Xiaopeng Wei

Dalian Ocean University, Lü-ta-shih, Liaoning, China

Are you Xiaopeng Wei?

Claim your profile

Publications (101)97.89 Total impact

  • Qiang Zhang · Lu Ji · Dongsheng Zhou · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Because space manipulators must satisfy the law of conservation of momentum, any motion of a manipulator within a space-manipulator system disturbs the position and attitude of its free-floating base. In this study, the authors have designed a multi-swarm particle swarm optimization (PSO) algorithm to address the motion planning problem and so minimize base disturbances for 6-DOF space manipulators. First, the equation of kinematics for space manipulators in the form of a generalized Jacobian matrix (GJM) is introduced. Second, sinusoidal and polynomial functions are used to parameterize joint motion, and a quaternion representation is used to represent the attitude of the base. Moreover, by transforming the planning problem into an optimization problem, the objective function is analyzed and the proposed algorithm explained in detail. Finally, numerical simulation results are used to verify the validity of the proposed algorithm.
    Robotica 11/2015; DOI:10.1017/S0263574715000855 · 0.69 Impact Factor
  • Dongsheng Zhou · Lu Ji · Qiang Zhang · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: In this study, we propose a practical approach for calculating the analytical inverse kinematic solution for a seven-degrees of freedom (7-DOF) space manipulator with joint and attitude limits. Instead of utilizing traditional velocity-based approaches that limit the ranges of joints by calculating the velocity-level Jacobian matrix, we propose a position-based approach for evaluating the ranges of feasible inverse kinematic solutions. We then search for the optimal solution, which is estimated based on the disturbance that acts on the base of the manipulator to obtain the final solution. First, the concept of the redundancy of manipulators is defined and each joint is parameterized by the redundancy. Second, how the joint limits affect this redundancy is discussed. Third, a practical approach (include the objective function that the author needs to minimize) is proposed for dealing with the inverse kinematic problem of 7-DOF manipulators. Finally, the validity of this approach is verified by numerical simulation.
    Intelligent Service Robotics 06/2015; 8(4). DOI:10.1007/s11370-015-0180-3 · 0.66 Impact Factor
  • Source
    Bin Wang · Xiaopeng Wei · Jing Dong · Qiang Zhang ·
    [Show abstract] [Hide abstract]
    ABSTRACT: The well-known massively parallel sequencing method is efficient and it can obtain sequence data from multiple individual samples. In order to ensure that sequencing, replication, and oligonucleotide synthesis errors do not result in tags (or barcodes) that are unrecoverable or confused, the tag sequences should be abundant and sufficiently different. Recently, many design methods have been proposed for correcting errors in data using error-correcting codes. The existing tag sets contain small tag sequences, so we used a modified genetic algorithm to improve the lower bound of the tag sets in this study. Compared with previous research, our algorithm is effective for designing sets of DNA tags. Moreover, the GC content determined by existing methods includes an imprecise range. Thus, we improved the GC content determination method to obtain tag sets that control the GC content in a more precise range. Finally, previous studies have only considered perfect self-complementarity. Thus, we considered the crossover between different tags and introduced an improved constraint into the design of tag sets.
    PLoS ONE 02/2015; 10(2):e0110640. DOI:10.1371/journal.pone.0110640 · 3.23 Impact Factor
  • Xiaopeng Wei · Pengfei Yi · Qiang Zhang ·
    [Show abstract] [Hide abstract]
    ABSTRACT: To generate foot-skate free locomotion along user defined path for virtual actors, a novel data structure of contact-based motion graph is proposed. At first, sample motions are divided to contact clips according to the number of feet in contact with the ground. Then a directed graph can be built by producing nodes and basic edges based on these clips. After generating edges between nodes from different samples by linear interpolation, the contact-based motion graph can be defined as a strongly connected component of this graph. Applying synthesis strategy designed for nodes and edges, a path on contact-based motion graph can be converted to a smooth foot-skate free motion moving along the given path. The following experiments show the effectiveness of this method.
