<strong>in</strong>g of S<strong>in</strong>gle Inverted Pendulum Device<br />

Chao Cheng<br />

Department of Automation, Beij<strong>in</strong>g University of Chemical Technology, Beij<strong>in</strong>g, Ch<strong>in</strong>a<br />

Email: beryle117@163.com<br />

Zhong Zhao 1 , Haixia Li<br />

Department of Automation, Beij<strong>in</strong>g University of Chemical Technology, Beij<strong>in</strong>g, Ch<strong>in</strong>a<br />

Email: zhaozhong@mail.buct.edu.cn<br />

Abstract—Inverted pendulum is a non-l<strong>in</strong>ear, multivariable<br />

and unstable device, a model predictive control (MPC)<br />

performance evaluation and tun<strong>in</strong>g method for <strong>in</strong>verted<br />

pendulum device is proposed. MPC was designed to control<br />

the <strong>in</strong>verted pendulum device, and the m<strong>in</strong>imum variance<br />

covariance constra<strong>in</strong>ed control (MVC 3 ) was applied to<br />

evaluate the performance of the MPC controller and tune its<br />

parameters. The application results to a s<strong>in</strong>gle <strong>in</strong>verted<br />

pendulum device have verified the feasibility and<br />

effectiveness of the proposed method.<br />

Index Terms—Inverted pendulum, Model Predict Control,<br />

M<strong>in</strong>imum Variance Covariance Constra<strong>in</strong>ed Control,<br />

Performance evaluation, Controller-tun<strong>in</strong>g<br />

I. INTRODUCTION<br />

Inverted pendulum is a non-l<strong>in</strong>ear, strongly coupled,<br />

multivariable and unstable system. Because it can<br />

effectively reflect a lot of key control problems, such as<br />

the stabilization, robustness, track<strong>in</strong>g performance, many<br />

control theories and control methods can be verified with<br />

the <strong>in</strong>verted pendulum experiment. Google Technology<br />

LTD [1] designed its LQR controller. D. Chatterjee et al.<br />

[2] described the sw<strong>in</strong>g-up and stabilization with a<br />

restricted cart track length and restricted control force<br />

us<strong>in</strong>g generalized energy control methods. M. Bugeja [3]<br />

presented a sw<strong>in</strong>g-up and stabiliz<strong>in</strong>g controller on<br />

<strong>in</strong>verted pendulum non-l<strong>in</strong>ear model. S.Y. Zhang [4] and<br />

Y. Fan et al. [5] designed the fuzzy controllers for<br />

<strong>in</strong>verted pendulum. L.X. Deng [6] designed a controller<br />

based on back stepp<strong>in</strong>g for <strong>in</strong>verted pendulum.<br />

Model Predictive Controllers (MPC) was proposed by<br />

J. Richalet et al. <strong>in</strong> 1978[7]. It is a model-based optimal<br />

control strategy [8]. Its ability to <strong>in</strong>corporate mean<strong>in</strong>gful<br />

limits on manipulative as well as control variables has<br />

allowed the <strong>in</strong>dustry to move away from traditional<br />

regulation-type control and focus on the economics of<br />

operat<strong>in</strong>g po<strong>in</strong>t selection [9]. Model predictive control<br />

has been widely applied to process control [10]. On the<br />

1, Correspond<strong>in</strong>g author, zhaozhong@mail.buct.edu.cn;<br />

other hand, it is noted that less effort has been made on<br />

the performance monitor<strong>in</strong>g of MPC applications, while<br />

the performance monitor<strong>in</strong>g of conventional controllers<br />

has been well studied such as <strong>in</strong> Harris (1989) [11],<br />

Harris, Boudreau, and Macgregor (1996) [12], Huang,<br />

Shah, and Kwok (1997) [13], Huang and Shah (1999)<br />

[14], Jelali (2005) [15], Sr<strong>in</strong>ivasan, Rengaswamy, and<br />

Miller (2005) [16] [17], Xu, Lee, and Huang (2006) [18],<br />

Salsbury (2007) [19] and Bauer and Craig (2008) [20].<br />

The M<strong>in</strong>imum Variance Covariance Constra<strong>in</strong>ed<br />

Control (MVC 3 ) pr<strong>in</strong>ciple was proposed by R.E. Skelton<br />

et al. [21] as the solution of l<strong>in</strong>ear feedback control<br />

problem. For multivariable systems, D.J. Chmielewski*<br />

et al. [22] solved it with LQR method. In this work, the<br />

model predictive control (MPC) performance evaluation<br />

and tun<strong>in</strong>g system has been developed by extended<br />

MVC 3 and applied to a s<strong>in</strong>gle <strong>in</strong>verted pendulum device.<br />

The application results have verified the feasibility and<br />

effectiveness of the developed system.<br />

II. THE MATHEMATIC MODEL OF LINEAR SINGLE<br />

INVERTED PENDULUM<br />

The l<strong>in</strong>ear s<strong>in</strong>gle <strong>in</strong>verted pendulum can be described<br />

as a system composed of a cart and a homogeneous rod<br />

without air resistance and all k<strong>in</strong>ds of frictions, as is<br />

illustrated <strong>in</strong> Fig. 1.<br />

Figure 1. L<strong>in</strong>ear s<strong>in</strong>gle <strong>in</strong>verted pendulum model<br />

Where, M , m , x , F , l ,θ ,denote cart weight, rod weight,<br />

cart level displacement, force on cart, the length from the<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1560-1570


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1561<br />

axis of the rod angle to the center of rod mass, the angle<br />

of the rod from the vertical upward direction respectively.<br />

A. State Space Model of L<strong>in</strong>ear S<strong>in</strong>gle Inverted<br />

Pendulum<br />

The method of this work is based on l<strong>in</strong>ear constant<br />

state space model as:<br />

x<br />

= Ax + Bu<br />

. (1)<br />

y = Cx + Du<br />

The mathematical model of s<strong>in</strong>gle <strong>in</strong>verted pendulum can<br />

be obta<strong>in</strong>ed by mechanism analysis [1], shown <strong>in</strong> (2),<br />

where, u , is cart angular velocity. x andθ , are the same<br />

as shown <strong>in</strong> Fig 1.<br />

⎛x<br />

⎞ ⎛0 1 0 0⎞⎛x<br />

⎞ ⎛0⎞<br />

⎜<br />

x<br />

⎟ ⎜<br />

0 0 0 0<br />

⎟⎜ x<br />

⎟ ⎜<br />

1<br />

⎟<br />

⎜ ⎟<br />

<br />

= ⎜ ⎟⎜ ⎟+<br />

⎜ ⎟u<br />

⎜ θ ⎟ ⎜0 0 0 1⎟⎜θ<br />

⎟ ⎜0⎟<br />

⎜<br />

θ ⎟ ⎜ ⎟<br />

0 0 29.4 0 ⎜θ<br />

⎟ ⎜ ⎟<br />

⎝ ⎠<br />

<br />

⎝ ⎠<br />

⎝ ⎠ ⎝3⎠<br />

⎛x<br />

⎞<br />

⎜<br />

x 1 0 0 0 x<br />

⎟<br />

⎛ ⎞ ⎛ ⎞ ⎛0⎞<br />

y = ⎜ ⎟<br />

⎜ = + u<br />

θ<br />

⎟ ⎜<br />

0 0 1 0<br />

⎟⎜θ<br />

⎟ ⎜<br />

0<br />

⎟<br />

⎝ ⎠ ⎝ ⎠ ⎝ ⎠<br />

⎜ <br />

θ ⎟<br />

⎝ ⎠<br />

B. Controllability & Observability Analysis of S<strong>in</strong>gle<br />

Inverted Pendulum<br />

The controllability and observability of a system is<br />

prerequisite for analysis and controller design. Here,<br />

n−<br />

Uc = B AB A 1 B and<br />

Controllability matrix ( )<br />

n<br />

observability matrix Uo ( C CA CA −1<br />

)<br />

T<br />

(2)<br />

= were<br />

obta<strong>in</strong>ed and then rank criterion was employed to<br />

analysis its controllability and observability. It has been<br />

proved that the system as (2) has both controllability and<br />

observability.<br />

C. Stability Analysis of S<strong>in</strong>gle Inverted Pendulum<br />

The extended MVC 3 performance evolution and MPC<br />

tun<strong>in</strong>g system is based on the stabilization system. Hence,<br />

Stability analysis is necessary. The poles of the <strong>in</strong>verted<br />

pendulum as (2) are ( 5.4222 − 5.4222 0 0)<br />

, where<br />

positive real root appears. It shows that the system as (2)<br />

is <strong>in</strong>stable and this requires a stabilizer before design<strong>in</strong>g a<br />

MPC controller for the generalized controlled system [23].<br />

III. MPC PERFORMANCE EVOLUTION AND TUNING<br />

METHODE BASED ON EXTENDED MVC 3<br />

A. Introductions of LMI and Lemmas<br />

• About LMI:<br />

Assume a l<strong>in</strong>ear matrix <strong>in</strong>equality (LMI) can be stated<br />

as: F( x) = F0 + x1F1+⋅⋅⋅+ xmFm<br />

< 0 .Where, variable<br />

x constitutes a convex set, LMI can be solved us<strong>in</strong>g the<br />

method of convex optimization problem [24].<br />

1) Feasible solution of LMI:<br />

If there exists x makes, F( x ) < 0 , established, then the<br />

LMI is feasible [24].This can be expressed us<strong>in</strong>g the<br />

follow<strong>in</strong>g formulation:<br />

m<strong>in</strong>. t<br />

.<br />

s.. tF( x)<br />

< tI<br />

2) M<strong>in</strong>imization problem of LMI:<br />

The problem can be stated as a optimality problem that<br />

m<strong>in</strong>imize the largest eigenvalue, λ , of the matrix<br />

Gx ( ) under <strong>in</strong>equality constra<strong>in</strong>t H( x ) < 0 [24]:<br />

st ..<br />

Another expression is as:<br />

T<br />

m<strong>in</strong> λ<br />

G < λI<br />

.<br />

< 0<br />

( x)<br />

H ( x)<br />

T<br />

m<strong>in</strong> c x<br />

,<br />

st .. F < 0<br />

( x)<br />

where, c x is object function.<br />

• Lemmas:<br />

Consider a l<strong>in</strong>ear time-<strong>in</strong>variant state-space system:<br />

x( k + 1) = Ax( k) + Bu( k) + Ew( k)<br />

, (3)<br />

y( k) = Cx( k)<br />

where, x (k)<br />

, u ( k ) , y( k ) are state variable, manipulative<br />

variable and control output variable respectively,<br />

A , B , C and E are process model matrix, w ( k)<br />

denotes<br />

stationary, Gaussian noise with zero mean and covariance<br />

as ∑ w .<br />

State feedback controller can be expressed as:<br />

u( k) = Kx ( k)<br />

. (4)<br />

Then, the closed-loop system can be written as:<br />

x( k + 1) = ( A+ BK) x( k) + Ew ( k)<br />

. (5)<br />

Lemma1: LMI of MVC 3 [22]:<br />

For system (5), ∃ stabiliz<strong>in</strong>g K and ∑x ≥ 0 s.t.<br />

∑ , = 1... p<br />

yi i<br />

T<br />

T<br />

x w x<br />

T<br />

∑ y = ϕ<br />

i iC∑<br />

xC<br />

ϕi<br />

2<br />

∑ y < y , 1<br />

i i i = … p<br />

( A+ BK) ∑ ( A+ BK)<br />

+ E∑ E = ∑<br />

If and only if ∃ W, X > 0and Yi , = 1... ps.t.<br />

⎡<br />

T<br />

X − E∑<br />

E AX BW⎤<br />

w +<br />

⎢<br />

⎥><br />

0<br />

T<br />

⎢⎣( AX + BW ) X ⎥⎦<br />

⎡ Yi<br />

ϕiCX⎤ ⎢<br />

( ) T 0<br />

T<br />

⎥ ><br />

⎢⎣<br />

CX ϕi<br />

X ⎥⎦<br />

© 2013 ACADEMY PUBLISHER


1562 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Y i2 i < y , i = 1… p,<br />

where, K is the l<strong>in</strong>ear state feedback ga<strong>in</strong>; ∑ x is the state<br />

variables covariance; ∑ is the i th variable of output<br />

covariance ∑ y ;<br />

y i<br />

2<br />

y i is constra<strong>in</strong>t of<br />

Lemma2: Schur complements [25]:<br />

For symmetric matrix:<br />

⎡S<br />

S = ⎢<br />

⎣S<br />

11<br />

21<br />

∑ yi .<br />

The follow<strong>in</strong>g three conditions are equivalent:<br />

1) S < 0<br />

T −1<br />

22 12 11 12 0<br />

2) S 11 < 0 , S − S S S <<br />

−1<br />

T<br />

11 12 22 12 0<br />

3) S 22 < 0 , S − S S S < .<br />

B. Extended MVC 3 Problem and Its LMI Solution<br />

In this work, constra<strong>in</strong>ts on manipulative variables<br />

were <strong>in</strong>cluded <strong>in</strong> the MVC 3 scheme. The extended MVC 3<br />

can be described as:<br />

S<br />

S<br />

12<br />

22<br />

⎤<br />

⎥<br />

⎦<br />

p<br />

m<br />

m<strong>in</strong> qi ∑ yi + rj ∑u j<br />

∑ x, KY , i, Uj<br />

i= 1 j=<br />

1<br />

∑ ∑ (6)<br />

s.t. ( A+ BK) ∑ ( A+ BK) T + E∑ E<br />

T = ∑ (7)<br />

x w x<br />

T<br />

yi ϕiC<br />

C ϕi<br />

∑ = ∑ x (8)<br />

T<br />

uj ϕ jK<br />

K ϕ j<br />

∑ = ∑ x (9)<br />

2<br />

i<br />

∑ < y , i = 1... p<br />

(10)<br />

yi<br />

2<br />

j<br />

∑ < u , j = 1... m. (11)<br />

uj<br />

The ma<strong>in</strong> design target of the extended MVC 3 is<br />

obta<strong>in</strong><strong>in</strong>g l<strong>in</strong>ear feedback ga<strong>in</strong> K to make object function<br />

(6) m<strong>in</strong>imum, additionally, to make the steady-state<br />

control outputs and the covariance of manipulative<br />

variables satisfy a set of bounds respectively. The above<br />

problem can be converted to a convex form of LMI as<br />

follows.<br />

Theorem 1: If and only if ∃W, X ≥ 0 and Y i ,<br />

U , i = 1... p, j = 1... m s.t.<br />

j<br />

p m<br />

m<strong>in</strong> qY i i+<br />

rU j j<br />

XWYU , , j j i= 1 j=<br />

1<br />

∑ ∑ (12)<br />

⎡<br />

T<br />

X −E∑ E AX BW⎤<br />

w +<br />

s.t. ⎢<br />

⎥><br />

0<br />

T<br />

⎢⎣( AX + BW ) X ⎥⎦<br />

(13)<br />

⎡ Yi<br />

ϕiCX⎤ ⎢<br />

0<br />

T T ⎥ ><br />

⎣( CX ) ϕi<br />

X ⎦<br />

⎡ U j ϕ jW⎤ ⎢ T T ⎥ > 0<br />

⎢⎣<br />

W ϕ j X ⎥⎦<br />

(14)<br />

(15)<br />

Y i2 i < y , i = 1... p<br />

(16)<br />

U j2 j < u , j = 1... m<br />

(17)<br />

−1<br />

Then, u= Kx( k) = WX x( k)<br />

is the extended MVC 3 l<strong>in</strong>ear<br />

feedback controller of system (2), satisfy<strong>in</strong>g covariance<br />

constra<strong>in</strong>ts.<br />

Proof: If the closed-loop system (2) is stable, the steady<br />

state covariance matrix can be expressed<br />

T<br />

as ∑ x = lim{E[ x( k) x ( k)]}<br />

, and ∑<br />

x<br />

satisfies (7). From<br />

k→∞<br />

the def<strong>in</strong>ition of covariance, it is easily to get the<br />

T<br />

T<br />

expression ∑ = ϕC∑ x C ϕ , ∑ = ϕ K∑ x K ϕ ,<br />

where,<br />

yi i i<br />

2<br />

u j<br />

∑<br />

yi<br />

< y i<br />

,<br />

uj j j<br />

2<br />

j<br />

∑ < u .From Lemma 1,<br />

∃∑ x < X , Makes the state covariance constra<strong>in</strong>t (7) is<br />

T<br />

equivalent to LMI (13). Let ϕiCXC ϕ i < Yi, i = 1, … p ,<br />

T<br />

ϕjKXK ϕ j < U j, j = 1, … m , and Y i2 i < y , i = 1... p ,<br />

U j2 j < u , j = 1... m.Then:<br />

p<br />

m<br />

p m<br />

qi ∑ yi + rj ∑u j ≤ qY i i + rU j j<br />

i= 1 j= 1 i= 1 j=<br />

1<br />

∑ ∑ ∑ ∑ .<br />

Then, m<strong>in</strong>imiz<strong>in</strong>g the function<br />

ensure the object function<br />

p m<br />

qY i i + rU j j<br />

i= 1 j=<br />

1<br />

p<br />

m<br />

qi yi + rj uj<br />

i= 1 j=<br />

1<br />

∑ ∑ will<br />

∑ ∑ ∑ ∑ be<br />

m<strong>in</strong>imized too. Still use Lemma 1, (14)-(17) can be<br />

derived.<br />

From the def<strong>in</strong>ition of extended MVC 3 problem,<br />

controller feedback solution K ∗ can be solved by<br />

∗ ∗ ∗−1<br />

K = W X with LMI. Where, W ∗ and X ∗ denote the<br />

optimal solution matrices of the extended MVC 3 problem.<br />

Conditions (14)-(17) are exactly that required to<br />

determ<strong>in</strong>e the feasibility of the extended MVC 3 problem.<br />

If the problem turns out to be <strong>in</strong>feasible, then the<br />

2 2<br />

bound<strong>in</strong>g region def<strong>in</strong>ed by yi<br />

and u j terms should be<br />

enlarged.<br />

C. Performance Evolution Based on Extended MVC 3<br />

For closed-loop system (5) the multi-variable form of<br />

LQG performance benchmarks can be def<strong>in</strong>ed as<br />

T<br />

T<br />

J<br />

LQG<br />

= E(<br />

y Qy)<br />

+ λ E( u Ru)<br />

. In order to evaluate<br />

controllers under constra<strong>in</strong>s, the covariance constra<strong>in</strong>s are<br />

<strong>in</strong>cluded <strong>in</strong> the LQG performance evaluation benchmarks.<br />

New performance evolution is exactly an advanced<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1563<br />

MVC 3 problem. After deformation, the problem can be<br />

solved by technology of LMI:<br />

If and only if ∃W, X ≥ 0 , λ > 0 and Y i , U j , i = 1... p ,<br />

j = 1... m and the follow<strong>in</strong>g optimization as (18) can be<br />

solved,<br />

p<br />

m<br />

m<strong>in</strong> qY i i+<br />

λ rU j j<br />

XYUWi , , , = 1 j=<br />

1<br />

∑ ∑ (18)<br />

s.t. (13)-(17).<br />

Then, accord<strong>in</strong>g to the change of λ , optimized curve of<br />

control outputs variance Var( y)<br />

and manipulative variable<br />

variance Var( u ) can be obta<strong>in</strong>ed. This optimized curve<br />

can be used as the benchmark to evaluate controller<br />

performance.<br />

Accord<strong>in</strong>g to optimization objective function:<br />

T<br />

T<br />

J = E( y Qy) + λ E( u Ru)<br />

= Trace( Q ∑ y + λR<br />

∑u)<br />

.<br />

T<br />

T<br />

= QTrace( C ∑ xC ) + λRTrace( K ∑x<br />

K )<br />

T<br />

T<br />

≤ QTrace( CXC ) + λRTrace( KXK )<br />

T<br />

T<br />

Let CXC < Y , KXK < U , thus, m<strong>in</strong>imiz<strong>in</strong>g<br />

QTrace( Y ) + λRTrace( U ) can ensure J be m<strong>in</strong>imized<br />

too. Object function can be rewritten as<br />

3<br />

MVC<br />

p<br />

m<br />

i i λ j j<br />

i= 1 j=<br />

1<br />

J = ∑qY + ∑ rU . (13)-(17) can be obta<strong>in</strong>ed as<br />

the same as LMI of advanced MVC 3 .<br />

The MVC 3 benchmark curve is the lower limit of the<br />

controller performance. That is, all l<strong>in</strong>ear controllers can<br />

only be located <strong>in</strong> operat<strong>in</strong>g area above the curve.<br />

Compar<strong>in</strong>g actual run-time steady state outputs and<br />

manipulated variables covariance with the MVC 3<br />

benchmark cure, closer distance means better<br />

performance. In practice, a benchmark<br />

3<br />

MVC<br />

p m<br />

i= 1<br />

i i<br />

j=<br />

1<br />

j j<br />

J = ∑qY + ∑ rU can be calculated as λ = 1, then,<br />

judge controller performance by the ratioη which is the<br />

value of benchmark J 3 divided by actual operation<br />

MVC<br />

steady state covariance J arh .η closes to 1 means better<br />

performance.<br />

D. Extended MVC 3 and Inf<strong>in</strong>ite Horizon MPC<br />

• Solution of <strong>in</strong>f<strong>in</strong>ite horizon MPC<br />

For l<strong>in</strong>ear system, solv<strong>in</strong>g <strong>in</strong>f<strong>in</strong>ite horizon MPC is<br />

equivalent to solv<strong>in</strong>g the LQR control problem as follows,<br />

∞<br />

m<strong>in</strong> ∑ x( k) Qx( k) + u ( k) Ru( k)<br />

(19)<br />

u( k ) k = 0<br />

T<br />

x( k + 1) = Ax( k) + Bu( k)<br />

s.t.<br />

.<br />

y( k) = Cx( k)<br />

T<br />

Let<br />

T<br />

p<br />

Q= C DC,( D= ∑ qϕ ϕ ) , and let feedback<br />

i=<br />

1<br />

T<br />

i i i<br />

controller be u( k) = Kx ( k)<br />

, then,<br />

T −1<br />

T<br />

K =− ( B PB + R)<br />

B PA , where,<br />

T T T −1<br />

T<br />

P = A PA − A PB( B PB + R)<br />

B PA + Q .<br />

• LQG control problem<br />

LQG control problem can be described as:<br />

1 T<br />

T<br />

T<br />

m<strong>in</strong> lim ∑ E[ y( k) Qy( k) + u( k) Ru ( k)]<br />

(20)<br />

u T<br />

( k) T→∞ k = 0<br />

x( k + 1) = Ax( k) + Bu( k) + Ew( k)<br />

s.t.<br />

,<br />

y( k) = Cx( k)<br />

where feedback controller can be solved by<br />

T −1<br />

T<br />

K =− ( B PB + R)<br />

B PA , here, PQis , the same as the<br />

solution of <strong>in</strong>f<strong>in</strong>ite horizon MPC. Rewrite the object<br />

function <strong>in</strong> (21) as,<br />

1 T<br />

T<br />

T<br />

J = lim ∑ E[ y( k) Qy( k) + u( k) Ru( k)<br />

T →∞ T k = 0<br />

T<br />

T<br />

= lim E[ y( k) Qy( k) + u( k) Ru( k)]<br />

k→∞<br />

.<br />

= Trace ∑ + ∑<br />

{ Q y R u}<br />

p<br />

m<br />

T<br />

T<br />

∑qiϕi yϕi ∑ rjϕ j uϕ<br />

j<br />

i= 1 j=<br />

1<br />

= ∑ + ∑<br />

• Extended MVC 3 control problem without<br />

constra<strong>in</strong>ts<br />

Extended MVC 3 control problem can be described as:<br />

p m<br />

qY i i+<br />

rU j j<br />

∑ x i= 1 j=<br />

1<br />

m<strong>in</strong> ∑ ∑ (21)<br />

s.t. ( A+ BK) ∑ ( A+ BK) + E∑ w E = ∑<br />

x<br />

T T<br />

i ∑ x ϕi = i, = 1<br />

ϕ C C Y i p<br />

T<br />

T<br />

ϕ jK ∑ x K ϕ j = U j, j = 1… m .<br />

The goal is to get a feedback ga<strong>in</strong> matrix K by m<strong>in</strong>imize<br />

p m<br />

the objective function ∑qY<br />

+ ∑ rU .<br />

T<br />

i i j j<br />

i= 1 j=<br />

1<br />

Assumption 1. R > 0 , Q ≥ 0 .<br />

Assumption 2.The pairs ( A, B ) and ( A, Q)<br />

is stabilizable<br />

and detectable, respectively.<br />

T<br />

Assumption 3.The pair ( A, G∑ w G ) is controllable.<br />

Let hypotheses 1-3 hold; then the solution to of MVC 3<br />

problem as (21) is co<strong>in</strong>cident with the solution of <strong>in</strong>f<strong>in</strong>ite<br />

horizon MPC as (19). Hypotheses 1-2 <strong>in</strong>dicate that the<br />

solutions of problems (19) and (20) are unique and<br />

stabiliz<strong>in</strong>g. Hypotheses 1-3 ensure that the solution of<br />

problem (21) is unique and stabiliz<strong>in</strong>g. From the<br />

construction of problem (20), it is equivalent to problem<br />

(21), <strong>in</strong> the sense that the l<strong>in</strong>ear feedback generated by<br />

T<br />

x<br />

© 2013 ACADEMY PUBLISHER


1564 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

(21) is the solution to problem (20). F<strong>in</strong>ally, certa<strong>in</strong>ty<br />

equivalence between problems (20) and (19) completes<br />

the proof.<br />

Theorem 2: Let hypotheses 1-3 hold; then the solution<br />

of K ∗ , to problem (12)-(17) is co<strong>in</strong>cident with the<br />

solution of appropriate weighted <strong>in</strong>f<strong>in</strong>ite horizon MPC<br />

problem (19).<br />

Proof. Problem (6)-(11) can be exactly restated as the<br />

existence of Lagrange multiplier, , s.t.<br />

1 1<br />

s.t. ⎢ 0<br />

T ⎥<br />

⎣S1 I1⎦<br />

⎡ T2 S2⎤ ⎢ 0<br />

T ⎥ ><br />

⎣S2 I2⎦<br />

T<br />

λ<br />

i<br />

, γ<br />

A PA 1 P1 Q 0<br />

j<br />

⎧<br />

p m ⎫<br />

T1 ρ1I1<br />

⎪<br />

m<strong>in</strong> { ∑qY<br />

i i+ ∑ rU j j +<br />

K, ∑x≥ 0, Yi, U<br />

⎪<br />

j i= 1 j=<br />

1<br />

⎪<br />

⎪<br />

⎪<br />

p<br />

m<br />

2 2 ⎪<br />

T2 ρ2I2<br />

⎪∑λi( Y i− yi ) + ∑γ<br />

j( U j −uj<br />

)} ⎪<br />

i= 1 j=<br />

1<br />

T<br />

⎪<br />

⎪ where, 1 ( ) ( )<br />

max ⎨<br />

T<br />

s. t. ( A+ BK) ∑ ( A+<br />

BK)<br />

⎬. (22)<br />

λi≥0, γ j≥0<br />

x<br />

T<br />

T<br />

⎪<br />

⎪ S2<br />

RK B PBK B PA<br />

T<br />

⎪ + E∑ w E =∑x<br />

⎪ LQR <strong>in</strong>verse-optimal Control, ,<br />

⎪<br />

T T<br />

⎪<br />

⎪ ϕiC∑ x C ϕi = Yi<br />

⎪<br />

⎪<br />

T T<br />

⎪<br />

∃P<br />

≥ 0 , Q ≥ 0 , R > 0 , P 1 > 0 , s.t.<br />

⎪⎩<br />

ϕ jK∑ x K ϕ j = U j ⎪⎭<br />

If rewrite the m<strong>in</strong>imization objective function as:<br />

p<br />

m<br />

T<br />

T<br />

m<strong>in</strong> { ∑( qi + λi) Y i+ ∑ ( rj + γ j) U j}<br />

RK B PBK B PA<br />

K, ∑x≥ 0, Yi, U j i= 1 j=<br />

1<br />

,<br />

p<br />

m<br />

T<br />

2 2<br />

A PA<br />

− ∑λiyi − ∑γ<br />

ju<br />

1 P1<br />

Q<br />

j<br />

i= 1 j=<br />

1<br />

λ i≥ γ j ≥ .This <strong>in</strong>dicates<br />

∗<br />

λ i γ j dependent solutions, K ( λi, γ j)<br />

,co<strong>in</strong>cide<br />

⎡ T1 S1⎤ ⎢ 0<br />

T ⎥ ><br />

⎣S1 I1⎦<br />

i = qi + i i = rj + j).<br />

T T T T<br />

1<br />

Because of the variance constra<strong>in</strong>ts (16) and (17),<br />

T<br />

problem cannot be equivalent to the <strong>in</strong>f<strong>in</strong>ite<br />

1 ≤ ρ1I1<br />

⎡ T1 S1⎤ and Lemma 2, ⎢ 0<br />

Theorem 2 guarantees that the MVC 3 T ⎥ ><br />

problem would<br />

⎣S1 I1⎦<br />

∗<br />

T<br />

T<br />

K λi<br />

γ j such that there to T 1 − S 1 S 1 > 0 , that is 1 I 1 SS 1 1<br />

⎡ T2 S2⎤ λ , γ j . But, weighted matrix Q , R of <strong>in</strong>f<strong>in</strong>ite<br />

⎢ 0<br />

T ⎥ ><br />

⎣S2 I2⎦<br />

T<br />

T<br />

2 = + +<br />

T2 ≤ ρ2I2<br />

LQR <strong>in</strong>verse-optimal control can be described as:<br />

If ∃P<br />

≥ 0 , Q ≥ 0 , R > 0 , P 1 > 0 and symmetric<br />

m<strong>in</strong> ρ 1 + ρ 2<br />

(23) PPT , , , T, QR ,<br />

then, it is clear that the above three assumptions are<br />

satisfied for all values of 0, 0<br />

that all ,<br />

with the solution to some <strong>in</strong>f<strong>in</strong>ite horizon MPC problem<br />

( λ λ , γ γ<br />

MVC 3<br />

horizon MPC problem (19). Theorem 2 shows that<br />

<strong>in</strong>troduc<strong>in</strong>g variance constra<strong>in</strong>ts to MVC 3 problem (21),<br />

is exactly the reason to adjust the MPC controller weight<br />

matrix, Q , R .<br />

generate a l<strong>in</strong>ear feedback ( , )<br />

exists a feasible solution for <strong>in</strong>f<strong>in</strong>ite horizon MPC<br />

problem. Unfortunately, the exact form of this <strong>in</strong>f<strong>in</strong>ite<br />

horizon MPC problem is unclear, unless the MVC 3<br />

solution procedure provides us with the optimal<br />

Lagrangians i<br />

horizon MPC can be solved by given feedback ga<strong>in</strong>, K .<br />

Then, it can be updated with the Riccati equation.<br />

E. LQR Inverse-Optimal Control and Its LMI Method<br />

matrices, T 1 , T 2 that<br />

1 1 2<br />

⎡ T S ⎤ ><br />

(24)<br />

(25)<br />

− − < (26)<br />

< (27)<br />

< , (28)<br />

S = A+ BK P A+ BK − P+ Q+ K RK ,<br />

= + + .Then, through the solution of<br />

QR,can be obta<strong>in</strong>ed.<br />

LQR <strong>in</strong>verse-Optimal Control [27] is described as:<br />

T T T T<br />

A PA − P −K RK − K B PBK + Q = 0 (29)<br />

+ + = 0 (30)<br />

− < , (31)<br />

where, (31) ensures that ( A, Q ) is detectable. As (29)<br />

cannot be converted to the LMI form, it can be<br />

constructed as,<br />

S = A PA −P −K RK − K B PBK + Q ,<br />

where, T 1 is symmetric matrix; ρ 1 is a scalar; I 1 is a<br />

unit matrix of appropriate dimension. From LMI theory<br />

is<br />

T<br />

equivalent<br />

ρ > .Then, approximate<br />

solution of equation (29), R , P , can be gotten through<br />

choos<strong>in</strong>g a small enough ρ 1 . Similarly,<br />

S RK B PBK B PA<br />

Equation (26) is the rewrit<strong>in</strong>g of (31). Then, the LMI<br />

form of LQR <strong>in</strong>verse-Optimal Control can be gotten.<br />

Equations (29)-(31) are constructed to LMI form to get<br />

parameters QR. , However, Matrix Q here is nondiagonal<br />

matrix, practical application is <strong>in</strong>convenience.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1565<br />

From LMI and ARE equivalence relation [28], S1<br />

is equal<br />

to:<br />

T T T T<br />

S1 = A PA + A PBK + ( BK) PA + BK P( BK)<br />

T<br />

T<br />

− P+ Q+<br />

K RK<br />

= ( A+ BK) P( A+ BK)<br />

− P+ Q+<br />

K RK<br />

Therefore, LMI form of (23)-(28) can be gotten and the<br />

solution of Q is diagonal matrix.<br />

F. MPC Tun<strong>in</strong>g Based on Extended MVC 3<br />

Consider system (3), outputs and manipulative variable<br />

constra<strong>in</strong>ts are as y ( k)<br />

< y and u ( k)<br />

< u , respectively,<br />

i<br />

i<br />

where, yi ( k)<br />

is i th element of y( k ) and u j ( k)<br />

is j th<br />

element of u ( k ) . When the MPC controller is put <strong>in</strong>to<br />

operation, extended MVC 3 performance evaluation<br />

criteria is used to monitor controller performance. If the<br />

performance evolution <strong>in</strong>dexη is below the thresholdψ ,<br />

weighted parameter R can be updated with extended<br />

MVC 3 to improve the robustness of the controlled system.<br />

The block diagram of MPC tun<strong>in</strong>g is shown <strong>in</strong> Fig. 2.<br />

Figure 2. Block diagram of MPC controller-tun<strong>in</strong>g<br />

IV. MPC CONTROLLER PERFORMANCE EVALUATION<br />

AND TUNING SYSTEM IN SINGLE INVERTED PENDULUM<br />

CONTROL<br />

A. Model Preprocess<strong>in</strong>g<br />

• Stabilizer design<br />

The s<strong>in</strong>gle <strong>in</strong>verted pendulum is unstable system,<br />

while, tun<strong>in</strong>g system of <strong>in</strong>f<strong>in</strong>ite MPC require a stable<br />

controlled object. Hence a stabilizer u =− Kx+ v is<br />

needed. For the <strong>in</strong>verted pendulum system (2), Use<br />

command K=acker(A,B,P) <strong>in</strong> Matlab, to configure<br />

closed-loop pole to:<br />

( 8 8 2 2 2 2 )<br />

j<br />

P = − − − + i − − i . (32)<br />

j<br />

T<br />

.<br />

The feedback ga<strong>in</strong> is obta<strong>in</strong>ed as:<br />

K = ( −17.4150 − 13.0612 60.9383 11.0204)<br />

. (33)<br />

The generalized system matrix after stabilization is as<br />

follows:<br />

⎛x<br />

⎞ ⎛ 0 1 0 0 ⎞⎛x<br />

⎞ ⎛0⎞<br />

⎜<br />

x<br />

⎟ ⎜<br />

0 0 1 0<br />

⎟⎜ x<br />

⎟ ⎜<br />

1<br />

⎟<br />

⎜ ⎟<br />

<br />

= ⎜ ⎟⎜ ⎟+<br />

⎜ ⎟u<br />

⎜ θ ⎟ ⎜ 0 0 0 1 ⎟⎜θ<br />

⎟ ⎜0⎟<br />

⎜ θ ⎟ ⎜ ⎟<br />

512 384 136 20 ⎜θ<br />

⎟ ⎜ ⎟<br />

⎝− − − − ⎠<br />

<br />

⎝ ⎠<br />

⎝ ⎠ ⎝3⎠<br />

. (34)<br />

⎛x<br />

⎞<br />

⎜<br />

x 1 0 0 0 x<br />

⎟<br />

⎛ ⎞ ⎛ ⎞ ⎛0⎞<br />

y = = ⎜ ⎟<br />

⎜ + u<br />

θ<br />

⎟ ⎜<br />

0 0 1 0<br />

⎟⎜θ<br />

⎟ ⎜<br />

0<br />

⎟<br />

⎝ ⎠ ⎝ ⎠ ⎝ ⎠<br />

⎜ <br />

θ ⎟<br />

⎝ ⎠<br />

The follow<strong>in</strong>g MPC controller performance evaluation,<br />

tun<strong>in</strong>g system based on extended MVC 3 was built on the<br />

stabilized generalized system (34).<br />

• Discretization<br />

S<strong>in</strong>ce the derivation of the above extended MVC 3<br />

algorithm is based on discrete state space model (3),<br />

discretization of system (34) and construct<strong>in</strong>g a suitable<br />

noise are needed. Use command sys=c2d(A,B,Ts) <strong>in</strong><br />

Matlab, here Ts = 1s<br />

, and consider the noise to be<br />

stationary, Gaussian White-noise processes, the follow<strong>in</strong>g<br />

system can be obta<strong>in</strong>ed as:<br />

⎛ xk ( + 1) ⎞ ⎛ 0.2584 0.1707 0.0306 0.0017 ⎞<br />

⎜<br />

xk ( 2)<br />

⎟ ⎜<br />

0.8519 0.3805 0.0556 0.0027<br />

⎟<br />

⎜<br />

+<br />

⎟<br />

− − − −<br />

= ⎜ ⎟<br />

⎜θ<br />

( k + 1) ⎟ ⎜ 1.3646 0.1716 −0.0181 −0.0023⎟<br />

⎜ ⎟ ⎜ ⎟<br />

⎝θ<br />

( k + 2) ⎠ ⎝ 1.1850 2.2534 0.4863 0.0282 ⎠<br />

⎛ xk ( ) ⎞ ⎛ 0.2319 ⎞ ⎛0⎞<br />

⎜<br />

xk ( + 1)<br />

⎟ ⎜<br />

0.1757<br />

⎟ ⎜<br />

⎜ ⎟<br />

1<br />

⎟<br />

× + ⎜ ⎟uk<br />

( ) + ⎜ ⎟wk<br />

( )<br />

⎜ θ ( k) ⎟ ⎜−1.<br />

3885⎟ ⎜0⎟<br />

⎜ ⎟ ⎜ ⎟ ⎜ ⎟<br />

⎝θ<br />

( k + 1) ⎠ ⎝ 0.1646 ⎠ ⎝1⎠<br />

where, ∑ w = 0.01 .<br />

⎛ xk ( ) ⎞<br />

xk ( ) 1 0 0 0<br />

⎜<br />

xk ( 1)<br />

⎟<br />

⎛ ⎞ ⎛ ⎞ +<br />

yk ( ) = ⎜ ⎟<br />

⎜<br />

θ( k) ⎟=<br />

⎜<br />

0 0 1 0<br />

⎟ , (35)<br />

⎝ ⎠ ⎝ ⎠ ⎜ θ( k)<br />

⎟<br />

⎜ ⎟<br />

⎝θ<br />

( k + 1) ⎠<br />

B. MPC Tun<strong>in</strong>g Design<br />

• MPC controller<br />

For system (35), choose the <strong>in</strong>itial objective function<br />

of extended MVC 3 as<br />

J = Y + Y + U ,where R = 1, Q = diag(1,1)<br />

,output<br />

1 2<br />

variance bounds as yi<br />

= 0.3, i = 1,2 , manipulative<br />

variable variance bounds to be u = 0.8 .Us<strong>in</strong>g the<br />

command of LMI toolbox <strong>in</strong> Matlab ,the MPC controller<br />

weight matrix of the nom<strong>in</strong>al model (35), R = 0.0167 ,<br />

Q = diag(0.0204,0.1234,0.0007,0.0160) can be gotten.<br />

© 2013 ACADEMY PUBLISHER


1566 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

• Mismatch model<br />

In order to create performance degradation condition,<br />

A disturbance, Δ A was added to the nom<strong>in</strong>al model (2),<br />

to construct a man-made mismatch model as,<br />

⎛ 0 1 0 0 ⎞<br />

⎜<br />

0 0 1 0<br />

⎟<br />

A'<br />

= A+Δ A= ⎜<br />

⎟. (36)<br />

⎜ 0 0 0 1 ⎟<br />

⎜<br />

⎟<br />

⎝−600 −300 −100 −30⎠<br />

• MPC tun<strong>in</strong>g parameters<br />

Based on the extended MVC 3 algorithm comb<strong>in</strong>ed<br />

with LQR <strong>in</strong>verse optimal, the MPC controller matrixes<br />

of above mismatch model can be gotten.<br />

R = 0.0388 , Q = diag(0.0706 0.0002 0.0357 0.000)<br />

Through MVC 3 performance evaluation, controller<br />

performance decl<strong>in</strong><strong>in</strong>g was detected. If it dropped below<br />

threshold, ψ , (here, ψ is set to 0.8), then, weight<br />

parameter of manipulated variable <strong>in</strong> MVC 3 , R ,is<br />

updated by R'<br />

= R+ ξ I ,(here,ψ is set to 0.5). Repeat the<br />

MPC weight matrix calculation process to update Q,<br />

R,<br />

the new MPC controller parameters<br />

as R = 0.0952<br />

,<br />

Q = diag(0.1703 0.0006 0.0552 0.0000) can be<br />

gotten. Apply the new controller parameters to operation<br />

to restore the desired operational performance.<br />

V. SIMULATION AND ANALYSIS OF MPC CONTROLLER<br />

A. Simulation and Comparison of MPC Controller and<br />

the LQR Controller<br />

• Simulation of LQR controller<br />

LQR controlled system <strong>in</strong> the Simul<strong>in</strong>k of Matlab was<br />

shown <strong>in</strong> Fig. 3. Parameter of LQR block was set to<br />

K = ( −31.623 − 20.151 72.718 13.155)<br />

, which was<br />

provided by Googol Technology LTD.<br />

Figure 3. Simulation block of LQR control loop<br />

• Simulation of MPC controller<br />

MPC controlled system <strong>in</strong> the Simul<strong>in</strong>k was shown <strong>in</strong><br />

Fig. 4, where, parameter of Acker block was set to<br />

stabilizer feedback ga<strong>in</strong>. Weighted matrixes of MPC<br />

block were set the parameters calculated by the nom<strong>in</strong>al<br />

model.<br />

Figure 4. Simulation block of MPC control loop<br />

• Analysis of simulations results<br />

Simulation curve charts of MPC controller and LQR<br />

controller are shown <strong>in</strong> Fig. 5, where, u denotes<br />

manipulative variable, which is cart angular velocity.<br />

angle, pos denote outputs, they are pendulum angle and<br />

cart position.<br />

The maximum deviation of MPC controller and LQR<br />

controller are shown <strong>in</strong> Table I and comparison bar chart<br />

is shown <strong>in</strong> Fig. 6.<br />

TABLE I.<br />

MAXIMUM DEVIATION COMPARISON<br />

u angle pos<br />

MPC 0.8240 0.0096 0.0093<br />

LQR 34.4589 0.3101 0.3533<br />

Obviously, due to the <strong>in</strong>troduction of steady state<br />

manipulative variable and outputs covariance constra<strong>in</strong>t,<br />

MPC controller can make the maximum deviation<br />

significantly reduced than LQR controller, which greatly<br />

improved the system dynamic performance.<br />

B. Simulation of MPC Controller Tun<strong>in</strong>g<br />

• Simulation of MPC controller tun<strong>in</strong>g<br />

MPC controller tun<strong>in</strong>g dynamic curves was obta<strong>in</strong>ed<br />

by replace orig<strong>in</strong>al weight matrix Q , R of MPC controller<br />

with mismatched and Controller-tuned parameters, shown<br />

<strong>in</strong> Fig. 7, where, the legend (good, bad and tuned) means<br />

controller runn<strong>in</strong>g under, nom<strong>in</strong>al model, mismatch<br />

model and MPC controller tuned.<br />

Through curves, if us<strong>in</strong>g orig<strong>in</strong>al controller parameters<br />

to control mismatch model, it would lead an <strong>in</strong>crease on<br />

manipulative variable and outputs deviation. After<br />

adjust<strong>in</strong>g controller parameters by controller tun<strong>in</strong>g<br />

system, the deviation reduced to some extent. This proves<br />

the feasible of MPC controller tun<strong>in</strong>g algorithm.<br />

• Extended MVC 3 performance evaluation method<br />

The extended MVC 3 performance evaluation curve is<br />

shown <strong>in</strong> Fig. 8.<br />

Set λ = 1 <strong>in</strong> the MVC 3 performance evolution object<br />

function (18) and get<br />

p m<br />

i= 1<br />

i i<br />

j=<br />

1<br />

j j<br />

−7<br />

benchmark J 3 = ∑qY + ∑ rU by LMI method,<br />

MVC<br />

here, J 3 = 1.3217 × 10 .Then actual run-time<br />

MVC<br />

variance was compared with this benchmark, get η<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1567<br />

40<br />

30<br />

MPC<br />

LQR<br />

0.35<br />

0.3<br />

MPC<br />

LQR<br />

0.3<br />

0.2<br />

MPC<br />

LQR<br />

0.25<br />

20<br />

0.2<br />

0.1<br />

u<br />

10<br />

0<br />

angle<br />

0.15<br />

0.1<br />

pos<br />

0<br />

-0.1<br />

-10<br />

0.05<br />

0<br />

-0.2<br />

-20<br />

-0.05<br />

-0.3<br />

-30<br />

0 20 40 60<br />

T<br />

-0.1<br />

0 20 40 60<br />

T<br />

-0.4<br />

0 20 40 60<br />

T<br />

Figure 5. Simulations curves charts of MPC and LQR control loop<br />

35<br />

0.35<br />

0.4<br />

30<br />

0.3<br />

0.35<br />

25<br />

0.25<br />

0.3<br />

20<br />

0.2<br />

0.25<br />

u<br />

15<br />

angle<br />

0.15<br />

pos<br />

0.2<br />

0.15<br />

10<br />

0.1<br />

0.1<br />

5<br />

0.05<br />

0.05<br />

0<br />

MPC<br />

1<br />

LQR<br />

0<br />

MPC<br />

2<br />

LQR<br />

0<br />

MPC<br />

3<br />

LQR<br />

Figure 6. Bar charts of MPC and LQR simulations curves maximum deviation<br />

1.5<br />

1<br />

good<br />

bad<br />

tuned<br />

12<br />

10<br />

good<br />

bad<br />

tuned<br />

0.01<br />

0.005<br />

good<br />

bad<br />

tuned<br />

8<br />

u<br />

0.5<br />

0<br />

angle<br />

14 x 10-3 T<br />

6<br />

4<br />

pos<br />

0<br />

-0.005<br />

2<br />

-0.5<br />

0<br />

-0.01<br />

-2<br />

-1<br />

0 20 40 60<br />

T<br />

-4<br />

0 20 40 60<br />

-0.015<br />

0 20 40 60<br />

T<br />

Figure 7. Dynamic curves of nom<strong>in</strong>al model, mismatch model and MPC controller-tuned<br />

as:<br />

J 3<br />

MVC<br />

η 1 = = 0.9803 ;<br />

J<br />

arh<br />

1<br />

J 3<br />

MVC<br />

η 2 = = 0.7551 ;<br />

J<br />

arh<br />

2<br />

J 3<br />

MVC<br />

η 3 = = 0.9143 , where,<br />

J<br />

arh<br />

3<br />

J , J , J denote<br />

arh1 arh2 arh3<br />

© 2013 ACADEMY PUBLISHER


1568 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

11.5 x 10-8 Var(U)<br />

11<br />

MVC3 curve<br />

good<br />

bad<br />

tuned<br />

10.5<br />

Var(Y)<br />

10<br />

9.5<br />

9<br />

8.5<br />

8<br />

1 2 3 4 5 6 7 8 9<br />

x 10 -8<br />

Figure 10. S<strong>in</strong>gle <strong>in</strong>verted pendulum device<br />

Figure 8. MVC 3 performance evolution curve<br />

steady state error of good, bad, tuned. η 1 , η 2 , η 3 denote<br />

their correspond<strong>in</strong>g ratio. The bar chart is shown <strong>in</strong> Fig. 9.<br />

It confirms the correctness and feasibility of MPC tun<strong>in</strong>g<br />

method.<br />

1<br />

0.9<br />

0.8<br />

0.7<br />

0.6<br />

0.5<br />

Figure 11. MPC control loop<br />

0.4<br />

0.3<br />

0.2<br />

0.1<br />

0<br />

good bad tuned<br />

Figure 9. Bar chart of performance evolution<br />

VI. ACTUAL CONTROL ON THE DEVICE<br />

A. Construct MPC Controller<br />

The photo of s<strong>in</strong>gle <strong>in</strong>verted pendulum device<br />

provided by Googol Technology LTD is shown <strong>in</strong> Fig.10.<br />

MPC controlled system was constructed on Matlab<br />

real-time control platform provided by Googol<br />

Technology LTD shown <strong>in</strong> Fig. 11.<br />

Parameters of k_acker block was set to stabilizer<br />

feedback ga<strong>in</strong> and weight matrixes QR , of MPC<br />

controller was set to which calculated from nom<strong>in</strong>al<br />

model. Run-time curves were shown <strong>in</strong> Fig.12.<br />

Obviously, under the permission of variance<br />

constra<strong>in</strong>ts, MPC controller can reach steady state <strong>in</strong> a<br />

short period of time.<br />

B. Tun<strong>in</strong>g Process<br />

Run the MPC controller tun<strong>in</strong>g system, and preprocess<br />

manipulated variable u by limit<strong>in</strong>g filter, the effect<br />

curves can be shown <strong>in</strong> Fig. 13.<br />

Figure 12. MPC run-time operat<strong>in</strong>g curves<br />

Steady state variance of manipulative variable and<br />

outputs were calculated and shown <strong>in</strong> Fig. 14.<br />

Bar charts shows MPC controller performance has<br />

been restored and the tun<strong>in</strong>g system is feasible.<br />

VII. CONCLUSION<br />

In this work, an extended MVC 3 method and its LMI<br />

solution were applied to <strong>in</strong>f<strong>in</strong>ite MPC controller<br />

performance evaluation and parameters tun<strong>in</strong>g system.<br />

Us<strong>in</strong>g extended MVC 3 pr<strong>in</strong>ciple to monitor controlled<br />

system, if controller performance decl<strong>in</strong>ed is detected, it<br />

can be improved by resett<strong>in</strong>g MPC weighted matrixes<br />

with controller tun<strong>in</strong>g algorithm. Simulation and device<br />

operation on s<strong>in</strong>gle <strong>in</strong>verted pendulum device provided<br />

by Googol Technology LTD reaffirm the correctness of<br />

this system. Also, the <strong>in</strong>troduction of LMI solution makes<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1569<br />

1<br />

-3.12<br />

0.05<br />

0.8<br />

-3.125<br />

0.04<br />

0.6<br />

0.4<br />

-3.13<br />

0.03<br />

0.02<br />

0.2<br />

-3.135<br />

0.01<br />

u<br />

0<br />

angle<br />

-3.14<br />

pos<br />

0<br />

-0.2<br />

-3.145<br />

-0.01<br />

-0.4<br />

-0.6<br />

-3.15<br />

-0.02<br />

-0.03<br />

-0.8<br />

-3.155<br />

-0.04<br />

-1<br />

0 200 400 600 800<br />

T<br />

-3.16<br />

0 200 400 600 800<br />

T<br />

-0.05<br />

0 200 400 600 800<br />

T<br />

Figure 13. Real-time operat<strong>in</strong>g curves of MPC controller-tun<strong>in</strong>g system<br />

Figure 14. Steady state variance comparison bar charts<br />

the system easy to extend and analysis, this will provide a<br />

new way for later controller performance evaluation and<br />

tun<strong>in</strong>g research.<br />

ACKNOWLEDGMENT<br />

This work is supported by National Science<br />

Foundation of Ch<strong>in</strong>a under Grant 60974065.<br />

REFERENCES<br />

[1] Experiment on Inverted Pendulum Device and Its<br />

Automatic Control. Googol Technology (Shenzhen), 2005.<br />

(<strong>in</strong> Ch<strong>in</strong>ese).<br />

[2] D. Chatterjee, A. Patra and H.K. Joglekar, “Sw<strong>in</strong>g-up and<br />

stabilization of a cart–pendulum system under restricted<br />

cart track length,” Systems & Control Letters, vol. 47:4, pp.<br />

355–364, November 2002.<br />

http://dx.doi.org/10.1016/s0167-6911(02)00229-3.<br />

[3] M. Bugeja, “Non-L<strong>in</strong>ear Sw<strong>in</strong>g-Up and Stabiliz<strong>in</strong>g Control<br />

of an Inverted Pendulum System,” EUROCON 2003.<br />

Computer as a Tool. The IEEE Region 8, vol. 2, pp. 437–<br />

441, September 2003.<br />

[4] S.y. Zhang, “A new fuzzy controller for stabilization of<br />

double <strong>in</strong>verted pendulum system,” Computer and<br />

Communication Technologies <strong>in</strong> Agriculture Eng<strong>in</strong>eer<strong>in</strong>g,<br />

vol. 1, pp. 300–303, June 2010.<br />

[5] Y. Fan and Yi. Sang, “A Fuzzy Control Based on<br />

Information Integration for Double Inverted Pendulum,”<br />

2011 Second International Conference on Digital<br />

Manufactur<strong>in</strong>g &Automation, pp. 24–27, 2011.<br />

[6] L.X. Deng and S.X. Gao, “The design for the controller of<br />

the l<strong>in</strong>ear <strong>in</strong>verted pendulum based on backstepp<strong>in</strong>g,”<br />

Electronic and Mechanical Eng<strong>in</strong>eer<strong>in</strong>g and Information<br />

