The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies.Early diagnosis of many diseases will improve the patient ...The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies.Early diagnosis of many diseases will improve the patient life.The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things(IoT),Wireless Sensor Networks(WSN),Embedded systems,Deep learning approaches and Optimization and aggregation methods.The data generated through these technologies will demand the bandwidth,data rate,latency of the network.In this proposed work,efficient discrete grey wolf optimization(DGWO)based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code(ECEMAC)has been used to aggregate the parameters generated from the wearable sensor devices of the patient.The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO.Aggregation scheme will reduce the number of transmissions over the network.The aggregated data are preprocessed at edge node to remove the noise for better diagnosis.Edge node will reduce the overhead of cloud server.The aggregated data are forward to cloud server for central storage and diagnosis.This proposed smart diagnosis will reduce the transmission cost through aggrega-tion scheme which will reduce the energy of the system.Energy cost for proposed system for 300 nodes is 0.34μJ.Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme(SPPDA),concealed data aggregation scheme for multiple application(CDAMA)and secure aggregation scheme(ASAS)are 1.3μJ,0.81μJ and 0.51μJ respectively.The optimization approaches and encryption method will ensure the data privacy.展开更多
Similarity measure design for discrete data group was proposed. Similarity measure design for continuous membership function was also carried out. Proposed similarity measures were designed based on fuzzy number and d...Similarity measure design for discrete data group was proposed. Similarity measure design for continuous membership function was also carried out. Proposed similarity measures were designed based on fuzzy number and distance measure, and were proved. To calculate the degree of similarity of discrete data, relative degree between data and total distribution was obtained. Discrete data similarity measure was completed with combination of mentioned relative degrees. Power interconnected system with multi characteristics was considered to apply discrete similarity measure. Naturally, similarity measure was extended to multi-dimensional similarity measure case, and applied to bus clustering problem.展开更多
This research involved an exploratory evaluation of the dynamics of vehicular traffic on a road network across two traffic light-controlled junctions. The study uses the case study of a one-kilometer road system model...This research involved an exploratory evaluation of the dynamics of vehicular traffic on a road network across two traffic light-controlled junctions. The study uses the case study of a one-kilometer road system modelled on Anylogic version 8.8.4. Anylogic is a multi-paradigm simulation tool that supports three main simulation methodologies: discrete event simulation, agent-based modeling, and system dynamics modeling. The system is used to evaluate the implication of stochastic time-based vehicle variables on the general efficiency of road use. Road use efficiency as reflected in this model is based on the percentage of entry vehicles to exit the model within a one-hour simulation period. The study deduced that for the model under review, an increase in entry point time delay has a domineering influence on the efficiency of road use far beyond any other consideration. This study therefore presents a novel approach that leverages Discrete Events Simulation to facilitate efficient road management with a focus on optimum road use efficiency. The study also determined that the inclusion of appropriate random parameters to reflect road use activities at critical event points in a simulation can help in the effective representation of authentic traffic models. The Anylogic simulation software leverages the Classic DEVS and Parallel DEVS formalisms to achieve these objectives.展开更多
Objective: To develop a new bioinformatic tool based on a data-mining approach for extraction of the most infor- mative proteins that could be used to find the potential biomarkers for the detection of cancer. Methods...Objective: To develop a new bioinformatic tool based on a data-mining approach for extraction of the most infor- mative proteins that could be used to find the potential biomarkers for the detection of cancer. Methods: Two independent datasets from serum samples of 253 ovarian cancer and 167 breast cancer patients were used. The samples were examined by surface- enhanced laser desorption/ionization time-of-flight mass spectrometry (SELDI-TOF MS). The datasets were used to extract the informative proteins using a data-mining method in the discrete stationary wavelet transform domain. As a dimensionality re- duction procedure, the hard thresholding method was applied to reduce the number of wavelet coefficients. Also, a distance measure was used to select the most discriminative coefficients. To find the potential biomarkers using the selected wavelet coefficients, we applied the inverse discrete stationary wavelet transform combined with a two-sided t-test. Results: From the ovarian cancer dataset, a set of five proteins were detected as potential biomarkers that could be used to identify the cancer patients from the healthy cases with accuracy, sensitivity, and specificity of 100%. Also, from the breast cancer dataset, a set of eight proteins were found as the potential biomarkers that could separate the healthy cases from the cancer patients with accuracy of 98.26%, sensitivity of 100%, and specificity of 95.6%. Conclusion: The results have shown that the new bioinformatic tool can be used in combination with the high-throughput proteomic data such as SELDI-TOF MS to find the potential biomarkers with high discriminative power.展开更多
