Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co...Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables.展开更多
The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging ...The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging process has a huge impact on the economy of all nations. Aging of the skin comes on the top and despite that, the results of the already present lines of treatment are not always satisfactory. This acts as a stimulus for us to dig deeper to discover the root causes of the premature aging of the skin. This was simply caused by the accumulation of repeated minute damage to the internal structure skin. In other words, if the degree of minute damage is more than the capacity of the skin to repair, the repeated micro-damage is presented in the long run as a skin wrinkling. Moreover, the skin acts as a mirror that reflects the internal structures of the human body. Thus, the more degenerative changes in the human body systems, the more the skin could become wrinkled. Our strategy to prevent or at least slow down the aging process of the skin depends on 2 main steps;the 1<sup>st</sup> is to reduce the micro-damage as can as possible, and the 2<sup>nd</sup> is to enhance the capacity of tissue regeneration to be able to reverse the already present damaged skin. As the 2 processes are synchronized with each other, this strategy would be considered the ideal for prevention of skin wrinkling especially premature ones. This not only reverses premature skin wrinkling but also protects it from future wrinklings. This review sharply pointed out the role of the functional collagen of the dermal layer of the skin in the prevention of skin wrinklings. Therefore, it would be the target to study how collagen works in the complex machinery of the dermal layer of the skin. This concept deeply believes that the recovery of dermal collagen has a much better effect than simply ingesting collagen or receiving a topical collagen booster. .展开更多
This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more ...This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more susceptible to vishing attacks. The proposed Emoti-Shing model analyzes potential victims’ emotions using Hidden Markov Models to track vishing scams by examining the emotional content of phone call audio conversations. This approach aims to detect vishing scams using biological features of humans, specifically emotions, which cannot be easily masked or spoofed. Experimental results on 30 generated emotions indicate the potential for increased vishing scam detection through this approach.展开更多
Problem: The Fresnel equations describe the proportions of reflected and transmitted light from a surface, and are conventionally derived from wave theory continuum mechanics. Particle-based derivations of the Fresnel...Problem: The Fresnel equations describe the proportions of reflected and transmitted light from a surface, and are conventionally derived from wave theory continuum mechanics. Particle-based derivations of the Fresnel equations appear not to exist. Approach: The objective of this work was to derive the basic optical laws from first principles from a particle basis. The particle model used was the Cordus theory, a type of non-local hidden-variable (NLHV) theory that predicts specific substructures to the photon and other particles. Findings: The theory explains the origin of the orthogonal electrostatic and magnetic fields, and re-derives the refraction and reflection laws including Snell’s law and critical angle, and the Fresnel equations for s and p-polarisation. These formulations are identical to those produced by electromagnetic wave theory. Contribution: The work provides a comprehensive derivation and physical explanation of the basic optical laws, which appears not to have previously been shown from a particle basis. Implications: The primary implications are for suggesting routes for the theoretical advancement of fundamental physics. The Cordus NLHV particle theory explains optical phenomena, yet it also explains other physical phenomena including some otherwise only accessible through quantum mechanics (such as the electron spin g-factor) and general relativity (including the Lorentz and relativistic Doppler). It also provides solutions for phenomena of unknown causation, such as asymmetrical baryogenesis, unification of the interactions, and reasons for nuclide stability/instability. Consequently, the implication is that NLHV theories have the potential to represent a deeper physics that may underpin and unify quantum mechanics, general relativity, and wave theory.展开更多
Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in s...Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in spinal surgery.Methods Medical records were retrospectively retrieved to collect the data of patients who undergoing posterior thoracic and lumbar fusion surgery or scoliosis surgery. Demographic information, perioperative visible blood loss volume, as well as laboratory results were recorded. The patients receiving fusion surgery or scoliosis surgery were further divided into the HBL positive subgroup and the HBL negative subgroup. Differences in the variables between the groups were then analyzed. Binary logistic regression analysis was performed to determine independent risk factors associated with HBL.Results For patients undergoing posterior spinal surgery, the independent risk factors associated with HBL were autologous transfusion(for fusion surgery P = 0.011, OR: 2.627, 95%CI: 1.574-2.782; for scoliosis surgery P < 0.001, OR: 2.268, 95%CI: 2.143-2.504) and allogeneic transfusion(for fusion surgery P < 0.001, OR: 6.487, 95%CI: 2.349-17.915; for scoliosis surgery P < 0.001, OR: 3.636, 95%CI: 2.389-5.231).Conclusion Intraoperative blood transfusion might be an early-warning indicator for perioperative HBL.展开更多
