Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi...Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.展开更多
This paper presents a sliding mode (SM) based identifier to deal with the parameter identification problem for a class of parameter uncertain nonlinear dynamic systems with input nonlinearity. A sliding mode controlle...This paper presents a sliding mode (SM) based identifier to deal with the parameter identification problem for a class of parameter uncertain nonlinear dynamic systems with input nonlinearity. A sliding mode controller (SMC) is used to ensure the global reaching condition of the sliding mode for the nonlinear system; an identifier is designed to identify the uncertain parameter of the nonlinear system. A numerical example is studied to show the feasibility of the SM controller and the asymptotical convergence of the identifier.展开更多
In this paper, fuzzy systems are used as identifiers for unknown nonlinear dynamic systems. The fuzzy identifier can incorporate linguistic knowledge of nonlinear dynamic systems with input-output pairs directly into ...In this paper, fuzzy systems are used as identifiers for unknown nonlinear dynamic systems. The fuzzy identifier can incorporate linguistic knowledge of nonlinear dynamic systems with input-output pairs directly into the design. In the case where there is the modelling error, a new identification algorithm is proposed. It is proved that the fuzzy identifier is globally stable and the identification error converges to zero exponentially fast.展开更多
With the data of daily precipitation and daily evaporation,dynamic drought index was calculated and compared with the identification standard of drought grade to qualify the severity of drought.According to the dynami...With the data of daily precipitation and daily evaporation,dynamic drought index was calculated and compared with the identification standard of drought grade to qualify the severity of drought.According to the dynamic drought index,a regional drought identifying system was developed for the watershed between the reach of the Yangtze River and Huaihe River in Anhui Province by using VC++ working platform and Access database.This drought identifying system would be very useful to forecast and early warn the happening of drought in this area.展开更多
Accurate and continuous identification of individual cattle is crucial to precision farming in recent years.It is also the prerequisite to monitor the individual feed intake and feeding time of beef cattle at medium t...Accurate and continuous identification of individual cattle is crucial to precision farming in recent years.It is also the prerequisite to monitor the individual feed intake and feeding time of beef cattle at medium to long distances over different cameras.However,beef cattle can tend to frequently move and change their feeding position during feeding.Furthermore,the great variations in their head direction and complex environments(light,occlusion,and background)can also lead to some difficulties in the recognition,particularly for the bio-similarities among individual cattle.Among them,AlignedReID++model is characterized by both global and local information for image matching.In particular,the dynamically matching local information(DMLI)algorithm has been introduced into the local branch to automatically align the horizontal local information.In this research,the AlignedReID++model was utilized and improved to achieve the better performance in cattle re-identification(ReID).Initially,triplet attention(TA)modules were integrated into the BottleNecks of ResNet50 Backbone.The feature extraction was then enhanced through cross-dimensional interactions with the minimal computational overhead.Since the TA modules in AlignedReID++baseline model increased the model size and floating point operations(FLOPs)by 0.005 M and 0.05 G,the rank-1 accuracy and mean average precision(mAP)were improved by 1.0 percentage points and 2.94 percentage points,respectively.Specifically,the rank-1 accuracies were outperformed by 0.86 percentage points and 0.12 percentage points,respectively,compared with the convolution block attention module(CBAM)and efficient channel attention(ECA)modules,although 0.94 percentage points were lower than that of squeeze-and-excitation(SE)modules.The mAP metric values were exceeded by 0.22,0.86 and 0.12 percentage points,respectively,compared with the SE,CBAM,and ECA modules.Additionally,the Cross-Entropy Loss function was replaced with the CosFace Loss function in the global branch of baseline model.CosFace Loss and Hard Triplet Loss were jointly employed to train the baseline model for the better identification on the similar individuals.AlignedReID++with CosFace Loss was outperformed the baseline model by 0.24 and 0.92 percentage points in the rank-1 accuracy and mAP,respectively,whereas,AlignedReID++with ArcFace Loss was exceeded by 0.36 and 0.56 percentage points,respectively.The improved model with the TA modules and CosFace Loss was achieved in a rank-1 accuracy of 94.42%,rank-5 accuracy of 98.78%,rank-10 accuracy of 99.34%,mAP of 63.90%,FLOPs of 5.45 