1 Introduction Geochemical mapping at national and continental scales continues to present challenges worldwide due to variations in geologic and geotectonic units.Use of the proper sampling media can provide rich inf...1 Introduction Geochemical mapping at national and continental scales continues to present challenges worldwide due to variations in geologic and geotectonic units.Use of the proper sampling media can provide rich information on展开更多
With the rapid development of the society,water contamination events cause great loss if the accidents happen in the water supply system.A large number of sensor nodes of water quality are deployed in the water supply...With the rapid development of the society,water contamination events cause great loss if the accidents happen in the water supply system.A large number of sensor nodes of water quality are deployed in the water supply network to detect and warn the contamination events to prevent pollution from speading.If all of sensor nodes detect and transmit the water quality data when the contamination occurs,it results in the heavy communication overhead.To reduce the communication overhead,the Connected Dominated Set construction algorithm-Rule K,is adopted to select a part fo sensor nodes.Moreover,in order to improve the detection accuracy,a Spatial-Temporal Abnormal Event Detection Algorithm with Multivariate water quality data(M-STAEDA)was proposed.In M-STAEDA,first,Back Propagation neural network models are adopted to analyze the multiple water quality parameters and calculate the possible outliers.Then,M-STAEDA algorithm determines the potential contamination events through Bayesian sequential analysis to estimate the probability of a contamination event.Third,it can make decision based on the multiple event probabilities fusion.Finally,a spatial correlation model is applied to determine the spatial-temporal contamination event in the water supply networks.The experimental results indicate that the proposed M-STAEDA algorithm can obtain more accuracy with BP neural network model and improve the rate of detection and the false alarm rate,compared with the temporal event detection of Single Variate Temporal Abnormal Event Detection Algorithm(M-STAEDA).展开更多
Analytical solutions have varied uses. One is to provide solutions that can be used in verification of numerical methods. Another is to provide relatively simple forms of exact solutions that can be used in estimating...Analytical solutions have varied uses. One is to provide solutions that can be used in verification of numerical methods. Another is to provide relatively simple forms of exact solutions that can be used in estimating parameters, thus, it is possible to reduce computation time in comparison with numerical methods. In this paper, an alternative procedure is presented. Here is used a hybrid solution based on Green's function and real characteristics (discrete data) of the boundary conditions.展开更多
Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to prese...Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios.展开更多
The governing factors that influence landslide occurrences are complicated by the different soil conditions at various sites.To resolve the problem,this study focused on spatial information technology to collect data ...The governing factors that influence landslide occurrences are complicated by the different soil conditions at various sites.To resolve the problem,this study focused on spatial information technology to collect data and information on geology.GIS,remote sensing and digital elevation model(DEM) were used in combination to extract the attribute values of the surface material in the vast study area of SheiPa National Park,Taiwan.The factors influencing landslides were collected and quantification values computed.The major soil component of loam and gravel in the Shei-Pa area resulted in different landslide problems.The major factors were successfully extracted from the influencing factors.Finally,the discrete rough set(DRS) classifier was used as a tool to find the threshold of each attribute contributing to landslide occurrence,based upon the knowledge database.This rule-based knowledge database provides an effective and urgent system to manage landslides.NDVI(Normalized Difference Vegetation Index),VI(Vegetation Index),elevation,and distance from the road are the four major influencing factors for landslide occurrence.The landslide hazard potential diagrams(landslide susceptibility maps) were drawn and a rational accuracy rate of landslide was calculated.This study thus offers a systematic solution to the investigation of landslide disasters.展开更多