The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov mode...The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov model is presented to establish ontology mapping. This method considers concepts as models, and attributes, relations, hierarchies, siblings and rules of the concepts as the states of the HMM, respectively. The models corresponding to the concepts are built by virtue of learning many training instances. On the basis of the best state sequence that is decided by the Viterbi algorithm and corresponding to the instance, mapping between the concepts can be established by maximum likelihood estimation. Experimental results show that this method can improve the precision of heterogeneous ontology mapping effectively.展开更多
The use of hidden conditional random fields (HCRFs) for tone modeling is explored. The tone recognition performance is improved using HCRFs by taking advantage of intra-syllable dynamic, inter-syllable dynamic and d...The use of hidden conditional random fields (HCRFs) for tone modeling is explored. The tone recognition performance is improved using HCRFs by taking advantage of intra-syllable dynamic, inter-syllable dynamic and duration features. When the tone model is integrated into continuous speech recognition, the discriminative model weight training (DMWT) is proposed. Acoustic and tone scores are scaled by model weights discriminatively trained by the minimum phone error (MPE) criterion. Two schemes of weight training are evaluated and a smoothing technique is used to make training robust to overtraining problem. Experiments show that the accuracies of tone recognition and large vocabulary continuous speech recognition (LVCSR) can be improved by the HCRFs based tone model. Compared with the global weight scheme, continuous speech recognition can be improved by the discriminative trained weight combinations.展开更多
A parameter estimation algorithm of the continuous hidden Markov model isintroduced and the rigorous proof of its convergence is also included. The algorithm uses theViterbi algorithm instead of K-means clustering use...A parameter estimation algorithm of the continuous hidden Markov model isintroduced and the rigorous proof of its convergence is also included. The algorithm uses theViterbi algorithm instead of K-means clustering used in the segmental K-means algorithm to determineoptimal state and branch sequences. Based on the optimal sequence, parameters are estimated withmaximum-likelihood as objective functions. Comparisons with the traditional Baum-Welch and segmentalK-means algorithms on various aspects, such as optimal objectives and fundamentals, are made. Allthree algorithms are applied to face recognition. Results indicate that the proposed algorithm canreduce training time with comparable recognition rate and it is least sensitive to the training set.So its average performance exceeds the other two.展开更多
A hidden line removal algorithm for bi parametric surfaces is presented and illustrated by some experimental results. The enclosure test is done using area coordinates. A technique of moving box of encirclement is p...A hidden line removal algorithm for bi parametric surfaces is presented and illustrated by some experimental results. The enclosure test is done using area coordinates. A technique of moving box of encirclement is presented. It is found that the algorithm is of general purpose, requires minimal computer storage, has high accuracy and simplicity, and is very easy to be implemented on a computer.展开更多
As the extension and supplement of explicit curriculum,the English hidden curriculum in higher vocational colleges plays animportant role in cultivating students' behaviors,stimulate their interest and arouse thei...As the extension and supplement of explicit curriculum,the English hidden curriculum in higher vocational colleges plays animportant role in cultivating students' behaviors,stimulate their interest and arouse their enthusiasm,initiative and creativity in learningEnglish.This paper analyzes the problems of English hidden curriculum construction in higher vocational colleges under the back-ground o"fInternet plus",and puts forward some corresponding countermeasures to bring the role of college English hidden curriculuminto full play.展开更多
We present a class of two-dimensional memristive maps with a cosine memristor. The memristive maps do not have any fixed points, so they belong to the category of nonlinear maps with hidden attractors. The rich dynami...We present a class of two-dimensional memristive maps with a cosine memristor. The memristive maps do not have any fixed points, so they belong to the category of nonlinear maps with hidden attractors. The rich dynamical behaviors of these maps are studied and investigated using different numerical tools, including phase portrait, basins of attraction,bifurcation diagram, and Lyapunov exponents. The two-parameter bifurcation analysis of the memristive map is carried out to reveal the bifurcation mechanism of its dynamical behaviors. Based on our extensive simulation studies, the proposed memristive maps can produce hidden periodic, chaotic, and hyper-chaotic attractors, exhibiting extremely hidden multistability, namely the coexistence of infinite hidden attractors, which was rarely observed in memristive maps. Potentially,this work can be used for some real applications in secure communication, such as data and image encryptions.展开更多
