Computer and Information Science
Computer and Information Science
1
Contents
A Framework for Selection of Information Systems Development Methodologies 3
Masoud Yaghini, Atieh Bourouni & Roozbeh Hesam Amiri
Model Checking the Inconsistency and Circularity in Rule-Based Expert Systems 12
Desheng Xu, Kejian Xia, Dezheng Zhang & Huangsheng Zhang
End-User Computing Satisfaction (EUCS) in Computerised Accounting System (CAS): Which the Critical
Factors? A Case in Malaysia
18
Azleen Ilias, Mohd Zulkeflee Abd Razak, Rahida Abdul Rahman & Mohd Rushdan Yasoa'
Layer Model and Algorithm of Organization Authorization Based on Position Network 25
Feng Ding, Yanzhang Wang & Xin Ye
Chi-Square Test for Anomaly Detection in XML Documents Using Negative Association Rules 35
K. Premalatha & A.M. Natarajan
Research of Sales Contract Management System Based on WEB 43
Hualun Lai, Liangwei Zhong & Jing Ni
Complexity Analysis in Heterogeneous System 48
Kuldeep Sharma & Deepak Garg
Pixel Based Temporal Analysis Using Chromatic Property for Removing Rain from Videos 53
Peng Liu, Jing Xu, Jiafeng Liu & Xianglong Tang
Fault Recovery Mechanisms in Utility Accrual Real Time Scheduling Algorithm 61
Idawaty Ahmad & Muhammad Fauzan Othman
The Fusion of Remote Sensing Images Based on Lifting Wavelet Transformation 69
Wei Zhang, Jinzhong Yang, Xiaohong Wang, Qinghua Yang, Qin Huang & Zhenkun Wang
Individual Differences, Perceived Ease of Use, and Perceived Usefulness in the E-Library Usage 76
Yusliza Mohd.Yusoff, Zikri Muhammad, Mohd Salehuddin Mohd Zahari, Ermy Syaifuddin Pasah &
Emmaliana Robert
Research and Application of the 3D Virtual Community Based on WEBVR and RIA 84
Meng Zhang, Zhihan Lv, Xiaolei Zhang, Ge Chen & Ke Zhang
Framework for Conference Management System 90
Abu Bakar Md Sultan, Abdul Azim Abdul Ghani & Lim Su Fang
Design of the Closed Loop Speed Control System for DC Motor 95
Guoliang Zhong & Liangzhong Jiang
Simulation Research of Extension Control Based on Crane-Double Pendulum System 103
Gang Yang, Weiwei Zhang, Ying Huang & Yongquan Yu
An Analysis of Improving Memory Performance Based on EEG Alpha and Theta Oscillations 108
Tianbao Zhuang, Hong Zhao & Zheng Tang
A Study on Query Optimization for Federated Database Systems 115
Xinhua Xu
Study on the Optimization Method of Select Query Sentence in Standard SQL Language 121
Yuqing Geng & Chunsheng Zhang
Vol. 2, No. 1 Computer and Information Science
2
Contents
Tracking High Speed Skater by Using Multiple Model 126
Guojun Liu & Xianglong Tang
Digital Divide: Issues Facing Adult Learners 132
Ramesh Rao
To Construct Search Engine Analyzer for Electrical Enterprises Based on Lucene 137
Kehe Wu, Xia He, Tingshun Li & Hongyu Tao
The Characteristic and Success Factors of an Organizational Memory Information System 142
Saidatul Rahah Hamidi & Kamaruzaman Jusoff
The Research of the Model of Communication System Depending on the Queuing Theory 152
Min Zhao, Jiyin Sun & Xiaochun Che
Estimate 3D Arm Motion with Hierarchical Limb Model 156
Xuesong Yu & Jiafeng Liu
Study on the Software Development Based on AOP Technology 164
Wei Wang & Wenju Liu
Analysis of BitTorrent on an Open Source VPN Technology to End User 168
Farok Azmat, Md Ikhwan Hamdan & Kamaruzaman Jusoff
Generating a Simple Fractal Graphics in Computer 184
Changhao Shuai & Yong Li
Stochastic Programming Models and Hybrid Intelligent Algorithm for Unbalanced Bidding Problem 188
Xingzi Liu, Liang Lin & Dongran Zang
People Portraits and Cartoon Algorithm Study 195
Weihua Gai & Dakun Zhang
A Summary Sentence Decomposition Algorithm for Summarizing Strategies Identification 200
Norisma Idris, Sapiyan Baba & Rukaini Abdullah
The Design of Intelligent Home Alarming System Based on Wireless Sensor Network Technology 211
Xin Chen & Weizhi Huang
Computer and Information Science February, 2009
3
- -
Evaluation
- - -
:
-
:
Implementation
- - -
:
-
;
Examination
- - -
;
-
;
Planning
- - -
:
-
:
Physical design
-
: ; ; ; ;
Logical design
-
; ; ; ; ;
Analysis ; ; ; ; ; ;
Feasibility : : ; : ; :
Strategy ;
-
; :
T
o
o
l
s
- -
A
d
v
i
c
e
t
o
u
s
e
u
s
e
b
e
c
a
u
s
e
o
f
c
o
m
p
l
e
x
i
t
y
a
n
d
t
i
m
e
A
d
v
i
c
e
t
o
u
s
e
u
s
e
b
e
c
a
u
s
e
o
f
c
o
m
p
l
e
x
i
t
y
a
n
d
t
i
m
e
M
a
j
o
r
M
o
d
e
l
R
i
c
h
p
i
c
t
u
r
e
S
o
c
i
a
l
-
t
e
c
h
n
i
c
a
l
m
o
d
e
l
D
F
D
E
R
D
D
F
D
O
b
j
e
c
t
M
o
d
e
l
P
h
i
l
o
s
o
p
h
y
A
p
p
l
i
c
a
t
i
o
n
S
i
t
u
a
t
i
o
n
s
i
n
c
l
u
d
e
h
u
m
a
n
a
c
t
i
v
i
t
i
e
s
A
n
y
s
y
s
t
e
m
w
i
t
h
a
n
y
s
i
z
e
B
i
g
S
y
s
t
e
m
B
i
g
S
y
s
t
e
m
B
i
g
S
y
s
t
e
m
B
i
g
S
y
s
t
e
m
D
o
m
a
i
n
i
n
f
o
r
m
a
t
i
o
n
a
n
d
o
r
g
a
n
i
s
a
t
i
o
n
a
l
s
y
s
t
e
m
s
p
l
a
n
n
i
n
g
N
o
t
w
e
l
l
-
d
e
f
i
n
e
d
o
r
u
n
s
t
r
u
c
t
u
r
e
d
D
e
t
e
r
m
i
n
e
d
p
r
o
b
l
e
m
s
o
l
v
i
n
g
m
e
t
h
o
d
o
l
o
g
y
D
e
t
e
r
m
i
n
e
d
p
r
o
b
l
e
m
s
o
l
v
i
n
g
m
e
t
h
o
d
o
l
o
g
y
S
t
r
a
t
e
g
i
c
i
n
f
o
r
m
a
t
i
o
n
a
n
d
o
r
g
a
n
i
s
a
t
i
o
n
a
l
s
y
s
t
e
m
s
p
l
a
n
n
i
n
g
D
e
t
e
r
m
i
n
e
d
p
r
o
b
l
e
m
s
o
l
v
i
n
g
m
e
t
h
o
d
o
l
o
g
y
D
e
t
e
r
m
i
n
e
d
p
r
o
b
l
e
m
s
o
l
v
i
n
g
m
e
t
h
o
d
o
l
o
g
y
O
b
j
e
c
t
i
v
e
s
F
o
r
c
o
m
p
l
e
x
s
i
t
u
a
t
i
o
n
s
a
n
a
l
y
s
i
s
I
m
p
r
o
v
e
w
o
r
k
l
i
f
e
q
u
a
l
i
t
y
a
n
d
i
n
c
r
e
a
s
e
u
s
e
r
j
o
b
s
a
t
i
s
f
a
c
t
i
o
n
C
o
m
p
u
t
e
r
i
z
e
d
i
n
f
o
r
m
a
t
i
o
n
s
y
s
t
e
m
s
d
e
v
e
l
o
p
m
e
n
t
C
o
m
p
u
t
e
r
i
z
e
d
i
n
f
o
r
m
a
t
i
o
n
s
y
s
t
e
m
s
d
e
v
e
l
o
p
m
e
n
t
C
o
m
p
u
t
e
r
i
z
e
d
i
n
f
o
r
m
a
t
i
o
n
s
y
s
t
e
m
s
d
e
v
e
l
o
p
m
e
n
t
C
o
m
p
u
t
e
r
i
z
e
d
i
n
f
o
r
m
a
t
i
o
n
s
y
s
t
e
m
s
d
e
v
e
l
o
p
m
e
n
t
P
a
r
a
d
i
g
m
S
y
s
t
e
m
i
c
S
y
s
t
e
m
i
c
S
c
i
e
n
t
i
f
i
c
S
c
i
e
n
t
i
f
i
c
S
c
i
e
n
t
i
f
i
c
S
c
i
e
n
t
i
f
i
c
A
p
p
r
o
a
c
h
S
o
f
t
S
o
f
t
H
a
r
d
H
a
r
d
H
a
r
d
H
a
r
d
S
S
M
E
T
H
I
C
S
Y
S
M
I
E
S
S
A
D
M
R
U
P
Computer and Informatiion Science
F
1
The problem
situation:
unstructured
2
The probl
situation
expresse
Figure 2.