    International Journal of Industrial and Systems Engineering 01/2015; 20(1). DOI:10.1504/IJISE.2015.068997
  • [Show abstract] [Hide abstract]
    ABSTRACT: Due to the efficient and secure requirements of image transmission, a number of research works have been done to encrypt the compressed image. Inspired by the arithmetic coding and chaotic map which are used to compress and encrypt image, respectively. In this paper, a scheme is proposed to encrypt the compressed image by chaotic map and arithmetic coding. This scheme compresses the image row by row which is firstly permuted by two logistic maps before arithmetic coding. It not only enhances the security of arithmetic coding, but also improves the compression ratio. To further improve the security of binary data which has been compressed, we use the chaotic maps to encrypt the data, and set different parameters and initial value for chaotic maps. In order to possess high sensitivities of key and plain-image, the keys that are employed to determine the parameter and initial value of chaotic maps are related to the plain-image. The experimental results validate the effect of the proposed scheme and demonstrate that the compressed and encrypted image is secure and convenient for transmission.
    Optik - International Journal for Light and Electron Optics 10/2014; 125(20). DOI:10.1016/j.ijleo.2014.06.107 · 0.68 Impact Factor
  • Changjun Zhou · Lan Wang · Qiang Zhang · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Face recognition is an important research hotspot. More and more new methods have been proposed in recent years. In this paper, we propose a novel face recognition method which is based on PCA and logistic regression. PCA is one of the most important methods in pattern recognition. Therefore, in our method, PCA is used to extract feature and reduce the dimensions of process data. Afterwards, we present a novel classification algorithm and use logistic regression as the classifier for face recognition. The experimental results on two different face databases are presented to illustrate the efficacy of our proposed method.
    Optik - International Journal for Light and Electron Optics 10/2014; 125(20):5916–5919. DOI:10.1016/j.ijleo.2014.07.080 · 0.68 Impact Factor
  • Changjun Zhou · Caixia Hou · Xiaopeng Wei · Qiang Zhang ·
    [Show abstract] [Hide abstract]
    ABSTRACT: A new improved hybrid optimization algorithm - PGATS algorithm, which is based on toy off-lattice model, is presented for dealing with three-dimensional protein structure prediction problems. The algorithm combines the particle swarm optimization (PSO), genetic algorithm (GA), and tabu search (TS) algorithms. Otherwise, we also take some different improved strategies. The factor of stochastic disturbance is joined in the particle swarm optimization to improve the search ability; the operations of crossover and mutation that are in the genetic algorithm are changed to a kind of random liner method; at last tabu search algorithm is improved by appending a mutation operator. Through the combination of a variety of strategies and algorithms, the protein structure prediction (PSP) in a 3D off-lattice model is achieved. The PSP problem is an NP-hard problem, but the problem can be attributed to a global optimization problem of multi-extremum and multi-parameters. This is the theoretical principle of the hybrid optimization algorithm that is proposed in this paper. The algorithm combines local search and global search, which overcomes the shortcoming of a single algorithm, giving full play to the advantage of each algorithm. In the current universal standard sequences, Fibonacci sequences and real protein sequences are certified. Experiments show that the proposed new method outperforms single algorithms on the accuracy of calculating the protein sequence energy value, which is proved to be an effective way to predict the structure of proteins.
    Journal of Molecular Modeling 07/2014; 20(7):2289. DOI:10.1007/s00894-014-2289-2 · 1.74 Impact Factor
  • Minglei Han · Jianxin Zhang · Qiang Zhang · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper calculates the finite element stiffness of a rotating shaft with a straight-fronted slant crack based on neutral axis method. In a steady rotation cycle, a 45-degree straight-fronted slant breathing crack is compared with a transverse one in different depths in the area of the crack breathing mechanism and time-varying characteristics of the shaft stiffness. The comparison between a slant crack and a transverse crack shows that the opening and closing mechanism is substantially the same, while the shaft stiffness differences are significant; as the crack inclination angle decreased, the stiffness of the shaft element tends to harmonic vibration.
