This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information ...The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests.展开更多
In order to optimize the embedded system implementation for Ethernet-based computer numerical control (CNC) system, it is very necessary to establish the performance analysis model and further adopt the codesign met...In order to optimize the embedded system implementation for Ethernet-based computer numerical control (CNC) system, it is very necessary to establish the performance analysis model and further adopt the codesign method from the control, communication and computing perspectives. On the basis of analyzing real-time Ethemet, system architecture, time characteristic parameters of control-loop ere, a performance analysis model for real-time Ethemet-based CNC system was proposed, which is able to include the timing effects caused by the implementation platform in the simulation. The key for establishing the model is accomplished by designing the error analysis module and the controller nodes. Under the restraint of CPU resource and communication bandwidth, the experiment with a case study was conducted, and the results show that if the deadline miss ratio of data packets is 0.2%, then the percentage error is 1.105%. The proposed model can be used at several stages of CNC system development.展开更多
As multimedia data sharing increases,data security in mobile devices and its mechanism can be seen as critical.Biometrics combines the physiological and behavioral qualities of an individual to validate their characte...As multimedia data sharing increases,data security in mobile devices and its mechanism can be seen as critical.Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time.Humans incorporate physiological attributes like a fingerprint,face,iris,palm print,finger knuckle print,Deoxyribonucleic Acid(DNA),and behavioral qualities like walk,voice,mark,or keystroke.The main goal of this paper is to design a robust framework for automatic face recognition.Scale Invariant Feature Transform(SIFT)and Speeded-up Robust Features(SURF)are employed for face recognition.Also,we propose a modified Gabor Wavelet Transform for SIFT/SURF(GWT-SIFT/GWT-SURF)to increase the recognition accuracy of human faces.The proposed scheme is composed of three steps.First,the entropy of the image is removed using Discrete Wavelet Transform(DWT).Second,the computational complexity of the SIFT/SURF is reduced.Third,the accuracy is increased for authentication by the proposed GWT-SIFT/GWT-SURF algorithm.A comparative analysis of the proposed scheme is done on real-time Olivetti Research Laboratory(ORL)and Poznan University of Technology(PUT)databases.When compared to the traditional SIFT/SURF methods,we verify that the GWT-SIFT achieves the better accuracy of 99.32%and the better approach is the GWT-SURF as the run time of the GWT-SURF for 100 images is 3.4 seconds when compared to the GWT-SIFT which has a run time of 4.9 seconds for 100 images.展开更多
In this paper, a mathematical model of real-time simulation is given, and the problem of convergence on real-time Runge-Kutta algorithms is analysed. At last a theorem on the relation between the order of compensation...In this paper, a mathematical model of real-time simulation is given, and the problem of convergence on real-time Runge-Kutta algorithms is analysed. At last a theorem on the relation between the order of compensation and the convergent order of real-time algorithm is proved.展开更多
Opinion (sentiment) analysis on big data streams from the constantly generated text streams on social media networks to hundreds of millions of online consumer reviews provides many organizations in every field with o...Opinion (sentiment) analysis on big data streams from the constantly generated text streams on social media networks to hundreds of millions of online consumer reviews provides many organizations in every field with opportunities to discover valuable intelligence from the massive user generated text streams. However, the traditional content analysis frameworks are inefficient to handle the unprecedentedly big volume of unstructured text streams and the complexity of text analysis tasks for the real time opinion analysis on the big data streams. In this paper, we propose a parallel real time sentiment analysis system: Social Media Data Stream Sentiment Analysis Service (SMDSSAS) that performs multiple phases of sentiment analysis of social media text streams effectively in real time with two fully analytic opinion mining models to combat the scale of text data streams and the complexity of sentiment analysis processing on unstructured text streams. We propose two aspect based opinion mining models: Deterministic and Probabilistic sentiment models for a real time sentiment analysis on the user given topic related data streams. Experiments on the social media Twitter stream traffic captured during the pre-election weeks of the 2016 Presidential election for real-time analysis of public opinions toward two presidential candidates showed that the proposed system was able to predict correctly Donald Trump as the winner of the 2016 Presidential election. The cross validation results showed that the proposed sentiment models with the real-time streaming components in our proposed framework delivered effectively the analysis of the opinions on two presidential candidates with average 81% accuracy for the Deterministic model and 80% for the Probabilistic model, which are 1% - 22% improvements from the results of the existing literature.展开更多