igure 1. RUP G
lem
n:
ed
3
Root definition of
relevant systems
7
Action to impro
the problem
situation
Compa
w
Soft Systems M
General Struct
f
4a
Formal system
concepts
ove
m
5
arison of 4
with 2
Methodology S
ture (Scott, 200
ms
4
Conceptu
models
6
Feasible,
desirable
changes
Stages (Check
05)
4b
Other systems
thinking
ual
s
kland, 1981)
Feb
s
bruary, 2009
11
Vol. 2, No. 1 Computer and Information Science
12
=
(
(
(
(
(
(
(
(
=
mn m m
n
n
n m m m
n
n
n
m
T
u u u
u u u
u u u
pos user pos user pos user
pos user pos user pos user
pos user pos user pos user
pos pos pos
user
user
user
P U
......
...... ...... ...... ......
......
......
......
...... ...... ...... ......
......
......
] ,..., , [
......
2 1
2 22 21
1 12 11
2 1
2 2 2 1 2
1 2 1 1 1
2 1
2
1
T
P U
P
U | |
n m mn P
u U
=
m
user
n
pos
m
user
n
pos 0 =
n m
pos user 0 =
mn
u
m
user
n
pos 1 =
n m
pos user 1 =
mn
u
(
(
(
(
1 ...... 0 0
...... ...... ...... ......
0 ...... 1 1
1 ...... 0 1
RBAC
RBAC
} ,..., , {
2 1 i
rol rol rol
T
i
rol rol rol R ] ,..., , [
2 1
=
i n
rol pos
n
pos
i
rol
ni
p
T
R P
(
(
(
(
=
(
(
(
(
(
(
(
(
=
ni n n
i
i
i n n n
i
i
i
n
T
p p p
p p p
p p p
rol pos rol pos rol pos
rol pos rol pos rol pos
rol pos rol pos rol pos
rol rol rol
pos
pos
pos
R P
......
...... ...... ...... ......
......
......
......
...... ...... ...... ......
......
......
] ,..., , [
......
2 1
2 22 21
1 12 11
2 1
2 2 2 1 2
1 2 1 1 1
2 1
2
1
Computer and Information Science February, 2009
27
Shorten for , then: .
We still use the descriptions for roles and operations in model, and setup multi-mapping for them. By allowing
this, the workload for distributing the system function is reduced a lot. Show as figure 4.
We define a set of operation:
, record as vector ;
We record the mapping of and as , and record it as the form of :
Shorten for , then: .
By the matrix of the mapping of User-Position, Position-Role and Role-Operation, we can get the
matrix for single layer organization authorization. With , the relationship of different parts in the system can be
found out easily.
We record as the elements in , and is the mapping of users and operations. So we get Single-layer Model
Algorithm for Organization Authorization System:
If , it shows that the user has the right to get the operation ; if , it shows that the user
has no right to get the operation . From this matrix , all the operations that each user can get are shown clearly.
This can help the system administrator check the rationality of each user, and enhance the reliability of the whole
system.
From the above process, shows the relationship between users
and positions, recorded as: ;
T
R P
R
P | |
i n ni R
p P
=
RBAC
} ,..., , {
2 1 j
oper oper oper
T
j
oper oper oper O ] ,..., , [
2 1
=
j i
oper rol
i
rol
j
oper
ij
r
T
O R
(
(
(
(
(
=
(
(
(
(
(
(
(
(
(
=
ij i i
j
j
j i i i
j
j
j
i
T
r r r
r r r
r r r
oper rol oper rol oper rol
oper rol oper rol oper rol
oper rol oper rol oper rol
oper oper oper
rol
rol
rol
O R
......
...... ...... ...... ......
......
......
......
...... ...... ...... ......
......
......
] ,..., , [
......
2 1
2 22 21
1 12 11
2 1
2 2 2 1 2
1 2 1 1 1
2 1
2
1
T
O R
O
R
| |
j i
ij O
r R
=
j m
T T
(
(
(
(
(
(
(
(
(
(
(
(
(
=
=
=
ij i i
j
j
ni n n
i
i
mn m m
n
n
j i ij i n ni n m mn
O R P
r r r
r r r
r r r
p p p
p p p
p p p
u u u
u u u
u u u
r p u
R P U T
......
...... ...... ...... ......
......
......
......
...... ...... ...... ......
......
......
......
...... ...... ...... ......
......
......
] [ ] [ ] [
2 1
2 22 21
1 12 11
2 1
2 22 21
1 12 11
2 1
2 22 21
1 12 11
mj
t T
mj
t
j m mj j i ij i n ni n m mn
t r p u T
= = ] [ ] [ ] [ ] [
0 =
mj
t m j 0 =
mj
t m
j T
(
(
(
(
(
(
(
(
ni n n
i
i
mn m m
n
n
p p p
p p p
p p p
u u u
u u u
u u u
......
...... ...... ...... ......
......
......
......
...... ...... ...... ......
......
......
2 1
2 22 21
1 12 11
2 1
2 22 21
1 12 11
i n ni n m mn R
p u U
= ] [ ] [
Vol. 2, No. 1 Computer and Information Science
28
And shows the relationship between positions and roles, recorded
as: .
and are very helpful in the application of checking the middle layer mapping in organization authorization
system.
2.2 Multi-layer Model Algorithm for organization authorization system
In the practice of government, a structure like pyramid has been formed between different layers and sections. And this
caused that the same structure has been used in the former constructed systems. And also there are lots of pyramid
structures in positions.
Meanwhile for the easy configuration of organization authorization system, the pyramid structures were formed
between roles in many systems based on .
Because of the multi-layer structures, we need to expand the single-layer model for further detection to verify the
authorization process.
For the multi-layer, we add a column vector between each two layers. Each column vector consists of the mapping of
the elements of the two layers.
As to the multi-layer structure of positions, if the number of positions is , and they have been divided into layers,
we describe each position as , and show the abstract description as figure 5.
We describe the whole position set as , and describe the layer as
; if there are layers, we can get vectors.
We get the relationship of layer and layer with the multiplication of column vector and the transpose of
column vector , and record it as :
When has
some kind of relationship with , we record the value of as 1. If there is no
relationship, we record it as 0. So we can get a matrix which only consists of 0 and 1. Suppose there are
layers in position structure, we can get matrices in total. Record them as .
Multiply these matrices one by one, we can get the whole position structure matrix :
For the roles with abstract layer structure, figure 6 gives an example.
We use to describe the mapping matrix between the two nearby role layers, then we can get the whole role
(
(
(
(
(
(
(
(
(
ij i i
j
j
ni n n
i
i
r r r
r r r
r r r
p p p
p p p
p p p
......
...... ...... ...... ......
......
......
......
...... ...... ...... ......
......
......
2 1
2 22 21
1 12 11
2 1
2 22 21
1 12 11
j i ij i n ni O
r p P
= ] [ ] [
R
U
O
P
RBAC
n t
pos
t n
n n n
pos
pos
pos
pos
pos
pos
pos
pos
pos
(
(
(
(
......