G,frames per second(FPS)of 5.64,and model size of 23.78 M.The rank-1 accuracies were exceeded by 1.84,4.72,0.76 and 5.36 percentage points,respectively,compared with the baseline model,part-based convolutional baseline(PCB),multiple granularity network(MGN),and relation-aware global attention(RGA),while the mAP metrics were surpassed 6.42,5.86,4.30 and 7.38 percentage points,respectively.Meanwhile,the rank-1 accuracy was 0.98 percentage points lower than TransReID,but the mAP metric was exceeded by 3.90 percentage points.Moreover,the FLOPs of improved model were only 0.05 G larger than that of baseline model,while smaller than those of PCB,MGN,RGA,and TransReID by 0.68,6.51,25.4,and 16.55 G,respectively.The model size of improved model was 23.78 M,which was smaller than those of the baseline model,PCB,MGN,RGA,and TransReID by 0.03,2.33,45.06,14.53 and 62.85 M,respectively.The inference speed of improved model on a CPU was lower than those of PCB,MGN,and baseline model,but higher than TransReID and RGA.The t-SNE feature embedding visualization demonstrated that the global and local features were achieve in the better intra-class compactness and inter-class variability.Therefore,the improved model can be expected to effectively re-identify the beef cattle in natural environments of breeding farm,in order to monitor the individual feed intake and feeding time.展开更多
Studying on the genetic diversity and genetic relationship of flowering cherry cultivars is extremely important for germplasm conservation, cultivar identification and breeding. Flowering cherry is widely cultivated a...Studying on the genetic diversity and genetic relationship of flowering cherry cultivars is extremely important for germplasm conservation, cultivar identification and breeding. Flowering cherry is widely cultivated as an important woody ornamental plant in worldwide, especially Japan, China. However, owning to the morphological similarity, many cultivars are distinguished hardly in non-flowering season. Here, we evaluated the genetic diversity and genetic relationship of 40 flowering cherry cultivars, which are mainly cultivated in China. We selected 13 polymorphicprimers to amplify to allele fragments with fluorescent-labeled capillary electrophoresis technology. The population structure analysis results show that these cultivars could be divided into 4 subpopulations. At the population level, N<sub>a</sub> and N<sub>e</sub> were 6.062, 4.326, respectively. H<sub>o</sub> and H<sub>e</sub> were 0.458 and 0.670, respectively. The Shannon’s information index (I) was 1.417. The Pop3, which originated from P. serrulata, had the highest H<sub>o</sub>, H<sub>e</sub>, and I among the 4 subpopulations. AMOVA showed that only 4% of genetic variation came from populations, the 39% variation came from individuals and 57% (p < 0.05) came from intra-individuals. 5 polymorphic SSR primers were selected to construct molecular ID code system of these cultivars. This analysis on the genetic diversity and relationship of the 40 flowering cherry cultivars will help to insight into the genetic background, relationship of these flowering cherry cultivars and promote to identify similar cultivars.展开更多
Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, renderin...Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, rendering many existing defences ineffective. This study performs a large-scale measurement of online tracking mechanisms across a large pool of websites using the OpenWPM (Open Web Privacy Measurement) platform. It systematically evaluates the effectiveness of several ad blockers and underlying Privacy Enhancing Technologies (PET) that are primarily used to mitigate different tracking techniques. By quantifying the strengths and limitations of these tools against modern tracking methods, the findings highlight gaps in existing privacy protections. Actionable recommendations are provided to enhance user privacy defences, guide tool developers and inform policymakers on addressing invasive online tracking practices.展开更多
We design a regulation-triggered adaptive controller for robot manipulators to efficiently estimate unknown parameters and to achieve asymptotic stability in the presence of coupled uncertainties.Robot manipulators ar...We design a regulation-triggered adaptive controller for robot manipulators to efficiently estimate unknown parameters and to achieve asymptotic stability in the presence of coupled uncertainties.Robot manipulators are widely used in telemanipulation systems where they are subject to model and environmental uncertainties.Using conventional control algorithms on such systems can cause not only poor control performance,but also expensive computational costs and catastrophic instabilities.Therefore,system uncertainties need to be estimated through designing a computationally efficient adaptive control law.We focus on robot manipulators as an example of a highly nonlinear system.As a case study,a 2-DOF manipulator subject to four parametric uncertainties is investigated.First,the dynamic equations of the manipulator are derived,and the corresponding regressor matrix is constructed for the unknown parameters.For a general nonlinear system,a theorem is presented to guarantee the asymptotic stability of the system and the convergence of parameters'estimations.Finally,simulation results are discussed for a two-link manipulator,and the performance of the proposed scheme is thoroughly evaluated.展开更多