To improve the complexity of chaotic signals,in this paper we first put forward a new three-dimensional quadratic fractional-order multi-scroll hidden chaotic system,then we use the Adomian decomposition algorithm to ...To improve the complexity of chaotic signals,in this paper we first put forward a new three-dimensional quadratic fractional-order multi-scroll hidden chaotic system,then we use the Adomian decomposition algorithm to solve the proposed fractional-order chaotic system and obtain the chaotic phase diagrams of different orders,as well as the Lyaponov exponent spectrum,bifurcation diagram,and SE complexity of the 0.99-order system.In the process of analyzing the system,we find that the system possesses the dynamic behaviors of hidden attractors and hidden bifurcations.Next,we also propose a method of using the Lyapunov exponents to describe the basins of attraction of the chaotic system in the matlab environment for the first time,and obtain the basins of attraction under different order conditions.Finally,we construct an analog circuit system of the fractional-order chaotic system by using an equivalent circuit module of the fractional-order integral operators,thus realizing the 0.9-order multi-scroll hidden chaotic attractors.展开更多
Pure tone audiometry is a routine clinical examination used to identify hearing loss. A normal pure tone audiogram is usually taken as evidence of normal hearing. Auditory deficits detected in subjects with normal aud...Pure tone audiometry is a routine clinical examination used to identify hearing loss. A normal pure tone audiogram is usually taken as evidence of normal hearing. Auditory deficits detected in subjects with normal audiograms, such as poor sound discrimination and auditory perceptual disorders, are generally attributed to central problems. Does the pure tone audiogram truly reflect cochlear status? Recent evidence suggests that individuals with normal audiogram may still have reduced peripheral auditory responses but normal central responses, indicating that the pure tone audiometry may not detect some types of cochlear injuries. In the cochlea, the outer hair cells (OHCs), inner hair cells (IHCs), and the spiral ganglion neurons that synapse with IHCs are the 3 key cochlear components in transducing acoustical vibrations into the neural signals. This report reviews three types of cochlear damage identified in laboratory animals that may not lead to overt hearing loss. The first type of cochlear impairment, such as missing a certain proportion of IHCs without damage to OHCs, may reduce the cochlear output and elevate response threshold; however, the reduced peripheral auditory sensitivity may be restored along the auditory pathway via central gain enhancement. The second type of cochlear impairment, such as selective damage to the synapses of the high-threshold thin auditory nerve fibers (ANFs), reduces cochlear output at high stimulation levels with no effect on response threshold. In this case the reduced cochlear output may be compensated along the auditory pathway as well. The third type of cochlear impairment, such as missing a certain number of OHCs without damage to others, may not even affect cochlear function at all. These "hidden" cochlear impairments do not result in overt hearing loss, but they may increase the vulnerability of the cochlea to traumatic exposure and lead to disrupted central auditory processing.展开更多
Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittan...Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittance spectral frequency (ISF) parameters in AMR-WB codec to optimally estimate the lost ISFs based on the minimum mean square error (MMSE) rule. The estimated ISFs are weighted with the ones of their previous neighbors to smooth the speech, resulting in the actual concealed ISF vectors. They are used instead of the lost ISFs in the speech synthesis on the receiver. Comparison is made between the speech concealed by this algorithm and by Annex I of G. 722. 2 specification, and simulation shows that the proposed concealment algorithm can lead to better performance in terms of frequency-weighted spectral distortion and signal-to-noise ratio compared to the baseline method, with an increase of 2.41 dB in signal-to-noise ratio (SNR) and a reduction of 0. 885 dB in frequency-weighted spectral distortion.展开更多
An integrated framework is presented to represent and classify process data for on-line identifying abnormal operating conditions. It is based on pattern recognition principles and consists of a feature extraction ste...An integrated framework is presented to represent and classify process data for on-line identifying abnormal operating conditions. It is based on pattern recognition principles and consists of a feature extraction step, by which wavelet transform and principal component analysis are used to capture the inherent characteristics from process measurements, followed by a similarity assessment step using hidden Markov model (HMM) for pattern comparison. In most previous cases, a fixed-length moving window was employed to track dynamic data, and often failed to capture enough information for each fault and sometimes even deteriorated the diagnostic performance. A variable moving window, the length of which is modified with time, is introduced in this paper and case studies on the Tennessee Eastman process illustrate the potential of the proposed method.展开更多
文摘Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables.