The accuracy of target threat estimation has a great impact on command decision-making.The Bayesian network,as an effective way to deal with the problem of uncertainty,can be used to track the change of the target thr...The accuracy of target threat estimation has a great impact on command decision-making.The Bayesian network,as an effective way to deal with the problem of uncertainty,can be used to track the change of the target threat level.Unfortunately,the traditional discrete dynamic Bayesian network(DDBN)has the problems of poor parameter learning and poor reasoning accuracy in a small sample environment with partial prior information missing.Considering the finiteness and discreteness of DDBN parameters,a fuzzy k-nearest neighbor(KNN)algorithm based on correlation of feature quantities(CF-FKNN)is proposed for DDBN parameter learning.Firstly,the correlation between feature quantities is calculated,and then the KNN algorithm with fuzzy weight is introduced to fill the missing data.On this basis,a reasonable DDBN structure is constructed by using expert experience to complete DDBN parameter learning and reasoning.Simulation results show that the CF-FKNN algorithm can accurately fill in the data when the samples are seriously missing,and improve the effect of DDBN parameter learning in the case of serious sample missing.With the proposed method,the final target threat assessment results are reasonable,which meets the needs of engineering applications.展开更多
For packet-based transmission of data over a network, or temporary sensor failure, etc., data samples may be missing in the measured signals. This paper deals with the problem of H∞ filter design for linear discrete-...For packet-based transmission of data over a network, or temporary sensor failure, etc., data samples may be missing in the measured signals. This paper deals with the problem of H∞ filter design for linear discrete-time systems with missing measurements. The missing measurements will happen at any sample time, and the probability of the occurrence of missing data is assumed to be known. The main purpose is to obtain both full-and reduced-order filters such that the filter error systems are exponentially mean-square stable and guarantee a prescribed H∞ performance in terms of linear matrix inequality (LMI). A numerical example is provided to demonstrate the validity of the proposed design approach.展开更多
In this paper, the coordination of spatial-temporal discrets of FEM and direct integral method is investigates.By analyzing the numespatial-temporal discrete,the principle of balancing the principle of balancing the...In this paper, the coordination of spatial-temporal discrets of FEM and direct integral method is investigates.By analyzing the numespatial-temporal discrete,the principle of balancing the principle of balancing the energy error induced by spatialdiscrete and the energy error induced by temporal discrete is presented, and the prioriprocess and adaptive method for the coordination of spatial discerand temporal discrete is obtained.展开更多
In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be t...In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be transmitted over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner and then con-vert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.展开更多
The present paper investigates the theoretical analysis of the tuberculosis(TB)model in the discrete-time case.The model is parameterized by the TB infection cases in the Pakistani province of Khyber Pakhtunkhwa betwe...The present paper investigates the theoretical analysis of the tuberculosis(TB)model in the discrete-time case.The model is parameterized by the TB infection cases in the Pakistani province of Khyber Pakhtunkhwa between 2002 and 2017.The model is parameterized and the basic reproduction number is obtained and it is found R_(0)=1:5853.The stability analysis for the model is presented and it is shown that the discrete-time tuberculosis model is stable at the disease-free equilibrium whenever R_(0)<1 and further we establish the results for the endemic equilibria and prove that the model is globally asymptotically stable if R_(0)>1.A discrete fractional model in the sense of Caputo derivative is presented.The numerical results of the model with various parameters and their effect on the model are presented.A comparison of discrete-time method with continuous-time model is presented graphically.A discrete fractional approach is compared with the existing method in literature and some reasonable results are achieved.Finally,a summary of results and conclusion are presented.展开更多
<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information tr...<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div>展开更多
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ...Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems.展开更多
基金This research was supported by a grant of the Korea Health Technology R&D Project through the Korea Health Industry Development Institute(KHIDI)funded by the Ministry of Health&Welfare,Republic of Korea(grant number:HI21C1831)the Soonchunhyang University Research Fund.