......
......
......
......
...... ......
2
1
2
1
2
1
l
] , 1 [ ,
......
2
1
t l
pos
pos
pos
p
n
l
e
(
(
(
(
= t t
l 1 + l l
1 + l
) 1 (
+ l l
p
n n
n n n n
n
n
n
n
l l
pos pos pos pos pos pos
pos pos pos pos pos pos
pos pos pos pos pos pos
pos pos pos
pos
pos
pos
p
+
(
(
(
(
=
(
(
(
(
=
......
...... ...... ...... ......
......
......
] ,..., , [
......
2 1
2 2 2 1 2
1 2 1 1 1
2 1
2
1
1 ,
i
pos
k
pos ] , 1 [ , , n k i pos pos
k i
e
n n t
1 t n n
t t
p p p
) 1 ( 23 12
,......, ,
1 t n n P
) positions of layers : , , ( ,
1
1
) 1 (
total t N n l p P
t
l
l l
e =
[
=
+
) 1 (
+ k k
r
Computer and Information Science February, 2009
29
structure matrix :
The organization authorization system structure with multi-layer positions and roles shows in figure 7.
When getting the position structure matrix and role structure matrix, we can get the Multi-layer Model Algorithm for
Organization Authorization System:
3. Example for Single-layer Model Algorithm
For a given existing organization authorization system, we analyze its internal relationship between users, positions,
roles and operations.
Figure 8 shows the mapping between users and positions.
We get:
;
Figure 9 shows the mapping between positions and roles:
We get:
;
Figure 10 shows the mapping between roles and operations:
We get:
;
The whole system mapping is shown in figure 11.
From we get:
;
From we get:
R
) roles of layers : , , ( ,
1
1
) 1 (
total h N h k r R
h
k
k k
e =
[
=
+
j i ij
h
k
k k i n ni
t
l
l l n m mn O R P
r r p p u R R P P U T
=
+
=
+
= =
[ [
] [ ] [ ] [
1
1
) 1 (
1
1
) 1 (
) roles of layers : , positions of layers : , , , ( total h total t N h t l e
(
(
(
(
=
(
(
(
(
= =
1 0 0 0 0
1 1 1 0 0
0 1 1 1 0
0 0 1 1 1
] [
45 44 43 42 41
35 34 33 32 31
25 24 23 22 21
15 14 13 12 11
u u u u u
u u u u u
u u u u u
u u u u u
u U
n m mn P
(
(
(
(
(
(
=
(
(
(
(
(
(
= =
1 0 0
1 1 0
1 1 1
0 1 1
0 0 1
] [
53 52 51
43 42 41
33 32 31
23 22 21
13 12 11
p p p
p p p
p p p
p p p
p p p
p P
i n ni R
(
(
(
=
(
(
(
= =
1 1 1 0 0
0 0 1 1 0
0 0 0 1 1
] [
35 34 33 32 31
25 24 23 22 21
15 14 13 12 11
r r r r r
r r r r r
r r r r r
r R
j i ij O
i n ni n m mn R
p u U
= ] [ ] [
(
(
(
(
=
(
(
(
(
(
(
(
(
(
(
=
1 0 0
3 2 1
2 3 2
1 2 3
1 0 0
1 1 0
1 1 1
0 1 1
0 0 1
1 0 0 0 0
1 1 1 0 0
0 1 1 1 0
0 0 1 1 1
R
U
j i ij i n ni O
r p P
= ] [ ] [
Vol. 2, No. 1 Computer and Information Science
30
;
From we get:
;
Now we can get the conclusion from the above calculation results:
From the mapping , the relationship of users and roles, we can see that there are 3 paths for user 1 to access role
1, 3 paths for user 2 to access role 2, 3 paths for user 3 to access role 3, and only 1 path for user 4 to access
role 4. Among these users, user 1, 2, 3 get full the rights to access all the roles, but user 4 does not.
From the mapping , we can see that position 1 can only access two operations, but position 3 can get the right
to access all the operations in the system.
From the mapping , there are 5 paths for user 1, user 2 and user 3 to get operation 2 and operation 3. Obviously the
authorization process was duplicated, and threatened to the safety of the system. If some user has more than 1 path to
get an operation, when someday the system administrator changes the configuration of the system and bans one path of
the user, the user can still access the operation through other paths. This can cause some uncertainty of the system.
References
Adams, S Farrell. (1999). Internet X. 509 Public Key Infrastructure: Certificate Management Protocols[EB/OL] .RFC
2510. March 1999.
Anders Kristensen. (1999). Formsheets and the XML Forms Language .Computer NetWorks, 1999, 31 :1189 .
Arpinar I B et al. (1999). Formalization of workflows and correctness issues in the presence of concurrency .Distributed
and Parallel Databases, 1999, 7(2):199~248.
Charlie Kaufman, Radia Perlman, Mike Speciner. (2002). Network Security: Private Communication in a Public World
[M] .America: Prentice Hall, 2002.
Christensen S R, Petrucci L. (2000). Modular analysis of Petri nets .The Computer Journal, 2000, 43(3):224~242 .
Christopher Steel, Ramesh Nagappan, Ray Lai. (2006). Core Security Patterns Best Practices and Strategies for J2EE,
Web Services and Identity Management[M] .2006.
Dave Crane, Eric Pascarello, Darren James. (2005). Ajax in Action [M]. America: Manning, 2005.
Eva Maler, Prateek Mishra. (2003). Assertions and Protocol for the OASIS Security Assertion Markup
Language(SAML)v1.1[EB/OL] .http://www.oasisopen.org/committee/security/. 2003-09.
Ferraiolo David F,Sandhu Ravi,Gavrila Serban,et al. (2001). Pro2 posed NIST standard for role2based access
control[J] .ACM Transac-tions on Information and Systems Security, 2001, 4 (3) :224-274 .
Holloway L E, Krogh B H, Giua A. (1999). A survey of Petri net methods for controlled discrete event
systems .Discrete Event Dynamic Systems: Theory and Applications, 1999, 7(2):151~190 .
Jesse James Garrett. (2005). Ajax: A New Approach to Web Applications
[EB/OL] .http://www.adaptivepath.com/publications/essays/archives/000385.php. 2005-2.
Liberty Alliance Project. Liberty Architecture View v1.1[EB/OL] .http://www.Projectliberty.org. 2003-01.
Liu K C, Ong T N. (1999). A modeling approach for handling business rules and exception .The Computer Journal,
1999, 42(3):206~223 .
Luo Z W, Sheth A, Kochut K, Miller J. (2000). Exception handling in workflow system .Applied Intelligence, 2000,
13(2):125~147 .
Mazzeo A, Mazzeocca N, Russo S, Vittorin V. (1997). A systematic approach to the Petri net based specification of
(
(
(
(
(
(
=
(
(
(
(
(
(
(
(
(
=
1 1 1 0 0
1 1 2 1 0
1 1 2 2 1
0 0 1 2 1
0 0 0 1 1
1 1 1 0 0
0 0 1 1 0
0 0 0 1 1
1 0 0
1 1 0
1 1 1
0 1 1
0 0 1
O
P
j i ij i n ni n m mn
r p u T
= ] [ ] [ ] [
(
(
(
(
=
(
(
(
(
(
(
(
(
(
(
(
(
(
=
1 1 1 0 0
3 3 5 3 1
2 2 5 5 2
1 1 3 5 3
1 1 1 0 0
0 0 1 1 0
0 0 0 1 1
1 0 0
1 1 0
1 1 1
0 1 1
0 0 1
1 0 0 0 0
1 1 1 0 0
0 1 1 1 0
0 0 1 1 1
T
R
U
O
P
T
Computer
concurrent
OASIS
http://docs
Perry D E
Engineerin
R. Fieldin
http://www
Ravi S San
1996, 29(2
Ryan Asle
SANDHU
standard .
2000, :47-
Volchkov
2001,:39-4
W M P v
Knowledg
and Informati
t systems .Rea
eXtensible
s.oasis-open.or
E, Romanovsky
ng, 2000, 26(9
ng, J. Gettys
w.w3.org/Proto
ndhu, Edward
2):38-47 .
son, (2005). N
U R S, FERRA
Proceedings o
63 .