Technology (EMEIT), vol.6, pp. 2892–2895, August 2011.<br />

[7] J. Richalet, A. Rault and J. Testud, “Model predictive<br />

heuristic control: Applications to <strong>in</strong>dustrial process,”<br />

Automatic, vol.14:5, pp. 413–428, September 1978.<br />

http://dx.doi.org/10.1016/0005-1098(78)90001-8.<br />

[8] S.J. Q<strong>in</strong> and T. A. Badgwell, “A survey of <strong>in</strong>dustrial model<br />

predictive control technology,” Control Eng<strong>in</strong>eer<strong>in</strong>g<br />

Practice, vol. 11:7, pp. 733–764, July 2003.<br />

http://dx.doi.org/10.1016/s0967-0661(02)00186-7.<br />

© 2013 ACADEMY PUBLISHER


1570 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

[9] J.L. Marchetti, D.A. Mellichamp and D.E. Seborg,<br />

“Predictive control based on discrete convolution models,”<br />

Industrial Eng<strong>in</strong>eer<strong>in</strong>g Chemistry Process Design<br />

Development, vol. 22:3, pp.488–495, July 1983.<br />

doi:10.1021/i200022a025.<br />

[10] J.M. Maciejowski, Predictive Control: with Constra<strong>in</strong>ts,<br />

Prentice Hall, October 2000.<br />

[11] T.J. Harris, “Assessment of Closed Loop Performance,”<br />

Canadian Journal of Chemical Eng<strong>in</strong>eer<strong>in</strong>g. vol. 67, pp.<br />

856–861, 1989.<br />

[12] T.J. Harris, F. Boudreau and J.F. Macgregor, “Performance<br />

Assessment of Multivariable Feedback Controller,”<br />

Automatica. vol. 32:11, pp. 1505–1518, November 1996.<br />

http://dx.doi.org/10.1016/s0005-1098(96)00108-2.<br />

[13] B. Huang, S.L. Shah and E.K. Kwok, “Good, bad or<br />

optimal Performance assessment of multivariable<br />

processes,” Automatica. vol. 33:6, pp. 1175–1183, June<br />

1997. http://dx.doi.org/10.1016/s0005-1098(97)00017-4.<br />

[14] B. Huang and S.L. Shah, Performance assessment of<br />

control loops: Theory and Applications, Spr<strong>in</strong>ger, 1999.<br />

[15] M. Jelali, “An overview of control performance assessment<br />

technology and <strong>in</strong>dustrial applications,” Intelligent Control<br />

Systems and Signal Process<strong>in</strong>g, vol. 14:5, pp. 441–466,<br />

May 2006.<br />

http://dx.doi.org/doi:10.1016/j.conengprac.2005.11.005.<br />

[16] R. Sr<strong>in</strong>ivasan, R. Rengaswamy and R. Miller, “Control<br />

Loop Performance Assessment.1. A Qualitative Approach<br />

for Stiction Diagnosis,” Industrial & Eng<strong>in</strong>eer<strong>in</strong>g<br />

Chemistry Research. vol. 44:17, pp. 6708–6718, July 2005.<br />

[17] R. Sr<strong>in</strong>ivasan, R. Rengaswamy and R. Miller, “Control<br />

Loop Performance Assessment.2. Hammerste<strong>in</strong> Model<br />

Approach for Stiction Diagnosis,” Industrial &<br />

Eng<strong>in</strong>eer<strong>in</strong>g Chemistry Research. vol. 44:17, pp. 6719–<br />

6728, July 2005.<br />

[18] F.W. Xu, K.H. Lee and B. Huang, “Monitor<strong>in</strong>g control<br />

performance via structured closed-loop response subject to<br />

output variance/covariance upper bound,” Journal of<br />

Process Control, vol. 16:9, pp. 971–984, October 2006.<br />

http://dx.doi.org/10.1016/j.jprocont.2006.05.003.<br />

[19] T.I. Salsbury, “Cont<strong>in</strong>uous-time model identification for<br />

closed loop control performance assessment,” Control<br />

Eng<strong>in</strong>eer<strong>in</strong>g Practice. vol. 15:1, pp. 109–121, January<br />

2007. http://dx.doi.org/10.1016/j.conengrac.2006.05.001.<br />

[20] M. Bauer, L.K. Craig, “Economic assessment of advanced<br />

process control-A survey and framework,” Journal of<br />

Process Control. vol. 18:1, pp.2–18, January 2008.<br />

[21] R.E. Skelton, T. Iwasaki and K.M. Grigoriadis, A Unified<br />

Algebraic Approach to L<strong>in</strong>ear Control Design.<br />

Taylor&Francis, 1999.<br />

[22] D.J. Chmielewski* and A.M. Manthanwar, “On the Tun<strong>in</strong>g<br />

of Predictive Controllers: Inverse Optimality and the<br />

M<strong>in</strong>imum Variance Covariance Constra<strong>in</strong>ed Control<br />

Problem,” Industrial &Eng<strong>in</strong>eer<strong>in</strong>g Chemistry Research,<br />

vol. 43, pp. 7807–7814, October 2004.<br />

doi:10.1021/ie030686e.<br />

[23] C.T. Chen, L<strong>in</strong>ear System Theory and Design. Oxford<br />

University Press, 2009.<br />

[24] S.Boyd, L.E. Ghaoui and E. Feron, “L<strong>in</strong>ear Matrix<br />

Inequalities <strong>in</strong> Systems and Control Theory,” Proceed<strong>in</strong>gs<br />

Allerton Conference on Communication, Control and<br />

Comput<strong>in</strong>g, pp. 237–246, October 1993.<br />

[25] A. Laub, “A Schur method for solv<strong>in</strong>g algebraic Riccati<br />

equations,” Automatic Control, vol. 24:6, pp. 913–921,<br />

December 1979.<br />

[26] F.W. Xu, B. Huang and S. Akande, “Performance<br />

Assessment of Model Predictive Control for Variability<br />

and Constra<strong>in</strong>t Tun<strong>in</strong>g,” Industrial & Eng<strong>in</strong>eer<strong>in</strong>g<br />

Chemistry Research, vol. 46:4, pp. 1208–1219, January<br />

2007.doi:10.1021/ie060786v.<br />

[27] B.L.Vladimir, “About the <strong>in</strong>verse problem of optimal<br />

control,” Application Computer Math, vol. 2:2, pp. 90–97,<br />

2003.<br />

[28] J. Li, H.O. Wang and S. Niemann, “On the Relations<br />

Between LMIs and AREs: Applications to Absolute<br />

Stability Criteria, Robustness Analysis and Optimal<br />

Control,” Automatica, vol. 32:10, pp. 1361–1379, 1996.<br />

Chao Cheng was born <strong>in</strong> Shanxi, Ch<strong>in</strong>a,<br />

1983. She received the bachelor degree<br />

<strong>in</strong> Beij<strong>in</strong>g Institute of Fashion<br />

Technology <strong>in</strong> 2004. From August 2004<br />

to January 2007, she worked as control<br />

eng<strong>in</strong>eer <strong>in</strong> Jiangsu Yangnong Chemical<br />

Group Co.,Ltd. She is currently a second<br />

grade postgraduate student <strong>in</strong><br />

Department of Automation <strong>in</strong> Beij<strong>in</strong>g<br />

University of Chemical Technology. Her research <strong>in</strong>terests<br />

<strong>in</strong>clude MPC and other advanced control.<br />

Zhong Zhao was born <strong>in</strong> Henan, Ch<strong>in</strong>a,<br />

1970. He received bachelor degree <strong>in</strong><br />

Zhejiang University <strong>in</strong> 1992 and master<br />

degree and Ph.D. from East Ch<strong>in</strong>a<br />

University of Science and Technology <strong>in</strong><br />

1995 and 1998 respectively.<br />

From 1998 to 2000, he worked as a<br />

postdoctol <strong>in</strong> Ts<strong>in</strong>ghua University, from<br />

2000 to 2002 as Senior Eng<strong>in</strong>eer <strong>in</strong><br />

Honeywell Hi-Spec Solutions and<br />

Visit<strong>in</strong>g fellow <strong>in</strong> Max-Planck-Institute. From 2002 to 2004 he<br />

employed as a lecturer by University of Saga, Japan.<br />

He is currently a professor <strong>in</strong> the Department of Automation,<br />

and deputy director of Institute of Automation <strong>in</strong> Beij<strong>in</strong>g<br />

University of Chemical Technology, also, member of U.S. IEEE<br />

and Japan, SICE. His research <strong>in</strong>terests are the advanced control<br />

of complex <strong>in</strong>dustrial processes, process monitor<strong>in</strong>g, and multiscale<br />

process signal analysis.<br />

Haixia Li was born <strong>in</strong> Gansu, Ch<strong>in</strong>a,<br />

1984. She received her bachelor degree<br />

and master degree <strong>in</strong> Information<br />

Science and Technology Institute of<br />

Beij<strong>in</strong>g University of Chemical<br />

Technology <strong>in</strong> 2007 and 2010<br />

respectively. Her research direction is<br />

advanced control of <strong>in</strong>dustrial process.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1571<br />

A Metadata-driven Cloud Comput<strong>in</strong>g Application<br />

Virtualization Model<br />

Yunpeng Xiao 1,2,*<br />

1. Chongq<strong>in</strong>g Eng<strong>in</strong>eer<strong>in</strong>g Laboratory of Internet and Information Security, Chongq<strong>in</strong>g University of Posts and<br />

Telecommunications (CQUPT), Chongq<strong>in</strong>g, Ch<strong>in</strong>a<br />

2. Beij<strong>in</strong>g Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beij<strong>in</strong>g University of Posts and<br />

Telecommunications (BUPT), Beij<strong>in</strong>g, Ch<strong>in</strong>a<br />

Email: sh<strong>in</strong>eagle2005@hotmail.com<br />

Guangxia Xu 1 , Yanb<strong>in</strong>g Liu 1 and Bai Wang 2<br />

1. Chongq<strong>in</strong>g Eng<strong>in</strong>eer<strong>in</strong>g Laboratory of Internet and Information Security, Chongq<strong>in</strong>g University of Posts and<br />

Telecommunications (CQUPT), Chongq<strong>in</strong>g, Ch<strong>in</strong>a<br />

2. Beij<strong>in</strong>g Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beij<strong>in</strong>g University of Posts and<br />

Telecommunications (BUPT), Beij<strong>in</strong>g, Ch<strong>in</strong>a<br />

Email: {xugx, liuyb}@cqupt.edu.cn, wangbai@bupt..edu.cn<br />

Abstract—In order to meet the requirements of<br />

standardization of virtualization <strong>in</strong> cloud comput<strong>in</strong>g<br />

platform, improve the flexibility and expansibility of the<br />

system and enhance the capability of management-control<br />

of the platform, by means of <strong>in</strong>troduc<strong>in</strong>g the features of<br />

decoupl<strong>in</strong>g and semantic of metadata, a Metadata-driven<br />

Cloud Comput<strong>in</strong>g Application Virtualization<br />

Model(MCCAVM) <strong>in</strong> software level is proposed <strong>in</strong> the<br />

paper based on Tur<strong>in</strong>g mach<strong>in</strong>e model and Von Neumann<br />

computer architecture. The model achieves the complete life<br />

cycle management of the capabilities and services. Based on<br />

the formal def<strong>in</strong>ition, analyz<strong>in</strong>g the hierarchical structure<br />

with multi-role and multi-dimensional view, the paper<br />

proposes a Metadata-driven Cloud Comput<strong>in</strong>g Application<br />

Virtualization System(MCCAVS). Tak<strong>in</strong>g the production of<br />

virtual cloud storage service as example, this paper gives<br />

formal analysis of system runn<strong>in</strong>g and compares with other<br />

relat<strong>in</strong>g work. The results show that the model presents<br />

good reference on the construction of cloud comput<strong>in</strong>g<br />

application virtualization platform.<br />

Index Terms—MCCAVM, metadata, cloud comput<strong>in</strong>g,<br />

application virtualization, software architecture<br />

I. INTRODUCTION<br />

The <strong>in</strong>ternet is gradually becom<strong>in</strong>g a k<strong>in</strong>d of<br />

comput<strong>in</strong>g platform <strong>in</strong> peace with the rapid expansion<br />

and popularization of computer communication<br />

technology. As a new comput<strong>in</strong>g mode, cloud comput<strong>in</strong>g<br />

describes a mode of <strong>in</strong>crement, use and deliver<strong>in</strong>g for a<br />

new type of IT services based on <strong>in</strong>ternet. It usually<br />

means to apply dynamic scalable and virtual resources<br />

through <strong>in</strong>ternet[1, 2]. Wikipedia def<strong>in</strong>ed cloud<br />

comput<strong>in</strong>g scenario as follow: Users or clients can submit<br />

Manuscript received August 20, 2012; revised October 8, 2012;<br />

accepted October 14, 2012.<br />

Correspond<strong>in</strong>g author: Yunpeng Xiao (xiaoyp@cqupt.edu.cn).<br />

a task, such as word process<strong>in</strong>g, to the service provider,<br />

without actually possess<strong>in</strong>g the software or hardware[3].<br />

This description shows that a core issue of cloud<br />

comput<strong>in</strong>g research is how to achieve virtualization and<br />

large-scale application scalability and availability <strong>in</strong> the<br />

virtual environment.<br />

A broadly understood of virtualization is that<br />

comput<strong>in</strong>g elements run on the virtual basis. That is a<br />

k<strong>in</strong>d of solution to simplify management and optimize<br />

resources. The key question highlights platform<br />

standardization, improvement of the platform flexibility<br />

and dynamic scalability, reduction of the degree of<br />

coupl<strong>in</strong>g of platform components and other aspects.<br />

There are many virtualization technology researches and<br />

explorations: Research [4] and [5] put forward<br />

virtualization platform architecture through researches<br />

based on service-oriented architecture (SOA), [6] and [7]<br />

focus on platform flexibility and dynamic capacity<br />

expansion, [8, 9, 10] study on virtualization from storage<br />

virtualization, virtual device, network virtualization, and<br />

other aspects.<br />

Application virtualization uncouples the applications<br />

from operat<strong>in</strong>g systems, provides a virtual operat<strong>in</strong>g<br />

environment for the applications. In this environment, not<br />

only <strong>in</strong>cludes the application executable file, but also<br />

<strong>in</strong>cludes the runtime environment it requires. In essence,<br />

application virtualization is abstracted dependent between<br />

low-level application systems and hardware. It can solve<br />

the problem of version <strong>in</strong>compatibility, the limitation of<br />

term<strong>in</strong>al capacity, application system host<strong>in</strong>g mass, realtime<br />

deployment of application, disaster recovery and so<br />

on.<br />

Metadata is descriptive <strong>in</strong>formation about the data. It is<br />

semantics on the basic concepts, basic relationships and<br />

basic constra<strong>in</strong>ts of data model. The metadata can solve<br />

problems that model layer can not resolve, such as fuzzy<br />

semantic of data model, model <strong>in</strong>tegration and shar<strong>in</strong>g of<br />

<strong>in</strong>formation. By us<strong>in</strong>g metadata we can translate<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1571-1579


1572 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

functional strong coupl<strong>in</strong>g relationships <strong>in</strong>to data type<br />

weak coupl<strong>in</strong>g relationships. Metadata research is widely<br />

used <strong>in</strong> data-driv<strong>in</strong>g system such as file system,<br />

<strong>in</strong>formation system and so on [11, 12]. On the other hand,<br />

the abstract computational model: Tur<strong>in</strong>g mach<strong>in</strong>e, which<br />

can simulate any human comput<strong>in</strong>g process, is equivalent<br />

to any f<strong>in</strong>ite mathematics of logic process. The Tur<strong>in</strong>g<br />

mach<strong>in</strong>e is also a general-purpose computer and an ideal<br />

model of universal def<strong>in</strong>ition. Its abstract def<strong>in</strong>ition is a<br />

k<strong>in</strong>d of mathematical logic mach<strong>in</strong>e [13]. Von Neumann<br />

implemented the ideal model, designed store-based<br />

computer architecture [14]. The Von’s th<strong>in</strong>k<strong>in</strong>g is<br />

<strong>in</strong>herited by modern computer architectures, s<strong>in</strong>ce its<br />

clear structure and feasibility [15].<br />

Tak<strong>in</strong>g <strong>in</strong>to account the needs of application<br />

virtualization mentioned above, and by means of<br />

metadata, Tur<strong>in</strong>g mach<strong>in</strong>e and Von Neumann architecture,<br />

a Metadata-driven Cloud Comput<strong>in</strong>g Application<br />

Virtualization Model(MCCAVM) <strong>in</strong> software level is<br />

proposed <strong>in</strong> this paper. A Metadata-driven Cloud<br />

Comput<strong>in</strong>g Application Virtualization System<br />

(MCCAVS) is implemented based on MCCAVM by<br />

then. We make the follow<strong>in</strong>g three major contributions: 1)<br />

Metadata is used to drive the whole system, so that the<br />

description of the system is standard and uniform. The<br />

decoupl<strong>in</strong>g purpose is well done besides. 2) We propose<br />

an application virtualization model <strong>in</strong> software level by<br />

refer<strong>in</strong>g Von Neumann architecture. All k<strong>in</strong>d of<br />

applications and services can be managed by software<br />

bus. 3) Not only implemented eng<strong>in</strong>eer<strong>in</strong>g, the entire<br />

model and system are def<strong>in</strong>ed and verified formally by<br />

us<strong>in</strong>g Tur<strong>in</strong>g mach<strong>in</strong>e.<br />

The rest of this paper is organized as follows: after the<br />

<strong>in</strong>troduction <strong>in</strong> Section 1, Section 2 describes the formal<br />

def<strong>in</strong>ition and gives the system model; Section 3 designs<br />

system and expla<strong>in</strong>s each module <strong>in</strong> detail; Section 4<br />

presents our MCCAVS and verifies it eng<strong>in</strong>eer<strong>in</strong>g and<br />

formally respectively; Section 5 concludes this paper.<br />

II. MODEL<br />

A. Formal Def<strong>in</strong>ition<br />

Before giv<strong>in</strong>g model description formally, the<br />

def<strong>in</strong>ition of capability and Service <strong>in</strong> the model is<br />

described firstly.<br />

Def<strong>in</strong>ition 1. Capability. Any underly<strong>in</strong>g hardware<br />

and software resource <strong>in</strong> the cloud server side.<br />

Def<strong>in</strong>ition 2. Service. Product generated by a variety<br />

of capabilities, through assembl<strong>in</strong>g and reprocess<strong>in</strong>g<br />

pattern.<br />

In fact, a virtual application <strong>in</strong> the cloud server side is<br />

comb<strong>in</strong>ed of Capability and Service. Accord<strong>in</strong>g to Von<br />

Neumann architecture, computers must have five basic<br />

components: <strong>in</strong>put data and devices, memory program<br />

and data memory, data process<strong>in</strong>g comput<strong>in</strong>g device,<br />

control program execution controller, output device.<br />

Draw<strong>in</strong>g on the th<strong>in</strong>k<strong>in</strong>g of the Von Neumann computer<br />

architecture, model regards Capability and Service as an<br />

external device. Various external devices mounted to the<br />

model via a software bus and driven by model controlled<br />

components. The work of the model is based on<br />

predef<strong>in</strong>ed tasks, makes multiple types of Capability and<br />

Service work together, and provides virtualization<br />

technology by us<strong>in</strong>g the basis of hardware, software<br />

resources and the upper applications supplied by these<br />

devices. Regard<strong>in</strong>g Capability and Service as an external<br />

device, the collaborative process can be considered as the<br />

calculation of the f<strong>in</strong>ite number of steps. Based on formal<br />

def<strong>in</strong>ition, the paper proposed a Metadata-driven Cloud<br />

Comput<strong>in</strong>g Application Virtualization Model(MCCAVM)<br />

consider<strong>in</strong>g Tur<strong>in</strong>g mach<strong>in</strong>e computation model and the<br />

von Neumann computer system structure of these devices.<br />

Def<strong>in</strong>ition 3. Formal def<strong>in</strong>ition of the model. A<br />

Metadata-driven cloud comput<strong>in</strong>g application<br />

virtualization model can be formalized as a ten-tuple: T =<br />

(Q,Σ,Γ 1 ,Γ 2 ,Γ 3 ,Γ 4 ,δ,q 0 ,q a ,q r )<br />

Q is the set of states;<br />

Σ is the <strong>in</strong>put alphabet, which does not conta<strong>in</strong> a<br />

special blank symbol B;<br />

Γ 1 is the capability to take the alphabet, where B∈Γ 1<br />

and Σ∈Γ 1 ;<br />

Γ 2 is the service with the alphabet, where B∈Γ 2 and<br />

Σ∈Γ 2 ;<br />

Γ 3 is the result with the alphabet, where B∈Γ 3 and Σ<br />

∈Γ 3 ;<br />

Γ 4 is a task with an alphabet, where B∈Γ 4 andΣ∈Γ 4 ;<br />

δ : Q×Γ 4 →Q×Γ 4 ×{L,R} 4 is the transfer function,<br />

where L, R <strong>in</strong>dicates that the read-write head to the left or<br />

to the right;<br />

q 0 ∈Q is the <strong>in</strong>itial state;<br />

q a ∈Q is an accept<strong>in</strong>g state;<br />

q r ∈Q is the denial of state and q r ≠q a ;<br />

Capability alphabet and service alphabet need to be<br />

processed were recorded on work tapeΓ 1 and Γ 2 ; Γ 3<br />

records the results; Γ 4 records work processes alphabet of<br />

different virtualization tasks.<br />

Theorem 1. MCCAVM is a general comput<strong>in</strong>g model<br />

which is equivalent to the universal Tur<strong>in</strong>g mach<strong>in</strong>e.<br />

Proof: Firstly, <strong>in</strong> Def<strong>in</strong>ition 3, depend<strong>in</strong>g on the<br />

differences of storage function, def<strong>in</strong><strong>in</strong>g a number of<br />

work<strong>in</strong>g tapes. Obviously, MCCAVM is multi-tape<br />

Tur<strong>in</strong>g mach<strong>in</strong>e, and multi-tape Tur<strong>in</strong>g mach<strong>in</strong>e is<br />

equivalent with Tur<strong>in</strong>g mach<strong>in</strong>e, so MCCAVM is<br />

equivalent with Tur<strong>in</strong>g mach<strong>in</strong>e.<br />

Secondly, we set the capability alphabet, service<br />

alphabet, results alphabet and tasks alphabet as<br />

T1,T2,T3,T4 <strong>in</strong> T's each comput<strong>in</strong>g step. Tur<strong>in</strong>g mach<strong>in</strong>e<br />

M is a seven-tuple. The current state, the current tape<br />

content and the location of the read-write head constitute<br />

the pattern of M. The specific calculation process of M is<br />

conversion from one pattern to another, based on the<br />

conversion rules described <strong>in</strong> the transition function δ.<br />

The essence of the Tur<strong>in</strong>g mach<strong>in</strong>e is an algorithm or<br />

function, given data x, a mapp<strong>in</strong>g rule accord<strong>in</strong>g to the<br />

function f, calculat<strong>in</strong>g the correspond<strong>in</strong>g f(x), that is, M is<br />

equivalent to a dedicated mach<strong>in</strong>e for a particular<br />

calculation. For a specific task, it completes a specific<br />

calculation or mapp<strong>in</strong>g process by MCCAVM accord<strong>in</strong>g<br />

to task process.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1573<br />

For a particular task, we can fix an algorithm Mi from<br />

process of tasks alphabet T4. The implementation process:<br />

Given T1, T2, transferr<strong>in</strong>g function δ is first fixed<br />

accord<strong>in</strong>g to algorithm Mi, mak<strong>in</strong>g T from one pattern to<br />

another. Each task corresponds to a process and each<br />

process corresponds to a Tur<strong>in</strong>g mach<strong>in</strong>e. Therefore, the<br />

algorithm is equivalent to a Tur<strong>in</strong>g mach<strong>in</strong>e. The<br />

calculation of (T1, T2) <strong>in</strong>putted on Tur<strong>in</strong>g mach<strong>in</strong>e Mi<br />

and array (T1, T2, T4) on MCCAVM are equivalent.<br />

That is, to any <strong>in</strong>put of Tur<strong>in</strong>g mach<strong>in</strong>e Mi, MCCAVM<br />

can emulate the calculations of Mi, MCCAVM<br />

equivalent to <strong>in</strong>terpreter for Mi. Therefore, MCCAVM is<br />

equivalent to a universal Tur<strong>in</strong>g mach<strong>in</strong>e.<br />

B. Role View of Model<br />

From the perspective of model development and<br />

management control, the model role is divided <strong>in</strong>to<br />

developers and system operators. Among them, the<br />

developers are divided <strong>in</strong>to capability developers and<br />

service developers. Developers produce capabilities or<br />

services by us<strong>in</strong>g <strong>in</strong>terface language. The system<br />

operators use the system language to complete the control<br />

of model. Interface <strong>in</strong>struction set is related to <strong>in</strong>terface<br />

language, system <strong>in</strong>struction set is related to system<br />

language. We will expla<strong>in</strong> separately bellowed.<br />

Def<strong>in</strong>ition 4. Interface language. It is a set of grammar<br />

rules fac<strong>in</strong>g capability and service developers. Follow<strong>in</strong>g<br />

this rule, developers can operate MCCAVM directly and<br />

complete the operat<strong>in</strong>g tasks accurately. Interface<br />

language enabled developers to manage full life-cycle of<br />

capability and service. In order to facilitate developer,<br />

<strong>in</strong>terface language uses simple <strong>in</strong>struction.<br />

Def<strong>in</strong>ition 5. Interface command set. This is a set of<br />

commands which make MCCAVM to complete all k<strong>in</strong>ds<br />

of basic operat<strong>in</strong>g actions accord<strong>in</strong>g to <strong>in</strong>terface language<br />

syntax framework. To complete a certa<strong>in</strong> capability or<br />

service development tasks, a number of <strong>in</strong>terface<br />

commands are comb<strong>in</strong>ed together accord<strong>in</strong>g to the<br />

workflow. And each command can also be used to carry<br />

out specified action. The commands are made up of<br />

parameters and <strong>in</strong>terface functions. Interface functions<br />

<strong>in</strong>structs MCCAVM to complete the basic operat<strong>in</strong>g<br />

actions. Parameter stands for the execut<strong>in</strong>g target of<br />

operat<strong>in</strong>g <strong>in</strong>structions and the association attributes of<br />

operational objectives.<br />

Def<strong>in</strong>ition 6. System language. A set of grammar rules<br />

which can be discerned and read directly by the central<br />

process<strong>in</strong>g unit of MCCAVM. Under the rules of<br />

grammar <strong>in</strong> the system language, each <strong>in</strong>terface<br />

command corresponds to a number of system commands.<br />

Def<strong>in</strong>ition 7. System commands. Basic system<br />

commands set which meet the system language syntax<br />

rules. System commands directly relate to a variety of<br />

metadata operat<strong>in</strong>g, and they are significant m<strong>in</strong>imum<br />

driv<strong>in</strong>g force of model. Model task <strong>in</strong>put will be turned<br />

<strong>in</strong>to system <strong>in</strong>structions sequence f<strong>in</strong>ally.<br />

In the MCCAVM, the <strong>in</strong>terface language is source<br />

language and the system language is target language. The<br />

<strong>in</strong>terface language is developer-oriented, which presents a<br />

simple way and shields complex logic operat<strong>in</strong>g <strong>in</strong>volved<br />

with metadata <strong>in</strong> the model. The system language is the<br />

model executable language, which can complete <strong>in</strong>ternal<br />

behaviors with the core of metadata-driven.<br />

Figure 1. MCCAVM architecture<br />

C. Model Architecture<br />

Accord<strong>in</strong>g to the formal def<strong>in</strong>ition of the model, model<br />

architecture is shown <strong>in</strong> Fig.1. There are five parts:<br />

metadata entities, metadata management eng<strong>in</strong>e, bus<br />

architecture, the <strong>in</strong>put-output system and the client<br />

<strong>in</strong>terface. Referenc<strong>in</strong>g to the Von Neumann computer<br />

architecture, capability and service <strong>in</strong> MCCAVM are<br />

equivalent to the "peripheral" <strong>in</strong> computer hardware; the<br />

metadata entity is memory and driver of peripheral;<br />

Metadata management eng<strong>in</strong>es are belonged to the central<br />

controller unit. Capability and service are mounted to the<br />

correspond<strong>in</strong>g bus through the metadata entity drive and<br />

<strong>in</strong> form of peripheral, complet<strong>in</strong>g <strong>in</strong>teraction with<br />

metadata management eng<strong>in</strong>e. Capability and service are<br />

managed and controlled by metadata management eng<strong>in</strong>e.<br />

The central controller will eventually register service and<br />

capability to the user <strong>in</strong>terface and release <strong>in</strong> a<br />

standardized form of web service. The form will be<br />

transferred by client, implements transparent access to<br />

cloud resources through clients.<br />

1) Metadata entity<br />

The metadata entity is the core part of the model basis.<br />

It is generated by metadata generator when Capability or<br />

Service enters the MCCAVM. The metadata entity is<br />

divided <strong>in</strong>to two categories: descriptive metadata and<br />

adm<strong>in</strong>istrative metadata. Descriptive metadata <strong>in</strong>cludes<br />

resource description metadata, capability description<br />

metadata and service description metadata. Resource<br />

description metadata is a summary list of capability and<br />

service of the model, describ<strong>in</strong>g available resources of the<br />

entire model. Adm<strong>in</strong>istrative metadata <strong>in</strong>cludes the<br />

capability management metadata, the service<br />

management metadata and the control metadata.<br />

Metadata management eng<strong>in</strong>e controls the capability and<br />

service through the adm<strong>in</strong>istrative metadata.<br />

2) Metadata management eng<strong>in</strong>e<br />

Metadata management eng<strong>in</strong>e is <strong>in</strong>stitution of control<br />

and schedul<strong>in</strong>g of model, completes unified monitor<strong>in</strong>g,<br />

management and coord<strong>in</strong>ation work of capability and<br />

© 2013 ACADEMY PUBLISHER


1574 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

service and other resources. Firstly, after capability (or<br />

service) enters the model metadata generator. Metadata<br />

generator requests metadata management eng<strong>in</strong>e to<br />

process by us<strong>in</strong>g <strong>in</strong>terruption. Then eng<strong>in</strong>e mounts the<br />

correspond<strong>in</strong>g resource on model bus by us<strong>in</strong>g metadata<br />

entity, completes the registration task of service and<br />

capability, <strong>in</strong>forms MCCAVM that the capability (or<br />

service) has been <strong>in</strong> a state of read<strong>in</strong>ess, then<br />

accomplishes work of further assembly and<br />

configuration of resource by deploy<strong>in</strong>g the capability (or<br />

service), coord<strong>in</strong>ates with other related equipments and<br />

components <strong>in</strong> order to make the resource executable;<br />

realizes the management and control of model resource<br />

through capability (or service) monitor<strong>in</strong>g. For any<br />

update of the capability(or service), metadata generator<br />

requests eng<strong>in</strong>e to process by us<strong>in</strong>g the <strong>in</strong>terrupt<br />

mechanism similarly. The simple mechanism makes the<br />

MCCAVM model have favorable agile characteristic and<br />

dynamic extension property.<br />

3) Bus architecture<br />

Important ligament and prom<strong>in</strong>ent feature of<br />

MCCAVM is bus architecture. In the structure of<br />

computer hardware, rational task division of data bus,<br />

address bus and control bus promotes module production<br />

which is suitable for computer components, boosts the<br />

popularity of computers. The bus architecture of<br />

MCCAVM is constituted by capability metadata bus,<br />

service metadata bus and control metadata bus.<br />

Capability metadata bus and service metadata bus f<strong>in</strong>ish<br />

the carry of service and capability. Control metadata bus<br />

transmits control signals, communicate capability<br />

management metadata and service management metadata<br />

at the same time, makes MCCAVM unified.<br />

4) Input and output <strong>in</strong>terface system of server side<br />

Server-side provides the capability and service for the<br />

system by us<strong>in</strong>g metadata, through the capability<br />

metadata generator and the metadata generator.<br />

Capability and service are provided to MCCAVM model<br />

<strong>in</strong> the form of peripheral through description and<br />

expansion of metadata. On the output side, further<br />

assembly and deployment of the model are provided to<br />

the client system <strong>in</strong> the unified form of web service.<br />

5) Client <strong>in</strong>terface<br />

Client gets k<strong>in</strong>ds of cloud applications from server side<br />

by us<strong>in</strong>g virtual desktop. Firstly, client virtual desktop<br />

gets service list from cloud side. User orders the apps<br />

which he/she likes subsequently. The load eng<strong>in</strong>e<br />

completes the transparent access to capability and service<br />

of cloud side at last.<br />

Ⅲ. SYSTEM DESIGN<br />

An open, dynamic scalable and data loosely coupled<br />

MCCAVS is designed based on MCCAVM <strong>in</strong> this<br />

section.<br />

A. System Architecture<br />

Based on the model design, MCCAVS architecture is<br />

shown <strong>in</strong> Fig.2. Correspond<strong>in</strong>g to the model, the whole<br />

system <strong>in</strong>cludes metadata entities, metadata management<br />

eng<strong>in</strong>e, and bus structure, the <strong>in</strong>put and output <strong>in</strong>terface<br />

system of server side and client <strong>in</strong>terface. Moreover,<br />

capability pool and service stores are implemented, used<br />

for stor<strong>in</strong>g capability and service.<br />

Figure 2. MCCAVS architecture<br />

B. Metadata Entity<br />

In MCCAVS, metadata entity components are series<br />

files of system capability and service for describ<strong>in</strong>g,<br />

controll<strong>in</strong>g and manag<strong>in</strong>g (.meta). As the extensible<br />

markup language (eXtensible Markup Language, XML)<br />

provides standard methods of metadata <strong>in</strong>formation<br />

exchange methods, we use XML-based metadata file<br />

format. Resource metadata files (resource.meta) record<br />

all available capability and service <strong>in</strong> system; Capability<br />

description metadata file(capability_description.meta)<br />

and capability manager meta data files<br />

(capability_manager.meta) record detail <strong>in</strong>formation of<br />

specific capability; Similarly, service description<br />

metadata file (service_description.meta) and service<br />

manag<strong>in</strong>g data files (service_manager.meta) record detail<br />

<strong>in</strong>formation of specific service; Control metadata files<br />

record permissions related to capability and service,<br />

<strong>in</strong>formation of roles and life-cycle state control and so on.<br />

The resource metadata file (resource.meta) is given as<br />

followed for example:<br />

<br />

<br />

<br />

***<br />

***<br />

***<br />

<br />

......<br />

<br />

<br />

<br />

***<br />

***<br />

***<br />

<br />

......<br />

<br />

<br />

From above we can conclude that resource metadata<br />

file <strong>in</strong>cludes all the current capability and service list.<br />

Each capability or service has a system unique id<br />

identifier, which is assigned by the system when this<br />

capability or service enters the system and registers to the<br />

metadata eng<strong>in</strong>e. Based on Von Neumann architecture,<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1575<br />

we regard capability and service as “peripheral”, thus<br />

capability or service id is these “peripherals” address.<br />

Metadata management eng<strong>in</strong>e, which is the CPU of<br />

MCCAVS, can locate any capability or service accord<strong>in</strong>g<br />

to the "peripheral” id through meta-data bus. Individual<br />

capability or service metadata description file and path to<br />

the file metadata management are stored <strong>in</strong> the tag<br />

meta_location. We take capability described metadata file<br />

as an example to expound the entity format of <strong>in</strong>dividual<br />

capability metadata <strong>in</strong> the follow<strong>in</strong>g<br />

<br />

<br />

***<br />

***<br />

***<br />

***<br />

***<br />

***<br />

***<br />

**<br />

......<br />

<br />

<br />

Besides conta<strong>in</strong><strong>in</strong>g the capability id and other basic<br />

<strong>in</strong>formation, capability description metadata file also<br />

conta<strong>in</strong>s version tag used for controll<strong>in</strong>g capability<br />

version <strong>in</strong>formation, location tag <strong>in</strong>dicates the real<br />

location of the capability products <strong>in</strong> the capability pool,<br />

loadclass tag <strong>in</strong>dicates the entrance classes of the<br />

capability part; dependentCapability tag <strong>in</strong>dicates<br />

dependency relationship with other capability<br />

components.<br />

Figure 3. Interface language UML static structure<br />

C. Metadata Management Eng<strong>in</strong>e<br />

Metadata management eng<strong>in</strong>e, which takes responsible<br />

for pars<strong>in</strong>g the <strong>in</strong>terface command and translates it <strong>in</strong>to<br />

system commands, is the "central processor" and the core<br />

component of the system. We def<strong>in</strong>e a set of <strong>in</strong>terface<br />

commands based on object-oriented language JAVA to<br />

facilitate developers. As shown <strong>in</strong> fig.3, <strong>in</strong>terface<br />

language is divided <strong>in</strong>to three categories: the system <strong>in</strong>put<br />

and output (IOSystem), the schedul<strong>in</strong>g <strong>in</strong>terface<br />

(Schedule), and the web service <strong>in</strong>terface(WS). Interface<br />

command is the abstraction method provided by these<br />

<strong>in</strong>terfaces and the command parameter is the method<br />

parameter. Table 1 shows a typical <strong>in</strong>terface and the<br />

<strong>in</strong>terface commands.<br />

D. Bus Structure<br />

Accord<strong>in</strong>g to the design of the bus structure <strong>in</strong> the<br />

model, three types of buses <strong>in</strong> the MCCVAS system are<br />

def<strong>in</strong>ed: capability bus, service bus and control bus. For<br />

the purpose of quick address<strong>in</strong>g and ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g<br />

resources of storage efficiently, HashMap, which can<br />

complete key-value mapp<strong>in</strong>g and time complexity is O(1),<br />

is used to organize system capability and service.<br />

Capability or service id is the key and capability or<br />

service object <strong>in</strong>stance is the value. Three bus<br />

declarations are followed:<br />

protected class ControlBus extends HashMap<br />

implements Bus<br />

protected class CapabilityBus extends HashMap <br />

implements Bus<br />

protected class ServiceBus extends HashMap implements<br />

Bus<br />

Interface<br />

IOSystem<br />

Schedule<br />

WS<br />

TABLE I.<br />

TYPICAL INTERFACE AND INTERFACE COMMAND<br />

Interface<br />

commands<br />

jo<strong>in</strong>()<br />

exit()<br />

log<strong>in</strong>()<br />

load()<br />

start()<br />

update()<br />

Parameter<br />

Component: the<br />

Parent <strong>in</strong>terface<br />

of Capability and<br />

Service<br />

ditto<br />

ditto<br />

ditto<br />

ditto<br />

ditto<br />

Function Declaration<br />

To Generate metadata entity<br />

when Capability or Service<br />

enters.<br />

To make Capability or<br />

Service exits the system.<br />

To allocate component ID<br />

when register to the system<br />

Capability or Service.<br />

To load Capability or Service<br />

on the system, which requests<br />

metadata management eng<strong>in</strong>e<br />

mounted components to the<br />

correspond<strong>in</strong>g meta- data bus<br />

through <strong>in</strong>terrupt mode.<br />

To start-up Capability or<br />

Service.<br />

To update Capability or<br />

Service.<br />

stop() ditto To stop Capability or Service.<br />

logout() ditto<br />

To log out Capability or<br />

Service, log out components,<br />

exit the bus system.<br />

To generate service.xml and<br />

convert() ditto wsdl.xml for Capability or<br />

Service.<br />

publish() ditto<br />

To publish Capability or<br />

Service as a web service.<br />

E. Input and Output Interface <strong>in</strong> Server Side<br />

Server-side <strong>in</strong>put <strong>in</strong>terface <strong>in</strong>cludes capability<br />

metadata generator and service metadata generator. It<br />

shields metadata manipulation for outside of the system<br />

and generates metadata entity as described <strong>in</strong> Section 3.2.<br />

Output <strong>in</strong>terface releases system capability and service to<br />

meet the <strong>in</strong>vok<strong>in</strong>g of term<strong>in</strong>als by us<strong>in</strong>g standardization<br />

web service <strong>in</strong>terface. As shown <strong>in</strong> fig.2, we use AXIS2<br />

as release eng<strong>in</strong>e.<br />

F. Client Access<br />

As the server-side uses web service technology to<br />

provide resources, the system supports transparent access<br />

heterogeneous multi-platform capability and service of<br />

cloud side. Client <strong>in</strong>terface work steps are as follows:<br />

© 2013 ACADEMY PUBLISHER


1576 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

a. Regard<strong>in</strong>g all cloud resources (Capability and<br />

service) <strong>in</strong> cloud side as the services, and gett<strong>in</strong>g the list<br />

of services through pars<strong>in</strong>g eng<strong>in</strong>e.<br />

b. Users order correspond<strong>in</strong>g services when enter the<br />

list of services.<br />

c. User order<strong>in</strong>g events will trigger service pars<strong>in</strong>g<br />

eng<strong>in</strong>e and get metadata file of their subscription services.<br />

d. Service load eng<strong>in</strong>e loads the service of client<br />

components accord<strong>in</strong>g to service metadata file, achiev<strong>in</strong>g<br />

transparent access<strong>in</strong>g to virtual resources of the cloud.<br />

G. Capability Pool and Service Store<br />

Capability pool and service stores are components<br />

which storage system peripherals (Capability and service).<br />

System bus manages peripheral by us<strong>in</strong>g HashMap.<br />

Capability or service id is the key and capability or<br />

service object <strong>in</strong>stance is the value. Correspond<strong>in</strong>gly, the<br />

capability pool and service store are stockpiles of the<br />

value. So, here we use two <strong>in</strong>stances of simple data<br />

structures (class Set) to implement the two components<br />

separately.<br />

network and us<strong>in</strong>g Google nexus s, Samsung and HTC<br />

etc. as test term<strong>in</strong>ation.<br />

The MCCAVS <strong>in</strong>cludes three subsystems,<br />

correspond<strong>in</strong>g three user roles: 1) Virtual desktop<br />

subsystem, which is client software, correspond<strong>in</strong>g to end<br />

user. As shown <strong>in</strong> fig.5, end user can enjoy cloud storage,<br />

browse cloud app list and virtual <strong>in</strong>stall apps which<br />

he/she likes. 2) Developer subsystem, which is a platform<br />

<strong>in</strong> the cloud side for the developers. As shown <strong>in</strong> fig.6,<br />

developers can upload, submit for review, and release<br />

apps. 3) Adm<strong>in</strong>istrator subsystem, which is a platform <strong>in</strong><br />

the cloud side for adm<strong>in</strong>istrator. As shown <strong>in</strong> fig.7,<br />

adm<strong>in</strong>istrator can use it for check<strong>in</strong>g, configur<strong>in</strong>g,<br />

monitor<strong>in</strong>g and deploy<strong>in</strong>g everyth<strong>in</strong>g <strong>in</strong> the cloud system.<br />

a) home page b) cloud storage view c) cloud apps view<br />

Figure 4. Snapshot of experimental environment<br />

d) home page after <strong>in</strong>stall<strong>in</strong>g cloud apps e) configure cloud server<br />

Figure 5. Virtual desktop subsystem<br />

IV. SYSTEM IMPLEMENTATION AND VERIFICATION<br />

A. System Implementation<br />

The experimental environment of the system is as<br />

follows: The cloud cluster is made up of 14 PCs <strong>in</strong> which<br />

master node uses memory bank of 4G, Intel(r) core(tm)2<br />

duo 2.93GHz, hard disk of 500G and 13 slave nodes are<br />

of the same configuration of Pentium(r) dual-core<br />

3.20GHz,use memory bank of 2G,hard disk of 250G.<br />

MCCVS prototype system hosted by the master node, as<br />

shown <strong>in</strong> fig.4. The IaaS layer resources and the<br />

environment are made up of 13 slave nodes, which have<br />

<strong>in</strong>stalled Hadoop0.20, choose one as NameNode from the<br />

13 slave nodes. In MCCAVS, as IaaA basic resources<br />

made up of 13 slave nodes are regarded as a common<br />

"capability" enter system and MCCAVS manages IaaS<br />

resources through NameNode, IaaS layer can expand<br />

arbitrary amount of nodes at any time accord<strong>in</strong>g to<br />

demand while there is not effect on MCCAVS. The <strong>in</strong>ner<br />

bandwidth of the cluster is 100Mbit/s, outlet bandwidth<br />

of the server is 10Mbit/s; The operat<strong>in</strong>g system is<br />

ubuntu11.04, the version of Java virtual mach<strong>in</strong>e is Java<br />

SE6; The Web conta<strong>in</strong>er is Tomcat 5.5.17; Client test<br />

platform is Android2.2, work<strong>in</strong>g <strong>in</strong> Ch<strong>in</strong>a Mobile EDGE<br />

a) home page for developer b) app upload view<br />

c) app check<strong>in</strong>g result view d) cloud app list view<br />

Figure 6. Developer subsystem<br />

a) log<strong>in</strong> page for adm<strong>in</strong>istrator b) home page<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1577<br />

c) app monitor view d) app check view<br />

Figure 7. Adm<strong>in</strong>istrator subsystem<br />

B. System Verification<br />

Due to lack of space, we elaborate formal description<br />

and experimental analysis based on Tur<strong>in</strong>g mach<strong>in</strong>e by<br />

us<strong>in</strong>g an example of virtual cloud storage services <strong>in</strong> this<br />

section.<br />

1) Service Description<br />

Virtual cloud storage is a dest<strong>in</strong>ation service system,<br />

which makes numerous different k<strong>in</strong>ds of storage<br />

equipments <strong>in</strong> network co-operate and provides data<br />

storage and service access function jo<strong>in</strong>tly. To the<br />

movable term<strong>in</strong>ation which is resource-constra<strong>in</strong>ed<br />

system, virtual cloud storage can extend the storage<br />

capability of mobile term<strong>in</strong>als. In MCCAVS, virtual<br />

cloud storage implementation <strong>in</strong>volves four steps: First,<br />

the system IaaS layer underly<strong>in</strong>g storage resource<br />

(Hadoop HDFS) enters the system as a capability, as<br />

shown <strong>in</strong> fig.2; Then development storage services log-<strong>in</strong><br />

the system; Moreover, system transfers store service to<br />

standard web service and releases it; F<strong>in</strong>ally, the term<strong>in</strong>al<br />

device f<strong>in</strong>ds and loads the service, to provide users with a<br />

virtual storage service. Us<strong>in</strong>g the system <strong>in</strong>terface<br />

<strong>in</strong>struction def<strong>in</strong>ed <strong>in</strong> the 3.3 section, the service specific<br />

implementation steps are as follows:<br />

a. In IaaS layer, HDFS file system as a capability to<br />

enter the system and <strong>in</strong>vokes <strong>in</strong>terface IOSystem jo<strong>in</strong>()<br />

method.<br />

b. Based on HDFS, we develop cloud storage control<br />

components as service, <strong>in</strong>vok<strong>in</strong>g jo<strong>in</strong>() method of<br />

IOSystem.<br />

c. Storage capability registers to the system, <strong>in</strong>vokes<br />

log<strong>in</strong>() method of Schedule <strong>in</strong>terface.<br />

d. Storage service registers to the system, <strong>in</strong>vokes<br />

log<strong>in</strong>() method of Schedule <strong>in</strong>terface<br />

e. Invoke load() method of <strong>in</strong>terface Schedule, load the<br />

storage capability.<br />

f. Invoke load() method of <strong>in</strong>terface Schedule, load the<br />

storage service.<br />

g. Invoke start() method of <strong>in</strong>terface Schedule to start<br />

the storage capability.<br />

h. Invoke start() method of <strong>in</strong>terface Schedule to start<br />

the storage service.<br />

i. Invoke convert() method of <strong>in</strong>terface Schedule; make<br />

Storage service as standard web service.<br />

j. Invoke publish() method of <strong>in</strong>terface Schedule,<br />

release storage web service.<br />

In this section, the order of step a, b is fixed. Step c, e<br />

and d, f is the registration and load<strong>in</strong>g of the capability<br />

and service, order cannot be changed. The order of<br />

process g, h, i, j is also fixed.<br />

2) Formal Verification<br />

Accord<strong>in</strong>g to the description of the services, virtual<br />

cloud storage model of the Tur<strong>in</strong>g mach<strong>in</strong>e can decode<br />

the symbol str<strong>in</strong>g S=(a b N g h i j), <strong>in</strong> which N stands for<br />

symbol str<strong>in</strong>g sequence comb<strong>in</strong>ation of the fixed<br />

alphabetical order c, e and d, f. S is the symbol sequence<br />

after the comb<strong>in</strong>ation of these symbols. Symbols come<br />

from a f<strong>in</strong>ite alphabet Σ and all the sequences of symbols<br />

constitute a language L. Therefore, the problem is<br />

transformed to a Tur<strong>in</strong>g mach<strong>in</strong>e T which can identify the<br />

language L. The Tur<strong>in</strong>g mach<strong>in</strong>e formal description is<br />

given <strong>in</strong> the follow<strong>in</strong>g:<br />

T = (Q,Σ,Γ,δ,q 0 ,q a ,q r )<br />

Q = {q 1 ,q 2 ,…,q 8 ,q a ,q r }<br />

Σ= {a, b, c, d, e, f, g, h, i, j}<br />

Γ= {a, b, c, d, e, f, g, h, i, j, B}<br />

δ:Q×Γ→Q×Γ×{L,R} is the transfer function.<br />

q 0 ∈ Q is the <strong>in</strong>itial state;<br />

q a ∈ Q is the accept<strong>in</strong>g state;<br />

q r ∈ Q is the reject state and q r ≠q a ;<br />

The <strong>in</strong>itial state of Tur<strong>in</strong>g mach<strong>in</strong>e is q 0 , write symbol<br />

sequence S= (a b N g h i j), which needed to be read, on<br />

the work tape. Read-write head is scanned from left to<br />

right, Each read<strong>in</strong>g of a symbol will trigger a process of<br />

metadata management eng<strong>in</strong>e, transferr<strong>in</strong>g to a new state.<br />

That is, transferr<strong>in</strong>g from q 0 to q 1 is a→b, R, its state<br />

transition function is δ(q 0 , a ) = (q 1 , b, R). The service<br />

production of the state transition is shown <strong>in</strong> fig.8.<br />

Figure 8. State diagram of virtual storage<br />

3) Experimental Analysis<br />

For virtual storage, cloud capability is much larger<br />

than the term<strong>in</strong>al capability, so, time performance <strong>in</strong>dex<br />

of the system is more important than the storage capacity<br />

<strong>in</strong>dex. Fig.9 describes the relationships between capacity<br />

and response time when term<strong>in</strong>al equipment access cloud<br />

storage service. Three experimental data <strong>in</strong> the same test<br />

are showed. In every test, besides test<strong>in</strong>g mach<strong>in</strong>e, 15<br />

clients are simulated to test system concurrent effect. We<br />

can see, response time is ma<strong>in</strong>ly determ<strong>in</strong>ed by the<br />

term<strong>in</strong>al connection bandwidth, system process<strong>in</strong>g time<br />

can meet user requirement. On the other hand,<br />

virtualization technology will be the ma<strong>in</strong> comput<strong>in</strong>g<br />

tasks hosted by the cloud.<br />

© 2013 ACADEMY PUBLISHER


1578 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

time(ms)<br />

300000<br />

250000<br />

200000<br />

150000<br />

100000<br />

50000<br />

upload to cloud<br />

download from cloud<br />

0<br />

0 500 1000 1500 2000 2500 3000 3500<br />

file size(KB)<br />

Figure 9. Relationship between cloud storage capacity and response<br />

time<br />

amount of code(l<strong>in</strong>e)<br />

24000<br />

22000<br />

20000<br />

18000<br />

16000<br />

14000<br />

12000<br />

10000<br />

8000<br />

6000<br />

4000<br />

2000<br />

0<br />

amount of code <strong>in</strong> client<br />

amount of code <strong>in</strong> cloud side<br />

1 2 3 4 5<br />

service ID<br />

Figure 10. Compare amount of code between cloud and client<br />

Fig.10 compares code quantity of 5 services released <strong>in</strong><br />

Section 4.1 (by serial number, they are <strong>in</strong>stant<br />

messag<strong>in</strong>g[16], cloud storage, campus assistant, onl<strong>in</strong>e<br />

words, mobile TV) <strong>in</strong> the clouds and the term<strong>in</strong>al to<br />

compare the amount of computations roughly. As the<br />

figure shows, numerous comput<strong>in</strong>g tasks focus on the<br />

cloud by virtualization, even respective code quantity of<br />

service term<strong>in</strong>al is relatively more; it is also be<br />

concentrated <strong>in</strong> user <strong>in</strong>terface to be processed with. In<br />

addition, fig.10 shows that when service scale is small,<br />

for improv<strong>in</strong>g user experience, the calculation of client<br />

may closer to the cloud. However, more large-scale<br />

applications are more suitable for deployment <strong>in</strong> cloud<br />

comput<strong>in</strong>g virtualization platform.<br />

C. Compare with Related Work<br />

In virtualization architecture, typical system is<br />

designed by Ch<strong>in</strong>ese <strong>Academy</strong> of Sciences, named<br />