文摘The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies.Early diagnosis of many diseases will improve the patient life.The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things(IoT),Wireless Sensor Networks(WSN),Embedded systems,Deep learning approaches and Optimization and aggregation methods.The data generated through these technologies will demand the bandwidth,data rate,latency of the network.In this proposed work,efficient discrete grey wolf optimization(DGWO)based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code(ECEMAC)has been used to aggregate the parameters generated from the wearable sensor devices of the patient.The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO.Aggregation scheme will reduce the number of transmissions over the network.The aggregated data are preprocessed at edge node to remove the noise for better diagnosis.Edge node will reduce the overhead of cloud server.The aggregated data are forward to cloud server for central storage and diagnosis.This proposed smart diagnosis will reduce the transmission cost through aggrega-tion scheme which will reduce the energy of the system.Energy cost for proposed system for 300 nodes is 0.34μJ.Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme(SPPDA),concealed data aggregation scheme for multiple application(CDAMA)and secure aggregation scheme(ASAS)are 1.3μJ,0.81μJ and 0.51μJ respectively.The optimization approaches and encryption method will ensure the data privacy.
基金Project(2010-0020163) supported by Key Research Institute Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology, Korea
文摘Similarity measure design for discrete data group was proposed. Similarity measure design for continuous membership function was also carried out. Proposed similarity measures were designed based on fuzzy number and distance measure, and were proved. To calculate the degree of similarity of discrete data, relative degree between data and total distribution was obtained. Discrete data similarity measure was completed with combination of mentioned relative degrees. Power interconnected system with multi characteristics was considered to apply discrete similarity measure. Naturally, similarity measure was extended to multi-dimensional similarity measure case, and applied to bus clustering problem.
文摘This research involved an exploratory evaluation of the dynamics of vehicular traffic on a road network across two traffic light-controlled junctions. The study uses the case study of a one-kilometer road system modelled on Anylogic version 8.8.4. Anylogic is a multi-paradigm simulation tool that supports three main simulation methodologies: discrete event simulation, agent-based modeling, and system dynamics modeling. The system is used to evaluate the implication of stochastic time-based vehicle variables on the general efficiency of road use. Road use efficiency as reflected in this model is based on the percentage of entry vehicles to exit the model within a one-hour simulation period. The study deduced that for the model under review, an increase in entry point time delay has a domineering influence on the efficiency of road use far beyond any other consideration. This study therefore presents a novel approach that leverages Discrete Events Simulation to facilitate efficient road management with a focus on optimum road use efficiency. The study also determined that the inclusion of appropriate random parameters to reflect road use activities at critical event points in a simulation can help in the effective representation of authentic traffic models. The Anylogic simulation software leverages the Classic DEVS and Parallel DEVS formalisms to achieve these objectives.
文摘Objective: To develop a new bioinformatic tool based on a data-mining approach for extraction of the most infor- mative proteins that could be used to find the potential biomarkers for the detection of cancer. Methods: Two independent datasets from serum samples of 253 ovarian cancer and 167 breast cancer patients were used. The samples were examined by surface- enhanced laser desorption/ionization time-of-flight mass spectrometry (SELDI-TOF MS). The datasets were used to extract the informative proteins using a data-mining method in the discrete stationary wavelet transform domain. As a dimensionality re- duction procedure, the hard thresholding method was applied to reduce the number of wavelet coefficients. Also, a distance measure was used to select the most discriminative coefficients. To find the potential biomarkers using the selected wavelet coefficients, we applied the inverse discrete stationary wavelet transform combined with a two-sided t-test. Results: From the ovarian cancer dataset, a set of five proteins were detected as potential biomarkers that could be used to identify the cancer patients from the healthy cases with accuracy, sensitivity, and specificity of 100%. Also, from the breast cancer dataset, a set of eight proteins were found as the potential biomarkers that could separate the healthy cases from the cancer patients with accuracy of 98.26%, sensitivity of 100%, and specificity of 95.6%. Conclusion: The results have shown that the new bioinformatic tool can be used in combination with the high-throughput proteomic data such as SELDI-TOF MS to find the potential biomarkers with high discriminative power.