    International Conference on Simulation and Modeling Methodologies, Technologies and Applications; 06/2014
  • Yue Li · Jianxin Zhang · Qiang Zhang · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: In consideration of the different servicing types and various orbital spatial relationships, the paper proposes an orbital maneuver strategies model of on-orbit service vehicle (OSV) based on multiple decision variables for the problem of multispacecraft rendezvous mission. We establish a variety of mathematical models of orbit maneuver strategies, and formulate the appropriate time energy’s numerical model for different service types, adding orbital spatial relationship and service type as design variables, finally determine the optimal maneuver strategies of OSV. The paper selects two interim circle orbits as example. We select the orbit transfer strategies for service vehicle. We also calculate the relationship of transfer time and energy consumption according to the time energy’s consumption requirements.
    International Conference on Simulation and Modeling Methodologies, Technologies and Applications; 06/2014
  • Qiang Zhang · Xiang Xue · Dongsheng Zhou · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: The key frames extraction technique extracts key postures to describe the original motion sequence, which has been widely used in motion compression, motion retrieval, motion edition and so on. In this paper, we propose a method based on the amplitude of curve to find key frames in a motion captured sequence. First we select a group of joint distance features to represent the motion and adopt the Principal Component Analysis (PCA) method to obtain the one dimension principal component as a features curve which will be used. Then we gain the initial key-frames by extracting the local optimum points in the curve. At last, we get the final key frames by inserting frames based on the amplitude of the curve and merging key frames too close. A number of experimental examples demonstrate that our method is practicable and efficient not only in the visual performance but also in the aspect of the compression ratio and error rate.
    International Journal of Computational Intelligence Systems 05/2014; 7(3):506-514. DOI:10.1080/18756891.2013.859873 · 0.45 Impact Factor
  • Bin Wang · Xiaopeng Wei · Qiang Zhang ·
    [Show abstract] [Hide abstract]
    ABSTRACT: In recent years, there has been growing interesting in image encryption based on chaotic systems. In order to improve the effect of encryption, a large amount of operations are implemented in the most chaos-based cryptosystems. However, the runtime of chaos-based cryptosystems would be increased with the rise of operations. In this paper, a novel algorithm is proposed to generate cipher key for the permutation-diffusion architecture. The cipher key not only relates to the plain-image, but also the generated time of cipher key is shorter than the conventional method. On the premise of security, a novel and fast permutation-diffusion architecture based on chaotic systems and variable control conditions is proposed. For the sake of increasing the key space and enhancing the security of proposed architecture, variable control conditions used in this cryptosystem as the parameter and initial value of same chaotic system are generated from the cipher key related to the plain-image. So the proposed algorithm can effectively resist the most attacks against permutation-diffusion architectures. Finally, theoretical analyses and numerical experimental results show that the proposed chaos-based cryptosystem possesses high security and sound time of image encryption, which is suitable for protecting the image information.
    Journal of Computational and Theoretical Nanoscience 03/2014; 11(3):731-738. DOI:10.1166/jctn.2014.3420 · 1.34 Impact Factor
  • Qiang Zhang · Lili Liu · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: New image encryption based on DNA encoding combined with chaotic system is proposed. The algorithm uses chaotic system to disturb the pixel locations and pixel values and then DNA encodings according to quaternary code rules are carried out. The pseudo DNA operations are controlled by the quaternary chaotic sequences. At last the image encryption through DNA decoding is achieved. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext, has a large key space and a high key sensitivity, it is able to resist the statistical and exhaustive attacks.