A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and...A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and then each search bar was tracked using Kalman filter between frames. The lane detection performance was evaluated and demonstrated in ways of receiver operating characteristic, dice similarity coefficient and real-time performance. For lane departure detection, a lane departure risk evaluation model based on lasting time and frequency was effectively executed on the ARM-based platform. Experimental results indicate that the algorithm generates satisfactory lane detection results under different traffic and lighting conditions, and the proposed warning mechanism sends effective warning signals, avoiding most false warning.展开更多
Real-time electricity price( RTEP) influence factor extraction is essential to forecasting accurate power system electricity prices. At present,new electricity price forecasting models have been studied to improve pre...Real-time electricity price( RTEP) influence factor extraction is essential to forecasting accurate power system electricity prices. At present,new electricity price forecasting models have been studied to improve predictive accuracy,ignoring the extraction and analysis of RTEP influence factors. In this study,a correlation analysis method is proposed based on stochastic matrix theory.Firstly, an augmented matrix is formulated, including RTEP influence factor data and RTEP state data. Secondly, data correlation analysis results are obtained given the statistical characteristics of source data based on stochastic matrix theory.Mean spectral radius( MSR) is used as the measure of correlativity.Finally,the proposed method is evaluated in New England electricity markets and compared with the BP neural network forecasting method. Experimental results show that the extracted index system comprehensively generalizes RTEP influence factors,which play a significant role in improving RTEP forecasting accuracy.展开更多
Today with certainty, the petroleum industry is fostering sanguinely the fields’ development programs for the optimization of reservoir characterization through worth-full appliances of computer analysis techniques. ...Today with certainty, the petroleum industry is fostering sanguinely the fields’ development programs for the optimization of reservoir characterization through worth-full appliances of computer analysis techniques. The time element is of prime importance for optimistic petroleum development projects. Therefore, the frontline of “Real-time Analysis” is added into the applications of computer solving techniques for achieving and sketching up the real-time cost effectiveness in analyzing field development programs. It focuses on the phases of real-time well test data acquisition system, real-time secure access to the well test data either on field or in office and real-time data interpretation unit. This interface will yield the productive results for the field of reservoir’s pressure transient analysis and wells’ systems analysis by following the up-to-date preferred, accurate and effective well test analytical principles with modern real-time computer applications and techniques. It also lays emphasis for the comfort and reliability of data in creating best interpersonal working modes within a reputable and esteemed petroleum development organization.展开更多
A real-time monitoring and 3D visualization analysis system is proposed for dam foundation curtain grouting. Based on the real-time control technology, the optimization method and the set theory, a mathematical model ...A real-time monitoring and 3D visualization analysis system is proposed for dam foundation curtain grouting. Based on the real-time control technology, the optimization method and the set theory, a mathematical model of the system is established. The real-time collection and transmission technology of the grouting data provides a data foundation for the system. The real-time grouting monitoring and dynamic alarming method helps the system control the grouting quality during the grouting process, thus, the abnormalities of grouting, such as jacking and hydraulic uplift, can be effectively controlled. In addition, the 3D grouting visualization analysis technology is proposed to establish the grouting information model(GIM). The GIM provides a platform to visualize and analyze the grouting process and results. The system has been applied to a hydraulic project of China as a case study, and the application results indicate that the real-time grouting monitoring and 3D visualization analysis for the grouting process can help engineers control the grouting quality more efficiently.展开更多
Real-time system timing analysis is crucial for estimating the worst-case execution time(WCET)of a program.To achieve this,static or dynamic analysis methods are used,along with targeted modeling of the actual hardwar...Real-time system timing analysis is crucial for estimating the worst-case execution time(WCET)of a program.To achieve this,static or dynamic analysis methods are used,along with targeted modeling of the actual hardware system.This literature review focuses on calculating WCET for multi-core processors,providing a survey of traditional methods used for static and dynamic analysis and highlighting the major challenges that arise from different program execution scenarios on multi-core platforms.This paper outlines the strengths and weaknesses of current methodologies and offers insights into prospective areas of research on multi-core analysis.By presenting a comprehensive analysis of the current state of research on multi-core processor analysis for WCET estimation,this review aims to serve as a valuable resource for researchers and practitioners in the field.展开更多