基金supported by the Special Scientific Research Fund of Public Welfare Profession of Ministry of Land and Resources of the People’s Republic of China (No. 201011057)
文摘1 Introduction Geochemical mapping at national and continental scales continues to present challenges worldwide due to variations in geologic and geotectonic units.Use of the proper sampling media can provide rich information on
文摘With the rapid development of the society,water contamination events cause great loss if the accidents happen in the water supply system.A large number of sensor nodes of water quality are deployed in the water supply network to detect and warn the contamination events to prevent pollution from speading.If all of sensor nodes detect and transmit the water quality data when the contamination occurs,it results in the heavy communication overhead.To reduce the communication overhead,the Connected Dominated Set construction algorithm-Rule K,is adopted to select a part fo sensor nodes.Moreover,in order to improve the detection accuracy,a Spatial-Temporal Abnormal Event Detection Algorithm with Multivariate water quality data(M-STAEDA)was proposed.In M-STAEDA,first,Back Propagation neural network models are adopted to analyze the multiple water quality parameters and calculate the possible outliers.Then,M-STAEDA algorithm determines the potential contamination events through Bayesian sequential analysis to estimate the probability of a contamination event.Third,it can make decision based on the multiple event probabilities fusion.Finally,a spatial correlation model is applied to determine the spatial-temporal contamination event in the water supply networks.The experimental results indicate that the proposed M-STAEDA algorithm can obtain more accuracy with BP neural network model and improve the rate of detection and the false alarm rate,compared with the temporal event detection of Single Variate Temporal Abnormal Event Detection Algorithm(M-STAEDA).
文摘Analytical solutions have varied uses. One is to provide solutions that can be used in verification of numerical methods. Another is to provide relatively simple forms of exact solutions that can be used in estimating parameters, thus, it is possible to reduce computation time in comparison with numerical methods. In this paper, an alternative procedure is presented. Here is used a hybrid solution based on Green's function and real characteristics (discrete data) of the boundary conditions.
基金supported by TATA Consultancy Servies(TCS)Research Fellowship Program,India
文摘Wi-Fi devices have limited battery life because of which conserving battery life is imperative. The 802.11 Wi-Fi standard provides power management feature that allows stations(STAs) to enter into sleep state to preserve energy without any frame losses. After the STA wakes up, it sends a null data or PS-Poll frame to retrieve frame(s) buffered by the access point(AP), if any during its sleep period. An attacker can launch a power save denial of service(PS-DoS) attack on the sleeping STA(s) by transmitting a spoofed null data or PS-Poll frame(s) to retrieve the buffered frame(s) of the sleeping STA(s) from the AP causing frame losses for the targeted STA(s). Current approaches to prevent or detect the PS-DoS attack require encryption,change in protocol or installation of proprietary hardware. These solutions suffer from expensive setup, maintenance, scalability and deployment issues. The PS-DoS attack does not differ in semantics or statistics under normal and attack circumstances.So signature and anomaly based intrusion detection system(IDS) are unfit to detect the PS-DoS attack. In this paper we propose a timed IDS based on real time discrete event system(RTDES) for detecting PS-DoS attack. The proposed DES based IDS overcomes the drawbacks of existing systems and detects the PS-DoS attack with high accuracy and detection rate. The correctness of the RTDES based IDS is proved by experimenting all possible attack scenarios.
基金National Science Council(102-2313-b-275-001),which sponsored this work
文摘The governing factors that influence landslide occurrences are complicated by the different soil conditions at various sites.To resolve the problem,this study focused on spatial information technology to collect data and information on geology.GIS,remote sensing and digital elevation model(DEM) were used in combination to extract the attribute values of the surface material in the vast study area of SheiPa National Park,Taiwan.The factors influencing landslides were collected and quantification values computed.The major soil component of loam and gravel in the Shei-Pa area resulted in different landslide problems.The major factors were successfully extracted from the influencing factors.Finally,the discrete rough set(DRS) classifier was used as a tool to find the threshold of each attribute contributing to landslide occurrence,based upon the knowledge database.This rule-based knowledge database provides an effective and urgent system to manage landslides.NDVI(Normalized Difference Vegetation Index),VI(Vegetation Index),elevation,and distance from the road are the four major influencing factors for landslide occurrence.The landslide hazard potential diagrams(landslide susceptibility maps) were drawn and a rational accuracy rate of landslide was calculated.This study thus offers a systematic solution to the investigation of landslide disasters.