A. (2001). R
45 .
van der Aalst
ge Engineering
ion Science
al-Time System
Access
rg/xacml/2.0/a
y A, Tripathi
) :817~819 .
s, J. Mogul,
ocols/rfc2616/r
d J Coyne, Hal
Nathaniel T Sch
AIOLO D, KUH
of the Fifth A
Revisiting Sing
t. (2001). A
g, 2001, 38(3):3
Fi
ms, 1997, 13(3)
Control
ccess-control-x
A. (2000). Cu
et al. (1999
rfc2616.html:
l L Feinstein, e
hutta. Foundat
HN R. (2000)
ACM Worksh
gle Sign-On A
reference mod
335~263 .
igure 1. User-P
): 219~236 .
Markup
xacml-2.0-cor
urrent trands in
9). Hypertext
October, 1999
et al. (1996). R
ions of Ajax [M
. The NIST m
hop on Role B
A Pragmatic A
del for team-
Position-Role-
Language(X
re-spec-OS.pdf
n exception ha
Transfer Pro
9.
Role-Based A
M] .America: A
model for role-b
Based Access
Approach in a
-enabled work
-Operation Mo
XACML)
f. 20052-01.
andling .IEEE
otocol-HTTP/1
ccess Control
Apress, 2005.
based access c
s Control [C].
New Contex
kflow manage
odel
Feb
version 2
.
E Transaction o
1.1 [EB/OL]
Models .IEEE
control: Towar
. Berlin, Germ
xt .IT Professi
ement systems
bruary, 2009
31
2.0[EB/OL].
on Software
.RFC2616.
E Computer,
rds a unified
many:ACM,
onal, IEEE,
s .Data and
Vol
32
l. 2, No. 1
F
Figure 2. U
Figure 4. Role-
User-Position M
Operation Ma
Mapping
apping
Figure 6
Figu
Figur
6. Roles Layer
Co
ure 3. Position-
re 5. Positions
rs
omputer and In
-Role Mapping
Layers
nformation Sci
g
ience
Computer and Informati
Figure 7. C
ion Science
Complex Orga
Figure 8. Use
anization Autho
er-Position Ma
Figure 10.
orization Syste
apping
Role-Operatio
em Model Bas
Figure 9. Po
on Mapping
sed on Position
osition-Role M
Feb
ns and Roles
Mapping
bruary, 2009
33
Vol
34
l. 2, No. 1
Fig
gure 11. Relati
ionship in Org
ganization Auth
Co
horization Proc
omputer and In
cess
nformation Sciience
Computer and Information Science February, 2009
35
2
>
2
=
T
C R
eij
Tj ij
2
) (
ij
R Tj
C
2
= +
( , ) ( , ) ( , )
r b
I x y I x y I x y A =
( , ) ( , ) ( , ) ( , ) ( , )
r b r b
I x y I x y I x y E x y I x y
T
t
t A = =
( , ) ( , )
E r
I x y TE x y =
T
t
o =
( , ) ( , ) (1 ) ( , )
r E b
I x y I x y I x y o o = +
( , ) ( , ) ( , )
E b
I x y I x y I x y o o A =
( , )
E
I x y T / T o t =
1 2
2 1
( , ) ( , )
( , ) ( , )
b b
I x y I x y
I x y I x y
o
A A
=
( , )
E
I x y o
R G B
( , )
E
I x y o
( , ) I x y A
&
R
G B ( , )
b
I x y
&
( , ) ( , ) ( , )
E b
I x y I x y I x y o o A =
& & &
( , ) [ ( , ), ( , ), ( , )]
T
E ER EG EB
I x y I x y I x y I x y =
&
( , ) ( , ) ( , )
ER EG EB
I x y I x y I x y = = ( , )
E
I x y
( , ) x y ( , ) [ ( , ), ( , ), ( , )]
T
r rR rG rB
I x y I x y I x y I x y =
&
( , ) [ ( , ), ( , ), ( , )]
T
r rR rG rB
I x y I x y I x y I x y ' ' ' ' =
&
( , ) [ ( , ), ( , ), ( , )]
T
b bR bG bB
I x y I x y I x y I x y =
&
( , ) [ ( , ), ( , ), ( , )]
T
E ER EG EB
I x y I x y I x y I x y =
&
o
( , ) [ ( , ), ( , ), ( , )]
T
E ER EG EB
I x y I x y I x y I x y ' ' ' ' =
&
o'
( , ) ( , ) (1 ) ( , )
r E b
I x y I x y I x y o o =
& & &
( , ) ( , ) (1 ) ( , )
r E b
I x y I x y I x y o o ' ' ' ' =
& & &
( , ) ( , )
( , )
1
r E
b
I x y I x y
I x y
o
o
' ' '
=
'
& &
&
1
( , ) ( , ) ( , ) ( , ) ( , )
1 1
r r E E r
I x y I x y I x y I x y I x y
o o o
o o
o o
'
' ' ' ' =
' '
& & & & &
Vol. 2, No. 1 Computer and Information Science
56
Comparing Eq.(11) with Eq.(8), it shows that Eq.(8) is the special form of Eq.(11) when . In this condition the
pixel with less intensity value is background pixel. And the rain-affected time is zero, so .
Since the terms of , and in Eq.(11) are equal respectively in three channels, let
, , we can rewrite Eq.(11)
(12)
Eq.(12) is the pixel-based imaging formula using chromatic properties.
3. Existence of solution and noise effect
Eq.(12) is the imaging model of rain-affected pixels which is used as a detecting function. But when is
affected by noise, it is difficult to get an accurate value so that is inaccurate. Let denote the
noise in three channels, from Eq.(12), we get
(13)
Using two channel to calculate the value of , for example using , channels:
(14)
Calculation of is of two types.
(1) does not approach to zero
When does not approach to zero, suppose , and . The term of noises is negligible.
Using Eq.(12), we will get three values respectively in , channels. So according to the imaging model of
pixels covered by raindrops, if the three values are similar, this pixel is a rain-affected pixel. Otherwise it belongs
to a moving object.
(2) approaches to zero
When approaches to zero, the term of noises is not negligible. Although a pixel is rain-affected pixel, the
three values calculating by three channels may be not equal to each other. In this condition, ,
, where , due to the fast movement of raindrops, , therefore , we
get . From Eq.(13), when a pixel is affected by a raindrop,
. Since the noise is caused by illumination or imaging process, its far less than
the intensity change caused by a mobbing object. We get . So if we use and to denote different
channels, when approaches to zero, the pixel at is affected by raindrops, otherwise
its of a moving object.
4. Segmentation of moving object
From the discussion above we know if a pixel is covered by a raindrop, either , or
does not approach to zero. So the equation
has a solution. We use a general formula to calculate the
variable .
(15)
Where , is a threshold to judge if approaches to
zero. For three channels we will get three values by using Eq.(15). That is
r b
I I ' =
& &
0 o' =
1
( , ) ( , )
1
E E
I x y I x y
o
o o
o
' '
'
& &
1
o o
o
'
'
1
( , ) ( , )
1
E E
A I x y I x y
o
o o
o
' ' =
'
& & &
1
K
o o
o
'
=
'
( , ) ( , )
r
I x y A K I x y ' A =
& & &
( , )
r
I x y '
&
K
, , ,
[ ]
T
R G B
=
&
( , ) ( , )
b
I x y A K I x y ' A = +
& & & &
K R G
( , ) ( , )
R G R G
bR bG bR bG
I x y I x y
K
I I I I
A A
= +
' ' ' '
K
bR bG
I I ' '
bR bG
I I ' '
bR bG
I I C ' ' > 0 C >
K R G
K
bR bG
I I ' '
bR bG
I I ' '
K ( ) 0
bR bG
I I ' '
( ) /(1 ) K o o o ' ' = / T o t = 0 T t <
1 K <
( ) 0
bR bG
K I I ' '
( ( , ) ( , )) ( )
R G R G
I x y I x y A A
0
R G
k ' k
'
( , ) ( , )
k k
I x y I x y A A ( , ) x y
( , ) ( , ) 0
R G
I x y I x y A A
( , ) ( , )
bR bG
I x y I x y ' '
( ( , ) ( , )) /( ( , ) ( , ))
R G bR bG
K I x y I x y I x y I x y ' ' = A A
k
( , ) ( , )
( ( , ) ( , )) (1 )
( , ) ( , )
R G
R G
bR bG
I x y I x y
K J I x y I x y J
I x y I x y
A A
= A A
' '
1, when ( , ) ( , )
0, when ( , ) ( , )
bR bG
bR bG
J I x y I x y C
J I x y I x y C
' ' = s
C ( , ) ( , )
bR bG
I x y I x y ' '
k
Computer and Information Science February, 2009
57
(16)
The final value of is .To determine whether a pixel is covered by a raindrop by values of is
very tedious. Here we use another method to segment moving object from rain field.