We consider the identification problem of coefficients for vibrating systems described by a Euler-Bernoulli beam eq~. ation Or a string equation, with one end clamped and with an input exerted on the other end. For th...We consider the identification problem of coefficients for vibrating systems described by a Euler-Bernoulli beam eq~. ation Or a string equation, with one end clamped and with an input exerted on the other end. For the beam equation, the observations are the velocity and the angle velocity at the free end, while for the string equation, the observation is the velocity at the free end. In the framework of well-posed linear system theory, we show that both the density and the flexural rigidity of the beam, and the tension of the string, can be uniquely determined by the observations for all positive times. Moreover, a general constructive method is developed to show that the mass density and the elastic modulus of the string are not determined by the observation.展开更多
Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of t...Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.展开更多
Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resourc...Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resource,the efficient DSP-based H.264/AVC coding is studied by efficient video coding techniques and system optimizing implementation.To protect the confidentiality and integrity of media information,a novel security mechanism is presented,which includes user identify authentication and a perceptual video encryption algorithm based on exploiting the special feature of entropy coding in H.264.Experimental results show that the proposed hardware framework has high performance and achieves a better balance between security and efficiency.The proposed security mechanism can achieve high security and low complexity cost,and has a little effect on the compression ratio and transmission bandwidth.What’s more,encoding and encryption at the same time,the performance of data process can meet real-time application.展开更多
Some neurons,especially in mammalian peripheral nervous system or in lower vertebrate or in vertebrate central nervous system(CNS)regenerate after axotomy,while most mammalian CNS neurons fail to regenerate.There is a...Some neurons,especially in mammalian peripheral nervous system or in lower vertebrate or in vertebrate central nervous system(CNS)regenerate after axotomy,while most mammalian CNS neurons fail to regenerate.There is an emerging consensus that neurons have different intrinsic regenerative capabilities,which theoretically could be manipulated therapeutically to improve regeneration.Population-based comparisons between"good regenerating"and"bad regenerating"neurons in the CNS and peripheral nervous system of most vertebrates yield results that are inconclusive or difficult to interpret.At least in part,this reflects the great diversity of cells in the mammalian CNS.Using mammalian nervous system imposes several methodical limitations.First,the small sizes and large numbers of neurons in the CNS make it very difficult to distinguish regenerating neurons from non-regenerating ones.Second,the lack of identifiable neurons makes it impossible to correlate biochemical changes in a neuron with axonal damage of the same neuron,and therefore,to dissect the molecular mechanisms of regeneration on the level of single neurons.This review will survey the reported responses to axon injury and the determinants of axon regeneration,emphasizing non-mammalian model organisms,which are often under-utilized,but in which the data are especially easy to interpret.展开更多
In order to obtain the primary parameters and operating characteristics of a DC motor without directly measuring its torque and rational speed, it is proposed to use a PC and a data acquisition card to acquire both th...In order to obtain the primary parameters and operating characteristics of a DC motor without directly measuring its torque and rational speed, it is proposed to use a PC and a data acquisition card to acquire both the dynamic and static data of armature current to establish the performance of a DC permanent magnet motor. The accuracy and validity of this virtual test system proposed were verified by comparing the measurements made with the system proposed with the measurements made with conventional torque meters. It is concluded from the results of comparison that from the mathematic model established for the DC permant magnet motors, both major parameters and operating characteristics can be directly established for the DC motors without measuring their torques and rotational speed, a perfect on line measurement and test system has been established for the DC permanent magnet motors using the theory of virtual test system. The system proposed features shorter test time, higher efficiency and lower cost.展开更多