This paper designs a space electromagnetic interference signal test and analysis technology verification platform.The article firstly introduces the general scheme of the technical verification platform and then descr...This paper designs a space electromagnetic interference signal test and analysis technology verification platform.The article firstly introduces the general scheme of the technical verification platform and then describes each component unit of the hardware and the overall structure of the software in detail.The platform can achieve a 10 MHz~50 GHz working frequency band,1.2 GHz acquisition and real-time recording bandwidth,6 GB/s recording rate,and 12 TB recording capacity.展开更多
The belt and road initiative strategy is proposed based on the stable and sustainable cooperation on economy and development between China and neighboring countries.The development of economy can affect every aspect o...The belt and road initiative strategy is proposed based on the stable and sustainable cooperation on economy and development between China and neighboring countries.The development of economy can affect every aspect of vocational education development.Therefore,vocational education in China must be moved toward internationalization to achieve sustainable development in the face of the implementation of the belt and road initiative strategy.The analysis data obtained through the strengths,weaknesses,opportunities,and threats analysis method on the internationalization of China’s vocational education under the background of the belt and road initiative strategy were the advantages analysis(strengths)of continuous maturity in developing of vocational education,which drives by economic development and the foreign employment and entrepreneurship guidance mechanism;the disadvantages analysis(weaknesses)of lack talent cultivation and weak branding of vocational education;analysis of support opportunities given by national policy;and threats analysis of social culture in the involved countries along the route.To further develop and expand China’s vocational education under the background of the belt and road initiative strategy,some countermeasures were proposed such as improves cultivation or training of talents,to build strong branding of China vocational education,and faces cultural challenges to facilitate the international development of China vocational education.展开更多
Training of preschool teachers in Sichuan Province brings advantages in increasing government support for the preschool education industry.The society attaches an important role to the preschool education industry as ...Training of preschool teachers in Sichuan Province brings advantages in increasing government support for the preschool education industry.The society attaches an important role to the preschool education industry as well as the rapid development of preschool education in Sichuan Province.However,problem exists in large flows of preschool teachers and imbalanced gender ratios.By viewing from the new situation,the comprehensive liberalization of the second-child policy and the development of educational informatization as well as the implementation of the one belt and one road strategy have created great opportunities in training of preschool teachers.At the same time,the increase in external impact of high-quality graduates in the east also poses a great threat to the development of preschool teachers in Sichuan Province.Through the strategic combination of strengths,weaknesses,opportunities,and threats analysis,the paper explores effective countermeasure ways to improve the quality of training of the preschool teachers in Sichuan Province and the construction of an excellent team of preschool teachers in Sichuan Province.展开更多
Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabiliti...Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabilities and re-evaluate traditional approaches to cyber security. Protection against emerging cyber-security threats targeting smart meter infrastructures will increase risk to both the utility and customer if not addressed within initial rollouts. This paper will discuss the issues in SMI (smart meter infrastructures) deployments that pertain to cyber security. It will cover topics such as the threats to operations, infrastructure, network and people and organization and their associated risks. SMI deployments include not only the smart meter, but also the interfaces for home energy management systems as well as communication interfaces back to the utility. Utilities must recognize and anticipate the new threat landscape that can attack and compromise the meter and the associated field network collectors. They must also include threats to the WAN (wide-area-network) backhaul networks, smart meter headends, MDMS (meter data management systems) and their interfaces to CIS (customer information systems) and billing and OMS (outage management systems). Lessons learned from SMI implementations from North America, Europe and recently, Japan, will be discussed. How white-box and black-box testing techniques are applied to determine the threat impact to the SMI. Finally, organizational change risk will be discussed and how utilities have responded to re-organizing and developing a security governance structure for the SMI and other smart grid applications.展开更多
The strengths weaknesses opportunities and threats SWOT analysis method is applied to assess the feasibility of traditional stormwater management and low impact development LID in China.The results show that tradition...The strengths weaknesses opportunities and threats SWOT analysis method is applied to assess the feasibility of traditional stormwater management and low impact development LID in China.The results show that traditional stormwater management has many disadvantages e.g.only stormwater collection and discharge or flooding peak-flow regulation is taken into consideration but lack of many important functions such as on-site infiltration non-point pollution control ecological treatment etc.Meanwhile as a new stormwater management concept the LID system has many advantages e.g.LID can not only control rainwater quantity but also effectively prevent non-point pollution. Moreover LID is easy for implementation and cost effective and operation and management can also be done easily.LID has attracted more and more attention from governmental authorities at different levels and the majority of practitioners. Therefore LID has bright prospects for wide applications in China.展开更多