Virtual Management Architecture (VMA)[4]. The model<br />

aims to establish a unified resource management<br />

<strong>in</strong>frastructure for enterprises to realize the unified<br />

management of resources, resource systems and ondemand<br />

service of resource. The VMA focuses on<br />

management and use of underly<strong>in</strong>g hardware facilities.<br />

This is completely different <strong>in</strong> form and nature with<br />

MCCAVM <strong>in</strong> this paper.<br />

VMA is a resource management framework model,<br />

based on virtualization technology and equipped with the<br />

technique of <strong>in</strong>dependent schedul<strong>in</strong>g, which unified the<br />

management and use of <strong>in</strong>terface. VMA is made up of a<br />

number of resource management systems; each <strong>in</strong>dividual<br />

resource management system provides a k<strong>in</strong>d of virtual<br />

resource services. VMA provides reasonable and uniform<br />

resource management <strong>in</strong>frastructure of the system by<br />

unify<strong>in</strong>g these virtual resources management functions to<br />

a unified and consistent management platform.<br />

MCCAVM is a Cloud comput<strong>in</strong>g, virtualization model<br />

based on Metadata-driven. Accord<strong>in</strong>g to the formal<br />

def<strong>in</strong>ition of the model, it <strong>in</strong>cludes metadata entities,<br />

metadata management eng<strong>in</strong>e, the bus architecture, <strong>in</strong>putoutput<br />

system and customer term<strong>in</strong>ation. From the<br />

perspective of model development and control, besides<br />

end users, the model role is divided <strong>in</strong>to two major<br />

categories of developers and system operators. Among<br />

them, the development is divided <strong>in</strong>to capability<br />

developers and service developers. Developers use the<br />

<strong>in</strong>terface language to develop capability or service, the<br />

system operator uses the system language to complete the<br />

model management control task, Table 2 shows the<br />

comparison between the two roles.<br />

TABLE II.<br />

COMPARE MCCAVM WITH VMA<br />

MCCAVM<br />

VMA<br />

Model role<br />

Developers, system<br />

operators<br />

Resource users<br />

realization mode Metadata-Driven SOA<br />

Virtual level<br />

Hardware resources ,<br />

software services<br />

Hardware source<br />

objective<br />

Dynamic scalability for<br />

Unified management<br />

capability and service,<br />

of basic resources ,<br />

platform versatility and<br />

on-demand use<br />

capability to control<br />

Hierarchy<br />

Five parts: Metadata<br />

entities ,metadata<br />

management eng<strong>in</strong>e, bus<br />

architecture, <strong>in</strong>put, output<br />

systems and customer-side<br />

<strong>in</strong>terface<br />

Consists of one or<br />

more virtual resources<br />

management services<br />

(VMS) and a system<br />

of registration and<br />

<strong>in</strong>quiry services<br />

( SRCS )<br />

From the table above we can conclude that VMA<br />

focuses on the basic <strong>in</strong>tegration of resources and rational<br />

management. It is equivalent to an <strong>in</strong>tegration of<br />

resources and schedul<strong>in</strong>g platform, which can achieve the<br />

efficient use and reasonable allocation of resources.<br />

MCCAVM achieves a reasonable distribution of<br />

resources, and forms a broader perspective to understand<br />

the connotation and extension of the capability and<br />

service. Through fig.2, we can f<strong>in</strong>d that the capability<br />

<strong>in</strong>cludes not only just basic resources <strong>in</strong> IaaS layer of<br />

cloud comput<strong>in</strong>g, but all the basic hardware and software<br />

<strong>in</strong> MCCAVS. At the same time, all the production based<br />

on the capability or reproduced through the comb<strong>in</strong>ation<br />

of capability are all service, which reflects the idea<br />

EaaS(Everyth<strong>in</strong>g as a Service). And the model realizes<br />

the dynamic expansion of service and capability and hotswappable,<br />

which further enhances the versatility and<br />

scalability of the model.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1579<br />

V. CONCLUSION<br />

This paper proposes a metadata-driven cloud<br />

comput<strong>in</strong>g virtualization model MCCAVM, based on the<br />

discussion and analysis of real needs which exists <strong>in</strong><br />

cloud comput<strong>in</strong>g virtualization technology currently. The<br />

correspond<strong>in</strong>g system MCCAVS is implemented also.<br />

We formally def<strong>in</strong>e and verify the model based on data<br />

experiments. Compared with previous work, this model<br />

has good reference value which ma<strong>in</strong>ly reflected <strong>in</strong>: 1)<br />

Architecture which proposed by the model based on the<br />

Tur<strong>in</strong>g mach<strong>in</strong>e model and the Von Neumann computer<br />

is clear and simple. Simultaneously, it implements<br />

orig<strong>in</strong>al <strong>in</strong>tention of design efficiently. 2) The concept of<br />

cloud comput<strong>in</strong>g platform capability and service with a<br />

broader perspective is proposed. The full life cycle<br />

management of capability and service is implemented.<br />

The model regards capability and service as "peripheral",<br />

mak<strong>in</strong>g the model has a good dynamic scalability. 3) The<br />

form of a metadata-driven not only make the model has<br />

management-control ability, a simple mechanism and<br />

versatility, but also transform the traditional strong<br />

function coupl<strong>in</strong>g relationship to loosely data coupled<br />

relationship of the various components <strong>in</strong> the model,<br />

which plays an important role <strong>in</strong> the decoupl<strong>in</strong>g.<br />

ACKNOWLEDGMENT<br />

This research is supported by import National Science<br />

and Technology Specific Project under grants of<br />

2011ZX03002-004-03, Science & Technology Research<br />

Program of the Chongq<strong>in</strong>g Municipal Education<br />

Committee under grants of KJ110529, Special<br />

Foundation of Cloud Comput<strong>in</strong>g of Chongq<strong>in</strong>g<br />

University of Posts and Telecommunications A2010-13,<br />

Educational Reform Projects of Chongq<strong>in</strong>g University of<br />

Posts and Telecommunications XJG1216.<br />

REFERENCES<br />

[1] Gartner.com. Gartner Say's Cloud Comput<strong>in</strong>g Will Be As<br />

Influential As E-bus<strong>in</strong>ess. http://www.gartner.com/it/page.jspid=707508.<br />

Aug 2010.<br />

[2] Eric K, Galen G. What cloud comput<strong>in</strong>g really means.<br />

http://www.<strong>in</strong>foworld.com/d/cloud-comput<strong>in</strong>g/what-cloudcomput<strong>in</strong>g-really-means-031.<br />

InfoWorld. June 2008.<br />

[3] WikiMedia. Cloud Comput<strong>in</strong>g. http://en.wikipedia.org/<br />

wiki/Cloud_comput<strong>in</strong>g. last modified, June 2011.<br />

[4] WANG M<strong>in</strong>, LI J<strong>in</strong>g, FAN Zhong-Lei, XU Lu. A Service<br />

Model for Virtual Resource Management and Its<br />

Implementation. Ch<strong>in</strong>ese Journal of Computers, 2005,<br />

28(5): 856-863.<br />

[5] Kessler M, Reifert A, Lamp D, Voith T. A Service-<br />

Oriented Infrastructure for Provid<strong>in</strong>g Virtualized Networks.<br />

Bell Labs Technical Journal, 2008, 13(3): 111-127.<br />

[6] Bhattacharya K, K<strong>in</strong>g DJ. Interview with Douglas J. K<strong>in</strong>g<br />

on "The Impact of Virtualization and Cloud Comput<strong>in</strong>g on<br />

IT Service Management". Bus<strong>in</strong>ess & Information Systems<br />

Eng<strong>in</strong>eer<strong>in</strong>g, 2011, 3(1): 49-51.<br />

[7] TIAN Guan-Hua, MENG Dan, ZHAN Jian-Feng. Reliable<br />

Resource Provision Policy for Cloud Comput<strong>in</strong>g. Ch<strong>in</strong>ese<br />

Journal of Computers, 2010, 33(10): 1859-1872.<br />

[8] Flouris MD, Lachaize R, Chasapis K, Bilas A. Extensible<br />

block-level storage virtualization <strong>in</strong> cluster-based systems.<br />

Journal of Parallel and Distributed Comput<strong>in</strong>g, 2010, 70(8):<br />

800-824.<br />

[9] HUAI J<strong>in</strong>-Peng, LI Q<strong>in</strong>, HU Chun-M<strong>in</strong>g. Research and<br />

design on hypervisor based virtual comput<strong>in</strong>g environment.<br />

Journal of Software, 2007, 18(8): 2016-2026.<br />

[10] Baroncelli F, Mart<strong>in</strong>i B, Castoldi P. Network virtualization<br />

for cloud comput<strong>in</strong>g. Annals of Telecommunicationsannals<br />

Des Telecommunications, 2010, 65(11-12): 713-<br />

721.<br />

[11] Xiong J, Hu YM, Li GJ, Tang RF, Fan ZH. Metadata<br />

Distribution and Consistency Techniques for Large-Scale<br />

Cluster File Systems. IEEE Transactions on Parallel and<br />

Distributed Systems, 2011, 22(5): 803-816.<br />

[12] Govedarica M, Boskovic D, Petrovacki D, N<strong>in</strong>kov T,<br />

Ristic A. Metadata Catalogues <strong>in</strong> Spatial Information<br />

Systems. Geodetski List, 2010, 64(4): 313-334.<br />

[13] Tur<strong>in</strong>g A M. On computable numbers, with an application<br />

to the Entscheidungsproblem. Proceed<strong>in</strong>gs of the London<br />

Mathematical Society, 1936, 42(2): 230-265.<br />

[14] Neumann J. First Draft of a Report on the EDVAC.<br />

repr<strong>in</strong>ted <strong>in</strong> full <strong>in</strong> Stern, N. From ENIAC to UNIVAC: An<br />

Appraisal of the Eckert-Mauchly Computers Bedford,<br />

Mass.: Digital Press , 1981: 181-246.<br />

[15] ZHANG Tian-N<strong>in</strong>g, YUN Xiao-Chun, ZHANG Yong-<br />

Zheng, MEN Chao-Guang, SUN Jian-Liang. A Model of<br />

Network Device Coord<strong>in</strong>ative Run. Journal of Software,<br />

2011, 34(2): 216-228.<br />

[16] Yunpeng Xiao, Yanb<strong>in</strong> Liu, Shasha Yang, Guangxia Xu.<br />

Design and implement of OMS IM system based on cloud<br />

comput<strong>in</strong>g. Journal of Chongq<strong>in</strong>g University of Posts and<br />

Telecommunications(Natural Science Edition), 2010, (4):<br />

468-472.<br />

Yunpeng Xiao, born <strong>in</strong> 1979, Ph.D. candidate. His research<br />

<strong>in</strong>terests <strong>in</strong>clude cloud comput<strong>in</strong>g, data m<strong>in</strong><strong>in</strong>g and complex<br />

network.<br />

Guangxia Xu, born <strong>in</strong> 1974, Ph.D., Associate professor. Her<br />

research <strong>in</strong>terests <strong>in</strong>clude cloud comput<strong>in</strong>g and data m<strong>in</strong><strong>in</strong>g.<br />

Yanb<strong>in</strong>g Liu, born <strong>in</strong> 1971, Ph.D., professor, Ph.D. supervisor.<br />

His research <strong>in</strong>terests <strong>in</strong>clude network management and control,<br />

strategy and security.<br />

Bai Wang, born <strong>in</strong> 1962, Ph.D., professor, Ph.D. supervisor.<br />

Her research <strong>in</strong>terests <strong>in</strong>clude distributed comput<strong>in</strong>g and data<br />

m<strong>in</strong><strong>in</strong>g.<br />

© 2013 ACADEMY PUBLISHER


1580 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Robust Portfolio Optimization with Options<br />

under VE Constra<strong>in</strong>t us<strong>in</strong>g Monte Carlo<br />

X<strong>in</strong>g Yu<br />

Department of Mathematics & Applied Mathematics Humanities & Science and Technology Institute<br />

of Hunan Loudi, 417000, P.R. Ch<strong>in</strong>a<br />

Email:hnyux<strong>in</strong>g@163.com<br />

Abstract—this paper proposes a robust portfolio<br />

optimization programm<strong>in</strong>g model with options. Under<br />

constra<strong>in</strong>s of variance efficiency and shortfall preference<br />

structure, we derive optioned portfolios with the maximum<br />

expected return of robust counterpart. A numerical example<br />

us<strong>in</strong>g Monte Carlo illustrates some of the features and<br />

applications of this model.<br />

Index Terms—Robust portfolio optimization; VE constra<strong>in</strong>t;<br />

Monte Carlo<br />

I. INTRODUCTION<br />

The ma<strong>in</strong> problem an <strong>in</strong>vestor faces is to make an<br />

optimal portfolio. The classical portfolio model is<br />

generally only associated with stocks. The derivative<br />

<strong>in</strong>struments are no more considered as the hedg<strong>in</strong>g<br />

<strong>in</strong>struments, but now they are considered as the<br />

<strong>in</strong>vestment <strong>in</strong>strument. For example, options are the<br />

derivative <strong>in</strong>struments which can <strong>in</strong>crease the liquidity<br />

and flexibility of return from the <strong>in</strong>vestment. And at the<br />

same time, they also can be regarded as an asset to be<br />

<strong>in</strong>vested.<br />

Numerous studies have <strong>in</strong>vestigated the <strong>in</strong>tegration of<br />

options <strong>in</strong> portfolio optimization models. Alexander,<br />

Coleman and Li (2006) [1] analyzed the derivative<br />

portfolio hedg<strong>in</strong>g problems based on value at risk (VaR)<br />

and conditional value at risk (CVaR). Papahristodoulou[2]<br />

proposed optioned portfolio model, and based on Black-<br />

Scholes(B-S)formula, they derived the values of all<br />

the Greek letters of the portfolio ΔΓΘto , , hedge risk.<br />

Their objective was to maximize the difference between<br />

the theoretical value and the market value of a portfolio<br />

with options. And they transformed the problem to a<br />

l<strong>in</strong>ear programm<strong>in</strong>g model. Their model is simpler, but it<br />

is tractable. Horasanli[3] extended the model proposed by<br />

Papahristodoulou to a multi-asset sett<strong>in</strong>g to deal with a<br />

portfolio of options and underly<strong>in</strong>g assets. Gao[4] also<br />

extended the exist<strong>in</strong>g literature on options strategies.<br />

With the model and the method they mentioned, the<br />

<strong>in</strong>vestors can take the options strategies <strong>in</strong> terms of one’s<br />

subjective personality, and meanwhile, adjust the risks to<br />

suit the needs of the market change. Gerhard<br />

Scheuenstuhl, Rudi Zagst[5] exam<strong>in</strong>ed the problem of<br />

manag<strong>in</strong>g portfolios consist<strong>in</strong>g of both, stocks and<br />

options, However , the target function of their models<br />

associated with the stochastic properties of the portfolio<br />

return,which is <strong>in</strong>tractable. Because we have to deal<br />

with the stochastic dynamics price model of the expected<br />

f<strong>in</strong>al portfolio value.<br />

The mentioned above are related to the problem of<br />

parameter estimation. However, the framework requires<br />

the knowledge of some <strong>in</strong>puts, such both mean and<br />

covariance matrix of the asset returns, which practically<br />

are unknown and need to be estimated. The standard<br />

approach, ignor<strong>in</strong>g estimation error, simply treats the<br />

estimates as the true parameters and plugs them <strong>in</strong>to the<br />

optimal portfolio optimization model. But most<br />

frequently the uncerta<strong>in</strong> parameters play a central role <strong>in</strong><br />

the analysis of the decision mak<strong>in</strong>g process. So the<br />

peculiarity of these parameters cannot be ignored without<br />

the risk of <strong>in</strong>validat<strong>in</strong>g the possible implications of the<br />

analysis Wets [6].<br />

Dur<strong>in</strong>g the last two decades, the idea of robust<br />

optimization has become an <strong>in</strong>terest<strong>in</strong>g area of research.<br />

Soyster [7] is the first who <strong>in</strong>troduced the idea of robust<br />

optimization, but his idea turns to be very pessimistic<br />

which makes it unfavorable among practitioners. Ben-Tal<br />

and Nemirovski [8] developed new robust methodology<br />

where the optimal solution is more optimistic. Their idea<br />

uses <strong>in</strong>terior po<strong>in</strong>t based algorithm to f<strong>in</strong>d the robust<br />

solution on a counterpart of the <strong>in</strong>itial model. They also<br />

apply their robust method on some portfolio optimization<br />

problems and show that the f<strong>in</strong>al optimal solution<br />

rema<strong>in</strong>s feasible aga<strong>in</strong>st the uncerta<strong>in</strong>ty on different <strong>in</strong>put<br />

parameters. Steve Zymler proposed a novel robust<br />

optimization model for design<strong>in</strong>g portfolios that <strong>in</strong>clude<br />

European-style options. This model trades off weak and<br />

strong guarantees on the worst-case portfolio return. The<br />

weak guarantee applies as long as the asset returns are<br />

realized with<strong>in</strong> the prescribed uncerta<strong>in</strong>ty set, while the<br />

strong guarantee applies for all possible asset returns.<br />

Nemirovski[9] proposed robust portfolio selection under<br />

ellipsoidal uncerta<strong>in</strong>ty. There is rare literature about<br />

robust portfolio optimization with options as far as we<br />

know. Steve Zymler[10] proposed a novel robust<br />

optimization model for design<strong>in</strong>g portfolios that <strong>in</strong>clude<br />

European-style options, extend<strong>in</strong>g robust portfolio<br />

optimization to accommodate options. But they only paid<br />

attention to portfolio return and ignored risk. Ai-fan<br />

L<strong>in</strong>g.etc [11] proposed robust portfolio selection models<br />

under so-called ‘‘marg<strong>in</strong>al + jo<strong>in</strong>t’’ ellipsoidal<br />

uncerta<strong>in</strong>ty set and to test the performance of the<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1580-1586


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1581<br />

proposed models. In their paper one more robust portfolio<br />

selection model with option protection is proposed by<br />

comb<strong>in</strong><strong>in</strong>g options <strong>in</strong>to the robust portfolio selection<br />

model. This paper considers the optioned robust portfolio<br />

return.<br />

The rest of the paper is organized as follows. In<br />

section 2 we review robust portfolio optimization. In<br />

Section 3 we show how a portfolio that conta<strong>in</strong>s options<br />

can be modeled <strong>in</strong> a robust optimization framework.<br />

Section 4 gives an example based on Monte Carlo<br />

simulation to illustrate the application of the model and<br />

the method. Conclusions are also drawn.<br />

II. ROBUST PORTFOLIO OPTIMIZATION<br />

We consider the portfolio <strong>in</strong>cludes several European<br />

call options and put options on different stocks. This<br />

portfolio makes extensive use of options to achieve the<br />

desired payoff profile. As we all know, the return of<br />

options depends on the return of the correspond<strong>in</strong>g<br />

underly<strong>in</strong>g stocks. And the <strong>in</strong>puts such as mean or<br />

variance are uncerta<strong>in</strong>, which is lead to the returns of<br />

option are uncerta<strong>in</strong>. However, if the uncerta<strong>in</strong> sets of<br />

underly<strong>in</strong>g <strong>in</strong>puts are determ<strong>in</strong>ed, the ones of options are<br />

correspond<strong>in</strong>g to. Mostly portfolio model <strong>in</strong>tegrated <strong>in</strong>to<br />

options are only emphasized on portfolio return at the end<br />

of the <strong>in</strong>vestment horizon. Due to the result<strong>in</strong>g<br />

asymmetric portfolio return distribution mean–variance<br />

analysis will be not sufficient to identify optimal optioned<br />

portfolios. From the second half of the last century,<br />

options have been praised for their ability to give stock<br />

holders protection aga<strong>in</strong>st adverse market fluctuations. A<br />

standard option contract is determ<strong>in</strong>ed by the follow<strong>in</strong>g<br />

parameters: the premium or price of the option, the<br />

underly<strong>in</strong>g security price, the expiration date, and the<br />

strike price. A put (call) option gives the option holder<br />

the right, but not the obligation, to sell to (buy) from the<br />

option writer the underly<strong>in</strong>g security by the expiration<br />

date and at the prescribed strike price. American options<br />

can be exercised at any time up to the expiration date,<br />

whereas European options can be exercised only on the<br />

expiration date itself. We will only aim at European<br />

options, whose expiration is at the end of <strong>in</strong>vestment<br />

horizon, that is, at time T. We will pay attention to these<br />

<strong>in</strong>struments because of their simplicity and s<strong>in</strong>ce they<br />

naturally <strong>in</strong> the s<strong>in</strong>gle period portfolio optimization<br />

framework of the previous section.<br />

A. An Introduction to Option Pric<strong>in</strong>g<br />

It is necessary to <strong>in</strong>troduce call option first. Suppose an<br />

<strong>in</strong>vestor is presented with an opportunity to enter <strong>in</strong>to a<br />

position <strong>in</strong> a European call option written on a stock, with<br />

strike price K and expiration date T. The stock price<br />

process is assumed to follow a geometric Brownian<br />

motion with mean rate of return μ> 0 and volatility<br />

σ> 0 :<br />

dSt =μ Stdt +σ StdWt<br />

where { W,t<br />

t<br />

≥ 0}<br />

is a standard Brownian motion with<br />

W0<br />

= 0. The basic model for call option of the B–S is:<br />

−rT<br />

( ) ( )<br />

C= SN d − Ke N d<br />

1 2<br />

2<br />

( ) ( )<br />

d1<br />

= ⎡ln S/K r /2 T ⎤<br />

⎣<br />

+ +σ<br />

⎦<br />

/ σ T<br />

d2 = d1−σ<br />

T<br />

where<br />

C call option price;<br />

S current stock price;<br />

K strik<strong>in</strong>g price;<br />

r riskless <strong>in</strong>terest rate;<br />

T time until option expiration;<br />

σ standard deviation of return on the underly<strong>in</strong>g<br />

security;<br />

N( d<br />

i ) cumulative normal distribution function evaluated<br />

at d<br />

i<br />

.<br />

The same as put option:<br />

−rT<br />

P = Ke N( d2) − SN( d1)<br />

where P is put option price;<br />

The mean<strong>in</strong>gs of the rest letters are similar to the<br />

formers.<br />

Next, we will improve B-S formula us<strong>in</strong>g analytical<br />

method. It is well known that the basic assumption of B-S<br />

model is to assume the underl<strong>in</strong>g price follows Geometric<br />

Brown motion:<br />

dSt = μ Stdt +σ StdWt<br />

Call option is an option is a security that gives its<br />

owner the right to trade <strong>in</strong> a fixed number of shares of a<br />

specified common stock at a fixed price at any time on or<br />

before a given date. The act of mak<strong>in</strong>g this transaction is<br />

referred to as exercis<strong>in</strong>g the option. The fixed price is<br />

termed the strike price, and the given date, the expiration<br />

date. A call option gives the right to buy the shares; a put<br />

option gives the right to sell the shares.<br />

For an European call option its value at the expired<br />

time T is<br />

CT<br />

= ( ST<br />

− K )<br />

+<br />

Because the future is uncerta<strong>in</strong>, it is stochastic. And<br />

we need to know the current value of option. So it should<br />

to deduce from its expectation ES ( T<br />

− K )<br />

+<br />

The f<strong>in</strong>ancial market is perfect, that is the current value<br />

is equal to the discount of future value.<br />

−rT<br />

C0 = e E( ST<br />

− K )<br />

+<br />

Now, to calculate the expectation based on the hypothesis<br />

of lognormal distribution.<br />

2<br />

+<br />

⎛ σ ⎞<br />

⎛ σ TZ+ r−<br />

T ⎞<br />

+<br />

⎜ 2 ⎟<br />

⎝ ⎠<br />

E ( ST<br />

− K)<br />

= E⎜S0e −K⎟<br />

⎜<br />

⎟<br />

⎝<br />

⎠<br />

where Z∼<br />

N( 0,1)<br />

whose density function is<br />

Let Se<br />

1<br />

f ( x)<br />

= e<br />

2π<br />

2<br />

Ta ⎛<br />

r σ ⎞<br />

σ + ⎜<br />

−<br />

2 ⎟<br />

T<br />

0<br />

K 0<br />

2<br />

x<br />

−<br />

2<br />

⎝ ⎠<br />

− = then<br />

© 2013 ACADEMY PUBLISHER


1582 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

2<br />

⎛ ⎞ ⎛ ⎞<br />

K σ<br />

ln ⎜ ⎟−⎜r − ⎟T<br />

S0<br />

⎝ 2 ⎠<br />

a =<br />

⎝ ⎠<br />

σ T<br />

And the <strong>in</strong>tegral <strong>in</strong>terval is divided to two parts<br />

( −∞,a] ∪ [a, +∞ )<br />

⎛<br />

⎞<br />

e E S K S e K e dx<br />

⎛ 2 ⎞<br />

2<br />

+∞ σ<br />

σ Tx+ ⎜<br />

r−<br />

2 ⎟<br />

T<br />

x<br />

+<br />

1 −<br />

−rT<br />

⎝ ⎠<br />

2<br />

( − ) = ⎜<br />

⎟<br />

T ∫ 0<br />

−<br />

⎜<br />

⎟<br />

a<br />

2π<br />

where<br />

⎝<br />

= I + I<br />

1 2<br />

2 2<br />

x ⎛ ⎞<br />

+∞ − +σ Tx+ r− T<br />

rT S<br />

σ<br />

− 0 2 ⎜ 2 ⎟<br />

⎝ ⎠<br />

∫<br />

I1<br />

= e e dx<br />

2π<br />

a<br />

2<br />

+∞<br />

x<br />

rT K −<br />

−<br />

2<br />

∫<br />

I2<br />

=−e e dx<br />

2π<br />

For I 1<br />

,<br />

a<br />

2 2<br />

x ⎛ ⎞<br />

+∞ − +σ Tx+ r− T<br />

rT S<br />

σ<br />

− 0 2 ⎜ 2 ⎟<br />

⎝ ⎠<br />

∫<br />

I1<br />

= e e dx<br />

2π<br />

=<br />

a<br />

2 2<br />

σ +∞ x<br />

− T σ Tx−<br />

0 2 2<br />

S e ∫ e dx<br />

2π a<br />

( x−σ<br />

T)<br />

⎛<br />

⎞<br />

e exp dx<br />

2 2<br />

⎛ ⎞<br />

r− T<br />

2<br />

S<br />

σ +∞<br />

⎜<br />

0 2 ⎟<br />

⎝ ⎠<br />

σ T<br />

=<br />

⎜<br />

⎟<br />

∫ − +<br />

2π a<br />

2 2<br />

⎜ ⎟<br />

Let y= x−σ T then<br />

⎝<br />

2 2<br />

σ T +∞ y<br />

−<br />

0 2 2<br />

S<br />

I1<br />

= e ∫ e dy<br />

2π a−σ<br />

T<br />

( ( ))<br />

( ( ))<br />

= −Φ −σ<br />

rT<br />

Se<br />

0<br />

1 a T<br />

= − −σ<br />

For I<br />

2<br />

,<br />

rT<br />

Se<br />

0<br />

N a T<br />

2<br />

+∞ x<br />

rT K −<br />

−<br />

2<br />

I2<br />

=−e ∫ e dx<br />

2π ( ( ))( )<br />

−rT<br />

( a)<br />

= −Φ −<br />

−rT<br />

e 1 a K<br />

=−Ke<br />

Φ −<br />

a<br />

B. Basic Model<br />

The basic notion follows [12]. Consider a portfolio<br />

X = x x x ′ of stocks1, 2<br />

n<br />

consist<strong>in</strong>g of quantities ( )<br />

1, 2 n<br />

with the return vector R= ( r1, r2 r<br />

n )<br />

′ . We assume that for<br />

each stock there are m put and m call options that mature<br />

<strong>in</strong> one year. The m strike prices of the put and call<br />

options for one particular stock are located at equidistant<br />

po<strong>in</strong>ts between 70% and 130% of the stock's current<br />

price. C<br />

R , R are denoted the correspond<strong>in</strong>g calls and<br />

ik<br />

Pik<br />

puts returns <strong>in</strong> the portfolio with stock price<br />

S , k = 1, 2m<br />

means the k -th strike price based on the<br />

i<br />

th<br />

i stock,call price C ik<br />

, and put price P ik<br />

, whose exercise<br />

⎠<br />

⎠<br />

prices are K ik<br />

, β and<br />

ik<br />

γ denote the (decision) variables on<br />

ik<br />

the numbers of the correspond<strong>in</strong>g calls and puts option.<br />

0<br />

S denotes the <strong>in</strong>itial price of stock ,which then can be<br />

i<br />

expressed as S 0 ir at the end of the period. Us<strong>in</strong>g the<br />

i<br />

payoff functions of call and put options, we can explicitly<br />

express the returns of options as:<br />

C 1 0<br />

R<br />

ik<br />

= max { 0, Si ri − Kik} = max { 0, aik + bikri<br />

}<br />

Cik<br />

with<br />

K S<br />

ik<br />

0<br />

aik<br />

=− , bik<br />

=<br />

P C<br />

ik<br />

ik<br />

Similarly, the return of a put option is<br />

P 1 0<br />

R<br />

ik<br />

= max { 0,<br />

i<br />

Kik − Si ri<br />

}<br />

Pik<br />

= max{ 0, aik<br />

+ bikri<br />

}<br />

S K<br />

with<br />

0<br />

ik<br />

aik<br />

=− , bik<br />

=<br />

Pik<br />

Pik<br />

where P<br />

ik<br />

, C will be calculated from Black–Scholes<br />

ik<br />

formula.<br />

With<strong>in</strong> this <strong>in</strong>vestment framework, the value a<br />

portfolio at the expired time the <strong>in</strong>vestor wishes to<br />

maximize can thus be formulated as:<br />

n<br />

m<br />

⎧<br />

C P⎫<br />

maxV = ∑⎨xr i i<br />

+ ∑ βik Rik + γik Rik<br />

⎬<br />

i= 1 ⎩ k=<br />

1<br />

⎭<br />

Constra<strong>in</strong>s concluded <strong>in</strong> this paper will be developed<br />

based on [13], whose model also conta<strong>in</strong>ed <strong>in</strong> optioned<br />

portfolio. The risk-return preferences of the <strong>in</strong>vestor are<br />

specified as mean–variance efficiency with additional<br />

shortfall constra<strong>in</strong>ts express<strong>in</strong>g the downside risk<br />

preferences.<br />

−1<br />

( I − L) wxβγ<br />

= C r and<br />

a<br />

QV ( ≥ Bα ( )) ≥1−<br />

α<br />

where the mean<strong>in</strong>gs of the parameters are expla<strong>in</strong>ed<br />

as: w βγ<br />

is the share vector of stocks, call options and put<br />

x<br />

− 1<br />

options. Set L = C rr′<br />

and I be<strong>in</strong>g the matrix with 1 <strong>in</strong> the<br />

c<br />

diagonal and 0 else. Let C be the covariance matrix of<br />

the (discrete) returns, r ( r1, r2<br />

rp<br />

)<br />

= the vector of<br />

expected returns and e the p -dimensional vector filled<br />

with 1 <strong>in</strong> each component of the <strong>in</strong>struments.<br />

The steps of calculat<strong>in</strong>g the parameters are follows:<br />

(1) Covariance matrix of the (discrete) returns C is<br />

estimated from history data.<br />

r = r r r is also<br />

(2) Expected returns vector ( 1, 2 p )<br />

estimated from history data.<br />

(3) a = eC ′ − r, b= rC ′ − r, c= eC ′<br />

− e,<br />

d = bc−<br />

a<br />

⎛b−<br />

ari<br />

⎞ ⎛crj<br />

− a ⎞<br />

ra<br />

= ⎜ ⎟ , rc<br />

= ⎜ ⎟<br />

⎝ d ⎠i=<br />

1,2<br />

p ⎝ d ⎠j=<br />

1,2<br />

p<br />

−1<br />

(4) ( )<br />

1 1 1 2<br />

I − L w = C r<br />

xβγ<br />

a<br />

The follow<strong>in</strong>g portfolio optimization problem<br />

corresponds to this model:<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1583<br />

max<br />

⎧<br />

n<br />

m<br />

C P<br />

∑⎨xr i i<br />

+ ∑ ( βik Rik + γik Rik<br />

)<br />

⎩<br />

−1<br />

⎧⎪<br />

( I − L)<br />

wxβγ<br />

= C ra<br />

⎨<br />

⎪⎩<br />

QV ( ≥ B( α ))<br />

≥1−α<br />

i= 1 k=<br />

1<br />

st .<br />

C. Parameter Uncerta<strong>in</strong>ty<br />

Most of the parameter such as the expected returns and<br />

covariance are estimated from noisy data. Hence, these<br />

estimates are no accurate. As a result, if the model<br />

amplifies any estimation errors, the portfolios yield<strong>in</strong>g<br />

will extremely perform badly <strong>in</strong> out-of-sample tests. So it<br />

needs to solve this problem. And the robust optimization<br />

is a good choice. Generally speak<strong>in</strong>g, robust optimization<br />

aims to f<strong>in</strong>d solutions to a given optimization problems<br />

with uncerta<strong>in</strong> parameters which could achieve good<br />

objective values for all or most of realizations of the<br />

uncerta<strong>in</strong> parameters. We will assume that the estimate<br />

covariance is reasonably accurate such that there is no<br />

uncerta<strong>in</strong>ty about it. This assumption is justified s<strong>in</strong>ce the<br />

estimation error <strong>in</strong> expectation by far outweighs the<br />

estimation error <strong>in</strong> covariance, see e.g. [14]. So, <strong>in</strong><br />

decision-mak<strong>in</strong>g uncerta<strong>in</strong>ty is unknown. There are many<br />

factors that affect the decision-mak<strong>in</strong>g, <strong>in</strong>clud<strong>in</strong>g human<br />

psychology state, external <strong>in</strong>formation <strong>in</strong>put, which is<br />

usually difficult to be derived <strong>in</strong> terms of probabilistic or<br />

stochastic measurement. The well known B–S model has<br />

a number of assumptions such as the riskless <strong>in</strong>terest rate<br />

and the volatility are constant, which hardly catch human<br />

psychology state and external <strong>in</strong>formation <strong>in</strong>put although,<br />

B–S model has been improved.<br />

Now, it needs to <strong>in</strong>troduce robust optimization and<br />

portfolio selection [15]. The robust counterpart of an<br />

uncerta<strong>in</strong> mathematical program is a determ<strong>in</strong>istic worst<br />

case formulation <strong>in</strong> which model parameters are assumed<br />

to be uncerta<strong>in</strong>, but symmetrically distributed over a<br />

bounded <strong>in</strong>terval known as an uncerta<strong>in</strong>ty set U. The<br />

structure and scale of U is specified by the modeler,<br />

typically based on statistical estimates. Structure refers to<br />

the geometry or shape of the constra<strong>in</strong>t set U, such as<br />

ellipsoidal or polyhedral. Scale refers to the magnitude of<br />

the deviations of the uncerta<strong>in</strong> parameters from their<br />

nom<strong>in</strong>al values; it can be thought of as the size of the<br />

structure def<strong>in</strong><strong>in</strong>g U. A general form of the robust<br />

counterpart to an uncerta<strong>in</strong> LP is given as<br />

T<br />

max ⎡m<strong>in</strong> c x ⎤<br />

⎣<br />

( )<br />

Subject to Ax≤b, ∀( A,b,c)<br />

∈ U<br />

There are two forms for transfer the robust <strong>in</strong>to a set,<br />

l<strong>in</strong>ear or Ellipsoidal.<br />

(1) L<strong>in</strong>ear <strong>in</strong>terval<br />

In the robust optimization framework, the true value<br />

a is not certa<strong>in</strong> which is given by the follow<strong>in</strong>g equation<br />

i<br />

⎦<br />

− ^<br />

ai<br />

= ai+ a iηi, ∀ i<br />

where a −<br />

i is an estimate for a i<br />

, and a ^<br />

i is the maximum<br />

distance that a i<br />

deviated from a − i and ηi<br />

is a random<br />

⎫<br />

⎬<br />

⎭<br />

variable which is bounded by and symmetrically<br />

distributed with<strong>in</strong> the <strong>in</strong>terval[-1,1]. That is, the true<br />

value ai<br />

is symmetrically distributed with respect to i on<br />

− ^ − ^<br />

⎡<br />

⎤<br />

the <strong>in</strong>terval ai− a i,ai+<br />

ai<br />

⎢<br />

⎣<br />

⎥<br />

⎦ .<br />

(2) Ellipsoidal uncerta<strong>in</strong>ty sets are given by<br />

2<br />

⎧<br />

−<br />

⎛ ⎞ ⎫<br />

⎜ai<br />

− ai<br />

⎟<br />

⎪<br />

2<br />

a:<br />

⎝ ⎠ ⎪<br />

⎨ ∑<br />

^ 2 ≤Ω ⎬<br />

⎪ a ⎪<br />

i<br />

⎪⎩<br />

⎪⎭<br />

where Ω is a user def<strong>in</strong>ed parameter and adjusts the<br />

trade-off between robustness and optimality.<br />

Next, the problem is how to transfer the uncerta<strong>in</strong> set<br />

to a series equations or <strong>in</strong>-equations.<br />

Let J be the number of parameters. For Soyster’s and<br />

Ben-Tal and Nemirovski’s model[16],<br />

or<br />

∑<br />

i<br />

i<br />

a<br />

∑<br />

i<br />

^<br />

i<br />

−<br />

i<br />

− a<br />

a<br />

η =<br />

i<br />

Bertsimas and Sim (2004) relaxed this condition by<br />

def<strong>in</strong><strong>in</strong>g a new parameter Γ (the budget of uncerta<strong>in</strong>ty) as<br />

the number of uncerta<strong>in</strong> parameters that take their worst<br />

− ^<br />

case value ai<br />

− ai<br />

.Therefore ηi<br />

≤Γ,such that Γ ∈⎡⎣ 0, J ⎤⎦ ,<br />

then the optimal problem can be rewritten as<br />

−<br />

^<br />

⎛<br />

⎞<br />

max⎜∑ai<br />

wi + m<strong>in</strong>∑aiη<br />

iwi⎟<br />

⎝<br />

ηi<br />

⎠<br />

S.t w = 1<br />

∑<br />

∑ i<br />

i<br />

η ≤Γ<br />

wi<br />

≥0, −1≤ηi<br />

≤1, ∀ i<br />

It also can be rewritten as<br />

−<br />

^<br />

⎛<br />

⎞<br />

max⎜∑ai<br />

wi −max∑<br />

ai<br />

ηiwi<br />

⎟<br />

⎝<br />

ηi<br />

⎠<br />

S.t w = 1<br />

∑<br />

∑ i<br />

i<br />

η ≤Γ<br />

wi<br />

≥0,0≤ηi<br />

≤1, ∀ i<br />

However, this problem is not well-def<strong>in</strong>ed. Because it<br />

is difficult to obta<strong>in</strong> a different optimal solution for each<br />

return realization, there are multiple ways to specify the<br />

l<strong>in</strong>ear set. A nature choice is to construct an ellipsoidal<br />

uncerta<strong>in</strong>ty set<br />

T −<br />

Θ = r : r − μ Σ<br />

1 r − μ ≤ δ<br />

2<br />

r<br />

{ ( ) ( ) }<br />

~<br />

Accord<strong>in</strong>g to EI Ghaoui et al [17],when r has f<strong>in</strong>ite<br />

second-order moments, then, we can choice<br />

δ p<br />

= 1− p<br />

for p ∈[0,1 ) and δ = +∞<br />

for p = 1 , it means the follow<strong>in</strong>g probabilistic<br />

guarantee for any portfolio w :<br />

=<br />

J<br />

J<br />

a −<br />

© 2013 ACADEMY PUBLISHER


1584 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

~<br />

T<br />

T<br />

{ r∈Θ<br />

}<br />

r<br />

P w r ≥m<strong>in</strong>w r ≥ p<br />

The optimal problem reduces to a convex second-order<br />

cone program[18].<br />

T<br />

2 T<br />

max w μ − δ Σ<br />

1/ w 1 = 1,<br />

l ≤ w ≤ u<br />

w<br />

{ }<br />

2<br />

Accord<strong>in</strong>g to the Central Limit Theorem, it is<br />

^<br />

concluded that the sample mean μ is approximately<br />

normally distributed. That is ,it follows:<br />

^<br />

⎛ Σ ⎞<br />

μ ~ N ⎜ μ,<br />

⎟<br />

⎝ n ⎠<br />

Similarly, the ellipsoidal uncerta<strong>in</strong>ty set for the<br />

mean μ can be expressed as<br />

Θ<br />

μ<br />

−1<br />

⎪⎧<br />

^<br />

⎛ Σ<br />

^<br />

⎛ ⎞ ⎞ ⎛ ⎞ ⎪⎫<br />

2<br />

= ⎨μ<br />

: ⎜ μ − μ ⎟⎜<br />

⎟ ⎜ μ − μ ⎟ ≤ κ ⎬<br />

⎪⎩ ⎝ ⎠⎝<br />

n ⎠ ⎝ ⎠ ⎪⎭<br />

where κ = q / 1−<br />

q for some q ∈[0,1)<br />

The problem reduces to<br />

⎪⎧<br />

1/ 2<br />

^<br />

⎛ Σ<br />

^ 1/ 2<br />

⎪⎫<br />

T ⎞<br />

T<br />

max⎨w<br />

μ−κ<br />

⎜ ⎟ w −δ<br />

Σ w w 1 = 1, l ≤ w ≤ u⎬<br />

w<br />

⎪⎩<br />

⎝ n ⎠<br />

2<br />

2<br />

⎪⎭<br />

See[19] the problem is f<strong>in</strong>ally reduced to<br />

⎪⎧<br />

^<br />

^ 1 / 2<br />

⎪⎫<br />

T<br />

1 / 2<br />

T<br />

max⎨w<br />

μ − κ Ω w − δ Σ w w 1 = 1, l ≤ w ≤ u⎬<br />

w<br />

2<br />

⎪⎩<br />

2<br />

⎪⎭<br />

where<br />

Σ 1 Σ T Σ<br />

Ω = − 11<br />

n T Σ n n<br />

1 1<br />

n<br />

In this paper, firstly, we consider the uncerta<strong>in</strong> set for<br />

return mean. We def<strong>in</strong>e r′ is the estimation of real<br />

value r , the uncerta<strong>in</strong>ly set I as<br />

{ : i<br />

′ i i i<br />

′ i }<br />

I = r r −s ≤r ≤ r + s for mean μ .<br />

Accord<strong>in</strong>g to Anna[20], the robust counterpart:<br />

rx ≥ r<br />

∑<br />

m<strong>in</strong><br />

i i p<br />

can be transferred to the follow<strong>in</strong>g form:<br />

⎧∑rx ′<br />

i i<br />

−∑sm i i<br />

≥rp<br />

⎪<br />

⎨ mi<br />

≥ xi<br />

⎪<br />

⎩ si<br />

≥ 0<br />

The robust counterpart of objective function is<br />

n<br />

m<br />

⎛ ⎧<br />

C P ⎫⎞<br />

max ⎜∑⎨xr i i<br />

+ ∑ { βik Rik + γik Rik}<br />

⎬⎟<br />

x, βγ ,<br />

⎝ i= 1 ⎩ k=<br />

1<br />

⎭⎠<br />

let x αβγ<br />

is the share of stock and options.<br />

The goal is to determ<strong>in</strong>e the solution of above problem<br />

under the constra<strong>in</strong>ts.<br />

Ⅲ.MONTE CARLO SIMULATION AND EMPIRICAL EXAMPLE<br />

A. Monte Carlo Method and the Simulation Process<br />

Compar<strong>in</strong>g with other numerical methods, Monte<br />

Carlo simulation has two major advantages: first, more<br />

flexible, easy to implement and improvement; secondly,<br />

the simulation of estimation error and convergence speed<br />

<strong>in</strong> solv<strong>in</strong>g the problem has strong <strong>in</strong>dependence of<br />

dimension. European option because of its execution time<br />

is fixed, not to be executed <strong>in</strong> advance, therefore it only<br />

need to calculate the earn<strong>in</strong>gs of the option of each<br />

sample path at expiration date, which is available by<br />

Matlab programm<strong>in</strong>g. [21-23] discuss the application of<br />

the simulation methods <strong>in</strong> various area. Monte Carlo<br />

method can overcome the obstacle and we use it further<br />

to improve the accuracy of simulated price with the<br />

enhancement of reduction variate technique for more<br />

complex options whose payoff function is dependent on<br />

the underly<strong>in</strong>g asset path and sum of asset is more than<br />

one.<br />

Now, we illustrate the key steps <strong>in</strong> Monte Carlo. It is<br />

saw that to draw samples of the term<strong>in</strong>al stock price<br />

S( T ) it suffices to have a mechanism for draw<strong>in</strong>g<br />

samples from the standard normal distribution. For now<br />

we simply assume the ability to produce a sequence<br />

Z1,<br />

Z2 of <strong>in</strong>dependent standard normal random<br />

variables. Given a mechanism for generat<strong>in</strong>g the Z<br />

i<br />

, we<br />

rT<br />

can estimate E⎡<br />

−<br />

e ( ST<br />

− K )<br />

+ ⎤ us<strong>in</strong>g the follow<strong>in</strong>g<br />

⎣<br />

⎦<br />

algorithm:<br />

For i = 1, 2n<br />

generate<br />

Z<br />

i<br />

⎛⎡<br />

1 ⎤ ⎞<br />

Si<br />

T = S0<br />

exp⎜⎢<br />

r− σ +<br />

2 ⎥<br />

T σ TZi⎟<br />

⎝⎣<br />

⎦ ⎠<br />

set ( )<br />

2<br />

C = e S −K<br />

−rT<br />

set ( ) +<br />

^<br />

i<br />

set n = ( + + + )<br />

T<br />

C C C C n<br />

1 2 n<br />

/<br />

For any n ≥ 1, the estimator C n is unbiased, <strong>in</strong> the<br />

sense that its expectation is the target quantity:<br />

^<br />

⎛ ⎞<br />

− rT<br />

+<br />

E⎜Cn<br />

⎟= C = E⎡<br />

⎣e ( ST<br />

−K)<br />

⎤<br />

⎝ ⎠<br />

⎦<br />

The estimator is strongly consistent mean<strong>in</strong>g that as<br />

n →∞.<br />

In this paper, we suppose z = z()<br />

t is a random<br />

process, the change <strong>in</strong> a very small time <strong>in</strong>terval Δt<br />

is<br />

expressed as Δ z . If Δz<br />

satisfies that Δ z = ε Δ t where<br />

ε ∼ N ( 0,1)<br />

. For different time <strong>in</strong>terval Δ t , Δz<br />

are<br />

<strong>in</strong>dependent, then call z = z()<br />

t follows Wiener process.<br />

Suppose the stock price follows ds = μsdt + σ sdz ,<br />

where dz is the Standard Brown motion. In the practical<br />

^<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1585<br />

application, more accurate simulation not starts from S,<br />

but log-price ln S . Monte Carlo simulation steps:<br />

(1) To generate sample paths for underly<strong>in</strong>g asset, given<br />

the <strong>in</strong>itial value<br />

i i i i<br />

S = t 1<br />

S + t<br />

μiS Δ t<br />

t + +<br />

σiS Δ t<br />

tεt<br />

(2)To calculate option price of each sample path.<br />

(3) To average option price for each sample path.<br />

IV.EMPIRICAL EXAMPLE<br />

In order to illustrate the features and applications of<br />

this model, we make a numerical example. For simple,<br />

we only consider two stocks. And there is a call and a put<br />

option based on each stock. Suppose that the <strong>in</strong>vestment<br />

horizon is T = 1year, <strong>in</strong>clud<strong>in</strong>g 20 trad<strong>in</strong>g days <strong>in</strong> each<br />

month, so there is 240 trad<strong>in</strong>g days <strong>in</strong> total. To divide<br />

T by daily, that is Δ t =1day, equals to 1 year. The<br />

240<br />

price of each stock is supposed to follow log-normal<br />

distribution, then the price of stock i,( i = 1,2) <strong>in</strong><br />

t + 1day is:<br />

i i i i<br />

S S μ S t σ S tε<br />

ε ∼ N 0,1<br />

= + Δ + Δ , ( )<br />

+ t<br />

t 1 t i t i t t<br />

i i i<br />

Generate a path S 0<br />

, S 1<br />

S<br />

240<br />

for stock i by Monte<br />

Carlo method.<br />

Each stock will only correspond to a European call<br />

option and a European put option, asset specific<br />

parameters are as follows:<br />

μ1 = 11%, σ1 = 26.86%; μ2 = 8.05%, σ2<br />

= 16.3%<br />

Other parameters are as shown <strong>in</strong> the follow<strong>in</strong>g.<br />

The k<strong>in</strong>d of option, underly<strong>in</strong>g, market price, option<br />

price, time and strike price respectively are:<br />

For call option C 1<br />

whose underl<strong>in</strong>g is S with <strong>in</strong>itial<br />

1<br />

value S 1 ( 0 ) =15.59, the option premium C 1 ( 0 ) =2.17,<br />

the strike price is K<br />

11<br />

=14.5, the expired time is 6 month.<br />

For call option P 1<br />

whose underl<strong>in</strong>g is S 1<br />

with <strong>in</strong>itial<br />

P =1.87,<br />

value S ( ) =15.59, the option premium ( )<br />

1 0<br />

1 0<br />

the strike price is K 12<br />

=16.5, the expired time is 12<br />

month.<br />

For call option C whose underl<strong>in</strong>g is<br />

2<br />

S 1<br />

with <strong>in</strong>itial<br />

value ( ) 2<br />

0<br />

C<br />

2<br />

0 =1.32,<br />

the strike price is K =13, the expired time is 3 month.<br />

21<br />

For call option P 2<br />

whose underl<strong>in</strong>g is S 2<br />

with <strong>in</strong>itial<br />

P =1.48 ,<br />

S =13.71, the option premium ( )<br />

value S ( ) =13.71, the option premium ( )<br />

2<br />

0<br />

2<br />

0<br />

the strike price is K =15, the expired time is 9 month.<br />

22<br />

If the option j based on stock i is exercised on the<br />

l ( ≤ 240)<br />

day, the option value is<br />

i i i i<br />

( Srr<br />

01 2<br />

rl<br />

− Kij)<br />

max 0,<br />

,and <strong>in</strong> the rest of <strong>in</strong>vestment<br />

horizon, that is, <strong>in</strong> the follow<strong>in</strong>g 240 − l days,the value<br />

is treated as risk free asset,so the total value of the<br />

option <strong>in</strong> the <strong>in</strong>vestment horizon is:<br />

i i i i<br />

r( 240 −l)<br />

/ 365<br />

max ( 0, Srr<br />

0 1 2rl<br />

− Kij) e , r=<br />

5% is the risk<br />

free <strong>in</strong>terest rate.<br />

The European call option price before expiration day,<br />

for example, on the v− th day is<br />

i i i i −r l−v i<br />

max 0, Srr r − K e − c , v≤<br />

l<br />

( )<br />

( l ij) 0 1 2 0<br />

i<br />

where C is the option current price (option premium)<br />

0<br />

based on stock i.<br />

If v> l , then on the v− th day, the call option price<br />

is<br />

r<br />

⎛ ⎞<br />

365<br />

i i i i<br />

⎜e −1⎟max( 0, S0r1r2<br />

rl<br />

−Kij)<br />

⎝ ⎠<br />

Suppose that the portfolio assets real returns are<br />

μ = μ , μ , r 1 , r 1 , r<br />

2 , r<br />

2 , and the means of samples<br />

( 1 2 c p c p )<br />

return are μ ( μ′ )<br />

1 1 2 2<br />

1<br />

, μ ′<br />

2<br />

, r ′<br />

c<br />

, r ′<br />

p<br />

, r ′<br />

c<br />

, r ′<br />

p<br />

′ = with <strong>in</strong>vestment<br />

share x = ( x , x , w , w , w , w ) . We construct the model:<br />

1 2 1 2 3 4<br />

μ x μ x r w r w r w r w<br />

1 1 2 1<br />

max<br />

1 1+ 2 2+ c 1+ p 2+ c 3+<br />

p 4<br />

⎧<br />

1 1 2 1<br />

μ′ 1<br />

x1+ μ ′<br />

2<br />

x2 + r ′<br />

c<br />

w1+ r ′<br />

p<br />

w2 + r ′<br />

c<br />

w3+ r ′<br />

p<br />

w4<br />

≥0.001<br />

⎪<br />

−1<br />

⎪<br />

( I − L)<br />

wxβγ<br />

= C μa<br />

⎪<br />

−1 −1 −1 2<br />

a= eC ′ μ, b= μ′ C μ, c= eC ′ e,<br />

d = bc−a<br />

⎪<br />

⎪ ⎛b−aμ<br />

⎞ ⎛cμ−a⎞<br />

−1<br />

⎪ μa = ⎜ ⎟, μc = ⎜ ⎟,<br />

L=<br />

C μcμ′<br />

⎨ ⎝ d ⎠ ⎝ d ⎠<br />

⎪x1+ x2 + w1+ w2 + w3+ w4<br />

= 1<br />

⎪<br />

⎪μ′ x + μ ′ x + r ′ w + r ′ w + r ′ w + r ′ w −∑<br />

sm ≥r<br />

⎪<br />

⎪mi<br />

≥ xi<br />

⎪<br />

⎩si<br />

≥ 0<br />

1 1 2 1<br />

1 1 2 2 c 1 p 2 c 3 p 4 i i p<br />

where C is the covariance matrix between the assets ,<br />

the m<strong>in</strong>imum return for an <strong>in</strong>vestor is 2%.<br />

By solv<strong>in</strong>g the above model, we obta<strong>in</strong> the optimal<br />

portfolio is (0.4,-0.04,-0.1,-0.3,-0.16), the objective<br />

is0.00682456. If it is set s<br />

i<br />

= 0 , that is there is no robust<br />

of return mean, the result is 0.0070175439. It is easy to<br />

understand that under robust, <strong>in</strong>vestment is more<br />

conservative. Because the advantage of comb<strong>in</strong><strong>in</strong>g option<br />