The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many ...The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.展开更多
This paper addresses the design of an exponential function-based learning law for artificial neural networks(ANNs)with continuous dynamics.The ANN structure is used to obtain a non-parametric model of systems with unc...This paper addresses the design of an exponential function-based learning law for artificial neural networks(ANNs)with continuous dynamics.The ANN structure is used to obtain a non-parametric model of systems with uncertainties,which are described by a set of nonlinear ordinary differential equations.Two novel adaptive algorithms with predefined exponential convergence rate adjust the weights of the ANN.The first algorithm includes an adaptive gain depending on the identification error which accelerated the convergence of the weights and promotes a faster convergence between the states of the uncertain system and the trajectories of the neural identifier.The second approach uses a time-dependent sigmoidal gain that forces the convergence of the identification error to an invariant set characterized by an ellipsoid.The generalized volume of this ellipsoid depends on the upper bounds of uncertainties,perturbations and modeling errors.The application of the invariant ellipsoid method yields to obtain an algorithm to reduce the volume of the convergence region for the identification error.Both adaptive algorithms are derived from the application of a non-standard exponential dependent function and an associated controlled Lyapunov function.Numerical examples demonstrate the improvements enforced by the algorithms introduced in this study by comparing the convergence settings concerning classical schemes with non-exponential continuous learning methods.The proposed identifiers overcome the results of the classical identifier achieving a faster convergence to an invariant set of smaller dimensions.展开更多
This work proposes a method to construct a state-shared model for multiple-input multiple-output (MIMO) systems. A state-shared model is defined as a linear time invariant state-space structure that is driven by mea...This work proposes a method to construct a state-shared model for multiple-input multiple-output (MIMO) systems. A state-shared model is defined as a linear time invariant state-space structure that is driven by measurement signals-the plant outputs and the manipulated variables, but shared by different multiple input/output models. The genesis of the state-shared model is based on a particular reduced non minimal realization. Any such realization necessarily fulfills the requirement that the output of the state-shared model is an asymptotically correct estimate of the output of the plant, if the process model is selected appropriately. The approach is demomtrated on a nonlinear MIMO system - a physiological model of calcium fluxes that controls muscle contraction and relaxation in human cardiac myocytes.展开更多
Cytoscape is one of the most popular platforms for biomolecular networks research. However Cytoscape cannot display biomolecular names according to their accession identifiers in different databases. A plugin named Ai...Cytoscape is one of the most popular platforms for biomolecular networks research. However Cytoscape cannot display biomolecular names according to their accession identifiers in different databases. A plugin named Ai2NU is designed and implemented in this paper. It can make biomolecular names displayed automatically in biomolecular networks graphs in Cytoscape by constructing a local dictionary. It is convenient for researchers to recognize biomolecules and enhance the research efficiency.展开更多
In order to test the bending-torsional coupled vibration characteristics of the multi-shafts gear transmission system of large power vehicles,a torsional vibration exciter was used to apply torsional excitation on the...In order to test the bending-torsional coupled vibration characteristics of the multi-shafts gear transmission system of large power vehicles,a torsional vibration exciter was used to apply torsional excitation on the gear transmission systems and thirty-two acceleration sensors were used to measure the tangential acceleration of each shaft.Torsional vibration signals and bending vibration signals of each measuring point were obtained by calculation of the four-point-response signal.The modal parameters of gear transmission systems including nature frequency,modal shape and modal damping ratio were obtained by identifying modal parameters of the torsional vibration signal and bending vibration signal.The characteristic of the bending vibration and torsional vibration of the gear systems were studied through the analysis of the nature frequency and modal shape.The nonlinearity characteristic of the gear transmission system was investigated through single frequency excitation test,which can be the foundation for further nonlinearity research.展开更多
文摘Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.