A method was proposed to evaluate the real-time reliability for a single product based on damaged measurement degradation data.Most researches on degradation analysis often assumed that the measurement process did not...A method was proposed to evaluate the real-time reliability for a single product based on damaged measurement degradation data.Most researches on degradation analysis often assumed that the measurement process did not have any impact on the product's performance.However,in some cases,the measurement process may exert extra stress on products being measured.To obtain trustful results in such a situation,a new degradation model was derived.Then,by fusing the prior information of product and its own on-line degradation data,the real-time reliability was evaluated on the basis of Bayesian formula.To make the proposed method more practical,a procedure based on expectation maximization (EM) algorithm was presented to estimate the unknown parameters.Finally,the performance of the proposed method was illustrated by a simulation study.The results show that ignoring the influence of the damaged measurement process can lead to biased evaluation results,if the damaged measurement process is involved.展开更多
It is well-recognized that a transfer system response delay that reduces the test stability inevitably exists in real-time dynamic hybrid testing (RTDHT). This paper focuses on the delay-dependent stability and adde...It is well-recognized that a transfer system response delay that reduces the test stability inevitably exists in real-time dynamic hybrid testing (RTDHT). This paper focuses on the delay-dependent stability and added damping of SDOF systems in RTDHT. The exponential delay term is transferred into a rational fraction by the Pad6 approximation, and the delay-dependent stability conditions and instability mechanism of SDOF RTDHT systems are investigated by the root locus technique. First, the stability conditions are discussed separately for the cases of stiffness, mass, and damping experimental substructure. The use of root locus plots shows that the added damping effect and instability mechanism for mass are different from those for stiffness. For the stiffness experimental substructure case, the instability results from the inherent mode because of an obvious negative damping effect of the delay. For the mass case, the delay introduces an equivalent positive damping into the inherent mode, and instability occurs at an added high frequency mode. Then, the compound stability condition is investigated for a general case and the results show that the mass ratio may have both upper and lower limits to remain stable. Finally, a high-emulational virtual shaking table model is built to validate the stability conclusions.展开更多
Cytokinin oxidase/dehydrogenase(CKX; EC.1.5.99.12) regulates cytokinin(CK) level in plants and plays an essential role in CK regulatory processes. CKX proteins are encoded by a small gene family with a varying number ...Cytokinin oxidase/dehydrogenase(CKX; EC.1.5.99.12) regulates cytokinin(CK) level in plants and plays an essential role in CK regulatory processes. CKX proteins are encoded by a small gene family with a varying number of members in different plants. In spite of their physiological importance, systematic analyses of SiCKX genes in foxtail millet have not yet been examined. In this paper, we report the genome wide isolation and characterization of SiCKXs using bioinformatic methods. A total of 11 members of the family were identified in the foxtail millet genome. SiCKX genes were distributed in seven chromosomes(chromosome 1, 3, 4, 5, 6, 7, and 11). The coding sequences of all the SiCKX genes were disrupted by introns, with numbers varying from one to four. These genes expanded in the genome mainly due to segmental duplication events. Multiple alignment and motif display results showed that all SiCKX proteins share FAD- and CK-binding domains. Putative cis-elements involved in Ca2+-response, abiotic stress response, light and circadian rhythm regulation, disease resistance and seed development were present in the promoters of SiCKX genes. Expression data mining suggested that SiCKX genes have diverse expression patterns. Real-time PCR analysis indicated that all 11 SiCKX genes were up-regulated in embryos under 6-BA treatment, and some were NaCl or PEG inducible. Collectively, these results provide molecular insights into CKX research in plants.展开更多
Landslides have occurred frequently in the Luoshan mining area because of disordered mining.This paper discusses the landforms and physiognomy,hydro-meteorology,formation lithology,and geologic structure of the Luosha...Landslides have occurred frequently in the Luoshan mining area because of disordered mining.This paper discusses the landforms and physiognomy,hydro-meteorology,formation lithology,and geologic structure of the Luoshan mining area.It also describes the factors influencing the slope stability of landslide No.Ⅲ,determines the general parameters and typical section plane,analyzes the stress-strain state of the No.Ⅲ slope,and calculates its safety factors with FLAC3 D under saturated and natural conditions.Based on a stability analysis,a remote real-time monitoring system was applied to the No.Ⅲ slope,and these monitoring data were collected and analyzed.展开更多
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests.