    AEU - International Journal of Electronics and Communications 03/2014; 68(3):186–192. DOI:10.1016/j.aeue.2013.08.007 · 0.60 Impact Factor
  • Xiaopeng Wei · Bin Wang · Qiang Zhang · Chao Che ·
    [Show abstract] [Hide abstract]
    ABSTRACT: In recent years, there has been growing interesting in image encryption based on chaotic maps and wavelet transform. In this paper, a novel scheme for image encryption based on chaotic maps and reversible integer wavelet transform is proposed. Firstly, the cipher key which is related to plain-image is used to generate different parameters and initial values of chaotic maps. Then the plain-image is permuted by the order from chaotic maps, and processed by integer wavelet transform. A part of transform coefficient is diffused by the orbits of chaotic maps. Finally, the cipher image is obtained by inverse integer wavelet transform based on the diffused coefficient. Numerical experimental results and comparing with previous works show that the proposed scheme possesses higher security than previous works, which is suitable for protecting the image information.
    Journal of Electrical Engineering 02/2014; 65(2). DOI:10.2478/jee-2014-0013 · 0.38 Impact Factor
  • Xiaoyong Fang · Xiaopeng Wei · Qiang Zhang · Dongsheng Zhou ·
    [Show abstract] [Hide abstract]
    ABSTRACT: For the existing motion capture (MoCap) data processing methods, manual interventions are always inevitable, most of which are derived from the data tracking process. This paper addresses the problem of tracking non-rigid 3D facial motions from sequences of raw MoCap data in the presence of noise, outliers and long time missing. We present a novel dynamic spatiotemporal framework to automatically solve the problem. First, based on a 3D facial topological structure, a sophisticated non-rigid motion interpreter (SNRMI) is put forward; together with a dynamic searching scheme, it cannot only track the non-missing data to the maximum extent but recover missing data (it can accurately recover more than five adjacent markers under long time (about 5 seconds) missing) accurately. To rule out wrong tracks of the markers labeled in open structures (such as mouth, eyes), a semantic-based heuristic checking method was raised. Second, since the existing methods have not taken the noise propagation problem into account, a forward processing framework is presented to solve the problem. Another contribution is the proposed method could track facial non-rigid motions automatically and forward, and is believed to greatly reduce even eliminate the requirements of human interventions during the facial MoCap data processing. Experimental results proved the effectiveness, robustness and accuracy of our system.
    The Visual Computer 02/2014; 30(2). DOI:10.1007/s00371-013-0790-8 · 0.96 Impact Factor
  • Xiaopeng Wei · Dajun Liu · Lasheng Zhao · Qiang Zhang ·
    [Show abstract] [Hide abstract]
    ABSTRACT: The aim of this paper is to investigate the difference of time-varying stiffness characteristics between a semi-elliptical front crack and a straight front crack of shaft-element in order to obtain a more accurate and realistic cracked-rotor model for rotating machinery system. By calculating the correct time-varying area moments of inertia for the cross-section of cracked element and taking account the neutral axis position changes, the switching function is obtained, meanwhile the stiffness of shaft in a steady rotating cycle is determined. The result shows that a significant difference of stiffness appears as crack depth deepens. Especially, the difference between elliptical-front (EF) and straight-front (SF) cracked element is more obvious in the early crack propagation.
    International Journal of Industrial and Systems Engineering 01/2014; 17(3):302 - 314. DOI:10.1504/IJISE.2014.062540
  • Qiang Zhang · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system is presented. Different from the traditional DNA encryption methods, our algorithm is not use complex biological operation, but just uses the idea of DNA subsequence operation (such as elongation operation, truncation operation, and deletion operation). And then, do the DNA addition operation under the Chen's Hyper-chaotic map in this image cipher. The simulation experimental results and security analysis show that our algorithm not only has good encryption effect, but also has the ability of resisting exhaustive attack and statistical attack.