文摘This paper presents a sliding mode (SM) based identifier to deal with the parameter identification problem for a class of parameter uncertain nonlinear dynamic systems with input nonlinearity. A sliding mode controller (SMC) is used to ensure the global reaching condition of the sliding mode for the nonlinear system; an identifier is designed to identify the uncertain parameter of the nonlinear system. A numerical example is studied to show the feasibility of the SM controller and the asymptotical convergence of the identifier.
文摘In this paper, fuzzy systems are used as identifiers for unknown nonlinear dynamic systems. The fuzzy identifier can incorporate linguistic knowledge of nonlinear dynamic systems with input-output pairs directly into the design. In the case where there is the modelling error, a new identification algorithm is proposed. It is proved that the fuzzy identifier is globally stable and the identification error converges to zero exponentially fast.
基金Supported by Special Fund for Public Welfare Meteorology Industry (GYHY201106029)
文摘With the data of daily precipitation and daily evaporation,dynamic drought index was calculated and compared with the identification standard of drought grade to qualify the severity of drought.According to the dynamic drought index,a regional drought identifying system was developed for the watershed between the reach of the Yangtze River and Huaihe River in Anhui Province by using VC++ working platform and Access database.This drought identifying system would be very useful to forecast and early warn the happening of drought in this area.
基金National Key Research and Development Program(2023YFD1301801)National Natural Science Foundation of China(32272931)+1 种基金Shaanxi Province Agricultural Key Core Technology Project(2024NYGG005)Shaanxi Province Key R&D Program(2024NC-ZDCYL-05-12)。
文摘Accurate and continuous identification of individual cattle is crucial to precision farming in recent years.It is also the prerequisite to monitor the individual feed intake and feeding time of beef cattle at medium to long distances over different cameras.However,beef cattle can tend to frequently move and change their feeding position during feeding.Furthermore,the great variations in their head direction and complex environments(light,occlusion,and background)can also lead to some difficulties in the recognition,particularly for the bio-similarities among individual cattle.Among them,AlignedReID++model is characterized by both global and local information for image matching.In particular,the dynamically matching local information(DMLI)algorithm has been introduced into the local branch to automatically align the horizontal local information.In this research,the AlignedReID++model was utilized and improved to achieve the better performance in cattle re-identification(ReID).Initially,triplet attention(TA)modules were integrated into the BottleNecks of ResNet50 Backbone.The feature extraction was then enhanced through cross-dimensional interactions with the minimal computational overhead.Since the TA modules in AlignedReID++baseline model increased the model size and floating point operations(FLOPs)by 0.005 M and 0.05 G,the rank-1 accuracy and mean average precision(mAP)were improved by 1.0 percentage points and 2.94 percentage points,respectively.Specifically,the rank-1 accuracies were outperformed by 0.86 percentage points and 0.12 percentage points,respectively,compared with the convolution block attention module(CBAM)and efficient channel attention(ECA)modules,although 0.94 percentage points were lower than that of squeeze-and-excitation(SE)modules.The mAP metric values were exceeded by 0.22,0.86 and 0.12 percentage points,respectively,compared with the SE,CBAM,and ECA modules.Additionally,the Cross-Entropy Loss function was replaced with the CosFace Loss function in the global branch of baseline model.CosFace Loss and Hard Triplet Loss were jointly employed to train the baseline model for the better identification on the similar individuals.AlignedReID++with CosFace Loss was outperformed the baseline model by 