基金Projects(50875090,50905063) supported by the National Natural Science Foundation of ChinaProject(2009AA04Z111) supported by the National High Technology Research and Development Program of China+2 种基金Project(20090460769) supported by China Postdoctoral Science FoundationProject(2011ZM0070) supported by the Fundamental Research Funds for the Central Universities in ChinaProject(S2011010001155) supported by the Natural Science Foundation of Guangdong Province,China
文摘In order to optimize the embedded system implementation for Ethernet-based computer numerical control (CNC) system, it is very necessary to establish the performance analysis model and further adopt the codesign method from the control, communication and computing perspectives. On the basis of analyzing real-time Ethemet, system architecture, time characteristic parameters of control-loop ere, a performance analysis model for real-time Ethemet-based CNC system was proposed, which is able to include the timing effects caused by the implementation platform in the simulation. The key for establishing the model is accomplished by designing the error analysis module and the controller nodes. Under the restraint of CPU resource and communication bandwidth, the experiment with a case study was conducted, and the results show that if the deadline miss ratio of data packets is 0.2%, then the percentage error is 1.105%. The proposed model can be used at several stages of CNC system development.
文摘As multimedia data sharing increases,data security in mobile devices and its mechanism can be seen as critical.Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time.Humans incorporate physiological attributes like a fingerprint,face,iris,palm print,finger knuckle print,Deoxyribonucleic Acid(DNA),and behavioral qualities like walk,voice,mark,or keystroke.The main goal of this paper is to design a robust framework for automatic face recognition.Scale Invariant Feature Transform(SIFT)and Speeded-up Robust Features(SURF)are employed for face recognition.Also,we propose a modified Gabor Wavelet Transform for SIFT/SURF(GWT-SIFT/GWT-SURF)to increase the recognition accuracy of human faces.The proposed scheme is composed of three steps.First,the entropy of the image is removed using Discrete Wavelet Transform(DWT).Second,the computational complexity of the SIFT/SURF is reduced.Third,the accuracy is increased for authentication by the proposed GWT-SIFT/GWT-SURF algorithm.A comparative analysis of the proposed scheme is done on real-time Olivetti Research Laboratory(ORL)and Poznan University of Technology(PUT)databases.When compared to the traditional SIFT/SURF methods,we verify that the GWT-SIFT achieves the better accuracy of 99.32%and the better approach is the GWT-SURF as the run time of the GWT-SURF for 100 images is 3.4 seconds when compared to the GWT-SIFT which has a run time of 4.9 seconds for 100 images.
文摘In this paper, a mathematical model of real-time simulation is given, and the problem of convergence on real-time Runge-Kutta algorithms is analysed. At last a theorem on the relation between the order of compensation and the convergent order of real-time algorithm is proved.
文摘Opinion (sentiment) analysis on big data streams from the constantly generated text streams on social media networks to hundreds of millions of online consumer reviews provides many organizations in every field with opportunities to discover valuable intelligence from the massive user generated text streams. However, the traditional content analysis frameworks are inefficient to handle the unprecedentedly big volume of unstructured text streams and the complexity of text analysis tasks for the real time opinion analysis on the big data streams. In this paper, we propose a parallel real time sentiment analysis system: Social Media Data Stream Sentiment Analysis Service (SMDSSAS) that performs multiple phases of sentiment analysis of social media text streams effectively in real time with two fully analytic opinion mining models to combat the scale of text data streams and the complexity of sentiment analysis processing on unstructured text streams. We propose two aspect based opinion mining models: Deterministic and Probabilistic sentiment models for a real time sentiment analysis on the user given topic related data streams. Experiments on the social media Twitter stream traffic captured during the pre-election weeks of the 2016 Presidential election for real-time analysis of public opinions toward two presidential candidates showed that the proposed system was able to predict correctly Donald Trump as the winner of the 2016 Presidential election. The cross validation results showed that the proposed sentiment models with the real-time streaming components in our proposed framework delivered effectively the analysis of the opinions on two presidential candidates with average 81% accuracy for the Deterministic model and 80% for the Probabilistic model, which are 1% - 22% improvements from the results of the existing literature.