<strong>in</strong> portfolio is option could hedg<strong>in</strong>g with risk. In order to<br />

test it, we change the variance from small to large, for<br />

example, supposeσ<br />

1<br />

= 30%; σ 2<br />

= 25% , we f<strong>in</strong>d that the<br />

objective is 0.0052984, if there is without options, the<br />

objective is 0.000215. That is, options <strong>in</strong> portfolio could<br />

hedge risks.<br />

V. CONCLUSION<br />

This paper extents the general portfolio model <strong>in</strong> two<br />

aspects. The first is to comb<strong>in</strong>ed option <strong>in</strong> the portfolio<br />

could hedge the risk, and the options can also considered<br />

as an asset <strong>in</strong> the portfolio, extend<strong>in</strong>g the general<br />

model.And we use Monte Carlo method to simulate the<br />

© 2013 ACADEMY PUBLISHER


1586 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

option prices. The second po<strong>in</strong>t is to propose the model<br />

of maximiz<strong>in</strong>g the return under constra<strong>in</strong>s of variance<br />

efficiency and shortfall preference structure <strong>in</strong> the robust<br />

counterpart, tak<strong>in</strong>g account of uncerta<strong>in</strong> <strong>in</strong>puts. It extends<br />

the general portfolio model, putt<strong>in</strong>g forward some<br />

feasible suggestions to <strong>in</strong>vestors.<br />

ACKNOWLEDGMENT<br />

This research is supported by a Project Supported by<br />

Scientific Research Fund of Hunan Prov<strong>in</strong>cial Education<br />

Department (12C0749).<br />

REFERENCES<br />

[1] Alexander, S., T.F. Coleman and Yuy<strong>in</strong>g Li, Derivative<br />

Portfolio Hedg<strong>in</strong>g Based on CVaR, Journal of Bank<strong>in</strong>g and<br />

F<strong>in</strong>ance, 34,pp.343-350, 2006.<br />

[2] Christos Papahristodoulou, Options strategies with l<strong>in</strong>ear<br />

programm<strong>in</strong>g, European Journal of Operational Research,<br />

157, pp.246–256, 2004.<br />

[3] Mehment Horasanli.Hedg<strong>in</strong>g stragy for a portofolio of<br />

options and stocks with l<strong>in</strong>ear programm<strong>in</strong>g. Applied<br />

mathematics and computation, 199, pp.804-810,2008.<br />

[4] Pei-wang Gao. Options strategies with the risk adjustment.<br />

European Journal of Operational Research, 192, pp.975–<br />

980, 2009.<br />

[5] Gerhard Scheuenstuhl, Rudi Zagst. Integrated portfolio<br />

management with options. European Journal of<br />

Operational Research, 185, pp.1477–1500, 2008.<br />

[6] Wets, R.J.B., Stochastic Programm<strong>in</strong>g. In: Nemhauser,<br />

G.L.,R<strong>in</strong>nooy Kan, A.H.G., Todd, M.J., Handbooks <strong>in</strong><br />

Operations Research and Management Science,<br />

Optimization, 1,pp.573–625, (Chapter VIII), 1991.<br />

[7] Steve Zymler, Robust portfolio optimization with<br />

derivative <strong>in</strong>surance guarantees. European Journal of<br />

Operational Research, 210, pp. 410–424, 2011.<br />

[8] A.L.Soyster, Convex programm<strong>in</strong>g with set-<strong>in</strong>clusive<br />

constra<strong>in</strong>ts and applications to <strong>in</strong>exact l<strong>in</strong>ear programm<strong>in</strong>g.<br />

Operations Research, 21, pp.1154-1157, 1973.<br />

[9] BenTal, A., Nemirovski, A., Robust optimization –<br />

methodology and alications. Math. Program., Ser. B,<br />

92,pp.453–480,2002.<br />

[10] A,Nemilrovski A.Robust solutions of uncerta<strong>in</strong> l<strong>in</strong>ear<br />

programs[J].Operations Research Letters, 25( 1), pp.1-<br />

3,1999.<br />

[11] Steve Zymler. Robust Portfolio Optimization with<br />

Derivative Insurance Guarantees, 42, pp.1244-1265, 2010.<br />

[12] Ai-fan L<strong>in</strong>g, Cheng-xian Xu. Robust portfolio selection<br />

<strong>in</strong>v<strong>in</strong>g options under a ‘‘marg<strong>in</strong>al + jo<strong>in</strong>t’’ ellipsoidal<br />

uncerta<strong>in</strong>ty set. Journal of Computational and Applied<br />

Mathematics, 236, pp. 3373–3393, 2012.<br />

[13] S. Zymler, B. Rustem.Robust Portfolio Optimization with<br />

Derivative Insurance Guarantees. www.comiswf.eu.<br />

2009.4.11, pp.1-31.<br />

[14] Gerhard Scheuenstuhl, Rudi Zagst. Integrated portfolio<br />

management with options. European Journal of<br />

Operational Research,185, pp. 1477–1500,2008.<br />

[15] V.K. Chopra, W.T. Ziemba, The effect of errors <strong>in</strong> means,<br />

variances and covariances on optimal portfolio choice,<br />

Journal of Portfolio Management ,19(2),pp.6–11,1993.<br />

[16] L. El Ghaoui, M. Oks, and F. Outstry. Worst-case value-atrisk<br />

and robust portfolio optimization: A conic<br />

programm<strong>in</strong>g approach. Operations Research, 51(4), pp.<br />

543-556, 2003.<br />

[17] M. S. Lobo, L. Vandenberghe, S. Boyd, and H. Lebret.<br />

Applications of second-order cone programm<strong>in</strong>g. L<strong>in</strong>ear<br />

Algebra and its Applications, 284(1), pp.193-228, 1998.<br />

[18] Christ<strong>in</strong>e Gregory, Ken Darby-Dowman. Robust<br />

optimization and portfolio selection: The cost of robustness.<br />

European Journal of Operational Research 212, pp.417–<br />

428, 2011.<br />

[19] Ben-Tal, A., Nemirovski, A., Robust convex optimization.<br />

Mathematics of Operations Research 23 (4), pp. 769–805,<br />

1998.<br />

[20] S. Ceria and R. Stubbs. Incorporat<strong>in</strong>g estimation errors <strong>in</strong>to<br />

portfolio selection: Robust portfolio construction. Journal<br />

of Asset Management, 7(2), pp. 109–127, 2006.<br />

[21] Anna G.Q., Alberto z. Robust optimization of conditional<br />

value at risk and portfolio selection. Journal of Bank<strong>in</strong>g &<br />

F<strong>in</strong>ance, 32, pp. 2046–2056, 2008.<br />

[22] Wu, Jianwu,Functional verification methodology of<br />

complex electronics system based model<strong>in</strong>g and simulation.<br />

Journal of Computers, vol 5, no9, pp.1343-1347, 2010.<br />

[23] Mizouni,Simulation-based feature selection for software<br />

requirements basel<strong>in</strong>e. Journal of Software, vol 7, no7, pp.<br />

1440-1450, 2012.<br />

[24] Aijiu Chen. The Meso-level Numerical Experiment<br />

Research of the Mechanics Properties of Recycled<br />

Concrete. Journal of Software, vol 7.no 9, pp.1932-1940,<br />

2012.<br />

X<strong>in</strong>g Yu was born <strong>in</strong> 1981. From 2000.9.1 to 2004,7.1, she<br />

studied at Department of mathematics and applied mathematics<br />

of Yangtze University, received Bachelor of Science Degree,<br />

From 2004.9.1 to 2007,1, she studied at Department of<br />

mathematics and applied mathematics of Huazhong University<br />

of science and technology, and earned a Master of Science<br />

Degree. From 2007,3, she is work<strong>in</strong>g at Hunan university of<br />

humanities Science and Technology, study<strong>in</strong>g aim at f<strong>in</strong>ancial<br />

mathematics, mathematical model.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1587<br />

A Novel Water Quality Assessment Method<br />

Based on Comb<strong>in</strong>ation BP Neural Network<br />

Model and Fuzzy System<br />

M<strong>in</strong>g Xue<br />

Chang Chun Institute of Technology<br />

Chang Chun, Ch<strong>in</strong>a,130012<br />

Email: xuem<strong>in</strong>g_net@s<strong>in</strong>a.com<br />

Abstract—As the forefront of complex nonl<strong>in</strong>ear science and<br />

artificial <strong>in</strong>telligence science, artificial neural network has<br />

began to be applied <strong>in</strong> the field of water quality control and<br />

plann<strong>in</strong>g step by step. Accord<strong>in</strong>g to the fuzzy feature of<br />

water quality <strong>in</strong>formation, this paper proposes a<br />

membership degree Back-Propagation network (MDBP) for<br />

water quality assessment with comb<strong>in</strong><strong>in</strong>g fuzzy mathematics<br />

and artificial neural network. The proposed MDBP model<br />

comb<strong>in</strong>es the merits of artificial neural network method and<br />

fuzzy evaluation method, which overcomes effectively the<br />

shortcom<strong>in</strong>g of other assessment methods. With improv<strong>in</strong>g<br />

the accuracy and reliability of the assessment method, the<br />

method has a higher flexibility than other conventional<br />

approach and its programs have a better adaptability and<br />

more convenient application. The assessment method is<br />

closer to the reality with consider<strong>in</strong>g the cont<strong>in</strong>uity of the<br />

changes of water quality environment.<br />

Index Terms—Water Quality, Fuzzy Mathematics, Back-<br />

Propagation Neural Network, Assessment Method<br />

I. INTRODUCTION<br />

The water quality assessment is basic program to plan<br />

and manage water quality and important base of<br />

comput<strong>in</strong>g water environment capacity and controll<strong>in</strong>g<br />

water pollutant, which shows the total <strong>in</strong>formation of<br />

water environment quality. In practice, there are many<br />

assessment methods used to water quality assessment.<br />

For example, the <strong>in</strong>tegrated <strong>in</strong>dex approach shows the<br />

uncerta<strong>in</strong> characters of water quality changes, which<br />

holds the needs of water quality function classification.<br />

The practice shows that all of these used methods need to<br />

suppose subjective parameters and concrete assessment<br />

mode, so the assessment results always have obviously<br />

subjectivity and restra<strong>in</strong>ed applicability. In theory, the<br />

artificial neural network method with potentiality can<br />

solve the problem. As for the artificial neural theory, the<br />

function of learn<strong>in</strong>g and memoriz<strong>in</strong>g can provide the<br />

basic theory and methods for water quality assessment<br />

mode and classification problem. In the reference [1] the<br />

un-po<strong>in</strong>t pollutant sources dra<strong>in</strong>age area is assessed by<br />

us<strong>in</strong>g the method of Bayesian concepts and comb<strong>in</strong><strong>in</strong>g<br />

artificial neutral network. In reference [2-4], the Back-<br />

Propagation network model with multi-<strong>in</strong>put, multioutput<br />

and multi-layer is adopt to assess <strong>in</strong>tegrated water<br />

quality, and the qualitative description is used <strong>in</strong> water<br />

quality classification. But the shortcom<strong>in</strong>g of this method<br />

is that the output mode must be obta<strong>in</strong>ed not by learn<strong>in</strong>g<br />

but artificially load<strong>in</strong>g. Thus the assessment results can<br />

not be objective, direct and compact enough.<br />

In this paper, a new water quality assessment method<br />

is studied, which can be so much more effective and<br />

objective to overcome the shortcom<strong>in</strong>g of the present<br />

artificial neural network method. A membership degree<br />

Back-Propagation network for water quality assessment<br />

with comb<strong>in</strong><strong>in</strong>g fuzzy mathematics and artificial neural<br />

network is proposed, which comb<strong>in</strong>es the merits of<br />

artificial neural network method and fuzzy evaluation<br />

method, and then the model overcomes effectively the<br />

shortcom<strong>in</strong>g of other assessment methods. So the<br />

assessment method is closer to the reality with<br />

consider<strong>in</strong>g the cont<strong>in</strong>uity of the changes of water quality<br />

environment. The experiment and analysis show that the<br />

new water quality assessment method which comb<strong>in</strong>es<br />

BP neural network model and fuzzy system is effective.<br />

II. THE PRINCIPLE OF BACK PROPAGATION NEURAL<br />

NETWORK MODEL<br />

A. The Basic Structure of Back Propagation Network<br />

Model<br />

In 1985, Rumelhart and Meclelland proposed Back<br />

Propagation neural network model. Error Back<br />

Propagation usually called BP network <strong>in</strong> short, which is<br />

one of the most widely applied neural network model.<br />

[5]From the structure, BP network is typical multi-layer<br />

network which has not only <strong>in</strong>put layer nodes and output<br />

layer nodes, but also one layer or multi-layer recessive<br />

nodes. In BP network, the consecutive layers are<br />

complete connected, but no connections <strong>in</strong> different<br />

nodes of same layer. [6]<br />

The structure of the BP neural network model with<br />

three layers is shown as fig.1. In the BP neural network<br />

model, the weigh coefficients between different layers<br />

can be adjusted automatically. Except for the <strong>in</strong>put layer,<br />

the process units <strong>in</strong> other layers have nonl<strong>in</strong>ear<br />

<strong>in</strong>put/output connection. That is to say, the characteristic<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1587-1593


1588 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

functions of the process units are differentiable, which are<br />

usually S type function (Sigmoid function) f ( x ), that is<br />

1<br />

f( x)<br />

= (1)<br />

x<br />

1 + e −<br />

The study process of BP neural network <strong>in</strong>cludes<br />

forward propagation and error back-propagation. If given<br />

some <strong>in</strong>put mode, the BP network will study for every<br />

<strong>in</strong>put mode <strong>in</strong> accordance with the followed methods.<br />

The <strong>in</strong>put mode are transferred from <strong>in</strong>put layers to the<br />

hidden layer units, by which the <strong>in</strong>put mode can be<br />

processed, the new output mode will be transferred to<br />

output layer, that is called forward propagation. If the<br />

output mode is not expected, the error signals will return<br />

along the orig<strong>in</strong> route, connection weights of neurons <strong>in</strong><br />

every layer should be corrected to make the error signals<br />

least, that is error back-propagation. Forward propagation<br />

and back propagation repeatedly, until the expected<br />

output mode can be obta<strong>in</strong>ed<br />

The learn<strong>in</strong>g process of BP network beg<strong>in</strong> from a set<br />

of random weights and thresholds, any selected samples<br />

can be <strong>in</strong>put. The output can be computed by forwardback<br />

method. Usually this error is big, the new weights<br />

and thresholds of the mode must be computed over aga<strong>in</strong><br />

by the back propagation. For all of the samples, the<br />

process should be done repeatedly aga<strong>in</strong> and aga<strong>in</strong>, to get<br />

the appo<strong>in</strong>ted accuracy. In the process of network<br />

operation, the system error and s<strong>in</strong>gle mode error can be<br />

followed. If the network learn<strong>in</strong>g successfully, the system<br />

errors will decrease with <strong>in</strong>creas<strong>in</strong>g of iterative time, at<br />

last converge at a set of steady weights and thresholds.<br />

y1<br />

y2<br />

y3<br />

x1<br />

x2<br />

x3<br />

Figure 1. the BP network model structure with three layers<br />

B. The Mathematical Pr<strong>in</strong>ciple of Back Propagation<br />

Network Model<br />

The propagation formulas for BP network study are<br />

used to adjust the weights and thresholds. In fact, the<br />

network study process is a process <strong>in</strong> which weights and<br />

thresholds of network connection are revised repeatedly<br />

accord<strong>in</strong>g to the propagation formula <strong>in</strong> the direction of<br />

least error. There are some symbol conventions:<br />

O : output of nodei ;<br />

i<br />

net : <strong>in</strong>put of node<br />

j<br />

j ;<br />

w : connected weight from node i to node j ;<br />

ij<br />

θ : threshold of node<br />

j<br />

j ;<br />

y : actual output of node<br />

k<br />

k <strong>in</strong> output layer;<br />

t : expected output of node<br />

k<br />

k <strong>in</strong> output layer.<br />

Obviously, for hidden node j :<br />

net<br />

j<br />

= ∑ wijO<br />

⎫<br />

i ⎪ ⎬<br />

(2)<br />

Oj = f( netj −θ<br />

j)<br />

⎪⎭<br />

In study process of BP algorithm, the errors of every<br />

output node can be computed accord<strong>in</strong>g to the follow<strong>in</strong>g<br />

formula:<br />

1<br />

2<br />

e= ∑ ( tk<br />

− yk)<br />

(3)<br />

2 k<br />

The connection weights can be corrected accord<strong>in</strong>g to<br />

the follow<strong>in</strong>g formula:<br />

w ( t+ 1) = w ( t)<br />

+Δ w<br />

(4)<br />

ij ij ij<br />

w<br />

In the formula, () ij<br />

t wij<br />

( t+ 1)<br />

and are separately<br />

connection weights from node j to node k at time t<br />

andt + 1 Δw<br />

;<br />

ij is variation of connection weights.<br />

In order to improve the connection weights <strong>in</strong> the<br />

Δwij<br />

gradient change direction of error E, can be<br />

computed:<br />

e<br />

Δ wij<br />

=−η ∂<br />

(5)<br />

∂ w<br />

In the formula, η is ga<strong>in</strong> factor,<br />

Thus<br />

Thus<br />

jk<br />

∂e<br />

∂w<br />

jk<br />

∂e<br />

∂e<br />

∂net<br />

=<br />

∂w ∂net ∂w<br />

∂net<br />

jk k jk<br />

∂<br />

can be computed:<br />

k<br />

= ∑ wjkOj = O (6)<br />

j<br />

∂wjk<br />

∂wjk<br />

j<br />

∂<br />

δk<br />

= ∂ net k<br />

∂e<br />

Δ w =− η =−ηδ<br />

O<br />

ij k j<br />

∂wjk<br />

When comput<strong>in</strong>gδ k<br />

, it is essential to dist<strong>in</strong>guish the<br />

output layer nodes and hidden layer nodes. If node k lies<br />

<strong>in</strong> output layer, thus:<br />

∂e<br />

∂e<br />

∂yk<br />

δk<br />

= =<br />

∂netk ∂yk ∂netk<br />

Because of<br />

∂ e<br />

∂y<br />

=− ( t −<br />

k<br />

k<br />

yk)<br />

= f ′( netk<br />

)<br />

∂yk<br />

∂netk<br />

Thus<br />

δk =−( tk −yk) f′<br />

( netk)<br />

⎫⎪ ⎬ (8)<br />

Δ wjk = η( tk − yk) f′<br />

( netk)<br />

Oj⎪⎭<br />

k<br />

(7)<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1589<br />

If node k is not the node <strong>in</strong> output layer, connection<br />

weights effect on hidden node, then δ k<br />

can be computed<br />

by the follow<strong>in</strong>g formula:<br />

That is<br />

Thus<br />

∂e ∂e ∂Ok<br />

∂e δk<br />

= = = f ′( net<br />

k)<br />

∂net ∂O ∂net ∂O<br />

k k k k<br />

∂e<br />

(9)<br />

= ∑ δmw<br />

(10)<br />

km<br />

∂Ok<br />

δ = f ′( net ) ∑ δ w<br />

(11)<br />

k k m km<br />

m<br />

The formula shows that δ <strong>in</strong> low layer can be<br />

computed by δ <strong>in</strong> the upper layer.<br />

The learn<strong>in</strong>g process of BP network beg<strong>in</strong> from a set<br />

of random weights and thresholds, any selected samples<br />

can be <strong>in</strong>put. The output can be computed by forwardback<br />

method. Usually this error is big, the new weights<br />

and thresholds of the mode must be computed over aga<strong>in</strong><br />

by the back propagation. For all of the samples, the<br />

process should be done repeatedly aga<strong>in</strong> and aga<strong>in</strong>, to get<br />

the appo<strong>in</strong>ted accuracy. In the process of network<br />

operation, the system error and s<strong>in</strong>gle mode error can be<br />

followed. If the network learn<strong>in</strong>g successfully, the system<br />

errors will decrease with <strong>in</strong>creas<strong>in</strong>g of iterative time, at<br />

last converge at a set of steady weights and thresholds. [7]<br />

C. The Study Algorithm of Back Propagation Network<br />

In BP network model, the study algorithm of BP<br />

network can be described as the follow<strong>in</strong>g rules.<br />

Step 1 Initializ<strong>in</strong>g study parameters and BP network<br />

parameters. That is to set random numbers <strong>in</strong> [ − 1,1] for<br />

Neuron threshold and connection weights <strong>in</strong> hidden<br />

layers and output layers.<br />

Step 2 Propos<strong>in</strong>g the tra<strong>in</strong><strong>in</strong>g mode of BP network.<br />

That is to select a tra<strong>in</strong><strong>in</strong>g mode from the tra<strong>in</strong><strong>in</strong>g mode<br />

set, and put the <strong>in</strong>put mode and expected output mode to<br />

the BP network.<br />

Step 3 Forward propagation process. That is to<br />

compute the output mode of the network from the No.1<br />

hidden layer for the given <strong>in</strong>put layer. If error energiz<strong>in</strong>g,<br />

execut<strong>in</strong>g the step 4, else return<strong>in</strong>g to step 2, and<br />

provid<strong>in</strong>g next tra<strong>in</strong><strong>in</strong>g mode for the algorithm.<br />

Step 4 Back propagation process. That is to correct the<br />

connection weight of every unit <strong>in</strong> different layer from<br />

output layer to the first hidden layer, and follow<strong>in</strong>g the<br />

rules:<br />

1) Comput<strong>in</strong>g the error δ k<br />

of different units <strong>in</strong> the<br />

same layer.<br />

2) Correct<strong>in</strong>g the connection weights and threshold.<br />

For connection weights, the correct<strong>in</strong>g formula is:<br />

w ( t+ 1) = w ( t)<br />

+ ηδ O (12)<br />

jk jk k j<br />

For threshold, the correction method is same as the<br />

study method of connection weights.<br />

3) Repeat<strong>in</strong>g the Above-mentioned correct<strong>in</strong>g process<br />

to get expected output mode.<br />

Step 5 Turn back to step 2, and do<strong>in</strong>g step 2 to step 3<br />

for the every tra<strong>in</strong><strong>in</strong>g mode of tra<strong>in</strong><strong>in</strong>g mode set, until<br />

every tra<strong>in</strong><strong>in</strong>g mode meet the expected output.<br />

III. THE PRINCIPLE OF BACK PROPAGATION NEURAL<br />

NETWORK MODEL<br />

A. The Basic Pr<strong>in</strong>ciple of Fuzzy Mathematics<br />

Assumed that X represents a set of some objects,<br />

which is called co doma<strong>in</strong>. For a subset A <strong>in</strong> X , it can<br />

be expressed by its characteristic function, that is<br />

⎧1<br />

x ∈ A<br />

μA( x)<br />

= ⎨<br />

(13)<br />

⎩0<br />

x ∈ A<br />

In this, μ A<br />

is a function def<strong>in</strong>ed <strong>in</strong> X , its values<br />

belong to{ 0,1 } ,which is called characteristic function of<br />

A . For x ∈ X , if μ ( x A<br />

) = 1, thus, x is element of A .<br />

But if μ ( x A<br />

) = 0, thus, x isn’t the element of A . So we<br />

can def<strong>in</strong>e fuzzy sets:<br />

In co doma<strong>in</strong> X , for any element x ∈ X , if there is a<br />

formula correspond<strong>in</strong>g real function μ A( x ) :<br />

μA( x): X → [0,1]<br />

(14)<br />

X → μA( x)<br />

Then all elements x meet<strong>in</strong>g the formula assemble a<br />

set which is a fuzzy set A <strong>in</strong> set X . For x ∈ X , μ is<br />

A<br />

membership function of A . μ A ( x ) is called membership<br />

degree from x to A .[6]<br />

The Relationship that expresses uncerta<strong>in</strong> relationship<br />

us<strong>in</strong>g fuzzy Sets is def<strong>in</strong>ed fuzzy relation. [8] Fuzzy<br />

relation R between set X andY is fuzzy subset def<strong>in</strong>ed<br />

<strong>in</strong> X × Y , its membership function is shown as:<br />

μ<br />

R<br />

: X × Y → [0,1] (15)<br />

If X is same asY , so R is called the fuzzy relation <strong>in</strong> X .<br />

If the co doma<strong>in</strong> is product of n sets Xi<br />

( i = 1,2, , n)<br />

X × X × × X , its correspond<strong>in</strong>g fuzzy relationship<br />

1 2 n<br />

R is called n dimensions fuzzy relation.<br />

If X and Y are both limited subsets,<br />

X = { x , x , , x m<br />

} , Y = { y1, y2, , y n<br />

} , thus the<br />

then<br />

1 2<br />

fuzzy relation <strong>in</strong> X<br />

R<br />

× Y can be expressed by :<br />

⎡ μR( x1, y1) μR( x1, y2) μR( x1, yn)<br />

⎤<br />

⎢<br />

μ ( x , y ) μ ( x , y ) μ ( x , y )<br />

⎥<br />

⎢<br />

<br />

⎥<br />

<br />

<br />

⎢<br />

⎥<br />

⎣μR( xm, y1) μR( xm, y2) μR( xm, yn)<br />

⎦<br />

R 2 1 R 2 2 R 2 n<br />

= ⎢ ⎥<br />

(16)<br />

The above matrix is called fuzzy matrix, its<br />

element μ ( x , y ) <strong>in</strong> the scope of 0 between 1.<br />

R i i<br />

© 2013 ACADEMY PUBLISHER


1590 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

B. The Design of Membership Degree BP Neural<br />

Network<br />

The paper adopted a three layers BP network to build<br />

the membership degree BP network for water quality<br />

assessment. In the structure, the network has one <strong>in</strong>put<br />

layer one output layer and one hidden layer. The output<br />

layer can expressed water quality classification by one<br />

neuron, actual test<strong>in</strong>g parameters are six, so <strong>in</strong>put layer<br />

has six neurons, hidden layer has three neurons [9].<br />

In order to make the assessment more objective and<br />

certa<strong>in</strong>, this paper puts the membership degree of fuzzy<br />

mathematics <strong>in</strong>to BP network. The membership degree<br />

BP network model is built on comb<strong>in</strong><strong>in</strong>g the fuzzy system<br />

and neural network <strong>in</strong> series. In the series connection,<br />

output of neural network is <strong>in</strong>put of the fuzzy system.<br />

Membership degree can be computed, then the exact and<br />

concrete water quality classification can be put out. The<br />

membership degree BP network for water quality<br />

assessment is shown as fig. 2.<br />

In the formula, abstand , for the classification of<br />

neighbor<strong>in</strong>g two water quality samples, the membership<br />

degree to every standard water quality classification of<br />

test sample can be computed by the formula (17).<br />

IV. THE PRINCIPLE OF BACK PROPAGATION NEURAL<br />

NETWORK MODEL<br />

A.. The Model of BP Neural Network Algorithm<br />

Accord<strong>in</strong>g to the po<strong>in</strong>t of mathematics, BP algorithm is<br />

a generalized function convergence numeric method, and<br />

it has tra<strong>in</strong><strong>in</strong>g and test<strong>in</strong>g processes. The whole tra<strong>in</strong><strong>in</strong>g<br />

process <strong>in</strong>cludes forward and back propagation. After<br />

be<strong>in</strong>g built, the BP network model is tested by other<br />

samples to testify the effectiveness and validity of the<br />

model. The results show that the BP network model and<br />

its algorithm are effective. The algorithm of BP neural<br />

network is shown as <strong>in</strong> fig.3.<br />

Figure 2. The framework of BP neural network comb<strong>in</strong><strong>in</strong>g<br />

membership degree<br />

Accord<strong>in</strong>g to fuzzy mathematics theory, the standard<br />

water quality classification 1-5 as co doma<strong>in</strong> can be<br />

def<strong>in</strong>ed. For n assessment parameters of some standard<br />

water quality classification, we suppose that the<br />

membership degree to itself is zero, so a fuzzy subset E<br />

can be gotten. We suppose that the membership degree to<br />

other is zero, subset F can also be gotten. In here, the<br />

membership degree to standard water quality<br />

classification for n assessment parameters of other water<br />

quality samples must belong to[0,1] , and build<strong>in</strong>g fuzzy<br />

subset A . Therefore, the problem of assess<strong>in</strong>g water<br />

quality sample transforms <strong>in</strong>to comput<strong>in</strong>g the<br />

membership degree to two neighbor<strong>in</strong>g standard water<br />

quality classification. In this paper, the membership<br />

function is built as follow<strong>in</strong>g formula.<br />

⎧1<br />

x = a<br />

⎪<br />

ux ( ) = ⎨1 − f( x)<br />

a< x<<br />

b<br />

⎪<br />

⎩0<br />

x = b<br />

(17)<br />

Figure 3. The algorithm process of BP neural network<br />

B. The Tra<strong>in</strong><strong>in</strong>g of BP Neural Network<br />

The whole network tra<strong>in</strong><strong>in</strong>g process <strong>in</strong>cludes forward<br />

propagation and error back-propagation, the tra<strong>in</strong><strong>in</strong>g<br />

process are shown as followed.<br />

1) Assignment the weighs w_<br />

xh , w_<br />

hy between<br />

nodes and need threshold u_<br />

h, u_<br />

y , the assigned<br />

values are Nonzero Random <strong>in</strong>itial valuebetween (-1,1).<br />

2) Inputt<strong>in</strong>g <strong>in</strong>put vector X of one tra<strong>in</strong><strong>in</strong>g sample and<br />

target output vector T .<br />

3) Comput<strong>in</strong>g output vector Y .<br />

Comput<strong>in</strong>g output vector H of hidden layers:<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1591<br />

∑<br />

neth = w _ xhih⋅X i<br />

−u _ hh<br />

⎫<br />

⎪<br />

i<br />

⎬<br />

Hh = ( neth) = 1 1+ exp( −neth)<br />

⎪⎭<br />

Comput<strong>in</strong>g output vector Y of output layers:<br />

net<br />

j<br />

= ∑ w _ hyhj ⋅Hh −u _ y ⎫<br />

j<br />

⎪<br />

h<br />

⎬<br />

Yj = ( netj) = 1 (1 + exp( −netj))<br />

⎪ ⎭<br />

4) Comput<strong>in</strong>g the difference mountδ<br />

δ<br />

j<br />

(18)<br />

(19)<br />

Comput<strong>in</strong>g difference mount of output layers<br />

δ = Y (1 −Y )( T − Y ) (20)<br />

j j j j j<br />

δ<br />

Comput<strong>in</strong>g difference mount of hidden layers<br />

h :<br />

δ = H (1 −H ) ∑ w_<br />

hy δ (21)<br />

h h h hj j<br />

j<br />

5) Comput<strong>in</strong>g correction mount of weigh dw , and<br />

correction mount of threshold du .<br />

Comput<strong>in</strong>g weigh correction mount of output layers<br />

dw _ hy , correction mount of threshold du _ y :<br />

dw _ hyhj = δ<br />

jH<br />

h ⎫⎪ ⎬ (22)<br />

du _ y<br />

j<br />

=−ηδ<br />

j ⎪⎭<br />

Comput<strong>in</strong>g weigh correction mount of hidden layers<br />

dw , correction mount of threshold du :<br />

dw _ xhih = ηδh X<br />

i ⎫<br />

⎬ (23)<br />

du _ H<br />

h<br />

=−ηδh<br />

⎭<br />

6) Updat<strong>in</strong>g weigh mount w_<br />

hy , and threshold<br />

u_<br />

y.<br />

Updat<strong>in</strong>g weigh mount of output layer w_<br />

hy and<br />

threshold u_<br />

y:<br />

w _ hyhj = w _ hyhj + dw _ hyhj<br />

⎫⎪ ⎬ (24)<br />

u_ yj = u_ yj + du_<br />

yj<br />

⎪⎭<br />

Updat<strong>in</strong>g weigh mount of hidden layer w_<br />

hy and<br />

threshold u_<br />

y:<br />

w _ xhih = w _ xhih + dw _ xhih<br />

⎫<br />

⎬ (25)<br />

u_ hh = u_ hh + du_<br />

hh<br />

⎭<br />

(c) The test<strong>in</strong>g of BP neural network<br />

After be<strong>in</strong>g build<strong>in</strong>g, the character of model must be<br />

tested by us<strong>in</strong>g the samples which are not used <strong>in</strong><br />

build<strong>in</strong>g the model, so that the Correctness and<br />

Practicality of the model can be verified.<br />

The comput<strong>in</strong>g format of the test<strong>in</strong>g process is showed<br />

as followed.<br />

1) Adopted the stable Weight matrices after tra<strong>in</strong>ed<br />

w_<br />

xh, w_<br />

hy and Threshold vector u_<br />

h, u_<br />

y.<br />

2)Input vector X of test<strong>in</strong>g samples.<br />

3)Comput<strong>in</strong>g output vector Y .<br />

Comput<strong>in</strong>g the output vector of hidden layer H :<br />

∑<br />

neth = w _ xhih⋅X i<br />

−u _ hh⎫<br />

i<br />

⎪<br />

1 ⎬<br />

Hh = f( neth)<br />

= ⎪<br />

−neth<br />

1+ exp ⎪⎭<br />

(27)<br />

Comput<strong>in</strong>g the output vector of hidden layer Y :<br />

net<br />

j<br />

= ∑ w _ hyhj⋅H h<br />

−u _ y ⎫<br />

j<br />

h<br />

⎪<br />

1 ⎬ (28)<br />

Yj = f( netj)<br />

=<br />

−net<br />

⎪<br />

j<br />

1+ exp ⎪⎭<br />

V. THE EXPERIMENT AND ANALYSIS OF BP NEURAL<br />

NETWORK FOR WATER QUALITY ASSESSMENT<br />

In the learn<strong>in</strong>g process of network, some standard<br />

water quality classification is adopted <strong>in</strong> learn<strong>in</strong>g samples.<br />

With consider<strong>in</strong>g that the range of activation function<br />

is[0,1] , and water quality classification is from the first<br />

class to the fifth class, so the five water quality<br />

classifications are only part of the whole range, and no<br />

attach<strong>in</strong>g the limited values 0 and 1.<br />

In this paper, target outputs are 0.1,0.3,0.5,0.7,0.9 ,<br />

and the output represents No.1-5 water quality<br />

classifications. As the most important parameters <strong>in</strong><br />

debugg<strong>in</strong>g the BP network, learn<strong>in</strong>g rate η = 0.68 ,<br />

Impulse coefficient α = 0.5 , then the network can be<br />

tra<strong>in</strong>ed after 1600 iterations.<br />

(a) Errors curve of learn<strong>in</strong>g process<br />

(b) Test<strong>in</strong>g result curve of network for some samples<br />

Fig. 4 The learn<strong>in</strong>g process curve of the network<br />

© 2013 ACADEMY PUBLISHER


1592 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Then the accuracy of the tra<strong>in</strong>ed network can be<br />

accepted. The accuracy of the tra<strong>in</strong>ed network is accepted,<br />

and the learn<strong>in</strong>g process curves are shown <strong>in</strong> fig 4.<br />

After be<strong>in</strong>g tra<strong>in</strong>ed, the BP network has held the<br />

characters of water quality classification, which can<br />

recognize the samples effectively. In experiment, the<br />

test<strong>in</strong>g results of membership degree BP network are<br />

shown as table1 & table 2.<br />

Sample<br />

Index<br />

Dissolved<br />

oxygen (mg/l)<br />

TABLE I.<br />

THE INTERMEDIATE RESULTS OF MEMBERSHIP DEGREE BP NETWORK<br />

BOD5<br />

COD Mn<br />

Total<br />

phosphorus<br />

Ammonia<br />

Nitrate<br />

Output of<br />

network<br />

Water quality<br />

classification<br />

1 5.02 2.86 4.61 0.81 0.023 4.39 0.41 Ⅱ~ Ⅲ, near Ⅲ<br />

2 8.91 0.77 1.17 0.18 0.015 0.13 0.093 Ⅰ<br />

3 6.78 3.42 3.32 0.23 0.07 0.93 0.17 Ⅰ~ Ⅱ, near Ⅰ<br />

4 7.56 0.71 0.71 0.19 0 0.1 0.096 Ⅰ<br />

5 3.54 6.15 8.05 1.36 0.05 1.00 0.62 Ⅲ~ Ⅳ, near Ⅳ<br />

6 4.13 1.33 1.24 0.46 0.02 1.1 0.22 Ⅰ~ Ⅱ, near Ⅱ<br />

7 10.22 1.33 1.26 0.17 0 0.06 0.092 Ⅰ<br />

8 6.32 4.57 5.56 0.78 0.19 0.97 0.42 Ⅱ~ Ⅲ, near Ⅲ<br />

9 9.67 1.57 3.16 0.21 0 0.31 0.1 Ⅰ~ Ⅱ, near Ⅰ<br />

10 4.96 6.58 6.55 1.1 0 0.23 0.56 Ⅲ~ Ⅳ, near Ⅲ<br />

TABLE II.<br />

THE MEMBERSHIP DEGREE TESTING RESULTS OF SAMPLES TO STANDARD WATER QUALITY<br />

Sample<br />

1 2 3 4 5 6 7 8 9 10<br />

Classification<br />

Ⅰ 0 0.939 0.696 0.971 0 0.393 0.997 0 0.92 0<br />

Ⅱ 0.425 0.061 0.304 0.029 0 0.607 0.003 0.45 0.08 0.729<br />

Ⅲ 0.575 0 0 0 0.403 0 00 0.55 0 0.271<br />

Ⅳ 0 0 0 0 0.597 0 0 0 0 0<br />

Ⅴ 0 0 0 0 0 0 0 0 0 0<br />

Fig.7 the Software structure of the prediction and warn<strong>in</strong>g system<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1593<br />

VI. THE NEW WATER QUALITY ASSESSMENT METHOD<br />

APPLIED IN THE PREDICTION AND WARNING SYSTEM<br />

In the paper, the automatic prediction and warn<strong>in</strong>g<br />

system based on the new water quality assessment<br />

methods, which is a whole <strong>in</strong>formation system <strong>in</strong>tegrat<strong>in</strong>g<br />

computer hardware technique, communication technique,<br />

and software Intelligent analysis technology. The system<br />

<strong>in</strong>cludes monitor<strong>in</strong>g term<strong>in</strong>al, user term<strong>in</strong>al, data<br />

transmission channel and data management center. The<br />

prediction and warn<strong>in</strong>g system can provide some water<br />

quality <strong>in</strong>formation for the department to mak<strong>in</strong>g some<br />

decision. In the system, the water quality can be predicted<br />

based on hydrology and water quality data, natural and<br />

geographical environment, by the methods of software<br />

technology and theory of mathematical model. The water<br />

quality parameters predicted by the system <strong>in</strong>clude<br />

dissolved oxygen, total phosphorus, ammonia nitrogen,<br />

nitrate nitrogen, permanganate <strong>in</strong>dex and BOD 5. The<br />

software structure of system is shown as fig.7, which can<br />

be divided <strong>in</strong>to water quality database module, <strong>in</strong>tegrated<br />

<strong>in</strong>formation analysis module, assessment report<br />

generation module, water quality trend analysis module.<br />

The water quality database system <strong>in</strong>cludes both water<br />

quality database and geography <strong>in</strong>formation database.<br />

Accord<strong>in</strong>g to the above database, water quality data can<br />

be counted and evaluated. The water quality database<br />

covers monitor<strong>in</strong>g network <strong>in</strong>formation, all k<strong>in</strong>ds of<br />

water data and water composition for example total<br />

phosphorus, ammonia nitrogen, nitrate nitrogen,<br />

permanganate <strong>in</strong>dex and BOD 5 etc. The geography<br />

<strong>in</strong>formation database ma<strong>in</strong>ly <strong>in</strong>cludes all k<strong>in</strong>ds of<br />

geographical zon<strong>in</strong>g maps. Based on web, the statistics<br />

and evaluation reports can be archived, queried and<br />

published automatically. In the system, the water quality<br />

trends can be predicted base on the BP model.<br />

VII. CONCLUSIONS<br />

The new water quality assessment method proposed <strong>in</strong><br />

this paper <strong>in</strong>tegrates the fuzzy mathematics theory and<br />

artificial neural network. The theoretical analysis shows<br />

that the assessment method has theoretical feasibility and<br />

great practical utility. The new ideal and method <strong>in</strong> the<br />

paper propose a new way of water quality assessment and<br />

develop the application of artificial neural network. The<br />

experimental results and research demonstrate that the<br />

water quality assessment method has good prospects for<br />

further application and development.<br />

VIII. ACKNOWLEDGMENT<br />

This research was supported <strong>in</strong> part by JiL<strong>in</strong> prov<strong>in</strong>ce<br />

science and technology development plan project<br />

(No.20110421) and foundation of Jil<strong>in</strong> prov<strong>in</strong>ce<br />

educational committee (No.20110232). All the authors<br />

would like to thank the sponsors and the colleagues who<br />

give us good suggestions and helps dur<strong>in</strong>g the research.<br />

REFERENCES<br />

[1] Xue JianJun, Yao GuiJi. “Artificial Neural Network <strong>in</strong><br />

Water Quality Assessment”, Hydrological, 1997, (3), pp.<br />

37-39.<br />

[2] B<strong>in</strong> Zhang et al. “Prediction of Water Runoff Us<strong>in</strong>g<br />

Bayesian Concepts and Modular Neural Network”, Water<br />

Resources Research, 2000, Vo1 36 (3), pp. 753-761.<br />

[3] Hu M<strong>in</strong>gX<strong>in</strong>g, Guo L<strong>in</strong>g Xiang, Guo DaZhi. “Multiple<br />

Criteria Neural Network Method for Lake Water Quality<br />

Eutrophication Assessment”, Shanghai Environmental<br />

Sciences, 1998, Vo1 l 7 (4 ), pp. 14-16.<br />

[4] Wang Li Guan, Jia M<strong>in</strong>g Tao. “Neural Network Methods<br />

for Water Quality Assessment”, Environmental<br />

Eng<strong>in</strong>eer<strong>in</strong>g, 1998, Vo1 16 (2), pp. 62-65.<br />

[5] Yuan ZengRen. Artificial Neural Network and Application.<br />

T<strong>in</strong>gHua, University Press, 1999.<br />

[6] Zhao ZhenYu, Xu YongMao. The Base and Application of<br />

Fuzzy theory and neural network, T<strong>in</strong>g Hua Press, 1997.<br />

[7] Zaclch L. “A. Fuzzy Set”, Information and Control , 1965,<br />

Vol.8, pp. 338-353.<br />

[8] Mart<strong>in</strong> T H, Howard B D, Mark H B. Neural Network<br />

Design, Beij<strong>in</strong>g, Ch<strong>in</strong>a Mach<strong>in</strong>e Press, 2002.<br />

[9] Daniel J. Fisher et al, “The Relative Acute Toxity of<br />

Cont<strong>in</strong>uous and Intermittent Exposures of Chlor<strong>in</strong>e and<br />

Brom<strong>in</strong>e to Aquatic Organism <strong>in</strong> the Presence and Absence<br />

of Ammonia”, Water Research, 1999, Vol 33 (3), pp. 760-<br />

768.<br />

[10] Simon Hayk<strong>in</strong>. Neural Networks: A Comprehensive<br />

Foundation, Beij<strong>in</strong>g, Mechanical Industry Press, 2004.<br />

[11] Sasikumar K. and Mujumdar P.P. “Fuzzy Opimization<br />

Model for Water Quality Management of a River System”,<br />

Journal of Water Resources Plann<strong>in</strong>g and Management,<br />

1998, Vol 124 (2), pp.19-88.<br />

[12] Donald H. Burn. “Water Quality Management through<br />

Comb<strong>in</strong>ed Simulation-Optimization”, Journal of<br />

Environmental Eng<strong>in</strong>eer<strong>in</strong>g, 1989, Vol 115 (5), pp. 1011-<br />

1024.<br />

[13] Tanner R. et al. “Food Cha<strong>in</strong> Organism <strong>in</strong> Hypersal<strong>in</strong>e<br />

Industrial Evaporation”, Journal of Water Environ<br />

Research, 1999, Vol 71 (4), pp. 494-501.<br />

[14] Richard N. Palmer, et al. “Optimization of Water Quality<br />

Monitor<strong>in</strong>g Networks”, Journal of Water Resources<br />

Plann<strong>in</strong>g and Management, 1985, Vol 111(4), pp. 478-493.<br />

[15] Amity K. S<strong>in</strong>halese, et al. “Nonl<strong>in</strong>ear Optimization Model<br />

for Screen<strong>in</strong>g Multipurpose Reservoir System”, Journal of<br />

Water Resources Plann<strong>in</strong>g and Management, 1999, Vol<br />

125 (4), pp. 229-233.<br />

[16] Shang Gao, Zaiyue Zhang, Cungen Cao. “A BP Neural<br />

Network Realization <strong>in</strong> the Measurement of Material<br />

Permittivity”, Vol 6, No 6 (2011): Special <strong>Issue</strong>: Recent<br />

Advances <strong>in</strong> Data M<strong>in</strong><strong>in</strong>g and Data Management.<br />

[17] P<strong>in</strong>g Zhang, XiaoHong Hao, HengJie Li et al. “Research of<br />

the Electro-hydraulic Servo System Based on RBF Fuzzy<br />

Neural Network Controller”, Vol 7, No 9 (2012): Special<br />

<strong>Issue</strong>: Advances <strong>in</strong> Information and Networks.<br />

[18] Huawang Shi, Wanq<strong>in</strong>g Li Vol 5. “Risk Evaluation Model<br />

on Enterprises’ Complex Information System: A Study<br />

Based on the BP Neural Network”, No 1 (2010): Special<br />

<strong>Issue</strong>: Recent Trends and Advances <strong>in</strong> Software<br />

Technology and Applications<br />

M<strong>in</strong>g Xue born <strong>in</strong> Jil<strong>in</strong>, Ch<strong>in</strong>a, <strong>in</strong> 1970, received the B.S., M.S.<br />

degrees from Jil<strong>in</strong> University, Ch<strong>in</strong>a, <strong>in</strong> 1990, 1995,<br />

respectively, all <strong>in</strong> Computer Science and Technology. And<br />

now she is currently a associate professor <strong>in</strong> department of<br />

electrical and <strong>in</strong>formation, Chang Chun Institute of Technology.<br />

Her current research <strong>in</strong>terests <strong>in</strong>clude computer technology,<br />

software eng<strong>in</strong>eer<strong>in</strong>g.<br />

© 2013 ACADEMY PUBLISHER


1594 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

An Isolated Dual-Input Converter for<br />

Grid/PV Hybrid Power Systems<br />

Yu-L<strong>in</strong> Juan<br />

National Changhua University of Education Department of Electrical Eng<strong>in</strong>eer<strong>in</strong>g, Changhua City, Taiwan<br />

Email: yljuan0815@cc.ncue.edu.tw<br />

Hs<strong>in</strong>-Y<strong>in</strong>g Yang, Peng-Lai Chen<br />

National Changhua University of Education Department of Electrical Eng<strong>in</strong>eer<strong>in</strong>g, Changhua City, Taiwan<br />

Email: a13816@abc.ncue.edu.tw<br />

Abstract—An isolated dual-<strong>in</strong>put power converter for a<br />

grid/photovoltaic (PV) hybrid power <strong>in</strong>door light<strong>in</strong>g system<br />

is proposed <strong>in</strong> this paper. The proposed converter can be<br />

operated <strong>in</strong> s<strong>in</strong>gle power supply mode or hybrid power<br />

supply mode. While the available PV power is <strong>in</strong>sufficient<br />

for the load demand, the proposed dual-<strong>in</strong>put converter will<br />

automatically deliver the complement power from the grid.<br />

The power complement<strong>in</strong>g is achieved by two <strong>in</strong>dependent<br />

control loops of the PV power and the grid power. F<strong>in</strong>ally, a<br />

prototype for a 36W LED light<strong>in</strong>g module is constructed to<br />

verify the validity of the proposed converter. From the<br />

experimental results, it can be seen that a smooth 24V/1.5A<br />

output power for the LED light<strong>in</strong>g module can be provided<br />

even while the PV power is <strong>in</strong>sufficient or unavailable.<br />

Index Terms—hybrid power system, dual-<strong>in</strong>put converter,<br />

PV array<br />

I. INTRODUCTION<br />

Renewable energy systems have attracted a lot of<br />

attention due to the global warm<strong>in</strong>g and fuel crisis [1]-[6].<br />

It is seen that the power consumption of office light<strong>in</strong>g<br />

systems may take 20% to 60% of total energy<br />

consumption <strong>in</strong> daily life [7]. Among the renewable<br />

energy resources, PV power has been considered as a<br />

more stable and reliable power source [8]. In most of PV<br />

power systems, the battery storage device is required to<br />

provide smoother electricity. However, the costs of<br />

<strong>in</strong>stall<strong>in</strong>g PV arrays and ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g battery pack are still<br />

considerable for consumers. In recent studies, reduc<strong>in</strong>g<br />

the consumption of grid power by comb<strong>in</strong><strong>in</strong>g renewable<br />

resources is one of the major trends. To reduce the system<br />

cost and provide a stable power supply, several types of<br />

multi-<strong>in</strong>put converters with renewable energy resources<br />

and grid power hybrid have been proposed [9]-[18]. The<br />

dependence on grid power can then be reduced and the<br />

output power quality is also rema<strong>in</strong>ed.<br />

Basically, these multi-<strong>in</strong>put converters can be<br />

classified <strong>in</strong>to three types of topology. In first type, a<br />

multi-w<strong>in</strong>d<strong>in</strong>g transformer is used to <strong>in</strong>tegrate the multi<br />

<strong>in</strong>put power sources with s<strong>in</strong>gle core [12]-[14]. In second<br />

type of converter, a pulsat<strong>in</strong>g voltage source cell (PVSC)<br />

is used as the power coupl<strong>in</strong>g component [9],[15]-[18].<br />

Because the <strong>in</strong>ductor is the ma<strong>in</strong> component <strong>in</strong> the PVSC,<br />

the major design criteria of the PVSC-type converter are<br />

the cont<strong>in</strong>uity of <strong>in</strong>ductor current and the copper loss of<br />

<strong>in</strong>ductor w<strong>in</strong>d<strong>in</strong>g. In the last type converter, a pulsat<strong>in</strong>g<br />

current source cell (PCSC) is adopted as the power<br />

coupl<strong>in</strong>g component [17],[18]. The copper loss is<br />

relatively much lower because the multi-<strong>in</strong>put power<br />

sources are coupled by capacitors [18].<br />

Figure 1. Grid/PV hybrid power system with proposed dual-<strong>in</strong>put converter<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1594-1601


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1595<br />

Figure 2. Power supply modes of the grid/PV hybrid power system<br />

The circuit diagram of the grid/PV hybrid power<br />

system with proposed dual-<strong>in</strong>put converter is shown <strong>in</strong><br />

Fig. 1. The system can be operated <strong>in</strong> s<strong>in</strong>gle power<br />

supply mode or hybrid power supply mode as shown <strong>in</strong><br />

Fig. 2. While the PV power is unavailable, the converter<br />

would be operated <strong>in</strong> s<strong>in</strong>gle power supply mode, namely,<br />

the grid supply mode. If the PV power can only provide<br />

part of the load, the converter will be operated <strong>in</strong> hybrid<br />

power supply mode for deliver<strong>in</strong>g the rest part of power<br />

from the grid to the load side. As a result, the commonly<br />

required battery pack <strong>in</strong> the stand-alone system can then<br />

be replaced by the grid to provide smooth electricity. The<br />

PV array <strong>in</strong>stallation capacity can also be reduced<br />

because additional capacity for presort<strong>in</strong>g <strong>in</strong> the battery<br />

pack is not required. Therefore, resulted system<br />

<strong>in</strong>stallation and ma<strong>in</strong>tenance costs can both be reduced. It<br />

would be very helpful to encourage consumers to<br />

purchase a PV power system as an alternative electricity<br />

system.<br />

II. OPERATION PRINCIPLE OF THE PRPOSED CONVERTER<br />

For the proposed converter shown <strong>in</strong> Fig. 1, the active<br />

switch S 1 is adopted to control the power flow from the<br />

grid to the load through the coupl<strong>in</strong>g capacitor C 1 . The<br />

other <strong>in</strong>put term<strong>in</strong>al is connected to the PV array and the<br />

PV output power is controlled by the active switch S 2 .<br />

The PV power is delivered to the load side through the<br />

coupl<strong>in</strong>g capacitor C 1 as well. Once the available power<br />

from PV array is lower than the load demand, the<br />

proposed converter would deliver the complement power<br />

from the grid to the load side accord<strong>in</strong>g to the feedback<br />

<strong>in</strong>formation about the load current. Based on the<br />

supply<strong>in</strong>g power sources, there are three power supply<br />

modes of the proposed converter as shown <strong>in</strong> Fig. 2. First,<br />

if the PV power is unavailable, the converter is operated<br />

<strong>in</strong> the grid supply mode. Then the converter would be<br />

changed <strong>in</strong>to the PV supply mode while the available PV<br />

power is higher than the load demand. F<strong>in</strong>ally, if the PV<br />

power is available but not enough for the load, the<br />

converter would be operated <strong>in</strong> the third mode, namely<br />

the hybrid supply mode.<br />

While the two sources are simultaneously deliver<strong>in</strong>g<br />

power, i.e. <strong>in</strong> the hybrid supply mode, there would be six<br />

operation modes <strong>in</strong> one switch<strong>in</strong>g cycle as shown <strong>in</strong> Fig.<br />

3. The relative waveforms <strong>in</strong> one switch<strong>in</strong>g cycle are<br />

shown <strong>in</strong> Fig. 4. It can be seen that the two active<br />

switches are controlled with <strong>in</strong>terleave phase shift<br />

technique to reduce the voltage and current ripple of the<br />

coupled capacitor. The correspond<strong>in</strong>g operation<br />

pr<strong>in</strong>ciples are described as follows:<br />

Mode1—(t 0 ≦t


1596 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

(a) Mode 1<br />

(b) Mode 2<br />

(c) Mode 3<br />

(d) Mode 4<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1597<br />

(e) Mode 5<br />

(f) Mode 6<br />

Figure 3. Equivalent circuits of the proposed converter <strong>in</strong> different operation modes<br />