0.24 and 0.92 percentage points in the rank-1 accuracy and mAP,respectively,whereas,AlignedReID++with ArcFace Loss was exceeded by 0.36 and 0.56 percentage points,respectively.The improved model with the TA modules and CosFace Loss was achieved in a rank-1 accuracy of 94.42%,rank-5 accuracy of 98.78%,rank-10 accuracy of 99.34%,mAP of 63.90%,FLOPs of 5.45 G,frames per second(FPS)of 5.64,and model size of 23.78 M.The rank-1 accuracies were exceeded by 1.84,4.72,0.76 and 5.36 percentage points,respectively,compared with the baseline model,part-based convolutional baseline(PCB),multiple granularity network(MGN),and relation-aware global attention(RGA),while the mAP metrics were surpassed 6.42,5.86,4.30 and 7.38 percentage points,respectively.Meanwhile,the rank-1 accuracy was 0.98 percentage points lower than TransReID,but the mAP metric was exceeded by 3.90 percentage points.Moreover,the FLOPs of improved model were only 0.05 G larger than that of baseline model,while smaller than those of PCB,MGN,RGA,and TransReID by 0.68,6.51,25.4,and 16.55 G,respectively.The model size of improved model was 23.78 M,which was smaller than those of the baseline model,PCB,MGN,RGA,and TransReID by 0.03,2.33,45.06,14.53 and 62.85 M,respectively.The inference speed of improved model on a CPU was lower than those of PCB,MGN,and baseline model,but higher than TransReID and RGA.The t-SNE feature embedding visualization demonstrated that the global and local features were achieve in the better intra-class compactness and inter-class variability.Therefore,the improved model can be expected to effectively re-identify the beef cattle in natural environments of breeding farm,in order to monitor the individual feed intake and feeding time.
文摘Studying on the genetic diversity and genetic relationship of flowering cherry cultivars is extremely important for germplasm conservation, cultivar identification and breeding. Flowering cherry is widely cultivated as an important woody ornamental plant in worldwide, especially Japan, China. However, owning to the morphological similarity, many cultivars are distinguished hardly in non-flowering season. Here, we evaluated the genetic diversity and genetic relationship of 40 flowering cherry cultivars, which are mainly cultivated in China. We selected 13 polymorphicprimers to amplify to allele fragments with fluorescent-labeled capillary electrophoresis technology. The population structure analysis results show that these cultivars could be divided into 4 subpopulations. At the population level, N<sub>a</sub> and N<sub>e</sub> were 6.062, 4.326, respectively. H<sub>o</sub> and H<sub>e</sub> were 0.458 and 0.670, respectively. The Shannon’s information index (I) was 1.417. The Pop3, which originated from P. serrulata, had the highest H<sub>o</sub>, H<sub>e</sub>, and I among the 4 subpopulations. AMOVA showed that only 4% of genetic variation came from populations, the 39% variation came from individuals and 57% (p < 0.05) came from intra-individuals. 5 polymorphic SSR primers were selected to construct molecular ID code system of these cultivars. This analysis on the genetic diversity and relationship of the 40 flowering cherry cultivars will help to insight into the genetic background, relationship of these flowering cherry cultivars and promote to identify similar cultivars.
文摘Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, rendering many existing defences ineffective. This study performs a large-scale measurement of online tracking mechanisms across a large pool of websites using the OpenWPM (Open Web Privacy Measurement) platform. It systematically evaluates the effectiveness of several ad blockers and underlying Privacy Enhancing Technologies (PET) that are primarily used to mitigate different tracking techniques. By quantifying the strengths and limitations of these tools against modern tracking methods, the findings highlight gaps in existing privacy protections. Actionable recommendations are provided to enhance user privacy defences, guide tool developers and inform policymakers on addressing invasive online tracking practices.