基金Project(51175159)supported by the National Natural Science Foundation of ChinaProject(2013WK3024)supported by the Science andTechnology Planning Program of Hunan Province,ChinaProject(CX2013B146)supported by the Hunan Provincial InnovationFoundation for Postgraduate,China
文摘A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and then each search bar was tracked using Kalman filter between frames. The lane detection performance was evaluated and demonstrated in ways of receiver operating characteristic, dice similarity coefficient and real-time performance. For lane departure detection, a lane departure risk evaluation model based on lasting time and frequency was effectively executed on the ARM-based platform. Experimental results indicate that the algorithm generates satisfactory lane detection results under different traffic and lighting conditions, and the proposed warning mechanism sends effective warning signals, avoiding most false warning.
基金National Natural Science Foundation of China(No.61701104)the “13th Five Year Plan” Research Foundation of Jilin Provincial Department of Education,China(No.JJKH2017018KJ)
文摘Real-time electricity price( RTEP) influence factor extraction is essential to forecasting accurate power system electricity prices. At present,new electricity price forecasting models have been studied to improve predictive accuracy,ignoring the extraction and analysis of RTEP influence factors. In this study,a correlation analysis method is proposed based on stochastic matrix theory.Firstly, an augmented matrix is formulated, including RTEP influence factor data and RTEP state data. Secondly, data correlation analysis results are obtained given the statistical characteristics of source data based on stochastic matrix theory.Mean spectral radius( MSR) is used as the measure of correlativity.Finally,the proposed method is evaluated in New England electricity markets and compared with the BP neural network forecasting method. Experimental results show that the extracted index system comprehensively generalizes RTEP influence factors,which play a significant role in improving RTEP forecasting accuracy.
文摘Today with certainty, the petroleum industry is fostering sanguinely the fields’ development programs for the optimization of reservoir characterization through worth-full appliances of computer analysis techniques. The time element is of prime importance for optimistic petroleum development projects. Therefore, the frontline of “Real-time Analysis” is added into the applications of computer solving techniques for achieving and sketching up the real-time cost effectiveness in analyzing field development programs. It focuses on the phases of real-time well test data acquisition system, real-time secure access to the well test data either on field or in office and real-time data interpretation unit. This interface will yield the productive results for the field of reservoir’s pressure transient analysis and wells’ systems analysis by following the up-to-date preferred, accurate and effective well test analytical principles with modern real-time computer applications and techniques. It also lays emphasis for the comfort and reliability of data in creating best interpersonal working modes within a reputable and esteemed petroleum development organization.
基金Supported by the Innovative Research Groups of the National Natural Science Foundation of China(No.51321065)the National Natural Science Foundation of China(No.51339003 and No.51439005)
文摘A real-time monitoring and 3D visualization analysis system is proposed for dam foundation curtain grouting. Based on the real-time control technology, the optimization method and the set theory, a mathematical model of the system is established. The real-time collection and transmission technology of the grouting data provides a data foundation for the system. The real-time grouting monitoring and dynamic alarming method helps the system control the grouting quality during the grouting process, thus, the abnormalities of grouting, such as jacking and hydraulic uplift, can be effectively controlled. In addition, the 3D grouting visualization analysis technology is proposed to establish the grouting information model(GIM). The GIM provides a platform to visualize and analyze the grouting process and results. The system has been applied to a hydraulic project of China as a case study, and the application results indicate that the real-time grouting monitoring and 3D visualization analysis for the grouting process can help engineers control the grouting quality more efficiently.
基金supported by ZTE Industry-University-Institute Cooperation Funds under Grant No.2022ZTE09.