From Eq.(11) and Eq.(12), we know . Consider , because ,
and we get , that is . So
(17)
Where , and . So when the pixel at is covered by a raindrop, we have .
However when the pixel belongs to a moving object, the term of does not converge to zero. The
detecting function is
(18)
If dose not converge to zero, the pixel is of a moving object. We obtain the edges of moving object by using
this detecting function.
5. Detection and removal of rain
As mentioned in section 1.2, we suppose those frames abstracted from video are aligned in advance. Using the detecting
function, a frame is divided into two parts: static background and foreground. So the removal algorithm is twofold:
(a) To remove raindrops in background.
(b) To remove raindrops in foreground.
Many methods are suitable for removing raindrops in static background. We use Kalman Filter to suppress intensity
increase caused by raindrops. To remove raindrops in foreground, we align the foregrounds respectively, and then use
the method of removing raindrops in background like the first step.
6. Results and Analyses
Our experiments use a threshold of 3 gray levels to detect the intensity change of pixels. Use a threshold of 5 gray to
judge if the subtraction between channels such as approaches to zero. In calculating of
detecting function, the order of is 1, the threshold of the detecting function is 5.
Fig.2 (a) is an image of static scene from the video captured by Zhang and Li (2006, pp.461-464). (b) is removal result
using Garg and Nayars method (2007, pp.3-27). The result shows that the method of Garg and Nayar is not effective
when rain is heavy because their removal algorithm only calculates two consecutive frames. Image using method of
Zhang and Li (2006, pp.461-464) has better quality. But their method uses K-means clustering to calculate the
background color which is effective in static scene. But this method will damage the image quality in some areas of
dynamic scene by improperly regarded some moving object pixels as rain-affected pixels.
Fig. 3 shows results in dynamic scenes. Fig. 3 (b) and (c) are result of Zhangs method. The improperly detected pixels
obviously damage the visual quality of derained image. (d) is our result. (e) and (f) are local areas of (d). Compared
with (c), our results accurately detected rain-affected area. (g) is another frame in this video. (j) is derained frame. (h)
and (i) are local areas of (g). (k) and (l) are local areas of (j). Our results show a better performance in this conditon.
7. CONCLUSIONS
By further studying the model of raindrops, we obtain a detecting function using chromatic property which is suitable
for a general rain condition. It can segment rain-affected pixels from moving objects between two frames. Then
removing approach is classified into two steps: to remove raindrops in background and to remove raindrops covered
moving objects. The removal method makes the pixels at the same position of backgrounds in each frame similar and
shows a better visual quality. Another advantage is that our method does not use any information about the shape, the
velocity of raindrops, neither uses the value of cameras exposure time. Therefore it is effective in various conditions,
such as heavy rain, light rain, rain in focus, rain out of focus and so on. When the objects are moving in the rain, this is
1 1 1
2 2 2
3 3 3
( , ) ( , )
( ( , ) ( , )) (1 )
( , ) ( , )
( , ) ( , )
( ( , ) ( , )) (1 )
( , ) ( , )
( , ) ( , )
( ( , ) ( , )) (1 )
( , ) ( ,
R G
R G
bR bG
R B
R B
bR bB
B G
B G
bB bG
I x y I x y
K J I x y I x y J
I x y I x y
I x y I x y
K J I x y I x y J
I x y I x y
I x y I x y
K J I x y I x y J
I x y I x y
A A
= A A
' '
A A
= A A
' '
A A
= A A
' ' )
k
1 2 3
max( , , ) k k k k
( ) /(1 ) K o o o ' ' = K o ( 1) /(1 ) K o o o o ' ' =
0 1 o < 0 K o < K o s
1
( , ) ( , ) ( , )
n n n
E
K I x y I x y I x y o o
+
A s A <
/ T o t = T t ( , ) x y
1
lim ( , ) 0
n
E
n
I x y o
+
( , )
n
K I x y A
( , ) ( , )
n
F x y K I x y = A
( , ) F x y
( , ) ( , )
bR bG
I x y I x y ' '
K
Vol. 2, No. 1 Computer and Information Science
58
also effective. Moreover the method of Garg (2007, pp.3-27) and Zhang (2006, pp.461-464) need many consecutive
frames to calculate the information of rain-affected area. However our algorithm is able to segment rain field from
moving object in two arbitrary frames. The results show that our method has better visual quality.
References
Barnum, P, Kanade, T., and Narasimhan S., (2007). Spatio-Temporal Frequency Analysis for Removing Rain and
Snow from Videos, PACV workshop at ICCV.
Braillon, C., Pradalier, C., Crowley, J.L., Laugier, C., (2006). Real-time moving obstacle detection using optical flow
models.Proc. 2006 IEEE Intelligent Vehicles Symposium, IV 2006, pp. 466-471.
Cucchiara, R., Grana C., Piccardi M., and Prati A., (2003). Detecting moving objects, ghosts, and shadows in video
streams, IEEE Trans on Pattern Anal. and Machine Intel., vol. 25, no. 10, pp. 1337-1442,2003.
C. Wren, A. Azarhayejani, Darrell, T., and Pentland, A.P., (1997). Pfinder: real-time tracking of the human body,
IEEE Trans. on Pattern Anal. and Machine Intell., vol. 19, no. 7, pp. 780-785, 1997.
C. Ulbrich, W.. (1983). Natural variations in the analytical form of the raindrop size distribution, J. of Applied
Meteorology, 22(10):176475, 1983.
Garg, K., and Nayar, S. K., (2004). Detection and removal of rain from videos,CVPR, 2004.
Garg, K., and Nayar, S. K., (2006). Photorealistic rendering of rain streaks, SIGGRAPH, 2006.
Garg, K., and Nayar, S. K., (2007). Vision and Rain,IJCV, pp.3-27,2007.
Han, B., Comaniciu, D., and Davis, L.S.,(2004). Sequential kernel density approximation through mode propagation:
applications to background modeling, Proc. Asian Conf. on Computer Vision, Jan. 2004.
Liu, Polley R., Meng, Max Q.-H., Liu, Peter X., Tong, Fanny F. L., Wang, Xiaona, (2006). Optical flow and active
contour for moving object segmentation and detection in monocular robot, Proc. IEEE International Conference on
Robotics and Automation, ICRA 2006, pp. 4075-4080.
Narasimhan, S.G. and Nayar, S.K. (2002). Vision and the Atmosphere, IJCV, 2002, 48(3):233254.
Starik, S., and Werman, M., (2003). Simulation of rain in videos. In Intl. Workshop on Texture Analysis and Synthesis,
2003.
Seki, M., Wada, T., Fujiwara, H., and Sumi, K., (2003) Background subtraction based on cooccurrence of image
variations, Proc. CVPR 2003, Vol. 2, pp. 65-72,2003.
Wayne, P. Power, and Schoonees, J. A., Understanding background mixture models for foreground segmentation,
Proc. of JVCNZ 2002, pp. 267-271, Nov. 2002.
Zhang, X., Li, H., Qi, Y., Kheng, W., and Ng., T. K., (2006). Rain removal in video by combining temporal and
chromatic properties. ICME, pp.461-464, 2006.
Computer
(a) is the o
using Zha
algorithm
frames on
and Informati
Figure 1.
Fig
original frame.
angs method.
uses 10 frame
the position in
ion Science
Rain affected
(a) is a rain-a
(b) sh
gure 2. One fra
(b) is the resu
The removal
es. (e) is the re
n (a), the remo
frame and the
affected frame
hows the inten
ame in static sc
ult using Garg
algorithm us
esult of our me
val algorithm
intensities cha
e with stationar
nsities change
cene from the v
s method. The
ses 200 frame
ethod using 50
uses 10 frame
ange at one fix
ry background
of the position
video captured
e removal algo
es. (d) is the r
0 frames. (f) is
s
xed position in
d in heavy rain.
n in (a)
d by Zhang and
orithm uses thr
result using o
s the intensitie
Feb
n this video.