基金supported by the National Science Foundation under Award#1823951-1823983。
文摘We design a regulation-triggered adaptive controller for robot manipulators to efficiently estimate unknown parameters and to achieve asymptotic stability in the presence of coupled uncertainties.Robot manipulators are widely used in telemanipulation systems where they are subject to model and environmental uncertainties.Using conventional control algorithms on such systems can cause not only poor control performance,but also expensive computational costs and catastrophic instabilities.Therefore,system uncertainties need to be estimated through designing a computationally efficient adaptive control law.We focus on robot manipulators as an example of a highly nonlinear system.As a case study,a 2-DOF manipulator subject to four parametric uncertainties is investigated.First,the dynamic equations of the manipulator are derived,and the corresponding regressor matrix is constructed for the unknown parameters.For a general nonlinear system,a theorem is presented to guarantee the asymptotic stability of the system and the convergence of parameters'estimations.Finally,simulation results are discussed for a two-link manipulator,and the performance of the proposed scheme is thoroughly evaluated.
基金the National Natural Science Foundation of China (No.K411331528)
文摘We consider the identification problem of coefficients for vibrating systems described by a Euler-Bernoulli beam eq~. ation Or a string equation, with one end clamped and with an input exerted on the other end. For the beam equation, the observations are the velocity and the angle velocity at the free end, while for the string equation, the observation is the velocity at the free end. In the framework of well-posed linear system theory, we show that both the density and the flexural rigidity of the beam, and the tension of the string, can be uniquely determined by the observations for all positive times. Moreover, a general constructive method is developed to show that the mass density and the elastic modulus of the string are not determined by the observation.
文摘Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.
基金supported by the Project (No.2005CB321902) of Major State Basic Research Development (973)Project (No.yzdj0705) of Information Security Key Laboratory of the General Office of CPC Central Committee of China
文摘Security video communication is a challenging task,especially for wireless video applications.An efficient security multimedia system on embedded platform is designed.By analyzing the hardware architecture and resource,the efficient DSP-based H.264/AVC coding is studied by efficient video coding techniques and system optimizing implementation.To protect the confidentiality and integrity of media information,a novel security mechanism is presented,which includes user identify authentication and a perceptual video encryption algorithm based on exploiting the special feature of entropy coding in H.264.Experimental results show that the proposed hardware framework has high performance and achieves a better balance between security and efficiency.The proposed security mechanism can achieve high security and low complexity cost,and has a little effect on the compression ratio and transmission bandwidth.What’s more,encoding and encryption at the same time,the performance of data process can meet real-time application.
基金supported by 85310-PHI Shriners Research Foundation(to MIS)NIH R01 NS092876(to MES)
文摘Some neurons,especially in mammalian peripheral nervous system or in lower vertebrate or in vertebrate central nervous system(CNS)regenerate after axotomy,while most mammalian CNS neurons fail to regenerate.There is an emerging consensus that neurons have different intrinsic regenerative capabilities,which theoretically could be manipulated therapeutically to improve regeneration.Population-based comparisons between"good regenerating"and"bad regenerating"neurons in the CNS and peripheral nervous system of most vertebrates yield results that are inconclusive or difficult to interpret.At least in part,this reflects the great diversity of cells in the mammalian CNS.Using mammalian nervous system imposes several methodical limitations.First,the small sizes and large numbers of neurons in the CNS make it very difficult to distinguish regenerating neurons from non-regenerating ones.Second,the lack of identifiable neurons makes it impossible to correlate biochemical changes in a neuron with axonal damage of the same neuron,and therefore,to dissect the molecular mechanisms of regeneration on the level of single neurons.This review will survey the reported responses to axon injury and the determinants of axon regeneration,emphasizing non-mammalian model organisms,which are often under-utilized,but in which the data are especially easy to interpret.
文摘In order to obtain the primary parameters and operating characteristics of a DC motor without directly measuring its torque and rational speed, it is proposed to use a PC and a data acquisition card to acquire both the dynamic and static data of armature current to establish the performance of a DC permanent magnet motor. The accuracy and validity of this virtual test system proposed were verified by comparing the measurements made with the system proposed with the measurements made with conventional torque meters. It is concluded from the results of comparison that from the mathematic model established for the DC permant magnet motors, both major parameters and operating characteristics can be directly established for the DC motors without measuring their torques and rotational speed, a perfect on line measurement and test system has been established for the DC permanent magnet motors using the theory of virtual test system. The system proposed features shorter test time, higher efficiency and lower cost.