文摘Real-time system timing analysis is crucial for estimating the worst-case execution time(WCET)of a program.To achieve this,static or dynamic analysis methods are used,along with targeted modeling of the actual hardware system.This literature review focuses on calculating WCET for multi-core processors,providing a survey of traditional methods used for static and dynamic analysis and highlighting the major challenges that arise from different program execution scenarios on multi-core platforms.This paper outlines the strengths and weaknesses of current methodologies and offers insights into prospective areas of research on multi-core analysis.By presenting a comprehensive analysis of the current state of research on multi-core processor analysis for WCET estimation,this review aims to serve as a valuable resource for researchers and practitioners in the field.
基金supported by the China Electronics Technology Innovation Fund Project(Project No.KJ2202008).
文摘This paper designs a space electromagnetic interference signal test and analysis technology verification platform.The article firstly introduces the general scheme of the technical verification platform and then describes each component unit of the hardware and the overall structure of the software in detail.The platform can achieve a 10 MHz~50 GHz working frequency band,1.2 GHz acquisition and real-time recording bandwidth,6 GB/s recording rate,and 12 TB recording capacity.
文摘The belt and road initiative strategy is proposed based on the stable and sustainable cooperation on economy and development between China and neighboring countries.The development of economy can affect every aspect of vocational education development.Therefore,vocational education in China must be moved toward internationalization to achieve sustainable development in the face of the implementation of the belt and road initiative strategy.The analysis data obtained through the strengths,weaknesses,opportunities,and threats analysis method on the internationalization of China’s vocational education under the background of the belt and road initiative strategy were the advantages analysis(strengths)of continuous maturity in developing of vocational education,which drives by economic development and the foreign employment and entrepreneurship guidance mechanism;the disadvantages analysis(weaknesses)of lack talent cultivation and weak branding of vocational education;analysis of support opportunities given by national policy;and threats analysis of social culture in the involved countries along the route.To further develop and expand China’s vocational education under the background of the belt and road initiative strategy,some countermeasures were proposed such as improves cultivation or training of talents,to build strong branding of China vocational education,and faces cultural challenges to facilitate the international development of China vocational education.
文摘Training of preschool teachers in Sichuan Province brings advantages in increasing government support for the preschool education industry.The society attaches an important role to the preschool education industry as well as the rapid development of preschool education in Sichuan Province.However,problem exists in large flows of preschool teachers and imbalanced gender ratios.By viewing from the new situation,the comprehensive liberalization of the second-child policy and the development of educational informatization as well as the implementation of the one belt and one road strategy have created great opportunities in training of preschool teachers.At the same time,the increase in external impact of high-quality graduates in the east also poses a great threat to the development of preschool teachers in Sichuan Province.Through the strategic combination of strengths,weaknesses,opportunities,and threats analysis,the paper explores effective countermeasure ways to improve the quality of training of the preschool teachers in Sichuan Province and the construction of an excellent team of preschool teachers in Sichuan Province.
文摘Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabilities and re-evaluate traditional approaches to cyber security. Protection against emerging cyber-security threats targeting smart meter infrastructures will increase risk to both the utility and customer if not addressed within initial rollouts. This paper will discuss the issues in SMI (smart meter infrastructures) deployments that pertain to cyber security. It will cover topics such as the threats to operations, infrastructure, network and people and organization and their associated risks. SMI deployments include not only the smart meter, but also the interfaces for home energy management systems as well as communication interfaces back to the utility. Utilities must recognize and anticipate the new threat landscape that can attack and compromise the meter and the associated field network collectors. They must also include threats to the WAN (wide-area-network) backhaul networks, smart meter headends, MDMS (meter data management systems) and their interfaces to CIS (customer information systems) and billing and OMS (outage management systems). Lessons learned from SMI implementations from North America, Europe and recently, Japan, will be discussed. How white-box and black-box testing techniques are applied to determine the threat impact to the SMI. Finally, organizational change risk will be discussed and how utilities have responded to re-organizing and developing a security governance structure for the SMI and other smart grid applications.
基金The National Science and Technology Major Project of China(No.2010ZX07320-003)
文摘The strengths weaknesses opportunities and threats SWOT analysis method is applied to assess the feasibility of traditional stormwater management and low impact development LID in China.The results show that traditional stormwater management has many disadvantages e.g.only stormwater collection and discharge or flooding peak-flow regulation is taken into consideration but lack of many important functions such as on-site infiltration non-point pollution control ecological treatment etc.Meanwhile as a new stormwater management concept the LID system has many advantages e.g.LID can not only control rainwater quantity but also effectively prevent non-point pollution. Moreover LID is easy for implementation and cost effective and operation and management can also be done easily.LID has attracted more and more attention from governmental authorities at different levels and the majority of practitioners. Therefore LID has bright prospects for wide applications in China.