文摘The aging process is a group of degenerative changes that physiologically occur in most of the people in the elderly. This affects one or more of the human body systems. The treatment of diseases related to the aging process has a huge impact on the economy of all nations. Aging of the skin comes on the top and despite that, the results of the already present lines of treatment are not always satisfactory. This acts as a stimulus for us to dig deeper to discover the root causes of the premature aging of the skin. This was simply caused by the accumulation of repeated minute damage to the internal structure skin. In other words, if the degree of minute damage is more than the capacity of the skin to repair, the repeated micro-damage is presented in the long run as a skin wrinkling. Moreover, the skin acts as a mirror that reflects the internal structures of the human body. Thus, the more degenerative changes in the human body systems, the more the skin could become wrinkled. Our strategy to prevent or at least slow down the aging process of the skin depends on 2 main steps;the 1<sup>st</sup> is to reduce the micro-damage as can as possible, and the 2<sup>nd</sup> is to enhance the capacity of tissue regeneration to be able to reverse the already present damaged skin. As the 2 processes are synchronized with each other, this strategy would be considered the ideal for prevention of skin wrinkling especially premature ones. This not only reverses premature skin wrinkling but also protects it from future wrinklings. This review sharply pointed out the role of the functional collagen of the dermal layer of the skin in the prevention of skin wrinklings. Therefore, it would be the target to study how collagen works in the complex machinery of the dermal layer of the skin. This concept deeply believes that the recovery of dermal collagen has a much better effect than simply ingesting collagen or receiving a topical collagen booster. .
文摘This study examines vishing, a form of social engineering scam using voice communication to deceive individuals into revealing sensitive information or losing money. With the rise of smartphone usage, people are more susceptible to vishing attacks. The proposed Emoti-Shing model analyzes potential victims’ emotions using Hidden Markov Models to track vishing scams by examining the emotional content of phone call audio conversations. This approach aims to detect vishing scams using biological features of humans, specifically emotions, which cannot be easily masked or spoofed. Experimental results on 30 generated emotions indicate the potential for increased vishing scam detection through this approach.
文摘Problem: The Fresnel equations describe the proportions of reflected and transmitted light from a surface, and are conventionally derived from wave theory continuum mechanics. Particle-based derivations of the Fresnel equations appear not to exist. Approach: The objective of this work was to derive the basic optical laws from first principles from a particle basis. The particle model used was the Cordus theory, a type of non-local hidden-variable (NLHV) theory that predicts specific substructures to the photon and other particles. Findings: The theory explains the origin of the orthogonal electrostatic and magnetic fields, and re-derives the refraction and reflection laws including Snell’s law and critical angle, and the Fresnel equations for s and p-polarisation. These formulations are identical to those produced by electromagnetic wave theory. Contribution: The work provides a comprehensive derivation and physical explanation of the basic optical laws, which appears not to have previously been shown from a particle basis. Implications: The primary implications are for suggesting routes for the theoretical advancement of fundamental physics. The Cordus NLHV particle theory explains optical phenomena, yet it also explains other physical phenomena including some otherwise only accessible through quantum mechanics (such as the electron spin g-factor) and general relativity (including the Lorentz and relativistic Doppler). It also provides solutions for phenomena of unknown causation, such as asymmetrical baryogenesis, unification of the interactions, and reasons for nuclide stability/instability. Consequently, the implication is that NLHV theories have the potential to represent a deeper physics that may underpin and unify quantum mechanics, general relativity, and wave theory.