.
d Li.
ree frames. (c)
our method. T
es change of th
bruary, 2009
59
is the result
The removal
he de-rained
Vol
60
The
resu
(d).
are
l. 2, No. 1
e video is a chi
ult of Zhangs
(g) is another
local areas of
ip from the mo
method. (c) is
r frame of this
(j)
Figure 3. So
ovie Magnoli
s a local area o
video. (h) and
ome experimen
ia. It has been
of (b). (d) is o
d (i) are local a
nt results in dyn
n used by Garg
our result calcu
areas of (g). (j)
Co
namic scenes.
g and Zhang. (
ulating 10 fram
) is our result c
omputer and In
a) is the origin
mes. (e) and (f
calculating 10
nformation Sci
nal frame. (b) i
f) are local are
frames. (l) an
ience
is the
eas of
nd (k)
Computer and Information Science February, 2009
61
+ + =
+ + =
+ + =
) (
) (
) ( Re
B G R B Pan Blue
B G R G Pan Green
B G R R Pan d
Computer and Information Science February, 2009
71
d
1
= d
1
-p(s
1
) (3)
This difference has less information than d
1
.
update: some characteristics o f the coefficient subset s
1
(such as mean) and s
0
are different, so the update operator u is
introduced to update s
1
and preserve the integrity of signal s
0
:
s
1
= s
1
+u(d
1
) (4)
So far the subset s
1
and d
1
substitute the original dataset s
0
. When the recursion of the previous process repeats, s
1
will
be divided into subsets s
2
and d
2
. d
2
is substituted by difference between d
2
and p(s
0
), and s
2
is substituted by the sum of
s
2
and u(d
2
). When the recursion goes on the original dataset s
0
is substituted by a more compact expression
.
The decomposition and reconstruction of lifting scheme wavelet show as Fig.1(Sweldens W. 1998.)
.
This paper uses (4,2) lifting scheme to decompose and reconstruct image data:
(5)
(6)
Formula (5) is the forward wavelet transformation based on lifting scheme, Formula (6) is the reverse wavelet
transformation based on lifting scheme.
3.2 Wavelet transform based on lifting scheme
Lifting wavelet transformation is a new wavelet construction based on more efficient and simpler-to-inverter lifting
scheme, which needs less operation storage space and has better expansibility. Lifting wavelet transformation fuses the
multi-spectral and panchromatic bands of ETM+ images. The concrete process shows in Fig2.
In this paper, we first match PAN image (high resolution image) and MS image (multi-spectral image), and resample
MS image to get the same pixel as PAN images, and then stretch PAN image according to mean and variance in the
single band image.
Lifting wavelet transformation of PAN image can be conducted to obtain four components by formula (5), which are
HH, LH, HLand LL. And among them, HH, LHand HL represent spatial detailed information of high
resolution image of P resolution, LLrepresents approximate image of P/2 resolution. Lifting wavelet
transformation of MS single-band image can be similarly conducted to obtain Mi-HH, Mi-LH, Mi-HLand
Mi-LL.
Substitute LLwith Mi-LLand reverse transformation by formula (6) to obtain Mi. Till then, the fusion of PAN
images and MS single-band images has been completed.
This process is repeated until the images of other bands are fused and the spatial detail information of high resolution
images are conducted to various bands of multi-spectral images, so that the original images have kept both spectral
information and spatial detail information.
4. Experimental Results
In order to prove the effect of lifting wavelet transform, the Landsat-7 ETM+ multi-spectral image with the resolution
of 30m and panchromatic image with the resolution of 15m are fused. First, the 7, 4 and 3 bands of ETM+ image are
resampled to obtain the same pixel as panchromatic image. The size of the 7, 4 and 3 bands and panchromatic band of
ETM+ image is 512512.
From Fig.3 we can see that all the spatial information of fused image is better than the original image by visual
interpretation. And among them, Brovey transform leads to larger spectral distortion. But it is difficult to identify which
method can keep better spatial detail information or less spectral distortion. Therefore, the quantitative evaluation of the
fused images is separately carried out from the spatial quality and the spectrum quality.
4.1 Evaluation of spatial quality
In this paper, the entropy and average gradient as the two indicators to evaluate the enhancement effect of the fused
images. Among them, entropy represents the abundance of image information, the higher the entropy is, the more
{ }
1 1
, , , ,
n n
s d s d
+
+ =
+ + + +
+ =
4
) ( ) 1 (
) 2 ( ) (
16
)] 4 2 ( ) 2 2 ( [ )] 2 2 ( ) 2 ( [ 9
) 1 2 ( ) (
1 1
0 1
0 0 0 0
0 1
n d n d
n s n s
n s n s n s n s
n s n d
+ + + +
+ = +
+
=
16
)] 4 2 ( ) 2 2 ( [ )] 2 2 ( ) 2 ( [ 9
) ( ) 1 2 (
4
) ( ) 1 (
) ( ) 2 (
0 0 0 0
1 0
1 1
1 0
n s n s n s n s
n d n s
n d n d
n s n s
Vol. 2, No. 1 Computer and Information Science
72
information the image has. Average gradient shows the fine contrast, texture characteristic and clarity. Higher average
gradient has more image levels and the image is clearer. The formula of the entropy and average gradient is as follows:
(7)
H is entropy, P
i
is the grey value which is equals to the probability of i and L are total grey level.
(8)
Among them, is average gradient, and are the gradient on row-column direction, M and
N represent the row number and column number of image f.
According to formula (7) and formula (8), the entropy and average gradient of original ETM+ and fused images are
shown as tab2. We can see that compared to Brovey transform, IHS transform and PCA transform, the entropy and
average gradient of the image fused by lifting wavelet transformation are larger, which means this method can hence the
spatial detail information much better. Analyzed from algorithm principle, this method preserves the high frequency
information by low frequency substitution in wavelet domain, which corresponds to the detail information of the
multi-spectral image, so the entropy and average gradient of the fused image are larger.
4.2 Evaluation of spectral quality
In order to evaluate the spectral information, the correlation efficient and deviation index are adopted to measure the
fusion quality. The correlation efficient shows the similar degree of the two images and the alternation of spectral
information, while the deviation index shows the offset degree of the two images. The formula is as follows:
(9)
Among them, R(f
1
, f
2
) is the correlation efficient of f
1
and f
2
, and f
1
(i, j) and f
2
(i, j) are the grey values of f
1
and f
2
on the
point (i, j). u
1
and u
2
are the average grey values of the two images.
(10)
Among them, D is the deviation index of compared to f, M and N are the row number and column number of f, and
and f (i, j) are the grey values on the point (i, j) of the fused image and original image.
We can see that compared to Brovey transform, IHS transform and PCA transform, the image fused by lifting scheme
wavelet transformation has the highest correlation coefficient and the lowest deviation index, which means that this
method keeps more spectral information of the low resolution images. Analyzed from algorithm principle, Brovey
transform fuses high resolution panchromatic images and multi-spectral images directly by multiplication, while IHS
transform substitutes I component with panchromatic image and results in spectral distortion. PCA transform substitutes
PC1 component with panchromatic image, which results in the loss of spectral information. The method proposed in
this paper makes full use of the thoughts of wavelet transformation and fuses the images on the sub-band to preserve
spectral information.
5. Conclusions
In this paper, we introduce the lifting wavelet transformation fusion of low resolution multi-spectral image and high
resolution image. This method decomposes the panchromatic image with high resolution and the multi-spectral image
with low resolution by lifting wavelet transformation. It fuses the low-frequency component of the high resolution
image into the low-frequency component of the multi-spectral images, which further reserves spectral information of
original image and enhances spatial resolution of fused image. The results show that compared to Brovey transform,
IHS transform and PCA transform, the lifting wavelet transformation fusion is a better fusion method.
Acknowledgement
This study is supported by the major project of the Science and Technology bureau of Hangzhou city under grant
HZZFCG-2005-A2.