基金Project(60904002)supported by the National Natural Science Foundation of China
文摘A method was proposed to evaluate the real-time reliability for a single product based on damaged measurement degradation data.Most researches on degradation analysis often assumed that the measurement process did not have any impact on the product's performance.However,in some cases,the measurement process may exert extra stress on products being measured.To obtain trustful results in such a situation,a new degradation model was derived.Then,by fusing the prior information of product and its own on-line degradation data,the real-time reliability was evaluated on the basis of Bayesian formula.To make the proposed method more practical,a procedure based on expectation maximization (EM) algorithm was presented to estimate the unknown parameters.Finally,the performance of the proposed method was illustrated by a simulation study.The results show that ignoring the influence of the damaged measurement process can lead to biased evaluation results,if the damaged measurement process is involved.
基金State Key Laboratory of Hydroscience and Engineering Under Grant No.2008-TC-2National Natural Science Foundation of China Under Grant No.90510018,50779021 and 90715041
文摘It is well-recognized that a transfer system response delay that reduces the test stability inevitably exists in real-time dynamic hybrid testing (RTDHT). This paper focuses on the delay-dependent stability and added damping of SDOF systems in RTDHT. The exponential delay term is transferred into a rational fraction by the Pad6 approximation, and the delay-dependent stability conditions and instability mechanism of SDOF RTDHT systems are investigated by the root locus technique. First, the stability conditions are discussed separately for the cases of stiffness, mass, and damping experimental substructure. The use of root locus plots shows that the added damping effect and instability mechanism for mass are different from those for stiffness. For the stiffness experimental substructure case, the instability results from the inherent mode because of an obvious negative damping effect of the delay. For the mass case, the delay introduces an equivalent positive damping into the inherent mode, and instability occurs at an added high frequency mode. Then, the compound stability condition is investigated for a general case and the results show that the mass ratio may have both upper and lower limits to remain stable. Finally, a high-emulational virtual shaking table model is built to validate the stability conclusions.
基金supported by the project of the Modern Seed Industry Enterprise Science and Technology Development of Shandong Province, China (SDKJ2012QF003)
文摘Cytokinin oxidase/dehydrogenase(CKX; EC.1.5.99.12) regulates cytokinin(CK) level in plants and plays an essential role in CK regulatory processes. CKX proteins are encoded by a small gene family with a varying number of members in different plants. In spite of their physiological importance, systematic analyses of SiCKX genes in foxtail millet have not yet been examined. In this paper, we report the genome wide isolation and characterization of SiCKXs using bioinformatic methods. A total of 11 members of the family were identified in the foxtail millet genome. SiCKX genes were distributed in seven chromosomes(chromosome 1, 3, 4, 5, 6, 7, and 11). The coding sequences of all the SiCKX genes were disrupted by introns, with numbers varying from one to four. These genes expanded in the genome mainly due to segmental duplication events. Multiple alignment and motif display results showed that all SiCKX proteins share FAD- and CK-binding domains. Putative cis-elements involved in Ca2+-response, abiotic stress response, light and circadian rhythm regulation, disease resistance and seed development were present in the promoters of SiCKX genes. Expression data mining suggested that SiCKX genes have diverse expression patterns. Real-time PCR analysis indicated that all 11 SiCKX genes were up-regulated in embryos under 6-BA treatment, and some were NaCl or PEG inducible. Collectively, these results provide molecular insights into CKX research in plants.
文摘Landslides have occurred frequently in the Luoshan mining area because of disordered mining.This paper discusses the landforms and physiognomy,hydro-meteorology,formation lithology,and geologic structure of the Luoshan mining area.It also describes the factors influencing the slope stability of landslide No.Ⅲ,determines the general parameters and typical section plane,analyzes the stress-strain state of the No.Ⅲ slope,and calculates its safety factors with FLAC3 D under saturated and natural conditions.Based on a stability analysis,a remote real-time monitoring system was applied to the No.Ⅲ slope,and these monitoring data were collected and analyzed.