Figure 4. Relative waveforms <strong>in</strong> one switch<strong>in</strong>g cycle<br />

III. POWER COMPLEMENT CONTROLLER<br />

From section II, it is seen that the power drawn from<br />

the grid is controlled by the active switch S 1 and firstly<br />

buffered <strong>in</strong> the coupl<strong>in</strong>g capacitor. Then, it would be<br />

transmitted to the load side through the <strong>in</strong>ductor L 2 . The<br />

other <strong>in</strong>put power, i.e. the PV power, is controlled by the<br />

active switch S 2 . The power processes are similar to an<br />

isolated Cuk converter. The PV power would be<br />

delivered to the load side through the transformer T 2 and<br />

coupl<strong>in</strong>g capacitor C 1 . Obviously, the two power flows<br />

are both unidirectional and transferred to the load side<br />

<strong>in</strong>dividually. Therefore, the two active switches can be<br />

<strong>in</strong>dependently used to control the power from each <strong>in</strong>put<br />

source. To achieve automatically deliver<strong>in</strong>g the<br />

complement power part from the grid to provide smooth<br />

electricity for the load, a power complement controller<br />

for the proposed converter is shown <strong>in</strong> Fig. 5. It is seen<br />

that the power complement controller is composed of two<br />

<strong>in</strong>dependent control loops for grid power and PV power<br />

respectively.<br />

Usually, a maximum power po<strong>in</strong>t track<strong>in</strong>g (MPPT)<br />

would be adopted to fully utilize the renewable PV power.<br />

Hence, the gat<strong>in</strong>g signal of the active switch S 2 is<br />

provided accord<strong>in</strong>g to the adopted MPPT strategy. The<br />

MPPT strategy is out of the scope of this study and would<br />

not be further described. Basically, either one of the wellknown<br />

current-controlled type MPPT strategies can be<br />

directly applied to this controller. And the gat<strong>in</strong>g signal<br />

of the active switch S 1 is then decided accord<strong>in</strong>g to the<br />

amount of the complement power for the load. In this<br />

paper, a well-known hill-climb<strong>in</strong>g search<strong>in</strong>g MPPT<br />

strategy is adopted <strong>in</strong> the prototype light<strong>in</strong>g system. For<br />

the control loop of PV power, the PV current is regulated<br />

to the current command for extract<strong>in</strong>g maximum PV<br />

power.<br />

© 2013 ACADEMY PUBLISHER


1598 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 5. Power complement controller diagram<br />

The active switch S 2 is driven by gat<strong>in</strong>g signal V GS2 to<br />

control the <strong>in</strong>put current from PV array. For the control<br />

loop of grid power, the ma<strong>in</strong> object is to deliver the<br />

complement power for rema<strong>in</strong><strong>in</strong>g smooth current to the<br />

LED light<strong>in</strong>g module. Therefore, the load current I o is fed<br />

back and needs to be regulated to the load current<br />

command I o * which is decided by the normal operat<strong>in</strong>g<br />

current of LED module. Then the active switch S 1 will be<br />

driven by the gat<strong>in</strong>g signal V GS1 to control the <strong>in</strong>put grid<br />

power for complement<strong>in</strong>g the power demand.<br />

IV. EXPERIMENT RESULTS<br />

To evaluate the performance and validity of proposed<br />

converter, a prototype with a 45W PV array for a 36W<br />

LED light<strong>in</strong>g module is constructed as shown <strong>in</strong> Fig. 6.<br />

The controlled is implemented by a microprocessor,<br />

HT46R23, and relative electrical parameters are shown <strong>in</strong><br />

Table I. The <strong>in</strong>put current from PV array and load current<br />

are sampled by hall sensors. Fig. 7 shows the waveforms<br />

of the grid <strong>in</strong>put current, PV <strong>in</strong>put power and the load<br />

condition. In Fig. 7(a), it can be seen that firstly the load<br />

demand is only provided by the grid because the PV<br />

power is unavailable. Then, the PV power is started to<br />

provide its maximum power, but the available PV power<br />

is still not enough for the load.<br />

Therefore, the converter is automatically changed <strong>in</strong>to<br />

hybrid supply mode for deliver<strong>in</strong>g the complement power<br />

from the grid. Once, the maximum PV power is higher<br />

than the load demand, there is no complement power<br />

required from grid. As a result, the output power for the<br />

LED module as shown <strong>in</strong> Fig. 7(b) can then be wellcontrolled<br />

at 36W/24V/1.5A. Fig. 8 shows the waveforms<br />

of the capacitor C 1 while the converter is operated <strong>in</strong><br />

hybrid supply mode with 50% PV power and 50% grid<br />

power. It can be seen that the current ripple and peak<br />

current are reduced because of adopt<strong>in</strong>g the <strong>in</strong>terleave<br />

phase shift technique. Fig. 9 shows the efficiency of the<br />

proposed converter <strong>in</strong> s<strong>in</strong>gle power supply mode with PV<br />

power or Grid power <strong>in</strong>put. The efficiency <strong>in</strong> hybrid<br />

power supply mode is measured and shown <strong>in</strong> Fig. 10,<br />

and the def<strong>in</strong>ition of the efficiency η is given as<br />

follow<strong>in</strong>g:<br />

PO<br />

η =<br />

(1)<br />

P + P<br />

PV<br />

Grid<br />

Table I. PARAMETERS OF PROTOTYPE SYSTEM<br />

Input -<br />

V Grid =110VACrms, 60 Hz<br />

V MPPT ≈45 V, I MPPT ≈1 A<br />

Output - V O =24 V, I O =1.5 A<br />

Frequency - 38.4 kHz<br />

Ferrite core<br />

Transformer<br />

Component<br />

-<br />

-<br />

EI-33<br />

L T1P /L T1S =425μH / 35.8μH<br />

A gip ≈ 0.29 mm<br />

N T2P /N T2S =32N / 16N<br />

Inductance<br />

L 1 =460μH<br />

-<br />

Component<br />

L 2 =525μH<br />

C 1 =6μF<br />

Capacitor<br />

Component<br />

- C 2 =1μF<br />

C 3 =220μF<br />

Figure 6. Prototype of proposed dual-<strong>in</strong>put power converter<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1599<br />

(a) grid <strong>in</strong>put current I GRID<br />

Figure 10. Measured Efficiency of the proposed converter <strong>in</strong> hybrid<br />

power supply mode<br />

(b) output voltage V o , output current I o and output power P o<br />

Figure 7. Measured waveforms <strong>in</strong> hybrid power supply mode<br />

The comparison of system cost between stand-alone<br />

PV power system and the proposed hybrid power system<br />

is shown <strong>in</strong> Table II. For a 36W office light<strong>in</strong>g power<br />

system with 85% efficiency works 8 hours a day, the<br />

m<strong>in</strong>imum required power capacity is 340Wh. However,<br />

the rated power of PV array is only available <strong>in</strong> 2~3 hours<br />

a day [19]. The m<strong>in</strong>imum PV array <strong>in</strong>stalled capacity for<br />

a 36W stand-alone power system is 120W. Compared<br />

with the stand-alone system, the required capacity of PV<br />

array <strong>in</strong> the proposed system is only 36W. Moreover, the<br />

energy storage device is not required neither. It is seen<br />

that the <strong>in</strong>stall<strong>in</strong>g and ma<strong>in</strong>tenance cost can then be<br />

greatly reduced.<br />

Table II. THE POWER SUPPLY SYSTEM COST COMPARISON<br />

(8HOURS/DAY AT 36W)<br />

Stand-Alone<br />

Proposed system<br />

PV System<br />

Load<strong>in</strong>g 36W 36W<br />

PV Array 120W 36W<br />

Battery bank 720Wh —<br />

Cost High Low<br />

Figure 8. Waveforms <strong>in</strong> different supply modes (V GS1&GS2 : 20V/DIV,<br />

V C1 : 5V/DIV, I C1 :4A/DIV)<br />

Figure 9. Measured Efficiency of the proposed converter <strong>in</strong> s<strong>in</strong>gle<br />

power supply modes<br />

V. CONCLUSION<br />

This paper proposed an isolated dual-<strong>in</strong>put power<br />

converter for grid/PV hybrid power conversion systems<br />

which can be operated <strong>in</strong> s<strong>in</strong>gle power supply mode or<br />

hybrid power supply mode. The power complement<br />

controller composed of two <strong>in</strong>dependent control loops for<br />

the grid and the PV power. Once the available PV power<br />

is <strong>in</strong>sufficient for the load demand, the power flow from<br />

the grid would automatically be controlled to complement<br />

the output power. F<strong>in</strong>ally, a prototype for a 36W LED<br />

light<strong>in</strong>g module is constructed to evaluate the validity and<br />

performance of the proposed converter. From the<br />

experimental results, it is seen that even while the PV<br />

power is unstable, the proposed converter can provide a<br />

smooth 24V/1.5A output power for the LED module.<br />

© 2013 ACADEMY PUBLISHER


1600 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

a prototype with a 45W PV array for a 36W LED<br />

light<strong>in</strong>g module is constructed as shown <strong>in</strong> Fig. 6.<br />

Figure 11. Prototype of the 36W LED light<strong>in</strong>g module<br />

Figure 12. Prototype of the 45W PV array<br />

REFERENCES<br />

[1] X. Li, Q. Pan and K. He, “Model<strong>in</strong>g and Analysis of<br />

Harmonic <strong>in</strong> the M<strong>in</strong>e Hoist Converter Based on Double<br />

Closed-Loop Control,” Journal of Computers, vol. 7, no.6,<br />

pp. 1353-1360, Jun. 2012.<br />

[2] Q. Li, “A <strong>Full</strong>y-Integrated Buck Converter Design and<br />

Implementation for On-Chip Power Supplies,” Journal of<br />

Computers, vol. 7, no. 5, pp. 1270-1277, May. 2012.<br />

[3] H. Xu, J. Xu, Z You, W. Peng, K Zhang and J.Xu,<br />

“Thermal Simulation of Traction System for High-Speed<br />

Tra<strong>in</strong> Based on Heat Accumulation,” Journal of<br />

Computers, vol. 7, no. 4, pp. 1034-1040, Apr.. 2012.<br />

[4] Q. Li and M Zhou, “Research on Dependable Distributed<br />

Systems for Smart Grid,” Journal of Software, vol. 7, no.6,<br />

pp. 1250-1257, Jun. 2012.<br />

[5] H. Liu, G. Qian, Y. Tsunoo and S. Goto, “The Switch<strong>in</strong>g<br />

Glitch Power Leakage Model,” Journal of Software, vol. 6,<br />

no.9, pp. 1787-1794, Sept. 2011.<br />

[6] C. Jiang, X. Xu, J. Wan, J. Zhang and Y. Zhao, “Power<br />

Aware Job Schedul<strong>in</strong>g with QoS Guarantees Based on<br />

Feedback Control,” Journal of Software, vol. 6, no.8, pp.<br />

1562-1569, Aug. 2011.<br />

[7] Y. Uhm, I. Hong, G. Kim, B. Lee and S. Park, “Design and<br />

Implementation of Power-aware LED Light Enabler with<br />

Location-aware Adaptive Middleware and Context-aware<br />

User Pattern,” IEEE Trans. Consumer Electron., vol. 56 no.<br />

1, pp. 231-239, January 2010.<br />

[8] T. F. Wu, C. H. Chang and Y. H. Chen, “A Fuzzy-Logic-<br />

Controlled S<strong>in</strong>gle- Stage Converter for PV-Powered<br />

Light<strong>in</strong>g System Application,” IEEE Trans. Ind. Electron.,<br />

vol. 47 no.2, pp. 287-296, April 2000.<br />

[9] H. Patel and V. Agarwal, “MPPT Scheme for a PV-Fed<br />

S<strong>in</strong>gle-Phase S<strong>in</strong>gle- Stage Grid-Connected Inverter<br />

Operat<strong>in</strong>g <strong>in</strong> CCM With Only One Current Sensor,” IEEE<br />

Trans. Energy Convers. vol. 24 no. 1, pp. 256-263, March<br />

2009.<br />

[10] X. Sun, L. K. Wong, Y. S. Lee and D. Xu, “Design and<br />

Analysis of an Optimal Controller for Parallel Multi-<br />

Inverter Systems,” IEEE Trans. Circuits Syst. II, Exp.<br />

Briefs, vol. 52, no. 1, pp. 56-61, January 2006.<br />

[11] R. J. Wai, C. Y. L<strong>in</strong>, L. W. Liu and Y. R. Chang, “Highefficiency<br />

S<strong>in</strong>gle-stage Bidirectional Converter with Multi<strong>in</strong>put<br />

Power Sources,” IET Trnas. Electr. Power Appl., vol.<br />

1 no. 5, pp.763-777, April 2007.<br />

[12] Q. Wand, J. Zhang, X. Ruan and K. J<strong>in</strong>, “Isolated S<strong>in</strong>gle<br />

Primary W<strong>in</strong>d<strong>in</strong>g Multiple-Input Converters,” IEEE Trans.<br />

Power Electr., vol. 26 no. 12, pp. 3435-3542, December<br />

2011.<br />

[13] Y. M. Chen, Y. C. Liu and F. Y. Wu, “Multi-Input DC/DC<br />

Converter Based on the Multi-w<strong>in</strong>d<strong>in</strong>g Transformer for<br />

Renewable Energy Applications,” IEEE Trans. Ind.<br />

Application., vol. 38, no. 4, pp. 1096-1104, July/August<br />

2002.<br />

[14] R. Maurya, S. P. Srivastava, and P. Agarwal, “Design &<br />

Implementation of Transformer-less Multi Output DC<br />

Power Supply,” Trans. International Review of Electrical<br />

Eng<strong>in</strong>eer<strong>in</strong>g, vol. 6, no.7, pp. 2910-2918, November 2011.<br />

[15] R. J. Wai, C. Y. L<strong>in</strong>, J. J. Liaw, and Y. R. Chang, “Newly<br />

Designed ZVS Multi-Input Converter, IEEE Trans. Ind.<br />

Electr., vol. 58 no. 2, pp. 555-566, February 2011.<br />

[16] R. Ahmadi and M. Ferdowsi, “Double-Input Converters<br />

Based on H-Bridge Cells: Derivation, Small-Signal<br />

Model<strong>in</strong>g, and Power Shar<strong>in</strong>g Analysis,” IEEE Trans.<br />

Circuits Syst. I, Reg., vol. 59, no. 4, pp. 875-888, April<br />

2012.<br />

[17] Y. Yuanmao and K. W. E. Cheng, “Level-Shift<strong>in</strong>g<br />

Multiple-Input Switched- Capacitor Voltage Copier,” IEEE<br />

Trans. Power Electr., vol. 27 no. 2, pp. 828-837, February<br />

2012.<br />

[18] Y. C. Liu and Y. M.Chen, “A Systematic Approach to<br />

Synthesiz<strong>in</strong>g Multi-Input DC-DC Converter,” IEEE Trans.<br />

Power Electron., vol. 24, no.1, pp.116-127, January 2009.<br />

[19] Kolhe M, “Techno-Economic Optimum Siz<strong>in</strong>g of a Stand-<br />

Alone Solar Photovoltaic System,” IEEE Trans. Energy<br />

Convers., vol. 24, no.2, pp.511-519, 2009<br />

Yu-L<strong>in</strong> Juan (S’08) was born <strong>in</strong><br />

Kaohsiung, Taiwan, <strong>in</strong> 1979. He<br />

received the B.S. degree <strong>in</strong> electrical<br />

eng<strong>in</strong>eer<strong>in</strong>g from National Cheng Kung<br />

University, Ta<strong>in</strong>an, Taiwan, <strong>in</strong> 2001<br />

and the M.S. degree <strong>in</strong> electrical<br />

eng<strong>in</strong>eer<strong>in</strong>g <strong>in</strong> 2003 from National<br />

Ts<strong>in</strong>g Hua University, Hs<strong>in</strong>chu, Taiwan.<br />

His current research <strong>in</strong>terests <strong>in</strong>clude<br />

power electronics, renewable energy<br />

systems, and ac motor drives.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1601<br />

Hs<strong>in</strong>-Y<strong>in</strong>g Yang was born <strong>in</strong> Taichung<br />

Taiwan, R.O.C. <strong>in</strong> 1982. He received<br />

the B. S. degree <strong>in</strong> electrical<br />

eng<strong>in</strong>eer<strong>in</strong>g from National Formosa<br />

University, Yunl<strong>in</strong>, Taiwan, <strong>in</strong> 2005<br />

and was conferred the Master of<br />

Electrical Degree by National<br />

Changhua University of Education,<br />

Changhua City, Taiwan, R.O.C. <strong>in</strong> 2007.<br />

He is currently work<strong>in</strong>g toward the<br />

Ph.D. degree <strong>in</strong> electrical eng<strong>in</strong>eer<strong>in</strong>g. His research <strong>in</strong>terests are<br />

power electronics, electronic circuit design, battery charge and<br />

microprocessor application.<br />

Peng-Lai Chen is currently work<strong>in</strong>g<br />

toward the Ph.D. degree <strong>in</strong> electrical<br />

eng<strong>in</strong>eer<strong>in</strong>g. His research <strong>in</strong>terests are<br />

power electronics, design and<br />

application.<br />

© 2013 ACADEMY PUBLISHER


1602 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Deformed Kernel Based Extreme Learn<strong>in</strong>g<br />

Mach<strong>in</strong>e<br />

Zhang Chen<br />

School of Computer Science and Technology,Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology, XuZhou,221116,Ch<strong>in</strong>a<br />

Email: zc@cumt.edu.cn<br />

Xia Shi Xiong and Liu B<strong>in</strong>g<br />

School of Computer Science and Technology,Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology, XuZhou,221116,Ch<strong>in</strong>a<br />

Email: xiasx@cumt.edu.cn, liub<strong>in</strong>g@cumt.edu.cn<br />

Abstract—The extreme learn<strong>in</strong>g mach<strong>in</strong>e (ELM) is a newly<br />

emerg<strong>in</strong>g supervised learn<strong>in</strong>g method. In order to use the<br />

<strong>in</strong>formation provided by unlabeled samples and improve the<br />

performance of the ELM, we deformed the kernel <strong>in</strong> the<br />

ELM by model<strong>in</strong>g the marg<strong>in</strong>al distribution with the graph<br />

Laplacian, which is built with both labeled and unlabeled<br />

samples. We further approximated the deformed kernel by<br />

means of random feature mapp<strong>in</strong>g. The experimental<br />

results showed that the proposed semi-supervised extreme<br />

learn<strong>in</strong>g mach<strong>in</strong>e tends to achieve outstand<strong>in</strong>g<br />

generalization performance at a relatively faster learn<strong>in</strong>g<br />

speed than traditional semi-supervised learn<strong>in</strong>g algorithms.<br />

Index Terms—extreme learn<strong>in</strong>g mach<strong>in</strong>e (ELM); random<br />

feature mapp<strong>in</strong>g; semi-supervised learn<strong>in</strong>g; Reproduc<strong>in</strong>g<br />

Kernel Hilbert Spaces (RKHS).<br />

I. INTRODUCTION<br />

Lately, extreme learn<strong>in</strong>g mach<strong>in</strong>e ELM has been<br />

attract<strong>in</strong>g a lot of attention from an <strong>in</strong>creas<strong>in</strong>g number of<br />

researchers [1]-[5]. It was orig<strong>in</strong>ally developed for the<br />

s<strong>in</strong>gle-hidden layer feedforward neural networks (SLFN)<br />

[6]-[8], which was extended to the “generalized” SLFNs,<br />

i.e., may not be neuron alike [9, 10]. ELM has three ma<strong>in</strong><br />

learn<strong>in</strong>g features: (1) ELM was orig<strong>in</strong>ally proposed to<br />

apply random computational nodes <strong>in</strong> the hidden layer.<br />

Thus, the hidden layer of the ELM does not need be<br />

tuned. (2) ELM <strong>in</strong>corporates the smallest tra<strong>in</strong><strong>in</strong>g error<br />

and the norm of output weights <strong>in</strong>to the objective<br />

function. Hence, it controls the complexity of decision<br />

functions by means of regularization. (3) Unlike LS-SVM<br />

and SVM that only provide one type of computational<br />

need, ELM provides a unified solution to different<br />

practical applications (e.g., regression, b<strong>in</strong>ary, and<br />

multiclass classifications).<br />

ELM is a supervised learn<strong>in</strong>g method. In many<br />

applications, however, there are little labeled data and a<br />

large amount of unlabeled data available. Semi-<br />

Supervised Learn<strong>in</strong>g (SSL) methods are proposed to<br />

solve this problem. ELM can be naturally extended to the<br />

unsupervised scenario, where the “cluster” and “manifold”<br />

assumptions are used to learn <strong>in</strong>put-output mapp<strong>in</strong>g<br />

functions. The “cluster” assumption refers to that po<strong>in</strong>ts<br />

<strong>in</strong> a data cluster have similar labels. The “manifold”<br />

assumption corresponds to high-dimensional data<br />

distributed on a low-dimensional manifold and the<br />

samples <strong>in</strong> each local region have similar labels. There<br />

are many approaches based on the “cluster” assumption,<br />

which uses techniques such as local comb<strong>in</strong>atorial<br />

searches[12], branch-and-bound algorithms[13,14],<br />

gradient descent[15], semi-def<strong>in</strong>ite programm<strong>in</strong>g [16-19],<br />

cont<strong>in</strong>uation techniques[20], non-differentiable<br />

methods[21], concave-convex procedures[22,23], and<br />

determ<strong>in</strong>istic anneal<strong>in</strong>g[24]. However, the time<br />

complexity of these methods scales at least quadratically<br />

with the dataset size, which makes them <strong>in</strong>applicable to<br />

large-scale datasets. In [25], a cutt<strong>in</strong>g plane semisupervised<br />

support vector mach<strong>in</strong>e algorithm (CutS3VM)<br />

was proposed to reduce the number of iterations, but it<br />

still takes time O(sn) to converge with guaranteed<br />

accuracy <strong>in</strong> the l<strong>in</strong>ear case, where n is the total number of<br />

samples <strong>in</strong> the dataset and s is the average number of<br />

non-zero features. S<strong>in</strong>dhwani et al.[26] proposed two<br />

k<strong>in</strong>ds of large-scale semi-supervised l<strong>in</strong>ear SVMs: the<br />

transductive modified f<strong>in</strong>ite newton l<strong>in</strong>ear L 2 -SVM (L 2 -<br />

TSVM-MFN) and the determ<strong>in</strong>istic anneal<strong>in</strong>g L 2 -SVM-<br />

MFN method (DA L 2 -SVM-MFN). L 2 -TSVM-MFN is<br />

converged after hav<strong>in</strong>g been switched many times and<br />

DA L 2 -SVM-MFN needs a number of iterations to<br />

compute the correspond<strong>in</strong>g parameters of unlabeled data.<br />

Besides the “cluster” assumption, many regularization<br />

frameworks based on the “manifold” assumption have<br />

been designed by add<strong>in</strong>g a manifold regularization term.<br />

In [27], Belk<strong>in</strong> et al. proposed a general Manifold<br />

Regularization (MR) framework for a full range of<br />

learn<strong>in</strong>g problems from unsupervised and semisupervised,<br />

to supervised. The MR framework adds an<br />

additional penalty term to the traditional regularization,<br />

from which the Laplacian Regularization Least Square<br />

Classification (LapRLSC) and the Laplacian SVM<br />

(LapSVM) methods are derived and have been shown to<br />

be efficient <strong>in</strong> semi-supervised learn<strong>in</strong>g problems.<br />

Additionally, the Discrim<strong>in</strong>atively Regularization Least<br />

Square Classification (DRLSC) method and the Sparse<br />

Regularized Least Square Classification (S-RLSC)<br />

algorithm[29] were proposed, which improves the MR<br />

framework further. Although these frameworks can<br />

handle semi-supervised learn<strong>in</strong>g problems and the<br />

analytic solutions can also be derived, they still <strong>in</strong>volve<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1602-1609


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1603<br />

expensive computation when tra<strong>in</strong><strong>in</strong>g large-scale data<br />

sets.<br />

To improve the performance of the ELM, it is essential<br />

to use the <strong>in</strong>formation provided by both labeled and<br />

unlabeled samples. We construct the deformed kernel for<br />

the ELM, which is adapted to the geometry of the<br />

underly<strong>in</strong>g distribution. Based on the deformed kernel,<br />

we propose a deformed kernel-based extreme learn<strong>in</strong>g<br />

mach<strong>in</strong>e (DKELM) to provide a unified solution for<br />

regression, b<strong>in</strong>ary, and multiclass classifications (like<br />

ELM). To address large-scale data tra<strong>in</strong><strong>in</strong>g, we<br />

approximate the deformed kernel by random feature<br />

mapp<strong>in</strong>g, so that the proposed DKELM does not need<br />

parameter tun<strong>in</strong>g and has less computational complexity,<br />

as well as a natural out-of-sample extension for novel<br />

examples. We demonstrate the relationship between the<br />

traditional kernel-based learn<strong>in</strong>g approach and ELM, and<br />

our approach can be used by other kernel-based methods<br />

and a sequence of fast learn<strong>in</strong>g algorithms can be derived.<br />

The rest of this paper is organized as follows. Some<br />

previous works are <strong>in</strong>troduced <strong>in</strong> Section II. The method<br />

of construct<strong>in</strong>g and approximat<strong>in</strong>g the deformed kernel is<br />

discussed <strong>in</strong> Section III. In Section IV, we first<br />

demonstrate the relationship between the traditional<br />

kernel-based learn<strong>in</strong>g approach and ELM, and propose<br />

the deformed kernel based extreme learn<strong>in</strong>g mach<strong>in</strong>e.<br />

The experiments us<strong>in</strong>g benchmark real-world data sets<br />

are reported <strong>in</strong> Section V. F<strong>in</strong>ally, we conclude this paper<br />

<strong>in</strong> Section VI.<br />

II. BRIEF OF THE EXTREME LEARNING MACHINE<br />

The output function of ELM for generalized SLFNs <strong>in</strong><br />

the case of one output node case is<br />

(1)<br />

where<br />

is the vector of the weights<br />

between a hidden layer of L nodes and the output node.<br />

Note that<br />

is the output (row)<br />

vector of the hidden layer with respect to the <strong>in</strong>put x. In<br />

fact, maps the data from the d-dimensional <strong>in</strong>put<br />

space to the L-dimensional hidden-layer feature space<br />

(ELM feature space) H. Different from traditional<br />

learn<strong>in</strong>g algorithms [11], ELM is meant to m<strong>in</strong>imize the<br />

tra<strong>in</strong><strong>in</strong>g error as well as the norm of the output weights [7]<br />

M<strong>in</strong>imize: and (2)<br />

where H is the hidden-layer output matrix, which is<br />

denoted by<br />

where , and is a<br />

kernel function.<br />

If a feature mapp<strong>in</strong>g h(x) is known, we have<br />

(5)<br />

where is a nonl<strong>in</strong>ear piecewise cont<strong>in</strong>uous<br />

function satisfy<strong>in</strong>g ELM universal approximation<br />

capability theorems [7],[30] and are<br />

randomly generated accord<strong>in</strong>g to any cont<strong>in</strong>uous<br />

probability distribution. The output function of ELM<br />

classifier is<br />

or<br />

where<br />

classes.<br />

(4)<br />

, (6)<br />

, (7)<br />

and m is the number of<br />

III. DEFORMING THE KERNEL BY WARPING AN RKHS<br />

For a Mercer kernel K: X X , there is an<br />

associated RKHS of functions X with the<br />

correspond<strong>in</strong>g norm . Given a set of l labeled<br />

examples and a set of u unlabeled examples<br />

, where and , the classical<br />

kernel-based learn<strong>in</strong>g approach is based on solv<strong>in</strong>g the<br />

regularization problem given by<br />

, (8)<br />

where V is some loss function, such as the squared loss<br />

for RLS and the h<strong>in</strong>ge loss function<br />

for SVM; is the norm of the<br />

classification function <strong>in</strong> the reproduc<strong>in</strong>g kernel Hilbert<br />

space , and controls the complexity of function .<br />

The Representer Theorem [27] states that a solution can<br />

be found <strong>in</strong> the form<br />

. In order to<br />

avoid confusion, we list ma<strong>in</strong> notations of this paper <strong>in</strong><br />

Table I.<br />

TABLE I.<br />

. (3)<br />

As with SVM for the b<strong>in</strong>ary classification, to m<strong>in</strong>imize<br />

the norm of the output weights is actually used to<br />

maximize the distance of the separat<strong>in</strong>g marg<strong>in</strong>s of the<br />

two different classes <strong>in</strong> the ELM feature space: .<br />

The norm controls the complexity of the function <strong>in</strong> the<br />

ambient space, which will be elaborated later.<br />

If a feature mapp<strong>in</strong>g h(x) is unknown to users, the<br />

output function of ELM classifier is<br />

Notation<br />

m<br />

NOTATIONS<br />

Explanation<br />

The <strong>in</strong>put d-dimensional Euclidean space<br />

is the<br />

tra<strong>in</strong><strong>in</strong>g data matrix. are labeled po<strong>in</strong>ts,<br />

and are unlabeled po<strong>in</strong>ts.<br />

The number of classes that the samples belong<br />

to<br />

is the 0-1 label matrix.<br />

is the label vector of , and all<br />

components of are s except one be<strong>in</strong>g .<br />

is the discrim<strong>in</strong>ative<br />

vector function. The <strong>in</strong>dex of the class which x<br />

© 2013 ACADEMY PUBLISHER


1604 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

belongs to is that of the component with the<br />

maximum value.<br />

Kernel function of variables and<br />

Kernel matrix<br />

. Its columns are the<br />

coefficients of the kernel function to represent<br />

the discrim<strong>in</strong>ative function .<br />

Norm <strong>in</strong> the Hilbert space<br />

Inner product <strong>in</strong> the Hilbert space<br />

tr(M)<br />

The trace of the matrix M , that is, the sum of<br />

the diagonal elements of the matrix M.<br />

span{ } subspace expanded by<br />

In the implementation of this kernel-based learn<strong>in</strong>g<br />

approach, we often use the Radial Basis Function or<br />

Gaussian (RBF) as kernel, and the kernel k def<strong>in</strong>es a<br />

unique RKHS. S<strong>in</strong>ce the Gaussian kernel is isotropic, it<br />

has a spherical symmetry. That is, it generally does not<br />

conform to the particular geometry of the underly<strong>in</strong>g<br />

classes. In other words, the underly<strong>in</strong>g data structure is<br />

obviated. F<strong>in</strong>ally, it is unable to provide an accurate<br />

decision surface. To address these limitations, it is crucial<br />

to def<strong>in</strong>e a new kernel that is adapted to the geometry of<br />

the data distribution well.<br />

Instead of solv<strong>in</strong>g (8) like a traditional kernel-based<br />

learn<strong>in</strong>g approach, we modify (or deform) the orig<strong>in</strong>al<br />

kernel <strong>in</strong> order to adapt it to the underly<strong>in</strong>g distribution<br />

geometry. Def<strong>in</strong><strong>in</strong>g a new deformed kernel , the new<br />

problem to be solved becomes<br />

, (9)<br />

(8) and (9) solved with different kernels, and thus <strong>in</strong><br />

different .<br />

The solution of (9) is<br />

, (10)<br />

that should be appropriate for real sett<strong>in</strong>g.<br />

To “deform” the orig<strong>in</strong>al kernel and adapt it to the<br />

geometry of the underly<strong>in</strong>g distribution, let be a l<strong>in</strong>ear<br />

space with positive semi-def<strong>in</strong>ite <strong>in</strong>ner product, and let<br />

be a bounded l<strong>in</strong>ear operator. Def<strong>in</strong><strong>in</strong>g<br />

to be the space with the same functions as and its<br />

<strong>in</strong>ner product def<strong>in</strong>es<br />

, (11)<br />

It is proved <strong>in</strong> [27] that is a valid . In this<br />

specific problem, it is required that and should<br />

depend on the data. Therefore, let be , and def<strong>in</strong>e<br />

as the evaluation map<br />

.Us<strong>in</strong>g a symmetric positive semidef<strong>in</strong>ite<br />

matrix , the semi-norm on can be written<br />

as<br />

. With such a norm, the regularization<br />

problem <strong>in</strong> (9) becomes<br />

(12)<br />

where <strong>in</strong>cludes both labeled and unlabeled data<br />

and the matrix encodes smoothness w.r.t. the graph or<br />

manifold.<br />

Let<br />

and substitute it <strong>in</strong>to (12), we have<br />

(13)<br />

where<br />

is a free parameter that controls<br />

the “deformation” of the orig<strong>in</strong>al kernel. Thus, Equation<br />

(13), <strong>in</strong> fact, is a graph-based semi-supervised learn<strong>in</strong>g<br />

problem based on the manifold assumption; it can be<br />

<strong>in</strong>directly set out us<strong>in</strong>g (12) and solved us<strong>in</strong>g (10).<br />

To utilize the geometry <strong>in</strong>formation of the data<br />

distribution, a graph can be constructed us<strong>in</strong>g labeled<br />

and unlabeled pixels. The graph Laplacian of is a<br />

matrix def<strong>in</strong>ed as , where is the<br />

adjacency matrix. The elements are measures of the<br />

similarity between pixels and , and the diagonal<br />

matrix D is given by<br />

. The graph<br />

Laplacian L measures the variation of the function<br />

along the graph built upon all labeled and unlabeled<br />

samples. By fix<strong>in</strong>g , the orig<strong>in</strong>al (undeformed)<br />

kernel is obta<strong>in</strong>ed.<br />

Next, we discuss the computation of the deformed<br />

kernel . In [27], the result<strong>in</strong>g new kernel was computed<br />

explicitly <strong>in</strong> terms of labeled and unlabeled data. It is<br />

proved that<br />

and<br />

(14)<br />

Thus, the two spans are same and we have<br />

where the coefficients depend on x, let<br />

.<br />

We can compute at x:<br />

(17)<br />

(15)<br />

(16)<br />

Where<br />

and g is the<br />

vector given by components<br />

. Therefore, it can be derived from (17)<br />

that<br />

(I+MK) (18)<br />

where K is the kernel matrix<br />

, = and is the<br />

identity matrix. F<strong>in</strong>ally, we obta<strong>in</strong> the follow<strong>in</strong>g explicit<br />

form for<br />

(19)<br />

where<br />

. It satisfies the Mercer’s<br />

conditions, be<strong>in</strong>g a valid kernel. If<br />

, the<br />

deformed kernel is degenerated <strong>in</strong>to the orig<strong>in</strong>al<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1605<br />

(undeformed) kernel. When is s<strong>in</strong>gular, one adds a<br />

small ridge term to and uses a cont<strong>in</strong>uity argument.<br />

IV. ELM BASED ON DEFORMED KERNEL<br />

In regularization problem (8), if yi is an m-dimensional<br />

label vector with the elements 0 or 1, where m is the<br />

number of classes, and xi belongs to the k-th class, then<br />

the k-th component of yi takes the value 1 and the rest<br />

components take the value 0. The correspond<strong>in</strong>g vector<br />

function is def<strong>in</strong>ed as<br />

. Then<br />

the extended regularization problem estimates an<br />

unknown vector function by m<strong>in</strong>imiz<strong>in</strong>g<br />

where.<br />

(20)<br />

Next, we discuss the computation of the deformed<br />

kernel , accord<strong>in</strong>g to<br />

,<br />

where<br />

is the kernel<br />

matrix over labeled and unlabeled samples, we have to<br />

compute a matrix <strong>in</strong>version of size .<br />

Note that this <strong>in</strong>version scales exponentially with the<br />

number of samples. If the number of labeled and<br />

unlabeled samples is huge, it is difficult to compute. So<br />

we further approximate the kernel matrix K, lett<strong>in</strong>g<br />

and<br />

, then ,<br />

and<br />

, so we achieve<br />

In (20), if we <strong>in</strong>troduce a deformed kernel<br />

problem to be solved becomes<br />

, the<br />

(21)<br />

where<br />

, .<br />

The solution of (21) is<br />

, where<br />

Based on what is <strong>in</strong>troduced above, the regularization<br />

problem for DKELM with multioutput nodes can be<br />

formulated as<br />

(22)<br />

The solution of the optimization problem (22) is given<br />

by<br />

,<br />

where is the identity matrix. .<br />

Let<br />

and<br />

and<br />

, so<br />

,where<br />

is the deformed kernel<br />

matrix over labeled po<strong>in</strong>ts.<br />

If the number of labeled samples is not huge, the<br />

output function is<br />

, (23)<br />

if the number of labeled samples is huge, accord<strong>in</strong>g to<br />

the Sherman-Morrison-Woodbury(SMW) formula for<br />

matrix <strong>in</strong>version, we have<br />

, (24)<br />

where<br />

is the label matrix<br />

with elements or , and ( ) is an m-<br />

dimensional label vector with the elements 0 or 1. In a<br />

semi-supervised case, the number of labeled samples is<br />

small, so (40) should be used to compute the output<br />

function.<br />

, (25)<br />

where , .<br />

Correspond<strong>in</strong>gly, <strong>in</strong> a semi-supervised case, the output<br />

function of DKELM with a s<strong>in</strong>gle output is<br />

(26)<br />

where is an l dimensional label vector given by:<br />

.<br />

The formula (25) and (26) all <strong>in</strong>volve the <strong>in</strong>version of<br />

a matrix of order , as long as L is large enough, the<br />

generalization performance of DKELM is not sensitive to<br />

the dimensionality of the feature space (L) and good<br />

performance can be reached, which will be verified later<br />

<strong>in</strong> Section 5. The DKELM algorithm is summarized <strong>in</strong><br />

the Table II.<br />

TABLE II.<br />

THE DESCRIPTION OF DKELM ALGORITHM BASED ON DEFORMED<br />

KERNEL<br />

DKELM Algorithm based on deformed kernel<br />

Input: l labeled examples , u unlabeled examples .<br />

Output: Estimated function .<br />

Step 1: Construct data adjacency graph with (l+u) nodes us<strong>in</strong>g k nearest<br />

neighbors or a graph kernel. Choose edge weights Wij, for<br />

example, for b<strong>in</strong>ary weights or heat kernel weights<br />

.<br />

Step 2: Compute graph Laplacian matrix: , where is a<br />

diagonal matrix given by<br />

.<br />

Step 3: Choose a kernel function . Choose , C and L (the<br />

number of sample po<strong>in</strong>ts), randomly generate .<br />

Step 4: if the number of the tra<strong>in</strong><strong>in</strong>g data sets is very large ,<br />

compute ,<br />

, select (25) for<br />

comput<strong>in</strong>g the deformed kernel; Otherwise, use (19) .<br />

Step 5: Select (23) for comput<strong>in</strong>g the output function of DKELM<br />

© 2013 ACADEMY PUBLISHER


1606 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

with multioutputs or select (26) for comput<strong>in</strong>g the output<br />

function of DKELM with s<strong>in</strong>gle output (m=1).<br />

Step 6: Output .<br />

Like ELM, DKELM has the unified solutions for<br />

regression, b<strong>in</strong>ary and multiclass classification. But we<br />

ma<strong>in</strong>ly discuss DKELM for the classification problems <strong>in</strong><br />

this paper.<br />

A DKELM classifier with a s<strong>in</strong>gle-output node (m = 1):<br />

For multiclass problems, among all the multiclass labels,<br />

the predicted class label of a given test<strong>in</strong>g sample is<br />

closest to the output of a DKELM classifier. The decision<br />

function of the DKELM classifier is<br />

. (27)<br />

For the b<strong>in</strong>ary classification, the decision function of<br />

DKELM classifier is<br />

. (28)<br />

A DKELM classifier with multioutput nodes (m > 1) is:<br />

For multiclass cases, the predicted class label of a given<br />

test<strong>in</strong>g sample is the <strong>in</strong>dex number of the output node,<br />

which has the highest output value for the given test<strong>in</strong>g<br />

sample. The decision function of the DKELM classifier is<br />

. (29)<br />

The predicted class label of sample x is<br />

*<br />

label( x) arg max fi<br />

( x)<br />

i{1,..., m}<br />

. (30)<br />

The deformed kernel <strong>in</strong> both cases is computed by<br />

,<br />

which is applied to moderate scale tra<strong>in</strong><strong>in</strong>g samples, or<br />

,<br />

(31)<br />

which is applied to large scale tra<strong>in</strong><strong>in</strong>g samples, where<br />

, .<br />

V. EXPERIMENTS<br />

In this section, we will validate the performance of the<br />

proposed DKELM algorithm on a number of real-world<br />

data sets. In particular, we studied the sensitivity of<br />

DKELM to the number of labeled samples. All the<br />

experiments are performed with MATLAB 7.0.1<br />

environment on a 3.10GHZ Intel CoreTM i5-2400 with<br />

3-GB RAM.<br />

A. Data Sets<br />

We used different scale data sets from the UCI<br />

mach<strong>in</strong>e learn<strong>in</strong>g repository (satellite, Ionosphere), and<br />

another benchmark repository (Extended Yale B, USPS).<br />

For the satellite data sets, there are multiple class labels;<br />

we used their first two classes only. For USPS, we<br />

randomly selected 250 data po<strong>in</strong>ts from each class for our<br />

experiments. The basic <strong>in</strong>formation about these data sets<br />

is summarized <strong>in</strong> Table III.<br />

TABLE III.<br />

DESCRIPTION OF THE DATA SETS<br />

Data Size (n) Feature (d) Class<br />

SatelliteC1-C2 2236 36 2<br />

Ionosphere 351 34 2<br />

Extended Yale B 2114 1024 38<br />

USPS 2500 256 10<br />

B. Parameter selection and experimental sett<strong>in</strong>gs<br />

Comparisons are made with four important<br />

classification methods: CutS 3 VM[25], L 2 -TSVM-<br />

MFN[26], DA L 2 -SVM-MFN[26] and S-RLSC<br />

algorithm[29]. In our experiments, b<strong>in</strong>ary edge weights<br />

are chosen and the neighborhood size k is set to be 12 for<br />

all the data sets. DKELM algorithm needs to choose the<br />

feature mapp<strong>in</strong>g, the cost parameter C and the number of<br />

hidden nodes L, s<strong>in</strong>ce ELM algorithm achieves good<br />

generalization performance as long as L and C are large<br />

enough[30]. Thus we let C =500. The regularization<br />

parameters and are split <strong>in</strong>to the ratio 1:9, and we<br />

let , , which is<br />

set <strong>in</strong> the same way as <strong>in</strong> [27]. We select Gaussian<br />

functions as the hidden-node output functions.<br />

We test L 2 -TSVM-MFN with multiple switch<strong>in</strong>gs and<br />

DA L 2 -SVM-MFN with parameter and<br />

on all datasets. We also test CutS3VM with parameters<br />

, and set <strong>in</strong> the balanc<strong>in</strong>g constra<strong>in</strong>t to the<br />

true ratio of the positive po<strong>in</strong>ts <strong>in</strong> the unlabeled set. The<br />

S-RLSC methods also have regularization parameters<br />

and . Let , , and also use the<br />

Gaussian kernel function. In our experiments, we also set<br />

CA=0.005, CI=0.01 and for all data sets, which<br />

is set <strong>in</strong> the same way as <strong>in</strong> [29].<br />

For each data set , 15% of the data po<strong>in</strong>ts are left for<br />

out-of-sample extension experiment. We denote by the<br />

rest data po<strong>in</strong>ts of the data set . In each class of , we<br />

randomly label l data po<strong>in</strong>ts to tra<strong>in</strong> every algorithm. For<br />

DKELM, S-RLSC, L 2 -TSVM-MFN, DA L 2 -SVM-MFN<br />

and CutS 3 VM, the tra<strong>in</strong><strong>in</strong>g set consists of the whole ,<br />

<strong>in</strong>clud<strong>in</strong>g the labeled and the unlabeled data po<strong>in</strong>ts. For<br />

L 2 -TSVM-MFN, DA L 2 -SVM-MFN and CutS 3 VM,<br />

multiclass datasets are learned us<strong>in</strong>g a one-versus-rest<br />

approach.<br />

C. Experimental results<br />

For simplicity, we used DKELM with a s<strong>in</strong>gle output<br />

and 800 hidden nodes; the recognition result of all the<br />

algorithms is shown <strong>in</strong> Table 4–6, respectively. For each<br />

dataset, classification accuracy and tra<strong>in</strong><strong>in</strong>g time<br />

averaged over 20 <strong>in</strong>dependent trials. The number of l (<strong>in</strong><br />

each class) of the labeled data po<strong>in</strong>ts varies from 5 to 250<br />

for the Satellite data set, from 5 to 150 for the Ionosphere<br />

and from 5 to 40 for the Extended Yale B data set.<br />

In Tables 4–6, for several values of m, the best<br />

classification results are <strong>in</strong> boldface for each fixed value<br />

of m. As can be seen from the tables, the classification<br />

accuracy is lower for all algorithms when l is small. With<br />

the <strong>in</strong>crease of labeled data, the discrim<strong>in</strong>ative ability of<br />

the DKELM algorithm is much better than the other<br />

algorithms, s<strong>in</strong>ce it utilizes the manifold structure of<br />

labeled and unlabeled samples. The recognition result of<br />

the S-RLSC algorithm is very close to that of the<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1607<br />

DKELM algorithm, but it runs much slower than our<br />

algorithm. For the Satellite and Ionosphere data sets, the<br />

performance of the DKELM algorithm is worse than that<br />

of Extended Yale B data set, s<strong>in</strong>ce the manifold structure<br />

is less salient than that of face images. As can be seen<br />

from Table 6, the recognition accuracy of the L2-TSVM-<br />

MFN, DA L 2 -SVM-MFN and CutS3VM classifiers<br />

decreases with the <strong>in</strong>crease of the number of classes,<br />

s<strong>in</strong>ce these classifiers are constructed with a one-versusrest<br />

approach, which has a great <strong>in</strong>fluence on the<br />

accuracy. Moreover, this k<strong>in</strong>d of multiclass classification<br />

approach also <strong>in</strong>creases the runn<strong>in</strong>g time of these<br />

algorithms. With the <strong>in</strong>crease of the number of the feature<br />

dimensions of data sets, the runn<strong>in</strong>g time of the<br />

CutS3VM <strong>in</strong>creases dramatically, s<strong>in</strong>ce its time<br />

complexity depends on the average number of non-zero<br />

features. In contrast, as can be seen from Table IVandVI,<br />

the speed of the DKELM algorithm is not sensitive to the<br />

number of classes and the feature dimensions of data sets.<br />

It can perform well by means of the <strong>in</strong>tr<strong>in</strong>sic geometry of<br />

data distribution.<br />

TABLE IV.<br />

PERFORMANCE COMPARISON OF ALL T<br />

Numb<br />

er of<br />

labele<br />

d<br />

data<br />

po<strong>in</strong>ts<br />

l<br />

DKELM<br />

Accuracy<br />

(%)<br />

SATELLITE DATA SET<br />

S-RLSC<br />

Accurac<br />

y(%)<br />

L 2-TSVM-<br />

MFN<br />

Accuracy<br />

(%)<br />

HE ALGORITHMS FOR THE<br />

DA L 2-<br />

SVM-<br />

MFN<br />

Accuracy<br />

(%)<br />

CutS 3 VM<br />

Accuracy<br />

(%)<br />

l =5 57.62 62.78 56.48 61.02 73.59<br />

l =10 78.45 79.79 69.83 70.73 74.46<br />

l =50 85.68 83.47 71.95 75.28 82.85<br />

l =250 89.21 87.86 75.82 76.29 84.46<br />

Numb<br />

er of<br />

labele<br />

d<br />

data<br />

po<strong>in</strong>ts<br />

l<br />

DKELM<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

S-RLSC<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

L 2-TSVM-<br />

MFN<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

DA L 2-<br />

SVM-<br />

MFN<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

CutS 3 VM<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

l =5 52.782 328.579 3.782 12.652 1.190<br />

l =10 55.273 328.647 3.894 11.676 0.976<br />

l =50 54.374 330.152 2.957 10.016 0.620<br />

l =250 52.962 322.674 2.365 5.625 0.569<br />

Numb<br />

er of<br />

labele<br />

d<br />

data<br />

po<strong>in</strong>ts<br />

l<br />

DKELM<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

S-RLSC<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

L 2-TSVM-<br />

MFN<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

DA L 2-<br />

SVM-<br />

MFN<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

CutS 3 VM<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

l =5 21.704 168.579 0.618 5.724 0.554<br />

l =10 25.753 168.647 0.772 5.676 0.377<br />

l =50 23.176 170.152 0.252 4.534 0.324<br />

l =250 22.802 162.674 0.246 3.165 0.232<br />

Number<br />

of<br />

labeled<br />

data<br />

po<strong>in</strong>ts l<br />

TABLEVI<br />

PERFORMANCE COMPARISON OF ALL THE ALGORITHMS FOR THE<br />

EXTENDED YALE B DATA SET<br />

DKELM<br />

Accura<br />

cy(%)<br />

S-RLSC<br />

Accurac<br />

y(%)<br />

L 2-TSVM-<br />

MFN<br />

Accuracy<br />

(%)<br />

DA L 2-<br />

SVM-<br />

MFN<br />

Accuracy<br />

(%)<br />

CutS 3 VM<br />

Accuracy<br />

(%)<br />

l =5 61.25 64.41 55.17 38.47 63.93<br />

l =10 82.05 83.18 62.76 58.71 69.82<br />

l =20 94.52 93.10 67.72 68.49 75.91<br />

l =30 95.42 95.24 71.35 73.59 79.56<br />

l =40 97.44 97.12 75.25 76.84 80.13<br />

Number<br />

of<br />

labeled<br />

data<br />

po<strong>in</strong>ts l<br />

DKELM<br />

Tra<strong>in</strong><strong>in</strong><br />

g<br />

Time(s)<br />

S-RLSC<br />

Tra<strong>in</strong><strong>in</strong>gTi<br />

me(s)<br />

L 2-TSVM-<br />

MFN<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

DA L 2-<br />

SVM-<br />

MFN<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

CutS 3 VM<br />

Tra<strong>in</strong><strong>in</strong>g<br />

Time(s)<br />

l =5 87.589 452.644 60.427 361.928 75.249<br />

l =10 88.670 455.972 58.958 273.536 69.162<br />

l =20 86.465 452.177 49.514 247.923 65.368<br />

l =30 87.259 454.921 42.943 190.380 58.532<br />

l =40 89.694 452.228 35.519 163.476 54.348<br />

The out-of-sample extension result of the algorithms<br />

on larger USPS data sets is shown <strong>in</strong> Fig. 1. We perform<br />

the DKELM algorithm us<strong>in</strong>g 500 hidden nodes. As can<br />

be seen from Fig.1, the DKELM algorithm has best<br />

recognition results over any other algorithm. So our<br />

proposed DKELM algorithm tends to have better<br />

scalability and achieve best generalization performance at<br />

a relatively faster learn<strong>in</strong>g speed.<br />

TABLEV.<br />

PERFORMANCE COMPARISON OF ALL THE ALGORITHMS FOR THE<br />

IONOSPHERE DATA SET<br />

Numb<br />

er of<br />

labele<br />

d<br />

data<br />

po<strong>in</strong>ts<br />

l<br />

DKELM<br />

Accuracy<br />

(%)<br />

S-RLSC<br />

Accurac<br />

y(%)<br />

L 2-TSVM-<br />

MFN<br />

Accuracy<br />

(%)<br />

DA L 2-<br />

SVM-<br />

MFN<br />

Accuracy<br />

(%)<br />

CutS 3 VM<br />

Accuracy<br />

(%)<br />

l =5 57.62 72.78 66.52 60.81 73.89<br />

l =10 74.79 73.45 69.42 71.67 74.56<br />

l =50 87.68 83.47 81.14 77.21 85.25<br />

l =250 90.21 87.86 85.73 86.39 86.43<br />

Figure 1. Out-of-sample extension classification results on the USPS<br />

data set<br />

VI CONCLUSIONS<br />

© 2013 ACADEMY PUBLISHER


1608 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

In this paper, we first extended the traditional kernelbased<br />

learn<strong>in</strong>g problem to multiclass cases <strong>in</strong> an Extreme<br />

Learn<strong>in</strong>g Mach<strong>in</strong>e context. To enhance the performance<br />

of ELM, a deformed kernel was proposed, which can<br />

make use of underly<strong>in</strong>g <strong>in</strong>formation from both labeled<br />

and unlabeled samples. To speed up our algorithm, we<br />

further approximated the deformed kernel by means of<br />

random feature mapp<strong>in</strong>g. Our algorithm does not need<br />

kernel parameter tun<strong>in</strong>g. The experimental results have<br />

shown that the DKELM algorithm achieves better<br />

generalization performance at a relatively faster learn<strong>in</strong>g<br />

speed than traditional semi-supervised classification<br />

algorithms. In the future, we will further optimize our<br />

proposed framework and study the sparse regularization<br />

problems <strong>in</strong> our framework.<br />

ACKNOWLEDGMENTS<br />

This work was supported by the National Natural<br />

Science Foundation of Ch<strong>in</strong>a under Grant Nos. 50674086.<br />

REFERENCES<br />

[1] X. Tang and M. Han, “Partial Lanczos extreme learn<strong>in</strong>g<br />

mach<strong>in</strong>e for s<strong>in</strong>gle-output regression problems,”<br />