    Optik - International Journal for Light and Electron Optics 12/2013; 124(23):6276-6281. DOI:10.1016/j.ijleo.2013.05.009 · 0.68 Impact Factor
  • Qiang Zhang · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents an analysis method to the global exponential stability for the delayed genetic regulatory networks with SUM regulatory functions. By transforming the kinetics of networks into a single delay differential equation and utilizing the method of delay differential inequalities, several sufficient conditions for ensuring global exponential stability of the genetic regulatory networks with variable delays are derived. Since our method does not make use of Lyapunov functionals, it is simpler and more straightforward. Two numerical examples are provided to show the validity of the obtained results.
    Journal of Computational and Theoretical Nanoscience 11/2013; 10(11):2604-2608. DOI:10.1166/jctn.2013.3256 · 1.34 Impact Factor
  • Changjun Zhou · Yingying Jiao · Qiang Zhang · Bin Wang · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: The prediction of protein structure that attracts many researchers to study is an NP-hard problem. In recent year, numerous algorithms are proposed. Although particle swarm optimizer has many advantages, the disadvantages of poor convergence precision and easy to trap into local optimum cannot be ignored. Tabu search which has been applied for various combination optimization problems is one of global optimization algorithms. So, in this paper, we put forward a hybrid algorithm of particle swarm optimizer (PSO) and tabu search (TS) for three-dimension protein structure prediction based on AB off-lattice protein model. Experiments show that the proposed algorithm performs better in predicting of protein structure.
    Journal of Computational and Theoretical Nanoscience 11/2013; 10(11):2701-2707. DOI:10.1166/jctn.2013.3269 · 1.34 Impact Factor
  • Changjun Zhou · Lan Wang · Qiang Zhang · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Face recognition has become a research hotspot in the field of pattern recognition and artificial intelligence. Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) are two traditional methods in pattern recognition. In this paper, we propose a novel method based on PCA image reconstruction and LDA for face recognition. First, the inner-classes covariance matrix for feature extraction is used as generating matrix and then eigenvectors from each person is obtained, then we obtain the reconstructed images. Moreover, the residual images are computed by subtracting reconstructed images from original face images. Furthermore, the residual images are applied by LDA to obtain the coefficient matrices. Finally, the features are utilized to train and test SVMs for face recognition. The simulation experiments illustrate the effectivity of this method on the ORL face database.
    Optik - International Journal for Light and Electron Optics 11/2013; 124(22):5599-5603. DOI:10.1016/j.ijleo.2013.04.108 · 0.68 Impact Factor
  • Qiang Zhang · Xiaopeng Wei ·
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, an RGB color image encryption method based on the Lorenz chaotic system and DNA computation is presented. This method can not only change the location of the image pixel but also change the pixel values. Firstly, we split the RGB color image into R, G, B three components. Then, we use the 2D-hyperchaotic sequence to disorder the location of R, G, B three-component pixels. Secondly, three different chaotic sequences are generated by a one-dimensional logistic chaotic map, and the pixel values of the three components R, G, B can be scrambled through the three logistic chaotic sequences. Then the R, G, B digital images can be transformed into DNA coding matrices based on DNA coding rules. Thirdly, 3D chaotic sequences are generated by use of Lorenz chaotic system and are encoded based on DNA encoding rules in order to generate three DNA sequences. Finally, the encrypted image can be obtained by utilizing DNA operations on the DNA sequences of three components R, G, B and DNA sequences generated by the Lorenz chaotic system. The experiment results and encryption effect demonstrate that the proposed scheme is effective, and it has strong sensibility, high security, and good ability of resisting statistic attack.
    IETE Technical Review 09/2013; 30(5):404. DOI:10.4103/0256-4602.123123 · 0.89 Impact Factor

Publication Stats

1k Citations
97.89 Total Impact Points


  • 2003-2015
    • Dalian Ocean University
      Lü-ta-shih, Liaoning, China
  • 2006-2014
    • Dalian University of Technology
      • School of Management
      Lü-ta-shih, Liaoning, China
  • 2010
    • Shenyang Institute of Engineering
      Feng-t’ien, Liaoning, China