References
Aiazzi B, Alparone L, Baronti S, et.al. (2002). Context-driven fusion of high spatial and spectral resolution data based
1
0
ln
L
i i
i
H P P
=
=
_
( )( )
( ) ( )
2 2
1 1
1 1
, ,
1
1 1 2
M N
i j
i j
f i j f i j
G
M N
= =
V +V
V =
__
G V
( ) ,
i
f i j V ( ) ,
j
f i j V
( )
( )
( )
( )
( )
( )
( )
( )
( )
1 2
1 2
1 2
,
1 2
2 2
1 2
, ,
, ,
,
, ,
f f
i j
f f
i j i j
f i j f i j
R f f
f i j f i j
(
=
( (
( (
_
_ _
( ) ( )
( ) ,
, ,
1
,
i j
f i j f i j
D
MN f i j
=
_
( ) , f i j
Computer and Information Science February, 2009
73
on oversampled multi-resolution analysis. IEEE Transactions on Geosciences and Remote Sensing, 2002,
40(10):2300-2312.
Calderbank R, Daubechies I, Sweldens W. (1998). Wavelet transform that map integers to integers. Applied and
computational harmonic analysis, 1998, 5(1):332-369.
Chang S G, Yu B, Vetterli M. (2000). Adaptive wavelet thresholding for image denoising and compression. IEEE
Transaction on Geoscience and remote sensing, 2000, 9(9):1532-1546.
Chavez S, Sides C, Anderson A. (1991). Comparison of three different methods to merge multi-resolution and
multi-spectral data: Landsat TM and SPOT Panchromatic. Photogrammetric Engineering and Remote Sensing, 1991,
57(3):295-303.
Chipman J, Orr M, Lewis N. (1995). Wavelets and image fusion. IEEE Transactions on Image Processing. 1995,
3(1):248-251.
Haydn R. (1982). Application of the IHS color transform to the processing of multi-sensor data and image enhancement.
Proceedings of the International Symposium on Remote Sensing of Arid and Semi-Arid Lands[C]. Cairo, Egypt,
1982:599-616.
Kingsbury G. (2000). The dual-tree complex wavelet transform with improved orthogonality and symmetry properties.
IEEE International Conference on Image Processing, 2000, 1(1):375-378.
Li H, Manjunath B S, and Mitra S K. (1995). Multisensor image fusion using the wavelet transform. Graphical Models
and Image Processing, 1995, 57(2):235-245.
Mara Gonzlez-Audcana. (2004). Fusion of multi-spectral and panchromatic images using improved IHS and PCA
mergers based on wavelet decomposition. IEEE Transactions on Geosciences and Remote Sensing, 2004, 42 (6):
1291-1299.
Sweldens W. (1998). The lifting scheme: A construction of second generation wavelets. Journal of Mathematical
Analysis, 1998, 29 (2):511-546.
Vrabel, Jim. (1996). Multispectral imagery band sharpening study. Photogrammetric Engineering & Remote Sensing,
1996, 62 (9):1075-1083.
Zhang W, Ding X W, Chen H L. (2007). SAR-image enhancement and fusion based on improved IHS method. Journal
of Marine Sciences, 2007, 25(1):73-79. (In Chinese)
Zhang W, Mao Q M, Zhang X C, et.al. (2005). On features of fusion technique of remote sensing images with different
high resolutions. Donghai Marine Science, 2005, 23 (1):23-31. (In Chinese)
Zhu S L, Zhang Z M. (2000). The acquisition and analysis of remote sensing image. Beijing: Science Press, 2000. (In
Chinese)
Table 1. IHS Forward and Reverse Transformation Formulas
Condition Forward Transformation Formula Reverse Transformation
R>B G or 0 H<1
I = (R + G + B ) / 3
H = (G B) / [ 3 (IB ) ]
S =1B / I
R = I (1 + 2 S 3 S H )
G = I (1 S + 3 S H )
B = I (1 S )
G >R B or 1 H<2
I = ( R + G + B ) / 3
H = ( B R) / [3 ( I R) ] + 1
S = 1 R / I
R = I ( 1 S )
G = I (1 + 5 S 3 S H )
B = I (1 4 S + 3 S H )
B>G R or 2 H<3
I = ( R + G + B ) / 3
H = ( R G ) / [ 3 ( I G ) ] + 2
S = 1 G / I
R = I (1 7 S + 3 S H )
G = I (1 S )
B = I (1 + 8 S 3 S H )
s s
s s
s s
Vol. 2, No. 1 Computer and Information Science
74
Table 2. Statistic parameters of spatial performance between original ETM+ images and fusion images
Methods
Statistics
original
image
Brovey
transform
IHS transform
PCA
transform
lifting wavelet
transformation
Entropy
Band7 3.8945 4.4069 5.2968 5.2255 5.4947
Band4 3.9982 4.6351 5.1402 5.1850 5.5129
Band3 3.6828 4.4202 5.2752 5.3013 5.4828
Average
gradient
Band7 16.1102 23.4662 20.6459 24.0035 24.1366
Band4 13.2060 17.6053 19.3091 20.9073 21.1347
Band3 13.6423 19.8649 17.5965 15.4116 23.4283
Table 3. Statistic parameters of spectral performance between original ETM+ images and fused images
Methods
Statistics
original
image
Brovey
transform
IHS transform
PCA
transform
lifting wavelet
transformation
correlation
coefficient
Band7 1.0000 0.9060 0.9321 0.9197 0.9741
Band4 1.0000 0.9410 0.9445 0.9336 0.9802
Band3 1.0000 0.9117 0.9411 0.9797 0.9812
deviation
index
Band7 0.0000 0.5535 0.5040 0.4971 0.3731
Band4 0.0000 0.4651 0.3854 0.3804 0.3166
Band3 0.0000 0.4963 0.3707 0.2895 0.2381
Figure 1. Decomposition and reconstruction of lifting scheme wavelet
Figure 2. Remote sensing image fusion based on lifting scheme wavelet transformation
+
+
-
-
1+j
V
M
G
V
j
V
j
even/
odd
sp lit
P
U U
P
even/
odd
merge
odd
even
odd
even
Computer
and Informati
(a) Origina
(c) Fusion im
(e) Fusion
ion Science
al ETM+743 b
mage using Bro
image using P
Figure 3
bands image
ovey transform
PCA transform
3. Experimenta
m (d
m (f) Fu
al results by di
(b) Original E
d) Fusion imag
usion image us
ifferent fusion
ETM+PAN im
e using IHS tra
sing the propo
n methods
Feb
age
ansform
sed method
bruary, 2009
75
Vol. 2, No. 1 Computer and Information Science
76
=
u
=
~
= + = +
| |
= +
|
\ .
=
= +
Where, p is the pole-pairs, N is the number of turns. For the motor that the armature spur track number is a, the
motor constant
60
a
pN
C
a
=
, that means when the motor is confirmed, the value is fixed. But in
a a a
U I R
, because
a
R
is
only the winding resistance, so
a a
I R
is very small, and
a a a a
U I R U ~ . So it is obvious that when we change the
armature voltage, the rotate speed n changes with that.
3. System composition and work principle
3.1 Module frame of system hardware structure
The module block diagram of system hardware is seen in Figure 2.
3.2 Work principle of the system
The system is mainly composed by master switch, motor exciting circuit, thyristor speed control circuit (including
tachometer circuit), rectifying filter circuit, flat wave reactor and discharge circuit, energy consumption braking circuit,
and the system adopts the closed loop PI regulator to implement control. When the master switch closes, the
single-phase AC obtains continual current with small pulse through the control of thyristor speed control circuit, and
bridge rectifier, filtering and flat wave reactor for the motor, and at the same time, through the rectifying of exciting
circuit, AC makes the motor obtain excitation to begin to work. The speed in the regulation trigger circuit sets the
potentiometer RP1 to make the control angle output by PIC16F877 decrease when AN1 input voltage decreases, and the
flow angle of thyristor increases with that, and the output voltage of main circuit increase, and the motor speed
increases, and the output voltage of tachometer circuit increases, and the motor stably runs in the setting speed range
through the function of PI regulator.
4. Circuit designs of various parts in the system
4.1 Design of main circuit
The parameters of various components in the circuit are seen in Figure 3.