Neurocomput<strong>in</strong>g, vol. 72, no. 13–15, pp. 3066–3076, Aug.<br />

2009.<br />

[2] Q. Liu, Q. He, and Z.-Z. Shi, “Extreme support vector<br />

mach<strong>in</strong>e classifier,” Lecture Notes <strong>in</strong> Computer Science,<br />

vol. 5012, pp. 222–233, 2008.<br />

[3] B. Frénay and M. Verleysen, “Us<strong>in</strong>g SVMs with<br />

randomised feature spaces: An extreme learn<strong>in</strong>g approach,”<br />

<strong>in</strong> Proc. 18th ESANN, Bruges, Belgium, Apr. 28–30, pp.<br />

315–320,2010.<br />

[4] Y. Miche, A. Sorjamaa, P. Bas, O. Simula, C. Jutten, and<br />

A. Lendasse, “OP-ELM: Optimally pruned extreme<br />

learn<strong>in</strong>g mach<strong>in</strong>e,” IEEE Trans. Neural Netw., vol. 21, no.<br />

1, pp. 158–162, Jan. 2010.<br />

[5] W. Deng, Q. Zheng, and L. Chen, “Regularized extreme<br />

learn<strong>in</strong>g mach<strong>in</strong>e,” <strong>in</strong> Proc. IEEE Symp. CIDM, Mar. 30–<br />

Apr. 2, pp. 389–395,2009.<br />

[6] G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, “Extreme<br />

learn<strong>in</strong>g mach<strong>in</strong>e: A new learn<strong>in</strong>g scheme of feedforward<br />

neural networks,” <strong>in</strong> Proc. IJCNN, Budapest, Hungary, Jul.<br />

25–29, vol. 2, pp. 985–990.,2004.<br />

[7] G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, “Extreme<br />

learn<strong>in</strong>g mach<strong>in</strong>e: Theory and applications,”<br />

Neurocomput<strong>in</strong>g, vol. 70, no. 1–3, pp. 489–501, Dec. 2006.<br />

[8] G.-B. Huang, L. Chen, and C.-K. Siew, “Universal<br />

approximation us<strong>in</strong>g <strong>in</strong>cremental constructive feedforward<br />

networks with random hidden nodes,” IEEE Trans. Neural<br />

Netw., vol. 17, no. 4, pp. 879–892, Jul. 2006.<br />

[9] G.-B. Huang and L. Chen, “Convex <strong>in</strong>cremental extreme<br />

learn<strong>in</strong>g ma-ch<strong>in</strong>e,” Neurocomput<strong>in</strong>g, vol. 70, no. 16–18,<br />

pp. 3056–3062, Oct. 2007.<br />

[10] G.-B. Huang and L. Chen, “Enhanced random search based<br />

<strong>in</strong>cremental extreme learn<strong>in</strong>g mach<strong>in</strong>e,” Neurocomput<strong>in</strong>g,<br />

vol. 71, no. 16–18, pp. 3460–3468, Oct. 2008.<br />

[11] D. E. Rumelhart, G. E. H<strong>in</strong>ton, and R. J. Williams,<br />

“Learn<strong>in</strong>g representations by back-propagation errors,”<br />

Nature, vol. 323, pp. 533–536, 1986.<br />

[12] T. Joachims. Transductive <strong>in</strong>ference for text classification<br />

us<strong>in</strong>g support vector mach<strong>in</strong>es. In ICML 16, pp:200-209,<br />

1999.<br />

[13] K. P. Bennett and A. Demiriz. Semi-supervised support<br />

vector mach<strong>in</strong>es. In NIPS, pages 368-374, 1999.<br />

[14] O. Chapelle, V. S<strong>in</strong>dhwani, and S. S. Keerthi. Branch and<br />

bound for semi-supervised support vector mach<strong>in</strong>es.<br />

InNIPS, pages 217-224, 2006.<br />

[15] O. Chapelle and A. Zien. Semi-supervised classification<br />

by low density separation. In AISTATS 10, 2005.<br />

[16] O. Chapelle, B. Scholkopf, and A. Zien. Semi-Supervised<br />

Learn<strong>in</strong>g. MIT Press: Cambridge, MA, 2006.<br />

[17] L. Xu, J. Neufeld, B. Larson, and D. Schuurmans.<br />

Maximum marg<strong>in</strong> cluster<strong>in</strong>g. In NIPS, 2004.<br />

[18] L. Xu and D. Schuurmans. Unsupervised and semisupervised<br />

multi-class support vector mach<strong>in</strong>es. In AAAI,<br />

2005.<br />

[19] Z. Xu, R. J<strong>in</strong>, J. Zhu, I. K<strong>in</strong>g, and M. Lyu. Efficient convex<br />

relaxation for transductive support vector mach<strong>in</strong>e. In<br />

NIPS, 2007.<br />

[20] O. Chapelle, M. Chi, and A. Zien. A cont<strong>in</strong>uation method<br />

for semi-supervised svms. In ICML 23, pages 185-<br />

192,2006.<br />

[21] A. Astor<strong>in</strong>o and A. Fuduli. Nonsmooth optimization<br />

techniques for semi-supervised classification. IEEE<br />

Trans.Pattern Anal. Mach. Intell., 29(12):2135-2142, 2007.<br />

[22] R. Collobert, F. S<strong>in</strong>z, J. Weston, and L. Bottou. Large scale<br />

transductive svms. Journal of Mach<strong>in</strong>e Learn<strong>in</strong>g Research,<br />

7:1687-1712, 2006.<br />

[23] G. Fung and O. Mangasarian. Semi-supervised support<br />

vector mach<strong>in</strong>es for unlabeled data classification.<br />

Optimization Methods and Software, 15:29-44, 2001.<br />

[24] V. S<strong>in</strong>dhwani, S. S. Keerthi, and O. Chapelle.Determ<strong>in</strong>istic<br />

anneal<strong>in</strong>g for semi-supervised kernel mach<strong>in</strong>es. In ICML<br />

23, pp: 841-848, 2006.<br />

[25] B<strong>in</strong> Zhao, Fei Wang, Changshui Zhang.CutS3VM: A Fast<br />

Semi-Supervised SVM Algorithm.The 14th ACM<br />

SIGKDD International Conference on Knowledge<br />

Discovery & Data M<strong>in</strong><strong>in</strong>g(KDD).pp:830-838,August 24-<br />

27,2008.<br />

[26] V. S<strong>in</strong>dhwani, S.S. Keerthi. Large Scale Semi-supervised<br />

L<strong>in</strong>ear SVMs. 29th Annual International ACM SIGIR,<br />

Technical report, 2006.<br />

[27] M. Belk<strong>in</strong>, V. S<strong>in</strong>dhwani, P.Niyogi, Manifold<br />

regularization: a geometric framework for learn<strong>in</strong>g from<br />

labeled and unlabeled examples, J. Mach. Learn. Res.<br />

7:2399–2434,2006.<br />

[28] H. Xue, S. Chen, Q. Yang, Discrim<strong>in</strong>atively regularized<br />

least-squares classification, Pattern Recognition 42(1)<br />

pp:93–104,2009.<br />

[29] M<strong>in</strong>gyu Fan, Nannan Gu, Hong Qiao, etc. Sparse<br />

regularization for semi-supervised classification .Pattern<br />

Recognition, 44(8,), pp: 1777-1784,2011<br />

[30] G.-B. Huang, H.-M Zhou, X.-J. D<strong>in</strong>g. Extreme Learn<strong>in</strong>g<br />

Mach<strong>in</strong>e for Regression and Multiclass Classification<br />

IEEE Transactions on Systems, Man, and Cybernetics-<br />

PART B: Cybernetics, Vol. 42, no. 2, 513 – 529,2012.<br />

[31] Huang et al. Extreme learn<strong>in</strong>g mach<strong>in</strong>es: a<br />

survey .International Journal of Mach<strong>in</strong>e Learn<strong>in</strong>g and<br />

Cybernetics. pp:107–122,2011.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1609<br />

Zhang Chen is current a Ph.D<br />

candidate at Ch<strong>in</strong>a University of<br />

M<strong>in</strong><strong>in</strong>g and Technology(CUMT),<br />

Ch<strong>in</strong>a. She received her MS degree<br />

<strong>in</strong> Computer Application<br />

Technology from CUMT <strong>in</strong> 2004,<br />

and her BS degree <strong>in</strong> Computer<br />

Science from CUMT <strong>in</strong> 2001. She<br />

is currently a lecture at school of Computer Science and<br />

Technology, CUMT. Her research <strong>in</strong>terest is computation<br />

<strong>in</strong>telligence and mach<strong>in</strong>e learn<strong>in</strong>g et al.<br />

Xia Shi Xiong is born <strong>in</strong> 1962,<br />

Ph.D. He is a professor at school<br />

of Computer Science and<br />

Technology <strong>in</strong> CUMT. He has<br />

published more than 60 research<br />

papers <strong>in</strong> journals and<br />

<strong>in</strong>ternational conferences. His<br />

research <strong>in</strong>terest is Wireless sensor<br />

networks and <strong>in</strong>telligent<br />

<strong>in</strong>formation process<strong>in</strong>g et al.<br />

Liu B<strong>in</strong>g is current a Ph.D<br />

candidate at Ch<strong>in</strong>a University of<br />

M<strong>in</strong><strong>in</strong>g and Technology(CUMT),<br />

Ch<strong>in</strong>a. She received her MS degree<br />

<strong>in</strong> Computer Application<br />

Technology from CUMT <strong>in</strong> 2005,<br />

and her BS degree <strong>in</strong> Computer<br />

Science from CUMT <strong>in</strong> 2002. She is<br />

currently a lecture at school of Computer Science and<br />

Technology, CUMT. His research <strong>in</strong>terest is computation<br />

<strong>in</strong>telligence and mach<strong>in</strong>e learn<strong>in</strong>g et al.<br />

© 2013 ACADEMY PUBLISHER


1610 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Optimal Sleep Schedul<strong>in</strong>g Scheme for Wireless<br />

Sensor Networks Based on Balanced Energy<br />

Consumption<br />

Shan-shan Ma<br />

College of Computer Science and Technology, Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology, Xuzhou, 221116, Ch<strong>in</strong>a<br />

Email: ssma@cumt.edu.cn<br />

Jian-sheng Qian, Yan-j<strong>in</strong>g Sun<br />

College of Information and Electrical Eng<strong>in</strong>eer, Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and Technology, Xuzhou, 221116, Ch<strong>in</strong>a<br />

Abstract—Node schedul<strong>in</strong>g scheme of sensor nodes is one of<br />

the most important method to solve the energy-constra<strong>in</strong>ed<br />

wireless sensor networks. Because there are the defects that<br />

high computational complexity of exact location <strong>in</strong>formation<br />

and the energy consumption unbalance of location-unaware<br />

<strong>in</strong> traditional schemes. Aim<strong>in</strong>g at these problems, an optimal<br />

sleep schedul<strong>in</strong>g scheme based on balanced energy<br />

consumption (ECBS) was proposed <strong>in</strong> this paper.<br />

Account<strong>in</strong>g the residual energy, the precision for node<br />

redundancy evaluat<strong>in</strong>g was improved by us<strong>in</strong>g the distance<br />

<strong>in</strong>formation between the sensor and its neighbors. The<br />

numerical experiments results illustrate that our schedul<strong>in</strong>g<br />

scheme may improve the energy efficiency and extends the<br />

network lifetime while ensure the coverage requirement.<br />

Index Terms—wireless sensor networks; node schedul<strong>in</strong>g<br />

algorithm; energy balance; Location-Unaware<br />

I. INTRODUCTION<br />

Rapid advances <strong>in</strong> micro-electro-mechanical systems<br />

and wireless communication have led to the deployment<br />

of large scale wireless sensor networks (WSNs). The<br />

potential applications of sensor networks are highly<br />

varied, such as environmental monitor<strong>in</strong>g like<br />

temperature, humidity, seismic events, vibrations, and so<br />

on. But the energy source of WSNs often consists of a<br />

battery with a limited energy budget; and it is difficult or<br />

impossible to replace the power supplies for sensor nodes<br />

after deployed .So lifetime is the key performance<br />

measure for WSNs [1]. Sensors are usually deployed<br />

densely to prolong the network lifetime. But a<br />

high-density network will waste a lot of energy and<br />

cause severe problems such as redundancy, radio<br />

channel contention. A broadly-used method is to<br />

place nodes <strong>in</strong> sleep mode by schedul<strong>in</strong>g sensor nodes to<br />

work alternatively. But select<strong>in</strong>g the optimal sens<strong>in</strong>g<br />

ranges for all the sensors is a well-known NP-hard<br />

problem [2]. Random putt<strong>in</strong>g nodes to sleep mode for<br />

fixed time <strong>in</strong>terval [3 and 4] would cause the network to<br />

synchronize and may generate some bl<strong>in</strong>d po<strong>in</strong>ts that<br />

cannot be monitored by any sensors [5,6] . Based on the<br />

location of sensor nodes, some schedule schemes are<br />

known as GAF [7], PEAS [8], SSC [9], etc. Us<strong>in</strong>g the<br />

geography (location, direction, or distance) with global<br />

position system (GPS) or the directional antenna<br />

technology may ensure the coverage and connectivity<br />

effectively. But the costs of GPS or other complicated<br />

hardware devices are too high for t<strong>in</strong>y sensors. Due to<br />

the limited process<strong>in</strong>g and memory capabilities, it is not<br />

realistic to take the sensor nodes equipped with<br />

specialized hardware components such as GPS <strong>in</strong>to mass<br />

production [10]. Furthermore, most applications may not<br />

suit equip with GPS, such as underground, etc. Nodes<br />

schedul<strong>in</strong>g schemes without location <strong>in</strong>formation are<br />

more valuable <strong>in</strong> practical.<br />

Without accurate geography <strong>in</strong>formation, however, it is<br />

very hard to check whether a sensor’s sens<strong>in</strong>g area can be<br />

completely covered by other sensors. Fortunately, most<br />

applications may not require complete coverage of the<br />

monitored area. Fewer researchers have proposed the<br />

node schedul<strong>in</strong>g schemes without the accurate location<br />

<strong>in</strong>formation. Gao et al [11] propose a mathematical model<br />

to describe the redundancy <strong>in</strong> randomly deployed sensor<br />

networks. The results <strong>in</strong>dicate that: a sensor requires<br />

about 11 neighbors to get a 90% probability of be<strong>in</strong>g a<br />

complete redundant sensor. If we only require a sensor’s<br />

90% sens<strong>in</strong>g area to be covered by its neighbors, 5<br />

neighbors are necessary. Based on this theoretical<br />

analysis, a Lightweight Deployment-Aware Schedul<strong>in</strong>g<br />

(LDAS) scheme to turn off redundant sensors has been<br />

proposed [12]. LDAS uses a weighted random vot<strong>in</strong>g<br />

method to decide who will be eligible to fall asleep. But<br />

LDAS only consider a sensor’s 1-hop neighbors which<br />

can cause larger redundancy coverage. Younis proposed<br />

two distributed protocols (LUC-I and LUC-P) rely on<br />

distance between one-hop neighbors along with<br />

advertised tow-hop neighborhood <strong>in</strong>formation [13]. In<br />

[14], Li-Hs<strong>in</strong>g et al presented range-based sleep<br />

schedul<strong>in</strong>g (RBSS) protocol, an optimal sensor selection<br />

patter to ensure the coverage quality. These methods can<br />

effectively reduce network energy consumption without<br />

any location or directional <strong>in</strong>formation. But none of them<br />

take the balance of energy consumption <strong>in</strong>to account. The<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1610-1617


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1611<br />

unbalanced energy consumption means that the nodes<br />

<strong>in</strong>equality sleeps. It leads to the number of nodes<br />

premature death, and then speed up those nodes died <strong>in</strong><br />

this region, called as “funnel<strong>in</strong>g effect”. Thus the “energy<br />

hole” are formed and the network lifetime is reduced<br />

[15~18] . Ideally, all of the nodes deployed <strong>in</strong> the region<br />

should be consumed their energy at the same time as<br />

possible. The residual energy of the entire network is<br />

almost zero when the network is death.<br />

In this paper, we propose an optimal sleep schedul<strong>in</strong>g<br />

scheme (ECBS) which relies on approximate neighbor<br />

distances and two-hop neighbors’ <strong>in</strong>formation but no<br />

location <strong>in</strong>formation. Simulation results <strong>in</strong>dicate that our<br />

scheme not only prolongs the network lifetime, but also<br />

improves energy efficiency. The reset of the paper is<br />

organized as follows. Section II <strong>in</strong>troduces the system<br />

model and problem statement. Section III presents and<br />

analyzes the algorithm. In section IV, we present our<br />

experimental results for performance evaluation. F<strong>in</strong>ally,<br />

section V gives a summary and conclusion.<br />

the wireless communication module to send the data is on<br />

the transmitt<strong>in</strong>g circuit and the power amplify<strong>in</strong>g circuit.<br />

And the ma<strong>in</strong>ly energy consumption to receive the data<br />

focus on the receiv<strong>in</strong>g circuit. Under the reasonable SNR<br />

condition, the transmission energy consumption to send k<br />

bit data is:<br />

ET<br />

( k, d)<br />

= ⎨<br />

⎪⎩<br />

2<br />

⎧ ⎪ Eelec × k+ ε<br />

fs<br />

× k× d d < dcross over<br />

4<br />

Eelec × k+ ε<br />

mp<br />

× k× d d ≥dcross over<br />

and the reception energy consumption is<br />

E = E × k .<br />

R<br />

elec<br />

Among the formulas, E elec is the energy consumption<br />

coefficient for the radio electronics, ε fs and ε mp are the<br />

energy consumption coefficients for a power amplifier<br />

under different condition. Radio parameters are set as<br />

tableⅠ. We only consider the data aggregation, while<br />

ignore other process<strong>in</strong>g energy consumption. The energy<br />

for perform<strong>in</strong>g data aggregation is 5nJ/bit/signal.<br />

II. SYSTEM MODEL AND PROBLEM STATEMENT<br />

A. System Model<br />

We consider sensor nodes for which r t is the<br />

transmission range and r s is the sens<strong>in</strong>g range. And our<br />

analysis is based on the follow<strong>in</strong>g assumes: (1) sensors<br />

are stationary and are deployed randomly with<strong>in</strong> an area;<br />

(2) A sensor’s sens<strong>in</strong>g range is a circle area; (3) all<br />

sensors are supposed to have the same sens<strong>in</strong>g range and<br />

no two sensors can be deployed exactly at a same<br />

location; (4) no geography <strong>in</strong>formation is available; (5) a<br />

node can estimate the approximately distance between<br />

itself and a neighbor based on the received signal<br />

strength[19],and fusion, conflict and retransmission are<br />

not taken <strong>in</strong>to account when data transmitt<strong>in</strong>g; (6)<br />

r t ≥2r s , under this condition, coverage implies<br />

connectivity[20].<br />

Def<strong>in</strong>ition 1 (Neighbor nodes): the neighbor set of sensor<br />

i is def<strong>in</strong>ed as<br />

Ni () = { j∈ℵ| di (, j) ≤2 rs<br />

, i∈ℵ, j≠i } . Where<br />

ℵ represents the sensor set <strong>in</strong> the deployment region.<br />

d(i,j) denotes the distance between sensor i and j.<br />

Def<strong>in</strong>ition 2 1-hop neighbor of sensor i:<br />

N1 () i = { j∈N()| i d(, i j) ≤rs<br />

, i∈ℵ }.<br />

Def<strong>in</strong>ition 3 Half-hop neighbor of sensor i:<br />

ND( i) = { j ∈N( i) | d( i, j) ≤0.5 rs<br />

, i ∈ℵ}<br />

.<br />

Def<strong>in</strong>ition 4 Network lifetime: the runn<strong>in</strong>g time of the<br />

network meet<strong>in</strong>g the required coverage.<br />

B. Energy Dissipation<br />

In our simulations, we use the same energy parameters<br />

and radio model as discussed <strong>in</strong> [21] which are used<br />

widely. In the model, the ma<strong>in</strong>ly energy consumption of<br />

TABLE I.<br />

RADIO PARAMETERS<br />

Parameter<br />

Value<br />

Threshold distance(dcrossover)(m) 87<br />

E elec (nJ/bit) 50<br />

ε fs (pJ/bit/m 2 ) 10<br />

ε mp (pJ/bit/m 4 ) 0.0013<br />

Initial energy(J) 0.05<br />

Data packet size(bits) 4000<br />

C. Problem Statement<br />

Assume that N nodes are distributed <strong>in</strong> a field, and<br />

the number of the active nodes is N A . Then the sleep ratio<br />

of the network is def<strong>in</strong>ed as:<br />

N − N<br />

A<br />

Q = (1)<br />

N<br />

The sleep ratio is one of the standards for measur<strong>in</strong>g<br />

the efficiency of energy consumption. When the total<br />

number of nodes <strong>in</strong> the network is fixed, the higher the<br />

sleep ratio, the better the energy can be saved. If θ is the<br />

desired coverage rate of the network, the objective of<br />

sleep schedul<strong>in</strong>g scheme is to maximize the lifetime and<br />

the sleep ratio of the network while ensue the coverage<br />

rate of active nodes meet the θ requirement.<br />

III. OPTIMAL SLEEP SCHEDULING SCHEME<br />

A. Coverage Redundancy Determ<strong>in</strong>es<br />

© 2013 ACADEMY PUBLISHER


1612 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Figure 1.<br />

Supposed that sensor i has a neighbor sensor j. S i and<br />

S j denote the circle sens<strong>in</strong>g area covered by node i and j<br />

respectively. d ij is the distance between node i and j. And<br />

S denotes the sens<strong>in</strong>g area that is covered by node i<br />

i∩ j<br />

and j, as shown <strong>in</strong> Figure 1. Refer to [22], we can get<br />

that:<br />

⎧<br />

2<br />

d<br />

2<br />

ij<br />

dij<br />

⎪2rs arccos −dijrs 1− d ≤2<br />

2 ij<br />

rs<br />

Si∩<br />

j<br />

=<br />

(2)<br />

⎨ 2rs 4rs<br />

⎪⎩<br />

0<br />

otherwise<br />

So from formula (2), we can get that when the distance<br />

between node i and j is less than or equal to 0.5r, the<br />

redundant coverage area S<br />

i∩<br />

j<br />

is more than about 68.5%<br />

of S i . When the distance of node i and node j is more than<br />

1.75r, the area S i∩<br />

j<br />

is very small, about 0.052 S i.<br />

These results can be used <strong>in</strong> our nodes schedul<strong>in</strong>g. If<br />

d ij ≥1.75r, the effects that node i to node j will be ignored<br />

<strong>in</strong> this paper.<br />

If θ is the percentage of the redundant area covered by<br />

all the neighbors of node i. Refer to paper [22, 23], θ can<br />

be expressed as<br />

∪<br />

θ =<br />

S ∩ S<br />

S<br />

=<br />

Si<br />

= 1 −<br />

m<br />

Si<br />

j<br />

(1 − )<br />

S<br />

− S<br />

S<br />

S i∩j<br />

j i<br />

j∈N() i i N()<br />

i<br />

j=<br />

1<br />

i<br />

i<br />

∏ ∩ (3)<br />

S<br />

N()<br />

i<br />

is the area that covered by sensor i but not<br />

covered by its neighbors. Then, if node i has a neighbor<br />

node k and d ik ≤0.5r. Based on formula (2) and (3), the θ<br />

of node i can be expressed as<br />

m<br />

Si<br />

j<br />

θ ≥1− 0.32 • ∏(1 −<br />

∩ )<br />

(4)<br />

S<br />

j=<br />

1<br />

j≠k<br />

Suppose node j is a neighbor node of node i. Based<br />

on the above def<strong>in</strong>ition, the distance between node i and j<br />

satisfy the condition: 0


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1613<br />

the condition to sleep, it enters the pre-sleep state with a<br />

random short time T w. If the node received other<br />

sensor’s sleep-message at the pre-sleep state, it will<br />

return the active state. Otherwise, it broadcasts itself<br />

sleep-message after wait<strong>in</strong>g T w time and then goes to<br />

sleep state; fall asleep for a period of time Ts.<br />

Based on the classic LEACH cluster protocol, time is<br />

divided <strong>in</strong>to fixed-length time periods called rounds.<br />

Each round beg<strong>in</strong>s with a competition phase, <strong>in</strong> which<br />

every node determ<strong>in</strong>es whether it can be active or sleep.<br />

Then those active sensors enter <strong>in</strong>to cluster<strong>in</strong>g and<br />

sens<strong>in</strong>g. We detail the steps as follows.<br />

Step1: Networks <strong>in</strong>itialization. We assumed that all<br />

sensors are active <strong>in</strong>itially. Each sensor broadcasts<br />

messages to estimate the distance between itself and its<br />

every neighbor and then record these <strong>in</strong>formation.<br />

Accord<strong>in</strong>g to the QoS demand (the coverage rate θ) of<br />

network, s<strong>in</strong>k broadcasts the system message <strong>in</strong>clud<strong>in</strong>g<br />

the two parameters HT and AT. Where HT is the<br />

m<strong>in</strong>imum number of active neighbors with one half-hop<br />

neighbor and AT is the m<strong>in</strong>imum number of neighbor<br />

nodes that have no half-hop neighbor. For example, the<br />

network coverage (θ) is required to 85%. Accord<strong>in</strong>g to<br />

tableⅡ, we can set HT = 5 and AT = 8. While the<br />

coverage rateθis more than 90%, we can set HT = 6<br />

and AT = 9.<br />

Start<br />

cluster heads broadcast hello messages and other active<br />

nodes select the closest head to jo<strong>in</strong>.<br />

Step 4: Sens<strong>in</strong>g.<br />

Step 5: The current round end and return step 2.<br />

IV. SIMULATION RESULTS<br />

We focus on the construction of one cover and assume<br />

that 1000 nodes are deployed randomly <strong>in</strong> a 100<br />

meter×100 meter square. Each sensor has a sens<strong>in</strong>g range<br />

of 15 meters. The transmitt<strong>in</strong>g, receiv<strong>in</strong>g (idl<strong>in</strong>g), and<br />

sleep<strong>in</strong>g power consumption ratio is 20:4:0.01[21]. We<br />

conducted simulations with matlab simulator for<br />

compar<strong>in</strong>g among two sleep schedul<strong>in</strong>g methods: LDAS<br />

and our proposed scheme (ECBS).<br />

A. Coverage Effectiveness<br />

Set θ≥90%. Run LDAS and ECBS at the same<br />

condition to compare. We sampled on the No.100 round<br />

respectively as shown <strong>in</strong> Figure 4 (only active sensors are<br />

marked to see clearly). Only 58 nodes are active <strong>in</strong><br />

our algorithm, but 150 nodes are on-duty by LDAS<br />

algorithm. And Figure 5 shows the coverage condition<br />

with the active nodes on No.100 round by different<br />

algorithm. It can be easy to see that the fewer numbers of<br />

active nodes are needed <strong>in</strong> our algorithm to meet the<br />

same coverage required and the sensors distribute more<br />

uniform <strong>in</strong> Figure 4(b). However, there is more<br />

redundancy coverage <strong>in</strong> Figure 5(a).<br />

Ni>HT<br />

N<br />

Keep active<br />

Y<br />

Ndi>0<br />

N<br />

Y<br />

Ni>AT<br />

N<br />

The maximal residual<br />

energy of sensor <strong>in</strong> ND<br />

> Ei<br />

N<br />

Y<br />

Sensor i sleep<br />

Y<br />

Sensor j with the<br />

m<strong>in</strong>imum residual<br />

energy <strong>in</strong> ND sleep<br />

100<br />

90<br />

(a)<br />

LDAS<br />

80<br />

End<br />

70<br />

60<br />

Figure 3<br />

The schedul<strong>in</strong>g process of an active sensor i<br />

Step 2: Nodes-schedul<strong>in</strong>g. At the beg<strong>in</strong>n<strong>in</strong>g of each<br />

round, each active node determ<strong>in</strong>es whether it is a<br />

redundancy sensor or not. The schedul<strong>in</strong>g scheme is<br />

detailed <strong>in</strong> Figure 3. Where N i is the number of sensor<br />

i ’s active neighbors, and N di is the number of sensor i’s<br />

half-hop neighbors, ND is the set of sensor i’s half-hop<br />

neighbors, E i is the residual energy of sensor i.<br />

Step 3: Cluster<strong>in</strong>g. Active nodes randomly select nodes<br />

as cluster heads based on LEACH algorithm. Then the<br />

50<br />

40<br />

30<br />

20<br />

10<br />

0<br />

0 10 20 30 40 50 60 70 80 90 100<br />

(b) ECBS<br />

Figure 4 The distribution of active nodes on No.100 round<br />

© 2013 ACADEMY PUBLISHER


1614 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

covered by those active nodes at some time.<br />

As shown <strong>in</strong> Figure 6, the network coverage is<br />

reduc<strong>in</strong>g with the network runn<strong>in</strong>g us<strong>in</strong>g both the two<br />

algorithms. The higher the network coverage required,<br />

the shorter survival time of the network. Dur<strong>in</strong>g the <strong>in</strong>itial<br />

operation, the two algorithms have ma<strong>in</strong>ta<strong>in</strong>ed a higher<br />

coverage rate. But with the operation of network, more<br />

and more nodes exhausted their energy, the network<br />

coverage also decreased. Furthermore, the coverage rate<br />

of ECBS is always higher than LDAS at the same round<br />

dur<strong>in</strong>g the whole runn<strong>in</strong>g time.<br />

100<br />

80<br />

(a)<br />

LDAS<br />

the number of active nodes<br />

160<br />

140<br />

120<br />

100<br />

80<br />

60<br />

40<br />

θ=90%,LDAS<br />

θ=85%,LDAS<br />

θ=90%,ECBS<br />

θ=85%,ECBS<br />

60<br />

20<br />

network coverage<br />

1<br />

0.95<br />

0.9<br />

0.85<br />

0.8<br />

0.75<br />

0.7<br />

0.65<br />

40<br />

20<br />

0<br />

-20 0 20 40 60 80 100 120<br />

(b)<br />

ECBS<br />

Figure 5 The coverage condition on No.100 round<br />

0.6<br />

θ=90%,LDAS<br />

θ=85%,LDAS<br />

0.55<br />

θ=90%,ECBS<br />

θ=85%,ECBS<br />

0.5<br />

0 200 400 600 800 1000 1200 1400 1600 1800<br />

runn<strong>in</strong>g rounds<br />

Figure 6 Comparisons of network coverage ratio<br />

The network coverage (η) is the ratio of the area<br />

covered by those active nodes to the whole monitor<strong>in</strong>g<br />

area dur<strong>in</strong>g the nodes schedul<strong>in</strong>g scheme runn<strong>in</strong>g<br />

process.<br />

Aactive<br />

∩ A<br />

η () t =<br />

(5)<br />

A<br />

A is the whole monitor<strong>in</strong>g area, and A active is the area<br />

0<br />

0 200 400 600 800 1000 1200 1400 1600 1800<br />

runn<strong>in</strong>g round<br />

Figure 7 Comparisons of active nodes<br />

Figure 7 shows the number of active nodes dur<strong>in</strong>g the<br />

network runn<strong>in</strong>g. As can be seen from Figure 7 and<br />

Figure 6, the number of active nodes by ECBS is always<br />

less than the number that used by LDAS when the<br />

coverage ratio meet<strong>in</strong>g the requirement. Because there<br />

are more active nodes <strong>in</strong> the early operation by LDAS,<br />

too much energy were consumed. The active nodes<br />

decreased with more and more nodes run out of their<br />

energy. And the coverage percentage dropped from 98%<br />

to 50% quickly. But the number of active nodes used by<br />

ECBS algorithm is kept stability <strong>in</strong> the whole runn<strong>in</strong>g<br />

process. Us<strong>in</strong>g the less active nodes to meet a high<br />

coverage, thus the energy has been saved and the lifetime<br />

has been prolonged.<br />

B. Network Lifetime<br />

Accord<strong>in</strong>g to the def<strong>in</strong>ition 4 <strong>in</strong> this paper, network<br />

lifetime is the runn<strong>in</strong>g time of the network meet<strong>in</strong>g the<br />

required coverage. As illustrated <strong>in</strong> Figure 8, the network<br />

lifetime is only 70 rounds with no schedul<strong>in</strong>g scheme. Set<br />

θ≥90%, us<strong>in</strong>g LDAS schedul<strong>in</strong>g scheme the lifetime is<br />

850 rounds and the first dead node occurred on No.104<br />

round. But by ECBS schedul<strong>in</strong>g scheme, the lifetime<br />

extends to 1520 rounds and the first dead node occurred<br />

on No.382 round. Set θ≥85%, the lifetime is 1020 rounds<br />

and the first dead node occurred on No.117 round by<br />

LDAS. But by ECBS algorithm, the lifetime extends to<br />

1750 rounds and the first dead node occurred on No.402<br />

round. ECBS algorithm can prolong the network lifetime<br />

efficiently. And the lower required coverage, the longer<br />

the network lifetime.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1615<br />

∑ N<br />

Ei<br />

() t<br />

i=<br />

1<br />

mE<br />

() t =<br />

N<br />

(6)<br />

The energy variance function is:<br />

=<br />

D () t =<br />

E<br />

∑ N i E<br />

i 1<br />

[ E () t − m () t ] 2<br />

N<br />

(7)<br />

C. Energy Efficiency<br />

Figure 8 Comparison of network lifetime<br />

The average energy<br />

0.05<br />

0.045<br />

0.04<br />

0.035<br />

0.03<br />

0.025<br />

0.02<br />

0.015<br />

0.01<br />

θ=90%,LDAS<br />

θ=85%,LDAS<br />

θ=90%,ECBS<br />

θ=85%,ECBS<br />

0.005<br />

0<br />

0 200 400 600 800 1000 1200 1400 1600 1800<br />

runn<strong>in</strong>g round<br />

Figure 10 comparison of the average residual energy<br />

×10 -5 Figure 11 comparison of the energy Variance<br />

30<br />

25<br />

θ=90%,LDAS<br />

θ=85%,LDAS<br />

θ=90%,ECBS<br />

θ=85%,ECBS<br />

Figure 9 Comparison of sleep ratio<br />

As mentioned above, the sleep ratio is an important<br />

parameter to describe the situation of sav<strong>in</strong>g energy<br />

dur<strong>in</strong>g the operation. When meet<strong>in</strong>g the coverage<br />

requirement, the higher the sleep ratio, the better the<br />

energy can be saved. Figure 9 shows that the sleep ratios<br />

of ECBS are always higher than that of LDAS algorithm<br />

and ma<strong>in</strong>ta<strong>in</strong> stability <strong>in</strong> the whole runn<strong>in</strong>g time.<br />

Moreover with different coverage requirement, the sleep<br />

ratios of LDAS are also much different. The higher the<br />

network coverage requires the lower sleep ratio. But the<br />

sleep ratios of our algorithm have a little change.<br />

Figure10 shows the average residual energy of network<br />

dur<strong>in</strong>g operation. It confirms that the residual energy of<br />

ECBS is always higher than that of LDAS on the same<br />

round.<br />

Sleep ratio can only demonstrate the total condition of<br />

energy consumed, but not measure the balance of energy<br />

consumed. In this paper, the average residual energy and<br />

the energy variance function are used to measure that the<br />

energy consumed is balanced or not at some time [25].<br />

Consider<strong>in</strong>g the two values, the larger the average<br />

residual energy and the smaller the energy variance, the<br />

better balance of the energy consumed <strong>in</strong> the network.<br />

The average residual energy function is:<br />

Energy variance<br />

20<br />

15<br />

10<br />

5<br />

0<br />

0 200 400 600 800 1000 1200 1400 1600 1800<br />

runn<strong>in</strong>g round<br />

From Figure 10 and Figure 11, it can be seen that the<br />

ECBS algorithm has a better balance of energy consumed.<br />

By LDAS algorithm, the m E (t) decreased more rapidly<br />

and the D E (t) were larger. The experiment data shows that<br />

us<strong>in</strong>g LDAS algorithm some nodes still rema<strong>in</strong>ed more<br />

than 90% energy even when the network died. But us<strong>in</strong>g<br />

ECBS algorithm, the maximal ratio of the residual energy<br />

to the <strong>in</strong>itial energy was about 40% when the network<br />

died. It also <strong>in</strong>dicates that LDAS algorithm exits the<br />

problem that energy consumes uneven. Thus it will lead<br />

to some nodes run out their energy earlier. And then<br />

energy hole are formed so as to make the network dy<strong>in</strong>g<br />

prematurely. Ideally each node <strong>in</strong> a network runn<strong>in</strong>g out<br />

its energy at the same time will obta<strong>in</strong> the optimal energy<br />

efficiency.<br />

© 2013 ACADEMY PUBLISHER


1616 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

V. CONCLUSION<br />

Energy sav<strong>in</strong>g <strong>in</strong> WSNs has attracted a lot of attention<br />

<strong>in</strong> the recent years. Extensive research has been<br />

conducted to address these limitations by develop<strong>in</strong>g<br />

schemes that can improve resource efficiency. In this<br />

paper, we have <strong>in</strong>troduced an optimal energy-efficient<br />

sleep schedul<strong>in</strong>g scheme for WSNs. Without accurate<br />

geography <strong>in</strong>formation, the two-hop neighbors are<br />

considered. Simulation results show that our schedul<strong>in</strong>g<br />

scheme has improved the sleep ratio and extended the<br />

network lifetime. But <strong>in</strong> the simulation experiments, we<br />

discovered that there is approximately 17% residual<br />

energy when the network died. Consider<strong>in</strong>g the death<br />

spread from the border of the monitor region to the<br />

central, we believe that there is still space to improve. So,<br />

one of our future works is to f<strong>in</strong>d a solution to alleviate<br />

the <strong>in</strong>equality sleep of the boundary nodes.<br />

ACKNOWLEDGMENTS<br />

This work was supported under the National Science<br />

Foundation of Ch<strong>in</strong>a (50904070, 51104157); The Ch<strong>in</strong>a<br />

Postdoctoral Science Foundation (20100471412).<br />

REFERENCES<br />

[1] Liu, X. Jiang, S. Horiguchi, T. T. Lee, "Analysis of random<br />

sleep scheme for wireless sensor networks", International<br />

Journal of Sensor Networks, Vol. 7, No.1/2, pp. 71 - 84 ,<br />

2010.<br />

[2] Ossama You nis, Srimivasan Ramasubramanian, and<br />

Marwan Krunz, “Location-Unaware Sens<strong>in</strong>g Range<br />

Assignment <strong>in</strong> Sensor Netwroks”, Network<strong>in</strong>g 2007, pp.<br />

120-131, 2007.<br />

[3] Liu C, Wu k, Xiao Y, et al, “Random coverage with<br />

coverage with guaranteed connectivity: jo<strong>in</strong>t schedul<strong>in</strong>g for<br />

wireless sensor networks”, IEEE Transactions on Parallel<br />

and Distributed Systems, Vol. 17, No. 6, pp.562-575, 2006<br />

[4] Jiang J, Li F, et al, “Random schedul<strong>in</strong>g for wireless sensor<br />

networks”, ISPA’09, Sydney: IEEE CS Press, pp.324-332,<br />

2009<br />

[5] L<strong>in</strong> JW, Chen YT, “Improv<strong>in</strong>g the coverage of randomized<br />

schedul<strong>in</strong>g <strong>in</strong> wireless sensor networks”, IEEE<br />

Transactions o Wireless Communications, Vol.7, No. 12,<br />

pp. 4807-481, 2008<br />

[6] Q<strong>in</strong>g L, Zhi T, “M<strong>in</strong>imum node degree and k-connectivity<br />

of a wireless multi-hop network <strong>in</strong> bounded area”,<br />

GLOBECOM’07, NEW York: IEEE Press, pp. 1296-1301,<br />

2007<br />

[7] Xu Y, Heidemann J, Estr<strong>in</strong> D, “Geography-<strong>in</strong>formed<br />

energy conservation for ad hoc rout<strong>in</strong>g”, Proceed<strong>in</strong>gs of<br />

ACM Conference on Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g,<br />

USA:ACM, pp.16-21,2001<br />

[8] F.Ye,Zhong, S. Lu, L. Zhang, “PEAS : A robust energy<br />

conserv<strong>in</strong>g protocol for long-lived sensor networks”, <strong>in</strong><br />

Proc. of the ACM MobiCom Conf, pp.129-143,2004<br />

[9] GAO Shan, CHINH T U, LI Y<strong>in</strong>g-shu, et al, “Sensor<br />

schedul<strong>in</strong>g for k-coverage <strong>in</strong> wireless sensor networks”,<br />

Mobile Ad-hoc and Sensor Networks, vol. 43, no.25,<br />

pp.268-280, 2006<br />

[10] Wei Wei, Hui Yang, Hao Wang, etc, “Queu<strong>in</strong>g Schedule for<br />

Location Based on Wireless Ad-hoc Networks with<br />

D-Cover Algorithm”, International Journal of Digital<br />

Content Technology and its Applications, vol.5, no.1,<br />

pp.356-363, 2011<br />

[11] Gao Y, Wu K, Li F, “Analysis on the Redundancy of<br />

Wireless Sensor Networks”. WSNA’03[C]. New York:<br />

ACM Press, pp.108-114, 2003<br />

[12] KUI Wu, et al, “Lightweight Deployment-Aware<br />

Schedul<strong>in</strong>g for Wireless Sensor Networks”, Mobile<br />

Networks And Application, vol.10, no.6, pp.837-852, 2005<br />

[13] Younis O, Krunz M, Ramasubramanian S,<br />

“Location-Unaware Coverage <strong>in</strong> Wireless Sensor<br />

Networks”, Ad Hoc Networks, vol.6, no.7, pp.1078-1097,<br />

2008<br />

[14] Li-Hs<strong>in</strong>g Yen, Yang-M<strong>in</strong> Cheng, “Range-Based Sleep<br />

Schedul<strong>in</strong>g (RBSS) for Wireless Sensor Networks”,<br />

Wireless Pers Commun, Vol 48, No. 3, pp.411-423, 2009<br />

[15] Cheng Tie Ee, Ruzena Bajcsy, “Congestion control and<br />

fairness for many-to-one rout<strong>in</strong>g <strong>in</strong> sensor networks”, Proc<br />

of the 2nd ACM Conf on Embedded Networked Sensor<br />

Systems (SenSys).Baltimore:ACM Press,pp.148-161,<br />

2004<br />

[16] Khaled Matrouk, Bjorn Landfeldt, “RETT-gen:a globally<br />

efficient rout<strong>in</strong>g protocol for wireless sensor networks by<br />

equalis<strong>in</strong>g sensor energy and avoid<strong>in</strong>g energy holes”, Ad<br />

Hoc Networks,vol.7, No.3, pp.514-536, 2009<br />

[17] Wu X B,Chen G,Das S K, “Avoid<strong>in</strong>g energy holes <strong>in</strong><br />

wireless sensor netw0rks with non-uniform node<br />

distribution”, IEEE Transactions on Parallel and<br />

Distributed Systems,vol 19, No. 5, pp.710-720, 2007<br />

[18] Li J,Mohapatra P, “An analytical model for the energy hole<br />

problem <strong>in</strong> many-to-one sensor networks”, Proceed<strong>in</strong>gs of<br />

the IEEE Vehicular Technology Conference.<br />

Dallas,TX,pp.2721- 2725, 2005<br />

[19] WEN C Y, MORRIS R D, SETHARES W A. “Distance<br />

estimation us<strong>in</strong>g bidirectional communications without<br />

synchronous clock<strong>in</strong>g”, IEEE Transactions on Signal<br />

Process<strong>in</strong>g, vol.55, no.5, pp.1927-1939, 2007<br />

[20] H. Zhang, J.C. Hou, “Ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g sens<strong>in</strong>g coverage and<br />

connectivity <strong>in</strong> large sensor networks”, Ad Hoc and Sensor<br />

Wireless Networks, vol.1, no.1, pp.89-124, 2005<br />

[21] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K.<br />

Pister, “System Architecture Directions for Networked<br />

Sensors”, ACM SIGPLAN Notices, vol.35, no.11,<br />

pp.93-104, 2000<br />

[22] Tian D, Georganas N, “Location and calculation-free<br />

node-schedul<strong>in</strong>g schemes <strong>in</strong> large wireless sensor<br />

networks”, Ad Hoc Networks, vol.2, no.1, pp.65-85, 2004<br />

[23] Fan Gao-juan, Sun Li-juan, Wang Ru-chuan, et al,<br />

“Non-uniform distribution node schedul<strong>in</strong>g scheme <strong>in</strong><br />

wireless sensor networks”, Journal on Communications,<br />

vol.32, No.3, pp.10-17, 2011<br />

[24] Fan Gao-juan, Wang Ru-chuan, Huang Hai-p<strong>in</strong>g, et al,<br />

“Tolerable Coverage Area Based Node Schedul<strong>in</strong>g<br />

Algorithm <strong>in</strong> Wireless Sensor Networks”, ACTA<br />

ELECTRONICA SINICA, Vol. 39, No.1, pp. 89-94, 2011<br />

[25] Jiang Chang-jiang, Shi Wei-ren, Tang Xian-lun, et al,<br />

“Energy-Balanced Unequal Cluster<strong>in</strong>g Rout<strong>in</strong>g Protocol<br />

for Wireless Sensor Networks”, Journal of Software, vol.<br />

23, No. 5, pp.1222-1232, 2012<br />

[26] Shao-feng Jiang, M<strong>in</strong>g-hua Yang, Han-tao Song, et al, “An<br />

Enhanced perimeter coverage based density control<br />

algorithm for wireless sensor network”, Proceed<strong>in</strong>gs of the<br />

Third International Conference on Wireless and Mobile<br />

Communications (ICWMC’07), Wash<strong>in</strong>gton: IEEE<br />

Computer Society, 2007<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1617<br />

Shan-shan Ma, was born <strong>in</strong> 1978, is<br />

currently a lecturer <strong>in</strong> Ch<strong>in</strong>a University<br />

of M<strong>in</strong><strong>in</strong>g and Technology. She received<br />

the B.S. <strong>in</strong> Electronic and Information<br />

Technology from Ch<strong>in</strong>a University of<br />

M<strong>in</strong><strong>in</strong>g and Technology, Xuzhou, Ch<strong>in</strong>a,<br />

<strong>in</strong> 2000 and the M.S. <strong>in</strong> Communication<br />

and Information Eng<strong>in</strong>eer<strong>in</strong>g from Ch<strong>in</strong>a<br />

University of M<strong>in</strong><strong>in</strong>g and Technology,<br />

Xuzhou, Ch<strong>in</strong>a, <strong>in</strong> 2003. She is currently pursu<strong>in</strong>g the Ph. D.<br />

degree at Computer Application Technology <strong>in</strong> College of<br />

Computer Science and Technology, University of M<strong>in</strong><strong>in</strong>g and<br />

Technology, from 2007. Her research <strong>in</strong>terests <strong>in</strong>clude wireless<br />

sensor network and <strong>in</strong>formation process<strong>in</strong>g.<br />

Yan-J<strong>in</strong>g Sun, was born <strong>in</strong> 1977, is<br />

currently a professor <strong>in</strong> Ch<strong>in</strong>a University<br />

of M<strong>in</strong><strong>in</strong>g and Technology. He received<br />

his Ph.D. degree <strong>in</strong> Communication and<br />

Information System from Ch<strong>in</strong>a<br />

University of M<strong>in</strong><strong>in</strong>g and Technology <strong>in</strong><br />

2007. His research <strong>in</strong>terest <strong>in</strong>cludes<br />

wireless sensor network and embedded<br />

real-time system.<br />

Jian-sheng Qian, was born <strong>in</strong> 1964, is a<br />

professor and Ph.D. candidate tutor <strong>in</strong><br />

Ch<strong>in</strong>a University of M<strong>in</strong><strong>in</strong>g and<br />

Technology currently. He received the<br />

Ph. D degree <strong>in</strong> Control Theory and<br />

Control Eng<strong>in</strong>eer<strong>in</strong>g from Ch<strong>in</strong>a<br />

University of M<strong>in</strong><strong>in</strong>g and Technology,<br />

Ch<strong>in</strong>a, <strong>in</strong> 2003. His research <strong>in</strong>terest<br />

<strong>in</strong>cludes m<strong>in</strong>e communication and<br />

wireless sensor network.<br />

© 2013 ACADEMY PUBLISHER


1618 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Identity Based Proxy Re-encryption From BB1<br />

IBE<br />

J<strong>in</strong>dan Zhang 1 , Xu An Wang 2 and Xiaoyuan Yang 2<br />

1 Department of Electronic Information<br />

Xianyang Vocational Technical College, 712000, P. R. Ch<strong>in</strong>a<br />

2 Key Laboratory of Information and Network Security<br />

Eng<strong>in</strong>eer<strong>in</strong>g University of Ch<strong>in</strong>ese Armed Police Force, 710086, P. R. Ch<strong>in</strong>a<br />

wangxahq@yahoo.com.cn<br />

Abstract— In 1998, Blaze, Bleumer, and Strauss proposed a<br />

k<strong>in</strong>d of cryptographic primitive called proxy re-encryption.<br />

In proxy re-encryption, a proxy can transform a ciphertext<br />

computed under Alice’s public key <strong>in</strong>to one that can<br />

be opened under Bob’s decryption key. In 2007, Matsuo<br />

proposed the concept of four types of proxy re-encryption<br />

schemes: CBE (Certificate Based Public Key Encryption)<br />

to IBE (Identity Based Encryption) (type 1), IBE to IBE<br />

(type 2), IBE to CBE (type 3), CBE to CBE (type 4). In this<br />

paper, we f<strong>in</strong>d that if we allow the PKG to use its masterkey<br />

<strong>in</strong> the process of generat<strong>in</strong>g re-encryption key for proxy<br />

re-encryption <strong>in</strong> identity based sett<strong>in</strong>g, many open problems<br />

can be solved. We give the new security models for proxy reencryption<br />

<strong>in</strong> identity based sett<strong>in</strong>g, especially consider<strong>in</strong>g<br />

PKG’s <strong>in</strong>volv<strong>in</strong>g <strong>in</strong> the re-encryption key generation process<br />

and PKG’s master-key’s security. We construct the new<br />

IND-ID-CPA and the first IND-ID-CCA2 secure proxy reencryption<br />

schemes based on BB1 IBE. We also prove their<br />

security by <strong>in</strong>troduc<strong>in</strong>g some new techniques which maybe<br />

have <strong>in</strong>dependent <strong>in</strong>terest. At last, we compare our new<br />

schemes with exist<strong>in</strong>g ones, the results show that our scheme<br />

can achieve high security levels and are very efficient for<br />

re-encryption and, which are very important for practical<br />

applications.<br />

Index Terms— Cryptography, Identity based proxy reencryption,<br />

PKG, BB1 IBE, Security proof.<br />

I. INTRODUCTION<br />

The concept of proxy re-encryption(PRE) comes from<br />

the work of Blaze, Bleumer, and Strauss <strong>in</strong> 1998[2].<br />

The goal of proxy re-encryption is to securely enable<br />

the re-encryption of ciphertexts from one key to another,<br />

without rely<strong>in</strong>g on trusted parties. In 2005, Ateniese et<br />

al proposed a few new PRE schemes and discussed its<br />

several potential applications such as e-mail forward<strong>in</strong>g,<br />

law enforcement, cryptographic operations on storagelimited<br />

devices, distributed secure file systems and outsourced<br />

filter<strong>in</strong>g of encrypted spam [1]. S<strong>in</strong>ce then, many<br />

excellent schemes have been proposed[10], [25], [20],<br />

[26], [15], [27], [11], [29]. In ACNS’07, Green et al.<br />

proposed the first identity based proxy re-encryption<br />

schemes(IDPRE) [15]. In ISC’07, Chu et al. proposed<br />

The second author is the correspond<strong>in</strong>g author. This paper is an<br />

extended work of [34], [35] and supported by the National Natural<br />

Science Foundation of Ch<strong>in</strong>a under contract no. 61103230, 61103231,<br />

61272492, 61202492, Natural Science Foundation of Shaanxi Prov<strong>in</strong>ce<br />

and Natural Science Foundation of Eng<strong>in</strong>eer<strong>in</strong>g University of Ch<strong>in</strong>ese<br />

Armed Police Force.<br />

the first IND-ID-CCA2 IDPRE schemes <strong>in</strong> the standard<br />

model, they constructed their scheme based on Water’s<br />

IBE. But unfortunately Shao et al. found a flaw <strong>in</strong> their<br />

scheme and they fixed this flaw by propos<strong>in</strong>g an improved<br />

scheme [29]. In Pair<strong>in</strong>g’07, Matsuo proposed another<br />

few more PRE schemes <strong>in</strong> identity based sett<strong>in</strong>g [27].<br />

Interest<strong>in</strong>gly, they proposed the concept of four types of<br />

PRE: CBE(Certificate Based Public Key Encryption) to<br />

IBE(Identity Based Encryption)(type 1), IBE to IBE(type<br />

2), IBE to CBE (type 3), CBE to CBE (type 4)[27], which<br />

can help the ciphertext [33], [24] circulate smoothly <strong>in</strong><br />

the network. They constructed two PRE schemes: one<br />

is the hybrid PRE from CBE to IBE, the other is the<br />

PRE from IBE to IBE. Both of the schemes are now<br />

be<strong>in</strong>g standardized by P1363.3 workgroup [28]. Recently,<br />

Tang et al. extended the concept of identity based proxy<br />

re-encryption, they proposed a concept of <strong>in</strong>ter-doma<strong>in</strong><br />

identity based proxy re-encryption which aimed to construct<strong>in</strong>g<br />

proxy re-encryption scheme between different<br />

doma<strong>in</strong>s <strong>in</strong> identity based sett<strong>in</strong>g [31].<br />