文摘Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in spinal surgery.Methods Medical records were retrospectively retrieved to collect the data of patients who undergoing posterior thoracic and lumbar fusion surgery or scoliosis surgery. Demographic information, perioperative visible blood loss volume, as well as laboratory results were recorded. The patients receiving fusion surgery or scoliosis surgery were further divided into the HBL positive subgroup and the HBL negative subgroup. Differences in the variables between the groups were then analyzed. Binary logistic regression analysis was performed to determine independent risk factors associated with HBL.Results For patients undergoing posterior spinal surgery, the independent risk factors associated with HBL were autologous transfusion(for fusion surgery P = 0.011, OR: 2.627, 95%CI: 1.574-2.782; for scoliosis surgery P < 0.001, OR: 2.268, 95%CI: 2.143-2.504) and allogeneic transfusion(for fusion surgery P < 0.001, OR: 6.487, 95%CI: 2.349-17.915; for scoliosis surgery P < 0.001, OR: 3.636, 95%CI: 2.389-5.231).Conclusion Intraoperative blood transfusion might be an early-warning indicator for perioperative HBL.
基金国家自然科学基金(the National Natural Science Foundation of China under Grant No.50279041)陕西省自然科学基金(the Natural Science Foundation of Shaanxi Province of China under Grant No.2005F07)。
基金The Weaponry Equipment Foundation of PLA Equipment Ministry (No51406020105JB8103)
文摘The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov model is presented to establish ontology mapping. This method considers concepts as models, and attributes, relations, hierarchies, siblings and rules of the concepts as the states of the HMM, respectively. The models corresponding to the concepts are built by virtue of learning many training instances. On the basis of the best state sequence that is decided by the Viterbi algorithm and corresponding to the instance, mapping between the concepts can be established by maximum likelihood estimation. Experimental results show that this method can improve the precision of heterogeneous ontology mapping effectively.
文摘The use of hidden conditional random fields (HCRFs) for tone modeling is explored. The tone recognition performance is improved using HCRFs by taking advantage of intra-syllable dynamic, inter-syllable dynamic and duration features. When the tone model is integrated into continuous speech recognition, the discriminative model weight training (DMWT) is proposed. Acoustic and tone scores are scaled by model weights discriminatively trained by the minimum phone error (MPE) criterion. Two schemes of weight training are evaluated and a smoothing technique is used to make training robust to overtraining problem. Experiments show that the accuracies of tone recognition and large vocabulary continuous speech recognition (LVCSR) can be improved by the HCRFs based tone model. Compared with the global weight scheme, continuous speech recognition can be improved by the discriminative trained weight combinations.
文摘A parameter estimation algorithm of the continuous hidden Markov model isintroduced and the rigorous proof of its convergence is also included. The algorithm uses theViterbi algorithm instead of K-means clustering used in the segmental K-means algorithm to determineoptimal state and branch sequences. Based on the optimal sequence, parameters are estimated withmaximum-likelihood as objective functions. Comparisons with the traditional Baum-Welch and segmentalK-means algorithms on various aspects, such as optimal objectives and fundamentals, are made. Allthree algorithms are applied to face recognition. Results indicate that the proposed algorithm canreduce training time with comparable recognition rate and it is least sensitive to the training set.So its average performance exceeds the other two.
文摘A hidden line removal algorithm for bi parametric surfaces is presented and illustrated by some experimental results. The enclosure test is done using area coordinates. A technique of moving box of encirclement is presented. It is found that the algorithm is of general purpose, requires minimal computer storage, has high accuracy and simplicity, and is very easy to be implemented on a computer.
文摘As the extension and supplement of explicit curriculum,the English hidden curriculum in higher vocational colleges plays animportant role in cultivating students' behaviors,stimulate their interest and arouse their enthusiasm,initiative and creativity in learningEnglish.This paper analyzes the problems of English hidden curriculum construction in higher vocational colleges under the back-ground o"fInternet plus",and puts forward some corresponding countermeasures to bring the role of college English hidden curriculuminto full play.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 11972173 and 12172340)。
文摘We present a class of two-dimensional memristive maps with a cosine memristor. The memristive maps do not have any fixed points, so they belong to the category of nonlinear maps with hidden attractors. The rich dynamical behaviors of these maps are studied and investigated using different numerical tools, including phase portrait, basins of attraction,bifurcation diagram, and Lyapunov exponents. The two-parameter bifurcation analysis of the memristive map is carried out to reveal the bifurcation mechanism of its dynamical behaviors. Based on our extensive simulation studies, the proposed memristive maps can produce hidden periodic, chaotic, and hyper-chaotic attractors, exhibiting extremely hidden multistability, namely the coexistence of infinite hidden attractors, which was rarely observed in memristive maps. Potentially,this work can be used for some real applications in secure communication, such as data and image encryptions.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61561022 and 61672226)。
文摘To improve the complexity of chaotic signals,in this paper we first put forward a new three-dimensional quadratic fractional-order multi-scroll hidden chaotic system,then we use the Adomian decomposition algorithm to solve the proposed fractional-order chaotic system and obtain the chaotic phase diagrams of different orders,as well as the Lyaponov exponent spectrum,bifurcation diagram,and SE complexity of the 0.99-order system.In the process of analyzing the system,we find that the system possesses the dynamic behaviors of hidden attractors and hidden bifurcations.Next,we also propose a method of using the Lyapunov exponents to describe the basins of attraction of the chaotic system in the matlab environment for the first time,and obtain the basins of attraction under different order conditions.Finally,we construct an analog circuit system of the fractional-order chaotic system by using an equivalent circuit module of the fractional-order integral operators,thus realizing the 0.9-order multi-scroll hidden chaotic attractors.