基金supported by the Fundamental Scientific Research Business Expenses for Central Universities(3072021CFJ0803)the Advanced Marine Communication and Information Technology Ministry of Industry and Information Technology Key Laboratory Project(AMCIT21V3).
文摘The accuracy of target threat estimation has a great impact on command decision-making.The Bayesian network,as an effective way to deal with the problem of uncertainty,can be used to track the change of the target threat level.Unfortunately,the traditional discrete dynamic Bayesian network(DDBN)has the problems of poor parameter learning and poor reasoning accuracy in a small sample environment with partial prior information missing.Considering the finiteness and discreteness of DDBN parameters,a fuzzy k-nearest neighbor(KNN)algorithm based on correlation of feature quantities(CF-FKNN)is proposed for DDBN parameter learning.Firstly,the correlation between feature quantities is calculated,and then the KNN algorithm with fuzzy weight is introduced to fill the missing data.On this basis,a reasonable DDBN structure is constructed by using expert experience to complete DDBN parameter learning and reasoning.Simulation results show that the CF-FKNN algorithm can accurately fill in the data when the samples are seriously missing,and improve the effect of DDBN parameter learning in the case of serious sample missing.With the proposed method,the final target threat assessment results are reasonable,which meets the needs of engineering applications.
基金Supported by National Natural Science Foundation of P.R.China (60474049)the Natural Science Foundation of Fujian Province of P. R. China (A0410012, A0510009)
文摘For packet-based transmission of data over a network, or temporary sensor failure, etc., data samples may be missing in the measured signals. This paper deals with the problem of H∞ filter design for linear discrete-time systems with missing measurements. The missing measurements will happen at any sample time, and the probability of the occurrence of missing data is assumed to be known. The main purpose is to obtain both full-and reduced-order filters such that the filter error systems are exponentially mean-square stable and guarantee a prescribed H∞ performance in terms of linear matrix inequality (LMI). A numerical example is provided to demonstrate the validity of the proposed design approach.
文摘In this paper, the coordination of spatial-temporal discrets of FEM and direct integral method is investigates.By analyzing the numespatial-temporal discrete,the principle of balancing the principle of balancing the energy error induced by spatialdiscrete and the energy error induced by temporal discrete is presented, and the prioriprocess and adaptive method for the coordination of spatial discerand temporal discrete is obtained.
文摘In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be transmitted over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner and then con-vert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.
文摘The present paper investigates the theoretical analysis of the tuberculosis(TB)model in the discrete-time case.The model is parameterized by the TB infection cases in the Pakistani province of Khyber Pakhtunkhwa between 2002 and 2017.The model is parameterized and the basic reproduction number is obtained and it is found R_(0)=1:5853.The stability analysis for the model is presented and it is shown that the discrete-time tuberculosis model is stable at the disease-free equilibrium whenever R_(0)<1 and further we establish the results for the endemic equilibria and prove that the model is globally asymptotically stable if R_(0)>1.A discrete fractional model in the sense of Caputo derivative is presented.The numerical results of the model with various parameters and their effect on the model are presented.A comparison of discrete-time method with continuous-time model is presented graphically.A discrete fractional approach is compared with the existing method in literature and some reasonable results are achieved.Finally,a summary of results and conclusion are presented.
文摘<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div>
基金funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University,through the Research Funding Program,Grant No.(FRP-1443-11).
文摘Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the Internet of Medical Things(IoMT),equipped with cloud computing,has come out to be a beneficial paradigm in the healthcare field.However,the openness of networks and systems leads to security threats and illegal access.Therefore,reliable,fast,and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network.This paper presents an image protection scheme for healthcare applications to protect patients’medical image data exchanged in IoMT networks.The proposed security scheme depends on an enhanced 2D discrete chaotic map and allows dynamic substitution based on an optimized highly-nonlinear S-box and diffusion to gain an excellent security performance.The optimized S-box has an excellent nonlinearity score of 112.The new image protection scheme is efficient enough to exhibit correlation values less than 0.0022,entropy values higher than 7.999,and NPCR values around 99.6%.To reveal the efficacy of the scheme,several comparison studies are presented.These comparison studies reveal that the novel protection scheme is robust,efficient,and capable of securing healthcare imagery in IoMT systems.