A. Ma<strong>in</strong> Idea and Contribution<br />

Our contributions are ma<strong>in</strong>ly as follow<strong>in</strong>g: If we follow<br />

the pr<strong>in</strong>cipal that all the work PKG can do is just<br />

generat<strong>in</strong>g private keys for IBE users, it is <strong>in</strong>deed difficult<br />

for construct<strong>in</strong>g PRE based on BB 1 IBE. But if we allow<br />

PKG generat<strong>in</strong>g re-encryption keys for PRE by us<strong>in</strong>g its<br />

master − key, we can easily construct PRE based on a<br />

variant of BB 1 IBE.<br />

On the Role of PKG <strong>in</strong> IBPRE and Related Primitives.<br />

We challenge the traditional idea of PKG is only<br />

responsible to generate private keys. Traditionally when<br />

cryptographers design IBE and other related schemes, they<br />

assume the PKG can only generate the private keys to<br />

the users. The idea situation is that after PKG generat<strong>in</strong>g<br />

private keys for the whole users, the PKG is shut up<br />

to avoid “s<strong>in</strong>gle-po<strong>in</strong>t failure” problem. But we remark<br />

that this idea situation can not work <strong>in</strong> the practical<br />

application, we can not predicate all the future users<br />

of the system when it was set up. Furthermore, <strong>in</strong> the<br />

IBE systems, there are also requirements of revocation<br />

of the identity, which will necessary <strong>in</strong>volved the PKG.<br />

Thus many usable IBE systems let their PKG be onl<strong>in</strong>e<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1618-1626


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1619<br />

24/7/365. From a practical po<strong>in</strong>t, for PRE <strong>in</strong> the identity<br />

based sett<strong>in</strong>g, <strong>in</strong>volv<strong>in</strong>g PKG <strong>in</strong> generat<strong>in</strong>g re-encryption<br />

key can generically help the proxy improve its efficiency,<br />

which is very important for practical IBPRE systems,<br />

after all, re-encryption is the ma<strong>in</strong> operation <strong>in</strong> the PRE<br />

systems. More importantly, <strong>in</strong>volv<strong>in</strong>g PKG <strong>in</strong> generat<strong>in</strong>g<br />

some “valued ephemeral” maybe br<strong>in</strong>g unexpected benefits<br />

to exist<strong>in</strong>g identity based primitives. For example,<br />

<strong>in</strong> identity based broadcast encryption, some “valued<br />

ephemeral” given by the PKG maybe be very useful<br />

for the receivers for decryption, Note the length of this<br />

“valued ephemeral” is just constant, <strong>in</strong>stead of l<strong>in</strong>ear with<br />

the receivers, thus improve the efficiency greatly. Also<br />

note this feature can not be shared with the normal public<br />

key broadcast encryption schemes.<br />

B. Organization<br />

We organize our paper as follow<strong>in</strong>g. In Section I-<br />

I, we give some prelim<strong>in</strong>aries which are necessary to<br />

understand our paper. We propose our new proxy reencryption<br />

scheme based on a variant of BB 1 IBE and<br />

prove its security <strong>in</strong> SectionIII. In Section IV, we give<br />

the comparison results with previous IBPRE schemes. We<br />

give our conclusions <strong>in</strong> the last Section V.<br />

II. PRELIMINARIES<br />

In the follow<strong>in</strong>g, we sometimes use notations described<br />

<strong>in</strong> this section without notice. We denote the concatenation<br />

of a and b by a||b, denote random choice from a set<br />

S by R ←− S.<br />

A. Bil<strong>in</strong>ear groups<br />

Let G and G 1 be multiplicative cyclic groups of prime<br />

order p, and g be generator of G. We say that G 1 has an<br />

admissible bil<strong>in</strong>ear map e : G×G → G 1 . if the follow<strong>in</strong>g<br />

conditions hold.<br />

1) e(g a , g b ) = e(g, g) ab for all a, b.<br />

2) e(g, g) ≠ 1.<br />

3) There is an efficient algorithm to compute e(g a , g b )<br />

for all a, b and g.<br />

B. Assumptions<br />

Def<strong>in</strong>ition 1: For randomly chosen <strong>in</strong>tegers a, b, c R ←−<br />

Z ∗ p, a random generator g R ←− G, and an element R R ←− G,<br />

we def<strong>in</strong>e the advantage of an algorithm A <strong>in</strong> solv<strong>in</strong>g<br />

the Decision Bil<strong>in</strong>ear Diffie-Hellman(DBDH) problem as<br />

follows:<br />

Adv G dbdh (A) =| P r[A(g, g a , g b , g c , e(g, g) abc ) = 0]<br />

−P r[A(g, g a , g b , g c , R) = 0] |<br />

where the probability is over the random choice of generator<br />

g ∈ G, the randomly chosen <strong>in</strong>tegers a, b, c, the<br />

random choice of R ∈ G, and the random bits used by<br />

A. We say that the (k, t, ɛ)-DBDH assumption holds <strong>in</strong> G<br />

if no t-time algorithm has advantage at least ɛ <strong>in</strong> solv<strong>in</strong>g<br />

the DBDH problem <strong>in</strong> G under a security parameter k.<br />

C. Identity Based Encryption<br />

An Identity Based Encryption(IBE) system consists of<br />

the follow<strong>in</strong>g algorithms.<br />

1) SetUp IBE (k). Given a security parameter k, PKG<br />

generate a pair (parms, mk), where parms denotes<br />

the public parameters and mk is the master − key.<br />

2) KeyGen IBE (mk, parms, ID). Given the<br />

master − key mk and an identity ID with parms,<br />

generate a secret key sk ID for ID.<br />

3) Enc IBE (ID, parms, M). Given a message M and the<br />

identity ID with parms, compute the encryption of<br />

M, C ID for ID.<br />

4) Dec IBE (sk, parms, C ID ). Given the secret key sk,<br />

decrypt the ciphertext C ID .<br />

III. IBPRE BASED ON A VARIANT OF BB 1 IBE<br />

A. Our Def<strong>in</strong>ition for IBPRE<br />

In this section, we give our def<strong>in</strong>ition and security<br />

model for identity based PRE scheme, which is based<br />

on [15], [31].<br />

Def<strong>in</strong>ition 2: An identity based PRE scheme is tuple<br />

of algorithms (Setup, KeyGen, Encrypt, Decrypt, RK-<br />

Gen, Reencrypt):<br />

• Setup(1 k ). On <strong>in</strong>put a security parameter, the algorithm<br />

outputs both the master public parameters<br />

which are distributed to users, and the master secret<br />

key (msk) which is kept private.<br />

• KeyGen(params, msk, ID). On <strong>in</strong>put an identity<br />

ID ∈ {0, 1} ∗ and the master secret key, outputs a<br />

decryption key sk ID correspond<strong>in</strong>g to that identity.<br />

• Encrypt(params, ID, m). On <strong>in</strong>put a set of public<br />

parameters, an identity ID ∈ {0, 1} ∗ and a pla<strong>in</strong>text<br />

m ∈ M, output c ID , the encryption of m under the<br />

specified identity.<br />

• RKGen(params, msk, sk ID1 , sk ID2 , ID 1 , ID 2 ).<br />

On <strong>in</strong>put secret keys msk, sk ID1 , sk ID2 , and i-<br />

dentities ID ∈ {0, 1} ∗ , PKG, the delegator and the<br />

delegatee <strong>in</strong>teractively generat the re-encryption key<br />

rk ID1→ID 2<br />

, the algorithm output it.<br />

• Reencrypt(params, rk ID1→ID 2<br />

, c ID1 ). On <strong>in</strong>put<br />

a ciphertext c ID1 under identity ID 1 , and a reencryption<br />

key rk ID1→ID 2<br />

, outputs a re-encrypted<br />

ciphertext c ID2 .<br />

• Decrypt(params, sk ID , c ID ). Decrypts the ciphertext<br />

c ID us<strong>in</strong>g the secret key sk ID , and outputs m<br />

or ⊥.<br />

Remark 1: This def<strong>in</strong>ition is different from the Def<strong>in</strong>ition<br />

of IBPRE <strong>in</strong> the work of [27]. We <strong>in</strong>sist this is a<br />

more natural and general Def<strong>in</strong>ition for PRE from IBE to<br />

IBE. This def<strong>in</strong>ition is consistent with the work of [15],<br />

[31].<br />

B. Our Security Models for IBPRE<br />

In PRE from IBE to IBE, there is no necessary to<br />

consider the malicious PKG attack, so we omit PKG <strong>in</strong><br />

our security model when consider<strong>in</strong>g delegator security<br />

© 2013 ACADEMY PUBLISHER


1620 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

and delegatee security.<br />

Delegator Security.<br />

In PRE from IBE to IBE, we consider the case that proxy<br />

and delegatee are corrupted.<br />

Def<strong>in</strong>ition 3: (DGA-IBE-IND-ID-CPA) A PRE<br />

scheme from IBE to IBE is DGA 1 -IBE-IND-ID-CPA<br />

secure if the probability<br />

P r[{(ID ⋆ , sk ID ⋆) ← KeyGen(·)}<br />

{(ID x , sk IDx ) ← KeyGen(·)},<br />

{(ID h , sk IDh ) ← KeyGen(·)},<br />

{R hx ← RKGen(msk, sk IDh , sk IDx , ·)},<br />

{R xh ← RKGen(msk, sk IDx , sk IDh , ·)},<br />

{R hh ← RKGen(msk, sk IDh , sk IDh , ·)},<br />

{R xx ← RKGen(msk, sk IDx , sk IDx , ·)},<br />

{R ⋆h ← RKGen(msk, sk ID ⋆, sk IDh , ·)},<br />

{R ⋆x ← RKGen(msk, sk ID ⋆, sk IDx , ·)},<br />

(m 0 , m 1 , St) ← A Orenc (ID ⋆ , {sk IDx },<br />

{R xh }, {R hx }, {R hh }, {R xx }, {R ⋆h }, {R ⋆x }),<br />

d ⋆ R<br />

←− {0, 1}, C ⋆ = Encrypt(m d ⋆, ID ⋆ ),<br />

d ′ ← A Ørenc (C ⋆ , St) : d ′ = d ⋆ ]<br />

is negligibly close to 1/2 for any PPT adversary A. In<br />

our notation, St is a state <strong>in</strong>formation ma<strong>in</strong>ta<strong>in</strong>ed by A<br />

while (ID ⋆ , sk ID ⋆) is the target user’s pubic and private<br />

key pair generated by the challenger which also chooses<br />

other keys for corrupt and honest parties. For other honest<br />

parties, keys are subscripted by h and we subscript corrupt<br />

keys by x. Oracles O renc proceeds as follows:<br />

• Re-encryption O renc : on <strong>in</strong>put (pk i , ID j , C pki ),<br />

where C pki is the ciphertext under the public key pk i<br />

, pk i were produced by Keygen CBE , ID j were produced<br />

by Keygen IBE , this oracle responds with ‘<strong>in</strong>valid’<br />

if C pki is not properly shaped w.r.t. pk i . Otherwise<br />

the re-encrypted first level ciphertext C ID =<br />

ReEnc(KeyGen P RO (sk i , ID j , mk, parms), ID j ,<br />

parms, C pki ) is returned to A.<br />

Delegatee Security.<br />

In PRE from IBE to IBE, we consider the case that proxy<br />

and delegator are corrupted.<br />

Def<strong>in</strong>ition 4: (DGE-IBE-IND-ID-CPA) A PRE<br />

scheme from IBE to IBE is DGE 2 -IBE-IND-ID-CPA<br />

1 DGA means Delegator<br />

2 DGE means Delegatee.<br />

secure if the probability<br />

P r[{(ID ⋆ , sk ID ⋆) ← KeyGen(·)}<br />

{(ID x , sk IDx ) ← KeyGen(·)},<br />

{(ID h , sk IDh ) ← KeyGen(·)},<br />

{R hx ← RKGen(msk, sk IDh , sk IDx , ·)},<br />

{R xh ← RKGen(msk, sk IDx , sk IDh , ·)},<br />

{R hh ← RKGen(msk, sk IDh , sk IDh , ·)},<br />

{R xx ← RKGen(msk, sk IDx , sk IDx , ·)},<br />

{R h⋆ ← RKGen(msk, sk IDh , sk ID ⋆, ·)},<br />

{R x⋆ ← RKGen(msk, sk IDx , sk ID ⋆, ·)},<br />

(m 0 , m 1 , St) ← A Orenc (ID ⋆ , {sk IDx }, {R xh },<br />

{R hx }, {R hh }, {R xx }, {R h⋆ }, {R x⋆ }),<br />

d ⋆ R<br />

←− {0, 1}, C ⋆ = Encrypt(m d ⋆, ID ⋆ ),<br />

d ′ ← A Ørenc (C ⋆ , St) : d ′ = d ⋆ ]<br />

is negligibly close to 1/2 for any PPT adversary A. The<br />

notations <strong>in</strong> this game are same as Def<strong>in</strong>ition 3.<br />

PKG Security.<br />

In PRE from IBE and IBE, PKG’s master key can not<br />

leverage even if the delegator, the delegatee and proxy<br />

collude.<br />

Def<strong>in</strong>ition 5: (PKG-OW) A PRE scheme from IBE to<br />

IBE is one way secure for PKG if the probability<br />

P r[{(ID x , sk IDx ) ← KeyGen(·)},<br />

{(ID h , sk IDh ) ← KeyGen(·)},<br />

{R hx ← RKGen(msk, sk IDh , sk IDx , ·)},<br />

{R xh ← RKGen(msk, sk IDx , sk IDh , ·)},<br />

{R hh ← RKGen(msk, sk IDh , sk IDh , ·)},<br />

{R xx ← RKGen(msk, sk IDx , sk IDx , ·)},<br />

mk ′ ← A Orenc ({sk IDx }, {sk IDh }, {R xh },<br />

{R hx }, {R hh }, {R xx }, {parms}) : mk = mk ′ ]<br />

is negligibly close to 0 for any PPT adversary A. The<br />

notations <strong>in</strong> this game are same as Def<strong>in</strong>ition 3.<br />

C. Our Proposed IND-Pr-sID-CPA Secure IBPRE<br />

Scheme Based on a Variant of BB 1 IBE<br />

• The underly<strong>in</strong>g IBE scheme: We give a variant of<br />

BB 1 -IBE scheme as follows:<br />

Let G be a bil<strong>in</strong>ear group of prime order p (the<br />

security parameter determ<strong>in</strong>es the size of G). Let<br />

e : G × G → G 1 be the bil<strong>in</strong>ear map. For now, we<br />

assume public keys (ID) is element <strong>in</strong> Zp. ∗ We later<br />

extend the construction to public keys over {0, 1} ∗<br />

by first hash<strong>in</strong>g ID us<strong>in</strong>g a collision resistant hash<br />

H : {0, 1} ∗ → Z p . We also assume messages to be<br />

encrypted are elements <strong>in</strong> G. The IBE system works<br />

as follows:<br />

1) SetUp IBE (k). Given a security parameter k,<br />

select a random generator g ∈ G and random<br />

elements g 2 = g t1 , h = g t2 ∈ G. Pick a random<br />

α ∈ Zp. ∗ Set g 1 = g α ,mk = g2 α , and params =<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1621<br />

(g, g 1 , g 2 , h). Let mk be the master-secret key<br />

and let params be the public parameters.<br />

KeyGen IBE (mk, params, ID). Given<br />

mk = g2 α and ID with params, the<br />

PKG picks random s 0 , s 1 ∈ Zp, ∗ choose<br />

a hash function ˜H : Zp ∗ × {0, 1} ∗ → Zp<br />

∗<br />

and computes u 0 = ˜H(s0 , ID),<br />

u 1 = ˜H(s 1 , ID). Set sk ID = (d 0 , d 1 , d ′ 0) =<br />

(g2 α (g1 ID h) u0 , g u0 , (g2 α (g1 ID h) u1 )). The PKG<br />

preserves (s 0 , s 1 ).<br />

Enc IBE (ID, params, M). To encrypt a message<br />

M ∈ G 1 under the public key ID ∈ Zp,<br />

∗<br />

pick a random r ∈ Zp ∗ and compute C ID =<br />

(g r , (g1 ID h) r , Me(g 1 , g 2 ) r ).<br />

Dec IBE (sk ID , params, C ID ). Given ciphertext<br />

C ID = (C 1 , C 2 , C 3 ) and the secret key<br />

sk ID = (d 0 , d 1 ) with prams, compute M =<br />

C 3e(d 1,C 2)<br />

e(d .<br />

0,C 1)<br />

delegation scheme:<br />

KeyGen PRO (sk R , params, ID, ID ′ ). The<br />

PKG computes u ′ 1 = ˜H(s 1 , ID ′ ) and randomly<br />

selects k 1 , k 2 , k 3 ∈ Zp ∗ and sets<br />

rk ID→ID ′ = (rk 1 , rk 2 , rk 3 , rk 4 ) =<br />

( αID′ +t 2+k 1<br />

k 3(αID+t 2)<br />

+ k 2 , g u′ 1 k3 , g u′ 1 k2k3 , g u′ 1 k1 ) and<br />

sends them to the proxy via secure channel.<br />

We must note that the PKG computes a different<br />

(k 1 , k 2 , k 3 ) for every different user pair<br />

(ID, ID ′ ).<br />

Check(params, C ID , ID). Given the delegator’s<br />

identity ID and C ID = (C 1 , C 2 , C 3 )<br />

with params, compute v 0 = e(C 1 , g1 ID h) and<br />

v 1 = e(C 2 , g). If v 0 = v 1 then output 1.<br />

Otherwise output 0.<br />

ReEnc(rk ID→ID ′, params, C ID , ID ′ ).<br />

Given the identities ID, ID ′ , rk ID→ID ′ =<br />

(rk 1 , rk 2 , rk 3 , rk 4 ) = ( αID′ +t 2+k 1<br />

k 3(αID+t 2)<br />

+<br />

k 2 , g u′ 1 k3 , g u′ 1 k2k3 , g u′ 1 k1 ) with params, the<br />

proxy re-encrypt the ciphertext C ID <strong>in</strong>to<br />

C ID ′ as follows. First it runs “Check”, if<br />

output 0, then return “Reject”. Else computes<br />

C 2ID ′ = (C 1, ′ C 2, ′ C 3, ′ C 4, ′ C 5, ′ C 6, ′ C 7) ′ =<br />

αID ′ +t 2 +k 1<br />

k<br />

(C 1 , C 2 , C 3 , C<br />

(αID+t 2 ) +k2<br />

2 , rk 2 , rk 3 , rk 4 ).<br />

Dec1 IBE (sk ID ′, params, C 2ID ′). Given<br />

a re-encrypted ciphertext C 2ID ′ =<br />

(C 1, ′ C 2, ′ C 3, ′ C 4, ′ C 5, ′ C 6, ′ C 7) ′ and the secret key<br />

sk ID = (d 0 , d 1 , d ′ 0) with params, computes<br />

C<br />

M =<br />

3e(C ′ 5, ′ C 4)<br />

′<br />

e(C 2 ′ , C′ 6 )e(C′ 1 , C′ 7 )e(d′ 0 , C′ 1 )<br />

C<br />

=<br />

3e(rk ′ 2 , C 4)<br />

′<br />

e(C 2 ′ , rk 3)e(C 1 ′ , rk 4)e(d ′ 0 , C′ 1 )<br />

Dec2 IBE (sk ID ′, params, C 1ID ′). Given a<br />

normal ciphertext C ID ′ = (C 1 , C 2 , C 3 ) and the<br />

secret key sk ID ′ = (d 0 , d 1 , d ′ 0) with prams,<br />

compute M = C3e(d1,C2)<br />

e(d . 0,C 1)<br />

We<br />

Remark<br />

computes<br />

pair<br />

+t 2+k<br />

3(αID+t<br />

same<br />

not secure<br />

Security<br />

Theorem<br />

our<br />

IND-sID-CPA<br />

collud<strong>in</strong>g.<br />

Proof:<br />

construct<br />

On<br />

output<br />

= g<br />

<strong>in</strong>teract<strong>in</strong>g<br />

Initialization.<br />

with<br />

<strong>in</strong>tends<br />

Setup.To<br />

rithm<br />

h<br />

params<br />

<strong>in</strong>g<br />

g2 a<br />

Phase<br />

•<br />

•<br />

can verify its correctness as follow<strong>in</strong>g<br />

C 3e(rk ′ 2 , C 4)<br />

′<br />

e(C 2 ′ , rk 3)e(C 1 ′ , rk 4)e(d ′ 0 , C′ 1 )<br />

Me(g 1 , g 2 ) r e(g k3u′ 1 , (g<br />

ID<br />

=<br />

1 h) r( αID′ +t 2 +k 1<br />

k 3 (αID+t 2 ) +k2) )<br />

e((g1 IDh)r<br />

, g u′ 1 k2k3 )e(g r , g k1u′ 1)e(g2 α(gID′<br />

1 h) u′ 1, g r )<br />

= Me(g 1, g 2 ) r e(g k3u′ 1 , (g<br />

ID<br />

1 h) k2r )e(g k3u′ 1 , (g<br />

ID ′<br />

1 h) r<br />

e((g1 IDh)r<br />

, g u′ 1 k2k3 )e(g r , g k1u′ 1)e(g2 α(gID′<br />

= Me(g 1, g 2 ) r<br />

e(g2 α, = M<br />

gr )<br />

2: In our scheme, we must note that the P-<br />

a different (k 1 , k 2 , k 3 ) for every different<br />

(ID, ID ′ ). Otherwise, if the adversary knows<br />

1<br />

2) 2 for five different pairs (ID, ID ′ ) but<br />

k 1 , k 2 , k 3 , α, t 2 , he can compute (α, t 2 ), which<br />

at all.<br />

Analysis<br />

1: Suppose the DBDH assumption holds,<br />

scheme proposed <strong>in</strong> Section III-C is DGA-IBEsecure<br />

for the proxy and the delegatee’s<br />

Suppose A can attack our scheme, we<br />

an algorithm B solves the DBDH problem <strong>in</strong><br />

<strong>in</strong>put (g, g a , g a2 , g b , g c , T ), algorithm B’s goal<br />

1 if T = e(g, g) abc and 0 otherwise. Let<br />

, g 2 = g b , g 3 = g c . Algorithm B works by<br />

with A <strong>in</strong> a selective identity game as follows:<br />

The selective identity game beg<strong>in</strong>s<br />

A first outputt<strong>in</strong>g an identity ID ∗ that it<br />

to attack.<br />

generate the system’s parameters, algo-<br />

B picks α ′ ∈ Z p at random and def<strong>in</strong>es<br />

= g1 −ID∗ g α′ ∈ G. It gives A the parameters<br />

= (g, g 1 , g 2 , h). Note that the correspond-<br />

master − key, which is unknown to B, is<br />

= g ab ∈ G ∗ .<br />

1<br />

“A issues up to private key queries on<br />

ID i ”. B selects randomly r i , r ′ ∗<br />

i ∈ Z p<br />

and k ′ ∈ Z p , sets sk IDi = (d 0 , d 1 , d ′ 0) =<br />

−α ′<br />

ID<br />

(g i −ID ∗<br />

2 (g (IDi−ID∗ )<br />

1 g a ) ri −1<br />

ID<br />

, g i −ID ∗<br />

2 g ri ,<br />

−α ′<br />

ID<br />

g i −ID ∗<br />

2 (g (IDi−ID∗ )<br />

1 g a ) r′ i). We claim sk IDi<br />

is a valid random private key for ID i .<br />

b<br />

To see this, let ˜r i = r i −<br />

ID−ID<br />

and<br />

∗<br />

˜r i ′ = r′ i − b<br />

ID−ID<br />

. Then we have that<br />

∗<br />

−α ′<br />

ID<br />

d 0 = g i −ID ∗<br />

2 (g (IDi−ID∗ )<br />

1 g α′ ) ri =<br />

g2(g a (IDi−ID∗ )<br />

1 g α′ ) ri− b<br />

ID−ID∗<br />

= g2(g a IDi<br />

1 h) ˜ri .<br />

−1<br />

ID<br />

d 1 = g i −ID ∗<br />

2 g ri = g ˜ri .<br />

−α ′<br />

d ′ ID<br />

0 = g i −ID ∗<br />

2 (g (IDi−ID∗ )<br />

1 g α′ ) r′ i<br />

=<br />

g2(g a (IDi−ID∗ )<br />

1 g α′ ) r′ i − b<br />

ID−ID∗<br />

= g2(g a IDi<br />

1 h) ˜r i ′ .<br />

“A issues up to rekey generation queries on<br />

(ID, ID ′ )”.<br />

The challenge B chooses a randomly x ∈ Zp,<br />

∗<br />

2)<br />

KG<br />

3)<br />

αID ′<br />

k<br />

the<br />

is<br />

4)<br />

D.<br />

• The then<br />

1)<br />

G.<br />

is to<br />

g a 1<br />

1)<br />

2)<br />

2)<br />

3)<br />

3)<br />

4)<br />

5)<br />

k 3 )e(g k3u′ 1 , g<br />

k 1 r<br />

1 h) u′ 1, g r )<br />

k 3 )<br />

© 2013 ACADEMY PUBLISHER


1622 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

sets rk ID→ID ′ = x and returns it to A. He<br />

computes w = (gH 1 (ID) h) x<br />

and sends it to the<br />

(g H 1 (ID) h)<br />

proxy. We observe that<br />

rk 1 = αID′ + t 2 + k 1<br />

k 3 (αID + t 2 ) + k 2<br />

but from the simulation, α = a and t 2 = α ′ −<br />

aID ∗ , so we can get<br />

rk 1 = aID′ + α ′ − aID ∗ + k 1<br />

k 3 (aID + α ′ − aID ∗ ) + k 2<br />

Let rk 1 = x, we can get<br />

k 1 = k 3 (aID + α ′ − aID ∗ )(x − k 2 )<br />

−(aID ′ + α ′ − aID ∗ )<br />

= [k 3 (x − k 2 )a(ID − ID ∗ )<br />

−a(ID ′ − ID ∗ )] + k 3 α ′ (x − k 2 ) − α ′<br />

So the challenge B simulates as follows. He<br />

chooses a randomly k 2 , k 3 ∈ Z ∗ p, sets<br />

x =<br />

ID′ − ID ∗<br />

k 3 (ID − ID ∗ ) + k 2,<br />

k 1 = α ′ ( ID′ − ID ∗<br />

ID − ID ∗ ) − α′<br />

searches <strong>in</strong> User-key-list<br />

for item (ID ′ , α ′ , r, r ′ )(we assume<br />

sk ID ′ = (d 0 , d 1 , d ′ 0) =<br />

−α ′<br />

−1<br />

ID ′ −ID ∗<br />

ID<br />

(g<br />

′ −ID ∗<br />

2 (g (ID′ −ID ∗ )<br />

1 g a ) r , g2 g r ,<br />

−α ′<br />

ID<br />

g<br />

′ −ID ∗<br />

2 (g (ID′ −ID ∗ )<br />

1 g a ) r′ ) and computes<br />

rk 1 =<br />

rk 2 = g<br />

ID ′ − ID ∗<br />

k 3 (ID − ID ∗ ) + k 2,<br />

−k 3<br />

ID ′ −ID ∗<br />

2 g k3r′<br />

−k 2 k 3<br />

ID ′ −ID ∗<br />

rk 3 = g2 g k2k3r′ ,<br />

α ′ ( ID′ −ID ∗<br />

ID−ID ∗ )−α′<br />

ID<br />

rk 4 = g<br />

′ −ID ∗<br />

2 g (α′ ( ID′ −ID ∗<br />

ID−ID ∗ )−α ′ )r ′<br />

returns them to A. We can see<br />

C ′ 3e(rk 2 , C ′ 4)<br />

e(C ′ 2 , rk 3)e(C ′ 1 , rk 4)e(d ′ 0 , C′ 1 )<br />

can be reduced to<br />

Me(g 1 , g 2 ) r<br />

e(g α 2 , gr )<br />

= M<br />

Thus our simulation is <strong>in</strong>dist<strong>in</strong>guishable from<br />

the real algorithm runn<strong>in</strong>g. Thus our simulation<br />

is <strong>in</strong>dist<strong>in</strong>guishable from the real algorithm<br />

runn<strong>in</strong>g.<br />

• “A issues up to re-encryption queries on<br />

(C ID , ID, ID ′ )”. The challenge B runs<br />

ReEnc(rk ID→ID ′, C ID , ID, ID ′ ) and returns<br />

the results.<br />

4) Challenge When A decides that Phase1 is over,<br />

it outputs two messages M 0 , M 1 ∈ G. Algorithm<br />

B picks a random bit b and responds with the<br />

ciphertext C = (g c , (g α′ ) c , M b · T ). Hence if T =<br />

e(g, g) abc = e(g 1 , g 2 ) c , then C is a valid encryption<br />

of M b under ID ∗ . Otherwise, C is <strong>in</strong>dependent of<br />

b <strong>in</strong> the adversary’s view.<br />

5) Phase2 A issues queries as he does <strong>in</strong> Phase 1<br />

except natural constra<strong>in</strong>ts.<br />

6) Guess F<strong>in</strong>ally, A outputs a guess b ′ ∈ {0, 1}.<br />

Algorithm B concludes its own game by outputt<strong>in</strong>g<br />

a guess as follows. If b = b ′ , then B outputs 1<br />

mean<strong>in</strong>g T = e(g, g) abc . Otherwise it outputs 0<br />

mean<strong>in</strong>g T ≠ e(g, g) abc .<br />

When T = e(g, g) abc then A’s advantage for break<strong>in</strong>g<br />

the scheme is same as B’s advantage for solv<strong>in</strong>g DBDH<br />

problem.<br />

Theorem 2: Suppose the DBDH assumption holds,<br />

then our scheme proposed <strong>in</strong> Section III-C is DGE-<br />

IBE-IND-sID-CPA secure for the delegator and proxy’s<br />

collud<strong>in</strong>g.<br />

Proof: The security proof is same as the above<br />

theorem except that it does not allow “A issues up to<br />

rekey generation queries on (ID, ID ∗ )”, for B does not<br />

know the private key correspond<strong>in</strong>g to ID ∗ .<br />

Theorem 3: Suppose the DBDH assumption holds,<br />

then our scheme proposed <strong>in</strong> Section III-C is PKG-OW<br />

secure for the delegator, delegatee and proxy’s collud<strong>in</strong>g.<br />

Proof: We just give the <strong>in</strong>tuition for this<br />

theorem. The master-key is g2 α , and delegator’s private<br />

key is sk ID = (g2 α (g1 ID h) u0 , g u0 , (g2 α (g1 ID h) u1 )),<br />

the delegatee’s private key is sk ID ′ =<br />

(g2 α (g1 ID′ h) u0 , g u0 , (g2 α (g1 ID′ h) u1 )) , the proxy reencryption<br />

key is rk ID→ID ′ = ( αID′ +t 2+k 1<br />

k 3(αID+t 2)<br />

+<br />

k 2 , g u′ 1 k3 , g u′ 1 k2k3 , g u′ 1 k1 ). Because the re-encryption key<br />

rk ID→ID ′ is uniformly distributed <strong>in</strong> (Zp, ∗ G, G, G), and<br />

the orig<strong>in</strong>al BB 1 IBE is secure, we can conclude that<br />

g2<br />

α can not be disclosed by the proxy, delegatee and<br />

delegator’s collud<strong>in</strong>g.<br />

E. Toward Chosen Ciphertext Security<br />

As we all know, just consider<strong>in</strong>g IND-sID-CPA security<br />

is not enough for many applications. We consider<br />

construct IND-Pr-ID-CCA secure IBPRE based on a<br />

variant of BB 1 IBE. There are two ways to construct<br />

IND-Pr-ID-CCA secure IBPRE. One way is consider<strong>in</strong>g<br />

CHK transformation to hierarchal variant of BB 1 IBE<br />

to get IND-Pr-sID-CCA secure IBPRE or get IND-Pr-<br />

IDKEM-CCA secure IBPRE. The other way is consider<strong>in</strong>g<br />

variant of BB 1 IBE <strong>in</strong> the random oracle model.<br />

From a practical viewpo<strong>in</strong>t, we construct an IND-Pr-ID-<br />

CCA secure IBPRE based on a variant of BB 1 IBE <strong>in</strong><br />

the random oracle model.<br />

F. Our Proposed IND-Pr-ID-CCA Secure IBPRE Scheme<br />

Based on a Variant of BB 1 IBE<br />

Let G be a bil<strong>in</strong>ear group of prime order p(the security<br />

parameter determ<strong>in</strong>es the size of G). Let e : G × G →<br />

G 1 be the bil<strong>in</strong>ear map. Identities are represented us<strong>in</strong>g<br />

dist<strong>in</strong>ct arbitrary bit str<strong>in</strong>gs <strong>in</strong> {0, 1} l . The messages (or<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1623<br />

session keys) are bit str<strong>in</strong>gs <strong>in</strong> {0, 1} l of some fixed length<br />

l. We require the availability of five hash functions viewed<br />

as random oracles:<br />

• A hash function H 1 : {0, 1} ∗ → Z ∗ q ;<br />

• A hash function H 2 : G 1 × {0, 1} l → G;<br />

• A hash function H 3 : G 1 → {0, 1} l ;<br />

• A hash function H 4 : {0, 1} ∗ ×G×G×G×{0, 1} l →<br />

G;<br />

1) SetUp. To generate IBE system parameters, first<br />

select three <strong>in</strong>tegers α, β, γ ∈ Z p at random. Set<br />

g 1 = g α , g 2 = g t1 and h = g t2 <strong>in</strong> G, and<br />

compute v 0 = e(g, g) αβ . The public system parameters<br />

params and the masterkey are given by:<br />

params = (g, g 1 , g 3 , v 0 ), masterkey = (α, β, γ).<br />

Strictly speak<strong>in</strong>g, the generator need not be kept<br />

secret, but s<strong>in</strong>ce it will be used exclusively by the<br />

authority, it can be reta<strong>in</strong>ed <strong>in</strong> masterkey rather<br />

than published <strong>in</strong> params.<br />

2) Extract. To generate a private key d ID for an<br />

identity ID ∈ {0, 1} ∗ , us<strong>in</strong>g the masterkey, the<br />

PKG picks random s 0 , s 1 ∈ Zp, ∗ choose a hash<br />

function ˜H : Zp ∗ × {0, 1} ∗ → Zp ∗ and computes<br />

u 0 = ˜H(s 0 , ID), u 1 = ˜H(s 1 , ID). It outputs:<br />

d ID = (d 0 , d 1 ) = (g2 α (g H2(ID)<br />

1 h) u0 , g u0 ,<br />

g2 α (g H2(ID)<br />

1 h) u1 ). The PKG preserves (s 0 , s 1 ).<br />

3) Encrypt. To encrypt a message M ∈ {0, 1} l for<br />

a recipient {0, 1} ∗ , the sender chooses a randomly<br />

δ ∈ G and computes s = H 2 (δ, M), k = v0, s C 1 =<br />

g s , C 2 = h s g H1(ID)s<br />

1 , C 3 = δ·k, C 4 = M ⊕H 3 (δ),<br />

C 5 = H 4 (ID ‖ C 1 ‖ C 2 ‖ C 3 ‖ C 4 ) s , and then<br />

outputs C = (C 1 , C 2 , C 3 , C 4 , C 5 ).<br />

4) ReKeyGen. The PKG computes u ′ 1 = ˜H(s 1 , ID ′ )<br />

and randomly selects k 1 , k 2 , k 3 ∈ Zp,<br />

∗<br />

sets rk ID→ID ′ = ( αH1(ID′ )+t 2+k 1<br />

k 3(αH 1(ID)+t 2)<br />

+<br />

k 2 , g u′ 1 k3 , g u′ 1 k2k3 , g u′ 1 k1 ) and sends it to the<br />

proxy via secure channel. We must note that the<br />

PKG computes a different (k 1 , k 2 , k 3 ) for every<br />

different user pair (ID, ID ′ ).<br />

5) ReEnc. Given the identities (ID, ID ′ ),<br />

rk ID→ID ′ = (rk 1 , rk 2 , rk 3 , rk 4 ) =<br />

( αH1(ID′ )+t 2+k 1<br />

k 3(αH 1(ID)+t 2)<br />

+ k 2 , g u′ 1 k3 , g u′ 1 k2k3 , g u′ 1 k1 ),<br />

C ID = (C 1 , C 2 , C 3 , C 4 , C 5 ) with params, the<br />

proxy re-encrypts the ciphertext C ID <strong>in</strong>to C ID ′ as<br />

follows.<br />

a) First it computes v 0 = e(C 5 , g) and v 1 =<br />

e(H 4 (ID ‖ C 1 ‖ C 2 ‖ C 3 ‖ C 4 ), C 1 ). If<br />

v 0 ≠ v 1 , the ciphertext is rejected.<br />

b) Else computes C ID ′ =<br />

(C ′ 1, C ′ 2, C ′ 3, C ′ 4, C ′ 5, C ′ 6, C ′ 7, C ′ 8) =<br />

(C 1 , C 2 , C 3 , C rk1<br />

2 , rk 2 , rk 3 , rk 4 , C 4 ).<br />

6) Decrypt.<br />

a) To decrypt a normal ciphertext C =<br />

(C 1 , C 2 , C 3 , C 4 , C 5 ) us<strong>in</strong>g the private key<br />

d ID = (d 0 , d 1 , d ′ 0), it computes v 0 = e(C 5 , g)<br />

and v 1 = e(H 4 (ID ‖ C 1 ‖ C 2 ‖ C 3 ‖<br />

C 4 ), C 1 ). If v 0 ≠ v 1 , the ciphertext is rejected.<br />

The recipient computes k = e(C1,d0)<br />

e(C 2,d 1)<br />

. It then<br />

computes δ =<br />

C3<br />

k , M = H 4(δ) ⊕ C 4 . It<br />

computes s ′ = H 2 (δ, M) and verifies that<br />

C 1 = g s′ , C 2 = h s′ g H1(ID)s′<br />

1 , if either checks<br />

fails, returns ⊥, otherwise returns M.<br />

b) To decrypt a re-encrypted ciphertext C ID ′ =<br />

(C 1, ′ C 2, ′ C 3, ′ C 4, ′ C 5, ′ C 6, ′ C 7, ′ C 8) ′ us<strong>in</strong>g the<br />

private key d ID = (d 0 , d 1 , d ′ 0), the recipient<br />

computes k =<br />

C ′ 3 e(rk2,C′ 4 )<br />

e(C 2 ′ ,rk3)e(C′ 1 ,rk4)e(d′ 0 ,C′ C3<br />

1<br />

C ′ 3 e(C′ 5 ,C′ 4 )<br />

e(C ′ 2 ,C′ 6 )e(C′ 1 ,C′ 7 )e(d′ 0 ,C′ 1 ) =<br />

). It then computes<br />

δ =<br />

k , M = H 3(δ) ⊕ C 8. ′ It computes<br />

s ′ = H(δ, M) and verifies that C 1 = g s′ ,<br />

C 2 = h s′ g H1(ID)s′<br />

1 , if either check fails,<br />

returns ⊥, otherwise returns M.<br />

G. Security Analysis<br />

Theorem 4: Suppose the DBDH assumption holds,<br />

then our scheme proposed <strong>in</strong> Section III-F is DGA-<br />

IBE-IND-ID-CCA secure for the proxy and delegatee’s<br />

collud<strong>in</strong>g.<br />

Proof: Let A be a p.p.t. algorithm that has nonnegligible<br />

advantage <strong>in</strong> attack<strong>in</strong>g the scheme proposed <strong>in</strong><br />

Section III-F. We use A <strong>in</strong> order to construct a second algorithm<br />

B which has non-negligible advantage at solv<strong>in</strong>g<br />

the DBDH problem <strong>in</strong> G. Algorithm B accepts as <strong>in</strong>put<br />

a properly-distributed tuple (g, g a , g b , g c , R) and outputs<br />

1 if R = e(g, g) abc . We now describe the algorithm B,<br />

which <strong>in</strong>teracts with algorithm A as follow<strong>in</strong>g.<br />

B simulates the random oracles H 1 , H 2 , H 3 , H 4 as<br />

follows.<br />

1) H 1 : {0, 1} ∗ → Zq ∗ . On receipt of a new query for<br />

ID ≠ ID ∗ , return t ← R Zq<br />

∗ and record (ID, t);<br />

On receipt of a new query for ID ∗ , select randomly<br />

T ∈ Zq ∗ , return T and record (ID ∗ , T ).<br />

2) H 2 : G 1 × {0, 1} l :→ Zq ∗ . On a new query (δ, M),<br />

returns s ← R G and record (δ, M, s).<br />

3) H 3 : G 1 :→ {0, 1} l . On receipt of a new query δ,<br />

select p ← {0, 1} l and return p. Record the tuple<br />

(δ, p).<br />

4) H 4 : {0, 1} ∗ × G × G × G × {0, 1} l :→ G. On<br />

receipt of a new query (ID ‖ C 1 ‖ C 2 ‖ C 3 ‖ C 4 ),<br />

select z ∈ Zq ∗ and return g z ∈ G, record (ID ‖<br />

C 1 ‖ C 2 ‖ C 3 ‖ C 4 , z, g z ).<br />

Our simulation proceeds as follows:<br />

1) Setup. B generates the scheme’s master parameter<br />

as follow<strong>in</strong>g. First it lets g 1 = g a , g 2 =<br />

g b , g 3 = g c , algorithm B picks α ∈ Z p at<br />

random and def<strong>in</strong>es h = g −T<br />

1 g α′ ∈ G B lets<br />

params = (G 1 , H 1 , H 2 , H 3 , H 4 , g, g 1 , g 2 , g 3 , h)<br />

and gives params to A.<br />

2) F<strong>in</strong>d/Guess. Dur<strong>in</strong>g the F<strong>in</strong>d stage, there are<br />

no restrictions on which queries A may issue.<br />

The scheme permits only a s<strong>in</strong>gle consecutive reencryption,<br />

therefore, dur<strong>in</strong>g the GUESS stage, A<br />

is restricted from issu<strong>in</strong>g the follow<strong>in</strong>g queries:<br />

a) (extract, ID ∗ ) where ID ∗ is the challenge<br />

identity.<br />

© 2013 ACADEMY PUBLISHER


1624 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

b) (decrypt, ID ∗ , c ∗ ) where c ∗ is the challenge<br />

ciphertext.<br />

c) Any pair of queries (rkextract, ID ∗ , ID i ),<br />

(decrypt, ID i , c i )<br />

where<br />

c i =Reencrypt(rk ID∗ →ID i<br />

, c ∗ ).<br />

In the Guess stage, let ID ∗ be the target i-<br />

dentity, and parse the challenge ciphertext c ∗ as<br />

(C1 ∗ , C2 ∗ , C3 ∗ , C4 ∗ , C5 ∗ ). In both phases, B responds<br />

to A’s queries as follows.<br />

• On (extract, ID), where(<strong>in</strong> the Guess)stage<br />

ID ≠ ID ∗ , B selects randomly<br />

r i ∈ Zp, ∗ sets sk IDi = (d 0 , d 1 ) =<br />

−α ′<br />

H<br />

(g 1 (ID i )−T<br />

1 g α′ ) ri , g2 g ri ).<br />

We claim sk IDi is a valid random private key<br />

b<br />

for ID i . To see this, let ˜r i = r i −<br />

H .<br />

1(ID i)−T<br />

Then we have that<br />

2 (g (H1(IDi)−T )<br />

d 0 = g<br />

−α ′<br />

H 1 (ID i )−T<br />

2 (g (H1(IDi)−T )<br />

g2(g a (H1(IDi)−T )<br />

1 g α′ ) ri− b<br />

H 1 (ID i )−T<br />

g2(g a H1(IDi)<br />

1 h) ˜ri .<br />

−1<br />

H(ID<br />

d 1 = g i )−T<br />

2 g ri = g ˜ri .<br />

−1<br />

d ′ H(ID<br />

0 = g i )−T<br />

2 g ri = g ˜ri .<br />

−1<br />

H 1 (ID i )−T<br />

1 g α′ ) ri =<br />

• On (rkextract, ID, ID ′ ), do the same as A<br />

handl<strong>in</strong>g re-encryption key query <strong>in</strong> Phase 13<br />

<strong>in</strong> the above theorem.<br />

• On (decrypt, ID, c) where (<strong>in</strong> the Guess stage)<br />

(ID, c) ≠ (ID ∗ , c ∗ ), check whether c is<br />

a level-1 (non re-encrypted) or level-2 (reencrypted)<br />

ciphertext. In the Guess stage, parse<br />

c ∗ as (C1 ∗ , C2 ∗ , C3 ∗ , C4 ∗ , C5 ∗ ).<br />

For a level-1 ciphertext, B parses c as<br />

(C 1 , C 2 , C 3 , C 4 , C 5 ) and:<br />

a) Looks up the value (ID ‖ C 1 ‖ C 2 ‖<br />

C 3 ‖ C 4 ) <strong>in</strong> the H 4 table, to obta<strong>in</strong> the<br />

tuple (ID ‖ C 1 ‖ C 2 ‖ C 3 ‖ C 4 , z, g z ). If<br />

(ID ‖ C 1 ‖ C 2 ‖ C 3 ‖ C 4 ) is not <strong>in</strong> the<br />

table, or if (<strong>in</strong> the Guess stage) C 5 = C5 ∗ ,<br />

then B returns ⊥ to A.<br />

b) Looks up the value (δ, M, s) <strong>in</strong> the H 2<br />

table. Checks whether there exist an item<br />

of (δ, M, s) such that S = g zs . If not, B<br />

returns ⊥ to A.<br />

c) Computes k = e(C1,d0)<br />

e(C , checks that δ = C 2,d 1) k .<br />

If not, B returns ⊥ to A.<br />

d) Checks that C 4 = H 3 (δ) ⊕ M. If not, B<br />

returns ⊥ to A.<br />

e) Otherwise, B returns M to A.<br />

For a level-2 ciphertext, B parses c as<br />

(C 1, ′ C 2, ′ C 3, ′ C 4, ′ C 5, ′ C 6, ′ C 7, ′ C 8) ′ and:<br />

a) Computes<br />

k =<br />

=<br />

C ′ 3e(C ′ 5, C ′ 4)<br />

e(C ′ 2 , C′ 6 )e(C′ 1 , C′ 7 )e(d′ 0 , C′ 1 )<br />

C ′ 3e(rk 2 , C ′ 4)<br />

e(C ′ 2 , rk 3)e(C ′ 1 , rk 4)e(d ′ 0 , C′ 1 )<br />

=<br />

b) Checks that δ = C k<br />

. If not, B returns ⊥ to<br />

A.<br />

c) Checks that C 2 = h s g H1(ID)s<br />

1 . If so, return<br />

M. Otherwise, return ⊥.<br />

• On (reencrypt, C ID , ID, ID ′ ). B runs<br />

ReEnc(rk ID→ID ′, C ID , ID, ID ′ ) and returns<br />

the results.<br />

At the end of the F<strong>in</strong>d phase, A outputs<br />

(ID ∗ , M 0 , M 1 ), with the condition that A has not<br />

previously issued (extract, ID ∗ ). At the end of the<br />

Guess stage, A outputs its guess bit i ′ .<br />

3) Choice and Challenge. At the end of the F<strong>in</strong>d<br />

phase, A outputs (ID ∗ , M 0 , M 1 ). B forms the<br />

challenge ciphertext as follows:<br />

a) Choose δ ∈ G 1 and p ∈ {0, 1} n randomly,<br />

and <strong>in</strong>sert (δ, p) <strong>in</strong> H 3 table.<br />

b) Insert (δ, M b , , g 3 , δ · R, M b ⊕ p) to H 2 table.<br />

c) Choose z ∈ Z p randomly, and <strong>in</strong>sert<br />

((g 3 , g3 α′ , δ ·R, M b ⊕p), z, g z ) <strong>in</strong> the H 4 table.<br />

B outputs the challenge ciphertext<br />

(C1 ∗ , C2 ∗ , C3 ∗ , C4 ∗ , C5 ∗ ) = (g 3 , g3 α′ , δ · R, M b ⊕ p, g3)<br />

z<br />

to A and beg<strong>in</strong>s the GUESS stage.<br />

4) Forgeries and Abort conditions The adversary<br />

may forge C 5 on (C 1 , C 2 , C 3 , C 4 ), but from the<br />

security of BLS short signature [7], this probability<br />

is negligible.<br />

Theorem 5: Suppose the DBDH assumption holds,<br />

then our scheme proposed <strong>in</strong> Section III-F is DGE-<br />

IBE-IND-ID-CCA secure for the delegator and proxy’s<br />

collud<strong>in</strong>g.<br />

Proof: The security proof is same as the above<br />

theorem except that it does not allow “A issues up to<br />

rekey generation queries on (ID, ID ∗ )”, for B does not<br />

know the private key correspond<strong>in</strong>g to ID ∗ .<br />

Theorem 6: Suppose the DBDH assumption holds,<br />

then our scheme proposed <strong>in</strong> Section III-F is PKG-OW<br />

secure for the delegator, proxy and delegatee’s collud<strong>in</strong>g.<br />

Proof: The security proof is same as the proof for<br />

Theorem 3.<br />

IV. COMPARISON<br />

In this section, we give our comparison results with<br />

other identity based proxy re-encryption schemes[15],<br />

[11], [27], [29]. We compare our schemes with other<br />

schemes from two ways. First we concern about schemes’<br />

security, then we concern about schemes’ efficiency.<br />

Notations: In Table I, we denote with/without random<br />

oracle as W/O RO, assumption as Assum, security model<br />

as SecMod, collud<strong>in</strong>g attackers as Collud<strong>in</strong>g, underly<strong>in</strong>g<br />

IBE as UnderIBE, stand model as Std, , proxy as P,<br />

DGA as delegator, DGE as delegatee. P and DGA means<br />

that proxy colludes with delegator, P or DGA means that<br />

proxy or delegator is malicious adversary but they never<br />

collude. SymEnc-Sec means the security of symmetric<br />

encryption.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1625<br />

TABLE I.<br />

IBPRE SECURITY COMPARISON<br />

Scheme Security W/O RO Assum SecMod Collud<strong>in</strong>g UnderlyIBE Remark<br />

GA07A[15] IND-Pr-ID-CPA RO DBDH Sec.3.1[15] P and DGA BF IBE Weak<br />

or P and DGE<br />

GA07B[15] IND-Pr-ID-CCA RO DBDH Sec.3.1[15] P and DGA BF IBE Strong<br />

or P and DGE<br />

M07B [27] IND-Pr-sID-CPA Std DBDH Sec.4.2[27] P or DGA BB 1 IBE Weak<br />

or DGE<br />

CT07[11] IND-Pr-ID-CPA Std DBDH Sec.4.2[11] P and DGA Waters’ IBE Weak<br />

or P and DGE<br />

SXC08[29] IND-Pr-ID-CCA Std DBDH Sec.2.6[29] P and DGA Waters’ IBE Strong<br />

or P and DGE<br />

OursCIII-C IND-Pr-sID-CPA Std DBDH III-B P and DGA Variant of Weak<br />

or P and DGE BB 1 IBE<br />

OursDIII-F IND-Pr-ID-CCA RO DBDH III-B P and DGA Variant of Strong<br />

or P and DGE BB 1 IBE<br />

TABLE II.<br />

IBPRE EFFICIENCY COMPARISON<br />

Scheme Enc Check Reenc Dec Ciph-Len<br />

1stCiph 2-ndCiph 1stCiph 2-ndCiph<br />

GA07A[15] 1t e + 1t p 0 1t p 2t p 1t p 2|G| + 2|G e| 1|G| + 1|G e|<br />

GA07B[15] 1t p + 1t e 2t p 2t e + 2t p 1t e + 2t p 2t e + 2t p 1|G| + 1|G e| 1|G| + 1|G T |<br />

+2|m| + |id| +1|G e| + |m|<br />

M07B [27] 1t p + 2t e 2t p 1t p 2t p 2t p 2|G e| + 1|G T | 2|G e| + 1|G T |<br />

CT07[11] 3t e + 1t p + 1t s 1t v 2t e 2t e + 10t p + 1t v 2t e + 3t p 9|G| + 2|G T | 3|G| + |G T |<br />

+|vk| + |s| +|vk| + |s|<br />

SXC08[29] 3t e + 1t p + 1t s 1t v 2t e + 1t s 2t e + 10t p + 2t v 2t e + 3t p + 1t v 9|G| + 2|G T | 3|G| + |G T |<br />

+2|vk| + 2|s| +1|vk| + 1|s|<br />

OursCIII-C 2t e + 1t p 2t p 1t e 4t p 2t p 6|G| + |G T | 2|G| + |G T |<br />

OursDIII-F 3t e + 1t me 2t p 1t e 4t p + 1t e + 1t me 2t p + 1t e + 1t me 7|G| + m 4|G| + m<br />

From Table I, we can know that our IBPRE scheme<br />

based on a variant of BB 1 IBE scheme is the most<br />

secure IBPRE. M07B scheme is the weakest IBPRE for<br />

it can only achieve IND-Pr-sID-CPA under separated<br />

proxy or delegator or delegatee attack.<br />

In Table II, we denote encryption as Enc, reencryption<br />

as Reenc, decryption as Dec, ciphertext as<br />

Ciph and ciphertext length as Ciph-Len. t p , t e and t me<br />

represent the computational cost of a bil<strong>in</strong>ear pair<strong>in</strong>g, an<br />

exponentiation and a multi-exponentiation respectively,<br />

while t s and t v represent the computational cost of a<br />

one-time signature sign<strong>in</strong>g and verification respectively.<br />

|G|, |Z q |, |G e | and |G T | denote the bit -length of an<br />

element <strong>in</strong> groups G, Z q , G e and G T respectively.<br />

Here G and Z q denote the groups used <strong>in</strong> our scheme,<br />

while G e and G T are the bil<strong>in</strong>ear groups used <strong>in</strong> GA07,<br />