基金supported by grants from NIH (R01DC014693 and R01DC014452)
文摘Pure tone audiometry is a routine clinical examination used to identify hearing loss. A normal pure tone audiogram is usually taken as evidence of normal hearing. Auditory deficits detected in subjects with normal audiograms, such as poor sound discrimination and auditory perceptual disorders, are generally attributed to central problems. Does the pure tone audiogram truly reflect cochlear status? Recent evidence suggests that individuals with normal audiogram may still have reduced peripheral auditory responses but normal central responses, indicating that the pure tone audiometry may not detect some types of cochlear injuries. In the cochlea, the outer hair cells (OHCs), inner hair cells (IHCs), and the spiral ganglion neurons that synapse with IHCs are the 3 key cochlear components in transducing acoustical vibrations into the neural signals. This report reviews three types of cochlear damage identified in laboratory animals that may not lead to overt hearing loss. The first type of cochlear impairment, such as missing a certain proportion of IHCs without damage to OHCs, may reduce the cochlear output and elevate response threshold; however, the reduced peripheral auditory sensitivity may be restored along the auditory pathway via central gain enhancement. The second type of cochlear impairment, such as selective damage to the synapses of the high-threshold thin auditory nerve fibers (ANFs), reduces cochlear output at high stimulation levels with no effect on response threshold. In this case the reduced cochlear output may be compensated along the auditory pathway as well. The third type of cochlear impairment, such as missing a certain number of OHCs without damage to others, may not even affect cochlear function at all. These "hidden" cochlear impairments do not result in overt hearing loss, but they may increase the vulnerability of the cochlea to traumatic exposure and lead to disrupted central auditory processing.
基金The Science Foundation of Southeast University(No.XJ0704268)the Natural Science Foundation of the Education Department of Anhui Province(No.KJ2007B088)
文摘Frame erasure concealment is studied to solve the problem of rapid speech quality reduction due to the loss of speech parameters during speech transmission. A large hidden Markov model is applied to model the immittance spectral frequency (ISF) parameters in AMR-WB codec to optimally estimate the lost ISFs based on the minimum mean square error (MMSE) rule. The estimated ISFs are weighted with the ones of their previous neighbors to smooth the speech, resulting in the actual concealed ISF vectors. They are used instead of the lost ISFs in the speech synthesis on the receiver. Comparison is made between the speech concealed by this algorithm and by Annex I of G. 722. 2 specification, and simulation shows that the proposed concealment algorithm can lead to better performance in terms of frequency-weighted spectral distortion and signal-to-noise ratio compared to the baseline method, with an increase of 2.41 dB in signal-to-noise ratio (SNR) and a reduction of 0. 885 dB in frequency-weighted spectral distortion.
基金Supported by National High-Tech Program of China (No. 2001AA413110).
文摘An integrated framework is presented to represent and classify process data for on-line identifying abnormal operating conditions. It is based on pattern recognition principles and consists of a feature extraction step, by which wavelet transform and principal component analysis are used to capture the inherent characteristics from process measurements, followed by a similarity assessment step using hidden Markov model (HMM) for pattern comparison. In most previous cases, a fixed-length moving window was employed to track dynamic data, and often failed to capture enough information for each fault and sometimes even deteriorated the diagnostic performance. A variable moving window, the length of which is modified with time, is introduced in this paper and case studies on the Tennessee Eastman process illustrate the potential of the proposed method.