Press the start-up button SW, electrify the contactor KM loop, and KM normally open contact closes, and the normally
closed contact opens, and start the button self-lock, the main circuit connects, and the thyristor speed control circuit
controls the AC output through changing the control angle of bidirectional thyristor, and obtains the DC through bridge
rectifying and filtering, and at the same time, the motor obtains the excitation through rectifying of exciting circuit to
begin to work.
To limit the pulsation of DC, connect the flat wave reactor in the circuit, and the resistance R3 offers discharge loop for
the flat wave reactor when the master circuit suddenly breaks off.
To quicken braking and stopping, the energy consumption braking is adopted in the equipment, and the braking part is
composed by the resistance R4 and master circuit contactor normally closed contact.
The motor excitation is powered by the single rectifying circuit, and to prevent the uncontrollable high speed accident
induced by the excitation loss of motor, in the exciting circuit, serially connect the under-current relay KA, and the
action current can be regulated through the potentiometer RP.
4.2 Design of thyristor trigger circuit
The voltages at the point A and the point B in the main circuit change to 20V through the transformer, and after bridge
rectifying, the half signals about 100H occur at these two points, and the signals meet with NPN audion through
voltage-division R6 and R7 to amplify, produce zero passage pulse at the collector of the audion, and catch the zero
passage pulse ascending edge by CCP1 module and note the time of occurrence first, and catch the zero passage pulse
descending edge, and the time difference between both is the zero passage pulse width, and the half of the value is the
midpoint of pulse, and by this catching mode, we can exactly obtain the actual zero passage point of AC, and at the
Computer and Information Science February, 2009
97
same time, we can utilize ADC analog/digital conversion module to translate the simulation voltage of PIC16F877 pin
RA1/AN1 as the setting value of thyristor control angle (setting value of motor speed), change the setting value of
potentiometer RP1 and correspondingly change the setting value of thyristor control angle, and the output value of
tachometer circuit is input by the pin RA1/AN1 of PIC16F877, and the value is taken as the speed feedback value
through A/D conversion. The oscillation frequency of SCM in the system adopts 4MHz, and according to the character
of PIC16F877 order period, the resolution of thyristor control angle is the reciprocal of one fourth of SCM oscillation
frequency, i.e. 1s, for the half wave time of 10ms of the power, the control angle can achieve 10000 steps, which can
completely realize the stepless smooth control of motor.
4.3 Design of tachometer circuit
The tachometer circuit is composed by the optical coded disc accreting with motor rotor and the electric pulse
amplifying and shaping circuit. The frequency of electric pulse has fixed proportion with the rotate speed of motor, and
through amplifying and shaping, the electric pulse output by the optical coded disc is input from the pins RC0/T1CK1
of PIC16F877 as the standard TTL level, count by the TMR1 counter to compute the rotate speed, and compare this
rotate speed with the presetting rotate speed and obtain the difference value, and PIC16F877 implements PI operation to
this difference value to obtain the control increase, and send the thyristor control angle in CCP2 to change the effective
voltage of two ports of the motor, and finally control the rotate speed.
5. Software design
To obtain small super modulation of thyristor control angle, we design the speed closed control as the typical I system,
i.e. PI regulator, which is used to regulate the thyristor control angle time
d
T , and its control algorithm is
( ) ( ) ( ) ( ) ( )
0 1
0
( ) 1 1 ( 1) 0.84 0.63 1
1
d d d
I
i
T k T k a e k a e k T k e k e k
T
a Kp
T
= + = +
| |
= +
|
\ .
Where,
1
a Kp =
, Kp is the proportion coefficient of controller,
I
T
is the integral time constant, and
i
T
is the
sampling cycle.
Considering that the motor time constant of electromotor in the system is 0.12s, the warps couldnt be eliminated in
several sampling cycles, so we select 2ms as the tachometer sampling cycle in the system.
The software design module in the system mainly includes CCP1 ascending catching module, CCP1 descending
catching module, control angle setting value A/D conversion module, tachometer circuit pulse timing counting module,
PI regulator module and CCP2 comparison output module, and the program flow charts are seen in Figure 5 and Figure
6.
Suppose we obtain the zero-pass time T , and the thyristor control angle time is
d
T , so the comparison value which is
sent into CCP2 register CCPR2H:L is Tf T Td = + , and when the comparison is consistent, output high level in the pin
of CCP2 to make the thyristor connect, and modify the value of CCPR2H:L again according to the required trigger
pulse width value to sustain the output high level trigger pulse for certain time and return to low level again, so a
bidirectional thyristor trigger pulse output is completed.
6. Conclusions
The speed control system taking PIC16F877 SCM as the bidirectional thyristor trigger circuit designed in the article
possesses many characters such as simple structure, reliable running, wide regulation range, good current continuity and
quick response in the middle and small sized DC motor speed control system, and the rotate speed loop adopts PI
control algorithm, which can effectively restrain the super modulation of rotate speed, so it is a feasible design to adopt
the speed control system of SCM, and the running curve is seen in Figure 7.
References
Kang, Huaguang & Zou, Shoubin. (2000). Base of Electric Technology: Number Part (4th Edition). Beijing: Higher
Education Press.
Li, Xuehai. (2002). Practical Tutorial of PIC SCM. Beijing: Beijing University of Aeronautics and Astronautics Press.
Su, Jianhui. (2002). Study on the Photovoltaic Water Pump System and Its Control. Thesis of Doctors Degree of Hefei
University of Technology.
Zhang, Shen. (1996). Principle and Application of DC Brushless Motor. Beijing: Machine Industry Press.
Vol
98
l. 2, No. 1
Ma
sw
cir
aster
witch
rcuit
Excitin
circuit
motor
Figure
Figure 2. Blo
Thyristo
trigger cir
ng
of
r
e 1. Principle D
ck Diagram of
or
rcuit
Rec
filte
Diagram of DC
f Hardware Str
ctifying
er circuit
F
Co
C Motor
ructure Module
co
Flat wave react
and discharge
circuit
omputer and In
e
Energy
onsumption
braking
circuit
tor
e
nformation Sci
M
ience
Computer and Informatiion Science
Figure 3.
Figure 4.
Diagram of M
Thyristor Trig
Main Circuit
gger Circuit
Febbruary, 2009
99
Vol. 2, No. 1 Computer and Information Science
100
Figure 5. Interrupt Program Flow Chart of CPP1 Module and CPP2 Module
Interrupt
entrance
Protect interrupt locale
W, STATUS, PCLATH
Clear CCP1 interrupt
symbol CCP1IF
(Pulse width value+
CCP2 value) as the
new value of CCP2
Set CCP2 comparison
output as the low
level mode
Whether CCP1 is
the ascending
edge catching
mode?
Set the next catching
of CCP1 as
descending edge
mode
Store the ascending
edge time caught by
CCP1
Compute CCP1
(ascending time+ the
difference between
zero-pass time with
ascending edge time) as
the zero-pass time T0
Compute
T0+Td as the Tf
of CCP2
Set CCP2
comparison
output as the
high level
mode
Recover interrupt locale W, STATUS,
PCLATH, interrupt returns
Set next
catching of
CCP1 as the
descending
edge mode
Compute
CCP1
((descending
edge time
ascending
time)/2) as
the difference
between
zero-pass
time with
ascending
edge time
Yes
No
No
Yes
No
For
CCP1interrupt
symbol
For CCP2
interrupt symbol
Clear CCP2 interrupt
symbol CCP2IF
Whether output
high level mode
for CCP2 mode?
Computer and Information Science February, 2009
101
Figure 6. Flow Chart of Main Program
Start
Set CCP1pin as input,
set CCP2 pin as output
Allow CCP1to catch
interrupt, CCP2
compares interrupt
Preset CCP1catching as
the ascending edge
mode
Set ADCON1, ANI pin
as input of analog signal
Set ADCON0, set self RC
oscillation, preset channel
AD module to start up
Interrupt peripheral
function module
Open entire interrupt
Transfer A/D
conversion subprogram
and save result to Vr
Transfer tachometer
circuit pulse timing
counter subprogram
and save result to Vr
Transfer PI regulator
subprogram and take
the result as the
control time Td
Vol
102
l. 2, No. 1
Figure 7. Ru
unning Curve
Co omputer and Innformation Sciience