CT07, SXC08 schemes, i.e., the bil<strong>in</strong>ear pair<strong>in</strong>g is<br />

e : G e × G e → G T . F<strong>in</strong>ally, |vk| and |s| denote the<br />

bit length of the one-time signature’s public key and a<br />

one-time signature respectively.<br />

From Table II, Our schemes 3 , GA07 4 and M07B<br />

schemes are much more efficient than CT07 and SXC08<br />

scheme due to their underly<strong>in</strong>g IBE is Waters’ IBE.<br />

And for the proxy, CT07 and SXC08 scheme are much<br />

3 Our first level ciphertext maps second level ciphertext and second<br />

level ciphertext maps first level ciphertext <strong>in</strong> [15], [11], [29]. Sometimes<br />

<strong>in</strong> our schemes we use e : G × G → G 1 or e : G 1 × G 1 → G T , <strong>in</strong><br />

the former cases, G maps to G e, G 1 maps G T , <strong>in</strong> the latter case, G 1<br />

maps to G e, G T maps G T .<br />

4 GA07 and SXC08 are multi-hop IBPRE but we just consider their<br />

s<strong>in</strong>gle-hop variant.<br />

more efficient than others for their special paradigm, our<br />

IBPRE scheme is more efficient than GA07B scheme<br />

and our other schemes, we th<strong>in</strong>k this is important for<br />

resist<strong>in</strong>g DDos attack aga<strong>in</strong>st the proxy.<br />

V. CONCLUSIONS AND OPEN PROBLEMS<br />

In 2007, Matsuo proposed the concept of four types<br />

of PRE schemes: CBE to CBE, IBE to CBE, CBE to<br />

IBE and IBE to IBE [27]. In Matsuo’s scheme, they<br />

allow the PKG to help the delegator and the delegatee<br />

to generate re-encryption key. We explore this feature<br />

further, if we allow PKG to generate re-encryption keys<br />

by directly us<strong>in</strong>g master − key, many open problems can<br />

be solved. Consider<strong>in</strong>g the standardization of BB 1 IBE<br />

and its broad applications, we give new identity based<br />

proxy re-encryption schemes based on BB 1 IBE, and<br />

prove its security <strong>in</strong> our new stronger security models.<br />

Furthermore, our schemes are very efficient for the reencryption<br />

process, which is the most heavy-load part of<br />

PRE.<br />

ACKNOWLEDGEMENT<br />

The authors would like to thank Dr. Jian Weng, Dr. Jun<br />

Shao, Dr. Licheng Wang, Dr. Fagen Li, Dr. Qiang Tang<br />

for many helpful discussions and the anonymous referees<br />

for helpful comments.<br />

© 2013 ACADEMY PUBLISHER


1626 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

REFERENCES<br />

[1] G. Ateniese, K. Fu, M. Green, and S. Hohenberger.<br />

Improved proxy re-encryption schemes with applications<br />

to secure distributed storage. In ACM Transactions on<br />

Information and System Security, no. 1, pages 1–30. 2006.<br />

[2] M. Blaze, G. Bleumer and M. Strauss. Divertible protocols<br />

and atomic proxy cryptography. In EUROCRYPT 1998,<br />

volume 1403 of LNCS, pages 127–144, 1998.<br />

[3] D. Boneh, E. Goh, T. Matsuo. Proposal for P1363.3 Proxy<br />

Re-encryption. http://grouper.ieee.org/groups/1363/IBC<br />

/submissions/NTTDataProposal-for-P1363.3-2006-09-<br />

01.pdf.<br />

[4] D. Boneh, M. Frankl<strong>in</strong>. Identity based encryption from the<br />

Weil pair<strong>in</strong>g. In CRYPTO 2001, volume 2139 of LNCS,<br />

pages 213–229, 2001.<br />

[5] D. Boneh and X. Boyen. Efficient Selective-id Secure<br />

Identity Based Encryption without Random Oracles. In<br />

EUROCRYPT 2004, volume 3027 of LNCS, pages 223–<br />

238, 2004.<br />

[6] D. Boneh and X. Boyen. Secure Identity Based Encryption<br />

without Rando Oracles. In CRYPTO 2004, volume 3152<br />

of LNCS, pages 443–459, 2004.<br />

[7] D. Boneh, B. Lynn, and H. Shacham. Short signatures<br />

from the Weil Pair<strong>in</strong>g. In ASIACRYPTO 2001, volume<br />

1976 of LNCS, pages 514–532, 2004.<br />

[8] M. Barbosa, L. Chen, Z. Cheng.<br />

SK−KEM: An Identity−based Kem.<br />

http://grouper.ieee.org/groups/1363/IBC/submissions/Barbosa-<br />

SK-KEM-2006-06.pdf.<br />

[9] R. Canetti, S. Halevi and J. Katz. A forward-secure publickey<br />

encryption scheme. In EUROCRYPT 2003, volume<br />

2656 of LNCS, pages 255–271, 2003.<br />

[10] R. Canetti and S. Hohenberger. Chosen ciphertext secure<br />

proxy re-encryption. In ACM CCS 2007, pages 185–194,<br />

2007.<br />

[11] C. Chu and W. Tzeng. Identity-based proxy re-encryption<br />

without random oracles. In ISC 2007, volume 4779 of<br />

LNCS, pages 189–202, 2007.<br />

[12] L. Chen and Z. Cheng. Security Proof of Sakai-<br />

Kasahara’s Identity-Based Encryption Scheme.<br />

http://epr<strong>in</strong>t.iacr.org/2005 /226.pdf, 2005.<br />

[13] Y. Dodis. and A. Ivan Proxy cryptography revisited. In<br />

Internet Society (ISOC): NDSS 2003, 2003.<br />

[14] E. Fujisaki and T. Okamoto. Secure <strong>in</strong>tegration of asymmetric<br />

and symmetric encryption schemes. In CRYPTO<br />

1999, volume 1666 of LNCS, pages 535–554, 1999.<br />

[15] M. Green and G. Ateniese. Identity-based proxy reencryption.<br />

In ACNS 2007, volume 4521 of LNCS, pages<br />

288–306, 2007.<br />

[16] V. Goyal. Reduc<strong>in</strong>g Trust <strong>in</strong> Identity Based Cryptosystems.<br />

In CRYPTO 2007, volume 4622 of LNCS, pages 430–447,<br />

2007.<br />

[17] C. Gentry. Practical Identity-Based Encryption without<br />

Random Oracles. In EUROCRYPT 2006, volume 4004 of<br />

LNCS, pages 445–464, 2006.<br />

[18] E. Goh and T. Matsuo. Proposal for P1363.3 Proxy<br />

Re-encryption. http://grouper.ieee.org/groups/1363/IBC<br />

/submissions/NTTDataProposal-for-P1363.3-2006-08-<br />

14.pdf.<br />

[19] S. Hohenberger. Advances <strong>in</strong> Signatures, Encryption, and<br />

E-Cash from Bil<strong>in</strong>ear Groups. Ph.D. Thesis, MIT, May<br />

2006.<br />

[20] S. Hohenberger, G. N. Rothblum, a. shelat, V. Vaikuntanathan.<br />

Securely Obfuscat<strong>in</strong>g Re-encryption. In TCC<br />

2007, volume 4392 of LNCS, pages 233–252, 2007.<br />

[21] M. Jakobsson. On quorum controlled asymmetric proxy<br />

re-encryption. In PKC 1999, volume 1560 of LNCS, pages<br />

112–121, 1999.<br />

[22] L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker. A typeand-identity-based<br />

proxy re-encryption scheme and its<br />

application <strong>in</strong> healthcare. In SDM 2008, volume 5159 of<br />

LNCS, pages 185–198, 2008.<br />

[23] M. Luo, C. Zou, J. Xu. An efficient identity-based<br />

broadcast signcryption scheme. In Journal of Software,<br />

pages 366-373, Vol. 7, Num. 2, 2012.<br />

[24] B. Libert and D. Vergnaud. Unidirectional chosen ciphertext<br />

secure proxy re-encryption. In PKC 2008, volume<br />

4939 of LNCS, pages 360–379, 2008.<br />

[25] B. Libert and D. Vergnaud. Trac<strong>in</strong>g malicious proxies <strong>in</strong><br />

proxy re-encryption. In Pair<strong>in</strong>g 2008, volume 5209 of<br />

LNCS, pages 332–353, 2008.<br />

[26] T. Matsuo. Proxy re-encryption systems for identity-based<br />

encryption. In PAIRING 2007, volume 4575 of LNCS,<br />

pages 247–267, 2007.<br />

[27] L. Mart<strong>in</strong>(editor). P1363.3(TM)/D1, Draft Standard for<br />

Identity-based Public Cryptography Us<strong>in</strong>g Pair<strong>in</strong>gs, May<br />

2008.<br />

[28] J. Shao, D. X<strong>in</strong>g and Z. Cao, Identity-Based<br />

Proxy Rencryption Schemes with Multiuse, Unidirection,<br />

and CCA Security. Cryptology ePr<strong>in</strong>t Archive:<br />

http://epr<strong>in</strong>t.iacr.org/2008/103.pdf,2008.<br />

[29] R. Sakai and M. Kasahara. ID based cryptosystems with<br />

pair<strong>in</strong>g on elliptic curve. Cryptology ePr<strong>in</strong>t Archive,<br />

Report2003/054. 2003.<br />

[30] Q. Tang, P. Hartel and W Jonker. Inter-doma<strong>in</strong> identitybased<br />

proxy re-encryption. In INSCRYPT 2008, volume<br />

5487 of LNCS, pages 332–347, 2008.<br />

[31] Q. Tang. Type-based proxy re-encryption and its construction.<br />

In INDOCRYPT 2008, volume 5365 of LNCS, pages<br />

130–144, 2008.<br />

[32] Q. Wu, W. Wang. New identity-based broadcast encryption<br />

with constant ciphertexts <strong>in</strong> the standard model. In Journal<br />

of Software, 1929-1936 Volume 6, Number 10, 2011.<br />

[33] X. A. Wang, X. Y. Yang, J. R. Hu. CCA-Secure Identity<br />

Based Proxy Re-encryption Based on a Variant of BB1<br />

IBE. The 2010 Second International Conference on<br />

Networks Security, Wireless Communications and Trusted<br />

Comput<strong>in</strong>g (NSWCTC 2010), IEEE Press, (Vol.2) 509-<br />

513, 2010.<br />

[34] Y. D<strong>in</strong>g, X. A. Wang. Identity Based Proxy Re-encryption<br />

Based on a Variant of BB1 Identity Based Encryption. The<br />

2010 Second International Conference on Networks Security,<br />

Wireless Communications and Trusted Comput<strong>in</strong>g<br />

(NSWCTC 2010), IEEE Press, (Vol.2) 509-513, 2010.<br />

[35] L. D. Zhou, M. A. Marsh, F. B. Schneider, and A. Redz.<br />

Distributed bl<strong>in</strong>d<strong>in</strong>g for ElGamal re-encryption. TR 1924,<br />

Cornell CS Dept., 2004.<br />

J<strong>in</strong>dan Zhang was born <strong>in</strong> April. 27th, 1983. She<br />

obta<strong>in</strong>ed her master degree from University of Shaanxi<br />

Science and Technology. Now she is a lecturer <strong>in</strong> Xianyang<br />

Vocational Technical College. Her ma<strong>in</strong> research<br />

<strong>in</strong>terests <strong>in</strong>cludes cryptography, and <strong>in</strong>formation hid<strong>in</strong>g.<br />

Xu An Wang was born <strong>in</strong> Feb. 23th, 1981. He obta<strong>in</strong>ed<br />

his master degree from University of Ch<strong>in</strong>ese Armed<br />

Police Force. Now he is an associate professor <strong>in</strong> the same<br />

University. His ma<strong>in</strong> research <strong>in</strong>terests <strong>in</strong>cludes public key<br />

cryptography and <strong>in</strong>formation security.<br />

Xiaoyuan Yang was born <strong>in</strong> Nov. 12th, 1959. He<br />

obta<strong>in</strong>ed his master and bachelor degree from Xidian<br />

University. Now he is a professor <strong>in</strong> the Eng<strong>in</strong>eer<strong>in</strong>g<br />

University of Ch<strong>in</strong>ese Armed Police Force.<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1627<br />

Corn Moisture Measurement us<strong>in</strong>g a<br />

Capacitive Sensor<br />

Hongxia Zhang, Wei Liu*, Boxue Tan, Wenl<strong>in</strong>g Lu<br />

School of Electrical and Electronic Eng<strong>in</strong>eer<strong>in</strong>g, Shandong University of Technology, Zibo, Ch<strong>in</strong>a, 255049<br />

Abstract—Corn<br />

moisture content is the ma<strong>in</strong> factor of<br />

effect<strong>in</strong>g corn safe transportation and storage, and is also an<br />

<strong>in</strong>dispensable measurement part when it is<br />

used to feed,<br />

food and <strong>in</strong>dustry. Due to large particle size, corn will<br />

produce large gap dur<strong>in</strong>g measur<strong>in</strong>g moisture content.<br />

Because air has much <strong>in</strong>fluence on dielectric constant of the<br />

device, moisture content is not precision. In all k<strong>in</strong>ds of corn<br />

moisture<br />

measurement<br />

methods,<br />

capacitance<br />

method<br />

becomes the ma<strong>in</strong> method with simple structure, low cost<br />

and onl<strong>in</strong>e measurement.<br />

This paper designs a sensor for<br />

measur<strong>in</strong>g the<br />

corn moisture<br />

that uses a capacitance<br />

detection circuit based on the relationship between the<br />

capacitance and the dielectric constant of the corn. In<br />

addition, different operat<strong>in</strong>g modes of the detection circuit<br />

are analyzed. The relationship between the moisture content<br />

of corn and the sensor capacitance is obta<strong>in</strong>ed through<br />

experiment and a b<strong>in</strong>ary cubic equation is obta<strong>in</strong>ed by the<br />

least squares fitt<strong>in</strong>g method.<br />

Index Terms—corn<br />

moisture<br />

sensor, detection circuit<br />

measurement,<br />

capacitive<br />

I. INTRODUCTION<br />

The moisture component of a corn cell is essential for<br />

ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g its life activities. Furthermore, the moisture<br />

content must not be too high or too low. Higher moisture<br />

contents will cause corn mildew and other biochemical<br />

reactions. Lower moisture contents may destroy organic<br />

material and damage the dry matter. Hence, the<br />

measurement of moisture levels is important for the safe<br />

storage of corn [1,2] .<br />

The traditional method for measur<strong>in</strong>g moisture content<br />

uses an oven which leads to high accuracy but because it<br />

is time-consum<strong>in</strong>g and <strong>in</strong>volves a complicated procedure,<br />

it is not suitable for field use. Various techniques for<br />

<strong>in</strong>direct test<strong>in</strong>g methods have been studied for replac<strong>in</strong>g<br />

the traditional oven method at home and abroad, e.g. the<br />

use of conductance, capacitance, X-rays, neutrons, and<br />

microwaves. These methods allow quick measurements<br />

and are easily applied under field conditions [3] . The most<br />

common method is the capacitive method which has<br />

advantages of low cost, small volume and fast detection,<br />

although it lacks high precision.<br />

S<strong>in</strong>ce the 1960s, many countries’ researchers attached<br />

great importance to the development of gra<strong>in</strong> moisture<br />

measurement technology. Along with the measurement<br />

methods of gra<strong>in</strong> moisture emerged, advanced gra<strong>in</strong><br />

moisture measurement methods and the <strong>in</strong>struments are<br />

be<strong>in</strong>g promotion at home and abroad. TABLE I and TABLE<br />

II show the company produced the measur<strong>in</strong>g corn gra<strong>in</strong><br />

moisture <strong>in</strong>struments.<br />

TABLE I<br />

MOISTURE METER PRODUCED BY FOREIGN COMPANY<br />

Capacitance<br />

method<br />

Conductance<br />

method<br />

Decompression<br />

Infrared method<br />

Microwave method<br />

Carlfee Hugh<br />

method<br />

Capacitance<br />

method<br />

Conductance<br />

method<br />

F<strong>in</strong>land Humicoy company produced the<br />

WILE100 moisture meter [4]<br />

Japan KETT <strong>in</strong>stitute developed high frequency<br />

capacitive moisture meter<br />

European control company produced the CM - 4<br />

type moisture meter<br />

A Japanese enterprise produced VME type<br />

moisture meter<br />

British <strong>in</strong>frared eng<strong>in</strong>eer<strong>in</strong>g company produced<br />

the SM4 <strong>in</strong>frared moisture meter<br />

Japan QianYe <strong>in</strong>stitute produced the IR-AM300<br />

<strong>in</strong>frared moisture meter<br />

A Japan company produced the FD - 230, FD -<br />

310 and FD - 600 <strong>in</strong>frared moisture meter<br />

The battery motor manufactur<strong>in</strong>g produced<br />

onl<strong>in</strong>e microwave moisture meter<br />

A Germany company produced cont<strong>in</strong>uous<br />

moisture meter<br />

Japan Kyoto electronic company produced the<br />

MKA - 3 type moisture meter<br />

TABLE II<br />

MOISTURE METER PRODUCED BY DOMESTIC COMPANY<br />

Infrared method<br />

East food <strong>in</strong>spection produced the SC – 5F corn<br />

moisture meter<br />

J<strong>in</strong>an detect<strong>in</strong>g <strong>in</strong>strument company produced ly -<br />

8 capacitive moisture meter and LDS – 1G gra<strong>in</strong><br />

moisture meter<br />

Shanghai Q<strong>in</strong>gpu test<strong>in</strong>g <strong>in</strong>strument company<br />

produced LDS-IF , LDS-2,LDS – IA and LDS -<br />

ID<br />

Tianj<strong>in</strong> science and technology company produced<br />

SFY-60 corn rapid moisture meter<br />

Beij<strong>in</strong>g technology company produced high<br />

frequency capacitive gra<strong>in</strong> moisture meter<br />

81W1PM-8188 and gra<strong>in</strong> moisture meter BHC1 -<br />

PM818<br />

Beij<strong>in</strong>g huatai <strong>in</strong>strument technology company<br />

produced JCY13 / SFY -60d moisture meter<br />

Wuhan electronic <strong>in</strong>strument produced LSKC - 4<br />

type gra<strong>in</strong> moisture meter<br />

Hunan <strong>in</strong>strument factory balance <strong>in</strong>strument<br />

factory produced <strong>in</strong>serted l<strong>in</strong>k type moisture meter<br />

Hunan <strong>in</strong>strument factory balance <strong>in</strong>strument<br />

factory developed SCT - 3 moisture meter<br />

Xi’an light m<strong>in</strong>istry of light <strong>in</strong>dustry developed 3<br />

YBSIA four beam <strong>in</strong>frared moisture meter<br />

Guangdong test analysis and wuhan comb<strong>in</strong>e<br />

automation <strong>in</strong>strument developed WSHT - 102<br />

type <strong>in</strong>frared moisture meter<br />

Ts<strong>in</strong>ghua university developed near <strong>in</strong>frared<br />

moisture measurement <strong>in</strong>strument has completed<br />

the pr<strong>in</strong>ciple prototype<br />

*Correspond<strong>in</strong>g Author: weikey@sdut.edu.cn<br />

© 2013 ACADEMY PUBLISHER<br />

doi:10.4304/jcp.8.6.1627-1631


1628 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

Microwave<br />

method<br />

Neutron method<br />

Jil<strong>in</strong> prov<strong>in</strong>ce developed WSY - 100 microwave<br />

corn moisture meter<br />

Nanj<strong>in</strong>g university developed SHD - 1 type of<br />

neutron moisture gauge<br />

II. THEORY<br />

The absolute permittivity divided by the permittivity of<br />

free space is small for samples because of the air gaps<br />

between particles <strong>in</strong> the conta<strong>in</strong>er. Therefore, we adopt a<br />

coaxial cyl<strong>in</strong>der arrangement <strong>in</strong> the design of the<br />

capacitive sensor to ensure the plates’ effective area is<br />

large enough. The electrodes of the sensor are<br />

asymmetrical <strong>in</strong> that the <strong>in</strong>ner electrode is enveloped by<br />

the external one. This geometry is very effective <strong>in</strong><br />

prevent<strong>in</strong>g human body <strong>in</strong>duction. The design of the<br />

capacitive sensor is shown <strong>in</strong> Figure 1.<br />

The corn sample is placed <strong>in</strong> the media cavity between<br />

the two plate sensors. Changes <strong>in</strong> relative permittivity<br />

correspond<strong>in</strong>g to different corn moisture contents cause<br />

variations <strong>in</strong> capacitance allow<strong>in</strong>g the moisture content to<br />

be estimated.<br />

L<br />

R 1<br />

R 2<br />

external electrode<br />

media cavity<br />

<strong>in</strong>ner electrode<br />

Figure 1. capacitive sensor schematic<br />

The cyl<strong>in</strong>der height is L ; the external surface radius of<br />

<strong>in</strong>ner cyl<strong>in</strong>der is R<br />

1<br />

; the <strong>in</strong>ner surface radius of external<br />

cyl<strong>in</strong>der is R<br />

2<br />

. If L >> R2 − R1<br />

, the edge effect of<br />

cyl<strong>in</strong>drical ends can be ignored.<br />

The capacitance of the sensor can be calculated from<br />

the formula [5] :<br />

C<br />

2πε<br />

L<br />

ln R R<br />

= (1)<br />

2 1<br />

Permittivity is understood to represent the relative<br />

complex permittivity. The permittivity relative to free<br />

space, or the absolute permittivity divided by the<br />

permittivity of free space [6] .<br />

ε<br />

r<br />

ε<br />

ε<br />

= (2)<br />

0<br />

After the sample is placed <strong>in</strong>to the sensor the<br />

capacitance [7] is:<br />

C<br />

2πε ε L<br />

r 0<br />

= (3)<br />

R2<br />

It can be seen from the above formula that the changes<br />

of capacitance and relative dielectric constant of corn are<br />

l<strong>in</strong>early related. S<strong>in</strong>ce relative dielectric constant will<br />

change with corn moisture content, the latter can be<br />

obta<strong>in</strong>ed from the measured capacitance.<br />

When the corn relative dielectric constant changes<br />

capacitance changes<br />

∆<br />

ε r<br />

Sensitivity for constant<br />

So<br />

∆C<br />

and ∆ε<br />

r<br />

ln<br />

R<br />

( ε<br />

r<br />

+ ∆ε<br />

r ) L<br />

−10<br />

∆ C = × 10<br />

R2<br />

1.8ln<br />

R<br />

ε<br />

rL<br />

− × 10<br />

R2<br />

1.8ln<br />

R<br />

1<br />

1<br />

1<br />

1<br />

−10<br />

∆ε<br />

rL<br />

× 10<br />

R2<br />

1.8ln<br />

∆C<br />

R1<br />

K = =<br />

∆ε<br />

∆ε<br />

r<br />

L<br />

= × 10<br />

R2<br />

1.8ln<br />

R<br />

r<br />

−10<br />

−10<br />

(4)<br />

(5)<br />

is l<strong>in</strong>ear relationship. For moisture<br />

content corn M , when the corn moisture content<br />

changes ∆ M , relative dielectric constant changes ∆ ε<br />

r<br />

,<br />

causes the capacitance change is ∆ C ,therefore<br />

is l<strong>in</strong>ear relationship.<br />

∆C<br />

also ∆M<br />

III. MEASUREMENT CIRCUIT<br />

Hardware structure diagram of corn moisture<br />

measurement system is shown <strong>in</strong> figure 2. The ma<strong>in</strong> parts<br />

are the ma<strong>in</strong> control circuit, capacitance detection circuit,<br />

temperature detection circuit and RS232 communication<br />

circuit.<br />

Capacitive sensor<br />

Temperature<br />

detection circuit<br />

Capacitance<br />

detection circuit<br />

M S P 4 3 0 F1<br />

3 5<br />

scre e n<br />

R S 232<br />

Communication<br />

circuit<br />

Figure2 Measur<strong>in</strong>g system structure diagram<br />

Epistatic mach<strong>in</strong>e<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1629<br />

The work<strong>in</strong>g pr<strong>in</strong>ciple of moisture measurement<br />

system is: capacitance detection circuit and temperature<br />

detection circuit will set detected signal to the s<strong>in</strong>gle-chip<br />

microcomputer. The s<strong>in</strong>gle-chip microcomputer will<br />

received signal process<strong>in</strong>g as shown on the screen.<br />

The capacitance and changes of capacitance are very<br />

small <strong>in</strong> the capacitive sensor. Hence, detection circuits<br />

are needed to measure the t<strong>in</strong>y capacitance <strong>in</strong>crements.<br />

Usually we translate the t<strong>in</strong>y capacitance <strong>in</strong>crements <strong>in</strong>to<br />

a s<strong>in</strong>gle value function of voltage, current or frequency.<br />

There are many transformed capacitance circuits, such as<br />

capacitance charg<strong>in</strong>g and discharg<strong>in</strong>g circuit, FM circuit,<br />

operational amplifiers circuit, common communication<br />

bridge method, diode double T ac electric bridge, pulse<br />

width modulation circuit and so on.<br />

In the present work we use charg<strong>in</strong>g and discharg<strong>in</strong>g of<br />

capacitance sensor and transform<strong>in</strong>g capacitance <strong>in</strong>to<br />

voltage. The capacitance of the sensor can be obta<strong>in</strong>ed<br />

accord<strong>in</strong>g to the voltage<br />

The process of capacitance charge is<br />

VC<br />

= V ⎛<br />

i ⎜1−<br />

e −<br />

⎝<br />

t<br />

RC<br />

Where t denotes charg<strong>in</strong>g time, and RC denotes the<br />

time constant. The process of capacitance discharged:<br />

When C was charged until t<br />

1<br />

, C beg<strong>in</strong> to discharg<strong>in</strong>g.<br />

The process of capacitance discharge is<br />

C<br />

⎞<br />

⎟<br />

⎠<br />

(6)<br />

( = )<br />

C t t<br />

1<br />

t<br />

RC<br />

V ′ = V e −<br />

(7)<br />

The measurement circuit uses the theory of capacitor<br />

charg<strong>in</strong>g and discharg<strong>in</strong>g which make the output signal<br />

change with the capacitance of the sensor. We can get the<br />

DC voltage signal correspond<strong>in</strong>g to the changed sensor<br />

capacitor through difference amplifier, the same phase<br />

ratio amplifier and low-pass filter. Capacitive sensor<br />

detection circuit, equivalent detection circuit of the<br />

capacitance charg<strong>in</strong>g and equivalent detection circuit of<br />

the capacitance discharg<strong>in</strong>g can be seen from Figure 3 to<br />

Figure 5.<br />

C<br />

C<br />

Multiple<br />

s w itc h<br />

Periodic<br />

switch<br />

signals<br />

V C C<br />

R<br />

R<br />

Balance<br />

circuit<br />

Balance<br />

circuit<br />

R1<br />

R 1<br />

R 1<br />

-<br />

+<br />

R1<br />

A<br />

Figure 3. Capacitive sensor detection circuit<br />

R1<br />

R 1<br />

R 1<br />

-<br />

+<br />

R1<br />

A<br />

R1<br />

R1<br />

R1<br />

R1<br />

-<br />

+<br />

-<br />

+<br />

R1<br />

A<br />

R1<br />

A<br />

L o w -pass filter<br />

L o w -pass filter<br />

Output<br />

signal<br />

Output<br />

signal<br />

Figure 4. Equivalent detection circuit of the capacitance charg<strong>in</strong>g<br />

R<br />

C<br />

Balance<br />

circuit<br />

R1<br />

R 1<br />

R 1<br />

-<br />

+<br />

R1<br />

A<br />

R1<br />

R1<br />

-<br />

+<br />

R1<br />

A<br />

L o w -pass filter<br />

Output<br />

signal<br />

Figure 5. Equivalent detection circuit of the capacitance discharg<strong>in</strong>g<br />

VI. EXPERIMENT AND DATA ANALYSIS<br />

Configuration pr<strong>in</strong>ciple is important. If the default<br />

moisture content is lower than the orig<strong>in</strong>al sample corn<br />

moisture content , we can dry corn gradually through the<br />

oven to reduce the corn moisture content. If the default<br />

moisture is higher than the orig<strong>in</strong>al sample moisture, we<br />

can add water to improve corn gra<strong>in</strong> moisture content.<br />

Calculation formula for about add<strong>in</strong>g water weight [8]<br />

M = M<br />

1<br />

H2 − H1<br />

1−<br />

H<br />

Among formula, the M is added water weight. M1 is<br />

corn orig<strong>in</strong>al sample weight. H1 is orig<strong>in</strong>al sample<br />

moisture content. H2 is the default moisture content.<br />

Dur<strong>in</strong>g the process of corn sample preparation, if the<br />

default moisture value m<strong>in</strong>us corn orig<strong>in</strong>al sample<br />

moisture value is less than 10% [9] , the water can be onetime<br />

jo<strong>in</strong>ed. TABLE III shows operation method of<br />

shak<strong>in</strong>g jar of time and preparation. If greater than 10%,<br />

add water twice.Time about shak<strong>in</strong>g jar and operation<br />

method such as shown <strong>in</strong> TABLE IV<br />

The first<br />

n day<br />

n=1<br />

TABLE III<br />

SHAKING TIME IF LESS Than 10%<br />

Wett<strong>in</strong>g time(t/hour)<br />

one-time jo<strong>in</strong>ed water 60<br />

t=1 15<br />

t=2 15<br />

t=3 15<br />

t=3~24 15<br />

n=2 15<br />

n=3 15<br />

n=4 15<br />

The first<br />

n day<br />

n=1<br />

n=2<br />

2<br />

Shak<strong>in</strong>g time(s)<br />

TABLE IV<br />

SHAKING TIME IF GREATER THAN 10%<br />

Wett<strong>in</strong>g time(t/hour)<br />

Half of total 60<br />

t=1 15<br />

t=2 15<br />

t=3 15<br />

t=3~24 15<br />

Another half of total 60<br />

t=1 15<br />

t=2 15<br />

t=3 15<br />

t=3~24 15<br />

Shak<strong>in</strong>g time(s)<br />

(8)<br />

© 2013 ACADEMY PUBLISHER


1630 JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013<br />

n=3 15<br />

n=4 15<br />

n=5 15<br />

x ′ − x ′<br />

′ 2 1<br />

10<br />

=<br />

xn<br />

′ − x1<br />

′<br />

r<br />

(10)<br />

Twelve corn samples were placed <strong>in</strong> jars of 1L.<br />

Accord<strong>in</strong>g to the above two k<strong>in</strong>ds of operation methods<br />

prepared conta<strong>in</strong><strong>in</strong>g different moisture values of the corn<br />

samples. The sealed jars were stored <strong>in</strong> the laboratory of<br />

shady place. If the sample went bad, we must allocate the<br />

same corn samples to do the experiment.<br />

Place corn samples <strong>in</strong> the lab (laboratory temperature<br />

can be adjusted) and choose a temperature (through the<br />

temperature measurement circuit ). Us<strong>in</strong>g dry method<br />

measure a group of corn sample moisture content value,<br />

at the same time us<strong>in</strong>g the capacitive corn moisture<br />

measurement system collect capacitance value and<br />

voltage value related temperature. The data collection<br />

procedure as follows:<br />

1) Use dry method measure moisture content of a<br />

group of corn sample and record moisture value.<br />

2) At the same time a sample group will be placed <strong>in</strong><br />

the cyl<strong>in</strong>der of capacitive sensor. Press the reset<br />

button and start measur<strong>in</strong>g. After a period of time,<br />

the results of voltage value about sensor capacitance<br />

and temperature will be recorded.<br />

3) Weigh the sample and then put <strong>in</strong>to measurement,<br />

repeat steps 2 and record the results.<br />

4) Each group samples need to repeat measurement 5<br />

times.<br />

5) Another group of corn samples, repeat steps (1) - (4).<br />

Then configurate the same twelve groups of corn<br />

samples <strong>in</strong> lab (temperature changed) and repeat the<br />

above steps. Due to the limitation of the laboratory<br />

conditions, choose the five different temperatures. The<br />

measured data are saw <strong>in</strong> the appendix.<br />

In the process of data collection, the measurement of<br />

the personnel subjective reason, or the external condition<br />

of the objective causes, the results of each measurement<br />

can have <strong>in</strong>dividual measurement results and the real<br />

value a lot of deviation. For each group of corn samples<br />

more measured value, need to use some methods to<br />

remove or modify the deviation of measured value, the<br />

experiment us<strong>in</strong>g statistics discrim<strong>in</strong>ant method of Dixon<br />

(Dixon) criterion [10] get rid of deviation of measured<br />

value.<br />

Assum<strong>in</strong>g there are normal measur<strong>in</strong>g population<br />

x, x … x , arrangement for<br />

distribution of a sample 1 2<br />

, ,<br />

n<br />

the sample x ′ , , 1<br />

x ′<br />

2<br />

… x ′<br />

n<br />

, by from big to small,<br />

accord<strong>in</strong>g to the value of n can structure as shown below<br />

statistics,<br />

If n=3~7,<br />

x ′<br />

n<br />

− x ′<br />

n−1<br />

r10<br />

=<br />

x ′ − x ′<br />

n<br />

1<br />

(9)<br />

If n=8~10,<br />

If n=11~13,<br />

If n=14~30,<br />

If rij r ′<br />

ij<br />

x ′<br />

n<br />

− x ′<br />

n−1<br />

r11<br />

=<br />

x ′ − x ′<br />

r ′ =<br />

11<br />

n<br />

2<br />

x ′<br />

2<br />

− x ′<br />

1<br />

x ′ − x ′<br />

n−1 1<br />

x ′<br />

n<br />

− x ′<br />

n−2<br />

r21<br />

=<br />

x ′ − x ′<br />

r ′ =<br />

r<br />

21<br />

22<br />

n<br />

2<br />

x ′<br />

3<br />

− x ′<br />

1<br />

x ′ − x ′<br />

n−1 1<br />

x ′<br />

n<br />

− x ′<br />

n−2<br />

=<br />

x ′ − x ′<br />

n<br />

x ′<br />

3<br />

x ′<br />

1<br />

r ′<br />

−<br />

22<br />

=<br />

x ′ − x ′<br />

3<br />

n−2 1<br />

> and r D ( a,<br />

n)<br />

x ′<br />

n can be judged as abnormal value.<br />

r r ′<br />

If<br />

ij ij<br />

ij<br />

< and r D ( a,<br />

n)<br />

ij<br />

(11)<br />

(12)<br />

(13)<br />

(14)<br />

(15)<br />

(16)<br />

> (Dixon coefficient),<br />

′ > , x ′<br />

1<br />

can be judged as<br />

abnormal value. Otherwise, there is no abnormal value<br />

judgment.<br />

Experimental data obta<strong>in</strong>ed is discrete data, each set<br />

of data can not always avoid measurement error, need to<br />

use data fitt<strong>in</strong>g method to get data reflect the change<br />

trend of the whole of the approximate function. This<br />

paper collected the corn sample data based on the<br />

pr<strong>in</strong>ciple of least square fitt<strong>in</strong>g method, i.e., look<strong>in</strong>g for a<br />

fitt<strong>in</strong>g curve y = s (x) to approximate show discrete data<br />

that coord<strong>in</strong>ate relationship of function.<br />

All the experiments were carried out at room<br />

temperature and take no account of effects of<br />

temperature changes. Us<strong>in</strong>g the detection circuit to<br />

measure the capacitance of samples and the dry<strong>in</strong>g<br />

method to measure moisture content, we obta<strong>in</strong>ed the<br />

© 2013 ACADEMY PUBLISHER


JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1631<br />

curve of moisture content versus capacitance as shown <strong>in</strong><br />

Figure 6 .<br />

Us<strong>in</strong>g the least squares method we obta<strong>in</strong>ed the b<strong>in</strong>ary<br />

cubic equation l<strong>in</strong>k<strong>in</strong>g the capacitance x(nF) and moisture<br />

content y(%) on the basis of the experimental data. The<br />

equation is shown as follow<br />

moisture content(%)<br />

32<br />

30<br />

28<br />

26<br />

24<br />

22<br />

20<br />

18<br />

16<br />

y x x x<br />

3 2<br />

= −0.000054149 − 0.0089798 + 0.63413 + 11.4539 (17)<br />

14<br />

0 10 20 30 40 50 60 70 80<br />

capacitance(nF)<br />

Figure 6. Plot of corn moisture content versus capacitance (the<br />

cont<strong>in</strong>uous l<strong>in</strong>e is the fitt<strong>in</strong>g curve)<br />

From Figure 6, we conclude that capacitance <strong>in</strong>creases<br />

with <strong>in</strong>creas<strong>in</strong>g corn moisture content.<br />

V. CONCLUSIONS<br />

The relationship between moisture content and<br />

capacitance was obta<strong>in</strong>ed <strong>in</strong> 8 groups of experiments. The<br />

moisture content of the samples can be determ<strong>in</strong>ed on the<br />

basis of capacitance measured by the detection circuit.<br />

The error is smaller than <strong>in</strong> the dry<strong>in</strong>g method. We<br />

conclude that the accuracy <strong>in</strong> measur<strong>in</strong>g moisture content<br />

by the capacitive sensor circuit is high and that the<br />

method is appropriate for accurate assessment of the<br />

moisture content <strong>in</strong> corn.<br />

ACKNOWLEDGMENT<br />

The authors gratefully acknowledge assistance from Dr.<br />

Mike Hey from the University of Nott<strong>in</strong>gham, and also<br />

give thanks to the M<strong>in</strong>istry of Shandong Education<br />

(J09LG17), who provided part of the research fund<strong>in</strong>g.<br />

REFERENCES<br />

[1] JING Yong, DING Lan. Research on the design of<br />

capacitive gra<strong>in</strong> moisture meter, Journal of Shenyang<br />

university of aeronautics, 2011, 28 (2):51-54<br />

[2] C.V.K. Kandala. Instrument for S<strong>in</strong>gle-kernel nondestructive<br />

moisture measurement, Food and Process<br />

Eng<strong>in</strong>eer<strong>in</strong>g Inst. of ASAE, 36(1993):849-854<br />

[3] ZHAI Baofeng, BAI Yuan. Design of Capacitor Moisture<br />

Detector for Cereal, Journal of Liaon<strong>in</strong>g <strong>in</strong>stitute of<br />

technology, 2002,23 (1):34-35<br />

[4] LUO Chengm<strong>in</strong>g. Based on capacitance method of gra<strong>in</strong><br />

moisture detection system research and design. Northwest<br />

agriculture and forestry university of science and<br />

technology,2011:2-4<br />

[5] Babankumar S Bansod. Performance evaluation of digital<br />

gra<strong>in</strong> moisture analyzer for Indian wheat, Journal of<br />

scientific &Industrial Research, 70(2011)41-44<br />

[6] Mahmoud Soltani. Use of dielectric properties <strong>in</strong> quality<br />

measurement of agricultural products, Nature and Science,<br />

2011, 9(4):57-61<br />

[7] Li Zhang, Yuan Yijun. The Measur<strong>in</strong>g Moisture Content of<br />

Gra<strong>in</strong> Based on AVR, Farm mach<strong>in</strong>ery research,<br />

2010(6):183-185<br />

[8] ZHAI Baofeng. Based on data fusion of gra<strong>in</strong> moisture<br />

detection technology research. Shenyang university of<br />

technology,2002:8,13-14,16<br />

[9] Anton Fuchs, Hubert Zangl, Michael J. Moser, Thomas<br />

Bretterklieber. Capacitive sens<strong>in</strong>g <strong>in</strong> process <strong>in</strong>strumentation,<br />

metrology and measurement systems, 2009; 557-568<br />

[10] WANG Zhaohua. Based on the active bridge of capacitive<br />

sensor and measur<strong>in</strong>g system research. Beij<strong>in</strong>g university<br />

of chemical, 2006:11<br />

[11] M.E.Casada, P.R.Armstrong. Wheat moisture measurement<br />

with a fr<strong>in</strong>g<strong>in</strong>g field capacitive sensor.Transactions of<br />

the ASABE,vol.52(5):1785-1791<br />

[12] Measurement of Gra<strong>in</strong> Moisture. Rice Quality Workshop,<br />

2003:1-5<br />

[13] A.W.Kraszewski,S.O.Nelson. Nondestructive microwave<br />

measurement of moisture content and mass of s<strong>in</strong>gle<br />

peanut kernels. Food and Process Eng<strong>in</strong>eer<strong>in</strong>g Inst of<br />

ASAE, 1993, 36(1), 127-133<br />

[14] P.A.Berbert, B.C.Stenn<strong>in</strong>g. Analysis of Density <strong>in</strong>dependent<br />

Equations for Determ<strong>in</strong>ation of Moisture Content of<br />

Wheat <strong>in</strong> the Radiofrequency Range. J. Agric. Engng,<br />

1996(65):275-286<br />

[15] P.A.Berbert, B.C.Stenn<strong>in</strong>g. On-l<strong>in</strong>e Moisture Content<br />

Measurement of Wheat. J.agric.Engng, (1996)65,287-296<br />

[16] A.W.Kraszewski, S.Trabelsi, S.O.Nelson. Comparison of<br />

Density-<strong>in</strong>dependent Expressions for Moisture Content<br />

Determ<strong>in</strong>ation <strong>in</strong> Wheat at Microwave Frequencies.<br />

J.agric.Engng,1998(71),227-237<br />

[17] A.W.Kraszewski, S.Trabelsi. Temperature compensated<br />

and Density <strong>in</strong>dependent Moisture Content Determ<strong>in</strong>ation<br />

<strong>in</strong> Shelled Maize by Microwave Measurements. J.agric.<br />

Engng, (1999)72,27-35<br />

[18] Pablo J.Prado. NMR hand-held moisture sensor. Magnetic<br />

Resonance Imag<strong>in</strong>g 19(2001) 505-508<br />

[19] Chiachung Chen. Evaluation of Air Oven Moisture<br />

Content Determ<strong>in</strong>ation Methods for Rough Rice.<br />

Biosystems Eng<strong>in</strong>eer<strong>in</strong>g (2003)86(4),447-457<br />

[20] G.Diane Lee. What do Gra<strong>in</strong> Moisture Meters Measure and<br />

How are They Calibrated<br />

[21] Fred Owens, Steve Soderlund. Methodsf or measr<strong>in</strong>g<br />

moisture content of gra<strong>in</strong>s and implications for research<br />

and <strong>in</strong>dustry. 2007, 238-244<br />

[22] Anton Fuchs, Hubert Zangl, Gert Holler. Capacitance-<br />

Based Sens<strong>in</strong>g of Material Moisture <strong>in</strong> Bulk Solids:<br />

Applications and Restrictions. Smart Sensors and Sens<strong>in</strong>g<br />

Technology,235-247<br />

© 2013 ACADEMY PUBLISHER


Call for Papers and Special <strong>Issue</strong>s<br />

Aims and Scope.<br />

Journal of Computers (JCP, ISSN 1796-203X) is a scholarly peer-reviewed <strong>in</strong>ternational scientific journal published monthly for researchers,<br />

developers, technical managers, and educators <strong>in</strong> the computer field. It provide a high profile, lead<strong>in</strong>g edge forum for academic researchers, <strong>in</strong>dustrial<br />

professionals, eng<strong>in</strong>eers, consultants, managers, educators and policy makers work<strong>in</strong>g <strong>in</strong> the field to contribute and dissem<strong>in</strong>ate <strong>in</strong>novative new work<br />

on all the areas of computers.<br />

JCP <strong>in</strong>vites orig<strong>in</strong>al, previously unpublished, research, survey and tutorial papers, plus case studies and short research notes, on both applied and<br />

theoretical aspects of computers. These areas <strong>in</strong>clude, but are not limited to, the follow<strong>in</strong>g:<br />

• Computer Organizations and Architectures<br />

• Operat<strong>in</strong>g Systems, Software Systems, and Communication Protocols<br />

• Real-time Systems, Embedded Systems, and Distributed Systems<br />

• Digital Devices, Computer Components, and Interconnection Networks<br />

• Specification, Design, Prototyp<strong>in</strong>g, and Test<strong>in</strong>g Methods and Tools<br />

• Artificial Intelligence, Algorithms, Computational Science<br />

• Performance, Fault Tolerance, Reliability, Security, and Testability<br />

• Case Studies and Experimental and Theoretical Evaluations<br />

• New and Important Applications and Trends<br />

Special <strong>Issue</strong> Guidel<strong>in</strong>es<br />

Special issues feature specifically aimed and targeted topics of <strong>in</strong>terest contributed by authors respond<strong>in</strong>g to a particular Call for Papers or by<br />

<strong>in</strong>vitation, edited by guest editor(s). We encourage you to submit proposals for creat<strong>in</strong>g special issues <strong>in</strong> areas that are of <strong>in</strong>terest to the Journal.<br />

Preference will be given to proposals that cover some unique aspect of the technology and ones that <strong>in</strong>clude subjects that are timely and useful to the<br />

readers of the Journal. A Special <strong>Issue</strong> is typically made of 10 to 15 papers, with each paper 8 to 12 pages of length.<br />

The follow<strong>in</strong>g <strong>in</strong>formation should be <strong>in</strong>cluded as part of the proposal:<br />

• Proposed title for the Special <strong>Issue</strong><br />

• Description of the topic area to be focused upon and justification<br />

• Review process for the selection and rejection of papers.<br />

• Name, contact, position, affiliation, and biography of the Guest Editor(s)<br />

• List of potential reviewers<br />

• Potential authors to the issue<br />

• Tentative time-table for the call for papers and reviews<br />

If a proposal is accepted, the guest editor will be responsible for:<br />

• Prepar<strong>in</strong>g the “Call for Papers” to be <strong>in</strong>cluded on the Journal’s Web site.<br />

• Distribution of the Call for Papers broadly to various mail<strong>in</strong>g lists and sites.<br />

• Gett<strong>in</strong>g submissions, arrang<strong>in</strong>g review process, mak<strong>in</strong>g decisions, and carry<strong>in</strong>g out all correspondence with the authors. Authors should be<br />

<strong>in</strong>formed the Instructions for Authors.<br />

• Provid<strong>in</strong>g us the completed and approved f<strong>in</strong>al versions of the papers formatted <strong>in</strong> the Journal’s style, together with all authors’ contact<br />

<strong>in</strong>formation.<br />

• Writ<strong>in</strong>g a one- or two-page <strong>in</strong>troductory editorial to be published <strong>in</strong> the Special <strong>Issue</strong>.<br />

Special <strong>Issue</strong> for a Conference/Workshop<br />

A special issue for a Conference/Workshop is usually released <strong>in</strong> association with the committee members of the Conference/Workshop like<br />

general chairs and/or program chairs who are appo<strong>in</strong>ted as the Guest Editors of the Special <strong>Issue</strong>. Special <strong>Issue</strong> for a Conference/Workshop is<br />

typically made of 10 to 15 papers, with each paper 8 to 12 pages of length.<br />

Guest Editors are <strong>in</strong>volved <strong>in</strong> the follow<strong>in</strong>g steps <strong>in</strong> guest-edit<strong>in</strong>g a Special <strong>Issue</strong> based on a Conference/Workshop:<br />

• Select<strong>in</strong>g a Title for the Special <strong>Issue</strong>, e.g. “Special <strong>Issue</strong>: Selected Best Papers of XYZ Conference”.<br />

• Send<strong>in</strong>g us a formal “Letter of Intent” for the Special <strong>Issue</strong>.<br />

• Creat<strong>in</strong>g a “Call for Papers” for the Special <strong>Issue</strong>, post<strong>in</strong>g it on the conference web site, and publiciz<strong>in</strong>g it to the conference attendees.<br />

Information about the Journal and <strong>Academy</strong> <strong>Publisher</strong> can be <strong>in</strong>cluded <strong>in</strong> the Call for Papers.<br />

• Establish<strong>in</strong>g criteria for paper selection/rejections. The papers can be nom<strong>in</strong>ated based on multiple criteria, e.g. rank <strong>in</strong> review process plus<br />

the evaluation from the Session Chairs and the feedback from the Conference attendees.<br />

• Select<strong>in</strong>g and <strong>in</strong>vit<strong>in</strong>g submissions, arrang<strong>in</strong>g review process, mak<strong>in</strong>g decisions, and carry<strong>in</strong>g out all correspondence with the authors.<br />

Authors should be <strong>in</strong>formed the Author Instructions. Usually, the Proceed<strong>in</strong>gs manuscripts should be expanded and enhanced.<br />

• Provid<strong>in</strong>g us the completed and approved f<strong>in</strong>al versions of the papers formatted <strong>in</strong> the Journal’s style, together with all authors’ contact<br />

<strong>in</strong>formation.<br />

• Writ<strong>in</strong>g a one- or two-page <strong>in</strong>troductory editorial to be published <strong>in</strong> the Special <strong>Issue</strong>.<br />

More <strong>in</strong>formation is available on the web site at http://www.academypublisher.com/jcp/.


Deformed Kernel Based Extreme Learn<strong>in</strong>g Mach<strong>in</strong>e<br />

Chen Zhang, Shixiong Xia, and B<strong>in</strong>g Liu<br />

Optimal Sleep Schedul<strong>in</strong>g Scheme for Wireless Sensor networks Based on Balanced Energy<br />

Consumption<br />

Shan-shan Ma, Jian-sheng Qian, and Yan-j<strong>in</strong>g Sun<br />

Identity Based Proxy Re-encryption From BB1 IBE<br />

J<strong>in</strong>dan Zhang, Xu An Wang, and Xiaoyuan Yang<br />

Corn Moisture Measurement us<strong>in</strong>g a Capacitive Sensor<br />

Hongxia Zhang, Wei Liu, Boxue Tan, and Wenl<strong>in</strong>g Lu<br />

1602<br />

1610<br />

1618<br />

1627


(Contents Cont<strong>in</strong>ued from Back Cover)<br />

Intrusion Detection Based on Improved SOM with Optimized GA<br />

Jian-Hua Zhao and Wei-Hua Li<br />

Fault Diagnosis System for NPC Inverter based on Multi-Layer Pr<strong>in</strong>cipal Component Neural Network<br />

Danjiang Chen, Y<strong>in</strong>zhong Ye, and Rong Hua<br />

Pulse Wave K Value Averag<strong>in</strong>g Computation and Pathological Diagnosis<br />

Li Yang, J<strong>in</strong>xue Sui, and Yunan Hu<br />

Multi-Step Prediction Algorithm of Traffic Flow Chaotic Time Series based on Volterra Neural<br />

Network<br />

Lisheng Y<strong>in</strong>, Yigang He, Xuep<strong>in</strong>g Dong, and Zhaoquan Lu<br />

Adaptive Track<strong>in</strong>g Control for Nonaff<strong>in</strong>e Nonl<strong>in</strong>ear Systems with Zero Dynamics<br />

Hui Hu and Peng Guo<br />

Improved Feasible SQP Algorithm for Nonl<strong>in</strong>ear Programs with Equality Constra<strong>in</strong>ed Sub-Problems<br />

Zhijun Luo, Guohua Chen, Simei Luo, and Zhib<strong>in</strong> Zhu<br />

F<strong>in</strong>ite Element Analysis Based Design of Mobile Robot for Remov<strong>in</strong>g Plug Oil Well<br />

Xiaojie Tian, Yonghong Liu, Rongju L<strong>in</strong>, Baop<strong>in</strong>g Cai, Zengkai Liu, and Rui Zhang<br />

Contour Error Coupled-Control Strategy based on L<strong>in</strong>e Interpolation and Curve Interpolation<br />

Guoyong Zhao, Hongj<strong>in</strong>g An, and Q<strong>in</strong>gzhi Zhao<br />

Research of Leaf Quality Based on Snowflake Theory<br />

Lihui Zhou, Jiajia Sun, Juanjuan An, and Jun Long<br />

Oscillation Criteria for Second Order Nonl<strong>in</strong>ear Neutral Perturbed Dynamic Equations on Time<br />

Scales<br />

Xiup<strong>in</strong>g Yu, Hua Du, and Hongyu Yang<br />

Improved Quantum Ant Colony Algorithm based on Bloch Coord<strong>in</strong>ates<br />

Xiaofeng Chen, X<strong>in</strong>gyou Xia, and Ruiyun Yu<br />

Image Fusion Method Based on Directional Contrast-Inspired Unit-L<strong>in</strong>k<strong>in</strong>g Pulse Coupled Neural<br />

Networks <strong>in</strong> Contourlet Doma<strong>in</strong><br />

Xi Cai, Guang Han, and J<strong>in</strong>kuan Wang<br />

The Critical Legal Contention under the Challenge of Information Age and the Predom<strong>in</strong>ant Social<br />

Interests Concern for Develop<strong>in</strong>g Intelligent Vehicle Telematics <strong>in</strong> the United States<br />

Fa-Chang Cheng and Wen-Hs<strong>in</strong>g Lai<br />

MPC Controller Performance Evaluation and Tun<strong>in</strong>g of S<strong>in</strong>gle Inverted Pendulum Device<br />

Chao Cheng, Zhong Zhao, and Haixia Li<br />

A Metadata-driven Cloud Comput<strong>in</strong>g Application Virtualization Model<br />

Yunpeng Xiao, Guangxia Xu, Yanb<strong>in</strong>g Liu, and Bai Wang<br />

Robust Portfolio Optimization with Options under VE Constra<strong>in</strong>t us<strong>in</strong>g Monte Carlo<br />

X<strong>in</strong>g Yu<br />

A Novel Water Quality Assessment Method Based on Comb<strong>in</strong>ation BP Neural Network Model and<br />

Fuzzy System<br />

M<strong>in</strong>g Xue<br />

An Isolated Dual-Input Converter for Grid/PV Hybrid Power Systems<br />

Yu-L<strong>in</strong> Juan, Hs<strong>in</strong>-Y<strong>in</strong>g Yang, and Peng-Lai Chen<br />

1456<br />

1464<br />

1472<br />

1480<br />

1488<br />

1496<br />

1504<br />

1512<br />

1520<br />

1528<br />

1536<br />

1544<br />

1552<br />

1560<br />

1571<br />

1580<br />

1587<br />

1594

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!