基金This work is supported by the Institute for Information&communications Technology Promotion(IITP)grant funded by the Korean government Ministry of Science and ICT(MSIT)(No.B0184-15-1001,Federated Interoperable Semantic IoT Testbeds and Applications).
文摘The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.
基金supported by the National Polytechnic Institute(SIP-20221151,SIP-20220916)。
文摘This paper addresses the design of an exponential function-based learning law for artificial neural networks(ANNs)with continuous dynamics.The ANN structure is used to obtain a non-parametric model of systems with uncertainties,which are described by a set of nonlinear ordinary differential equations.Two novel adaptive algorithms with predefined exponential convergence rate adjust the weights of the ANN.The first algorithm includes an adaptive gain depending on the identification error which accelerated the convergence of the weights and promotes a faster convergence between the states of the uncertain system and the trajectories of the neural identifier.The second approach uses a time-dependent sigmoidal gain that forces the convergence of the identification error to an invariant set characterized by an ellipsoid.The generalized volume of this ellipsoid depends on the upper bounds of uncertainties,perturbations and modeling errors.The application of the invariant ellipsoid method yields to obtain an algorithm to reduce the volume of the convergence region for the identification error.Both adaptive algorithms are derived from the application of a non-standard exponential dependent function and an associated controlled Lyapunov function.Numerical examples demonstrate the improvements enforced by the algorithms introduced in this study by comparing the convergence settings concerning classical schemes with non-exponential continuous learning methods.The proposed identifiers overcome the results of the classical identifier achieving a faster convergence to an invariant set of smaller dimensions.
文摘This work proposes a method to construct a state-shared model for multiple-input multiple-output (MIMO) systems. A state-shared model is defined as a linear time invariant state-space structure that is driven by measurement signals-the plant outputs and the manipulated variables, but shared by different multiple input/output models. The genesis of the state-shared model is based on a particular reduced non minimal realization. Any such realization necessarily fulfills the requirement that the output of the state-shared model is an asymptotically correct estimate of the output of the plant, if the process model is selected appropriately. The approach is demomtrated on a nonlinear MIMO system - a physiological model of calcium fluxes that controls muscle contraction and relaxation in human cardiac myocytes.
基金Project supported by the Shanghai Leading Academic Discipline Project(Grnat No.J50103)the Ph D Programs Foundation of Ministry of Education of China(Grant No.20080280007)+1 种基金the Innovation Program of Municipal Education Commission of Shanghai Municipality(Grant No.11Y203)the Innovation Foundation of Shanghai University
文摘Cytoscape is one of the most popular platforms for biomolecular networks research. However Cytoscape cannot display biomolecular names according to their accession identifiers in different databases. A plugin named Ai2NU is designed and implemented in this paper. It can make biomolecular names displayed automatically in biomolecular networks graphs in Cytoscape by constructing a local dictionary. It is convenient for researchers to recognize biomolecules and enhance the research efficiency.
基金Sponsored by the Ministerial Level Advanced Research Foundation(40402060103)
文摘In order to test the bending-torsional coupled vibration characteristics of the multi-shafts gear transmission system of large power vehicles,a torsional vibration exciter was used to apply torsional excitation on the gear transmission systems and thirty-two acceleration sensors were used to measure the tangential acceleration of each shaft.Torsional vibration signals and bending vibration signals of each measuring point were obtained by calculation of the four-point-response signal.The modal parameters of gear transmission systems including nature frequency,modal shape and modal damping ratio were obtained by identifying modal parameters of the torsional vibration signal and bending vibration signal.The characteristic of the bending vibration and torsional vibration of the gear systems were studied through the analysis of the nature frequency and modal shape.The nonlinearity characteristic of the gear transmission system was investigated through single frequency excitation test,which can be the foundation for further nonlinearity research.