With the rapid development of sports,the number of sports images has increased dramatically.Intelligent and automatic processing and analysis of moving images are significant,which can not only facilitate users to qui...With the rapid development of sports,the number of sports images has increased dramatically.Intelligent and automatic processing and analysis of moving images are significant,which can not only facilitate users to quickly search and access moving images but also facilitate staff to store and manage moving image data and contribute to the intellectual development of the sports industry.In this paper,a method of table tennis identification and positioning based on a convolutional neural network is proposed,which solves the problem that the identification and positioning method based on color features and contour features is not adaptable in various environments.At the same time,the learning methods and techniques of table tennis detection,positioning,and trajectory prediction are studied.A deep learning framework for recognition learning of rotating flying table tennis is put forward.The mechanism and methods of positioning,trajectory prediction,and intelligent automatic processing of moving images are studied,and the self-built data sets are trained and verified.展开更多
In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military i...In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military intelligence database are discussed. On this condition, a new data-mining arithmetic based on relation intelligence database is presented according to the preference information and the requirement of time limit given by the commander. Furthermore, a simple calculative example is presented to prove the arithmetic with better maneuverability. Lastly, the problem of how to process the intelligence data mined from the intelligence database is discussed.展开更多
The epidemic characters of Omicron(e.g.large-scale transmission)are significantly different from the initial variants of COVID-19.The data generated by large-scale transmission is important to predict the trend of epi...The epidemic characters of Omicron(e.g.large-scale transmission)are significantly different from the initial variants of COVID-19.The data generated by large-scale transmission is important to predict the trend of epidemic characters.However,the re-sults of current prediction models are inaccurate since they are not closely combined with the actual situation of Omicron transmission.In consequence,these inaccurate results have negative impacts on the process of the manufacturing and the service industry,for example,the production of masks and the recovery of the tourism industry.The authors have studied the epidemic characters in two ways,that is,investigation and prediction.First,a large amount of data is collected by utilising the Baidu index and conduct questionnaire survey concerning epidemic characters.Second,theβ-SEIDR model is established,where the population is classified as Susceptible,Exposed,Infected,Dead andβ-Recovered persons,to intelligently predict the epidemic characters of COVID-19.Note thatβ-Recovered persons denote that the Recovered persons may become Sus-ceptible persons with probabilityβ.The simulation results show that the model can accurately predict the epidemic characters.展开更多
Based on the cognitive radar concept and the basic connotation of cognitive skywave over-the-horizon radar(SWOTHR), the system structure and information processingmechanism about cognitive SWOTHR are researched. Amo...Based on the cognitive radar concept and the basic connotation of cognitive skywave over-the-horizon radar(SWOTHR), the system structure and information processingmechanism about cognitive SWOTHR are researched. Amongthem, the hybrid network system architecture which is thedistributed configuration combining with the centralized cognition and its soft/hardware framework with the sense-detectionintegration are proposed, and the information processing framebased on the lens principle and its information processing flowwith receive-transmit joint adaption are designed, which buildand parse the work law for cognition and its self feedback adjustment with the lens focus model and five stages informationprocessing sequence. After that, the system simulation andthe performance analysis and comparison are provided, whichinitially proves the rationality and advantages of the proposedideas. Finally, four important development ideas of futureSWOTHR toward "high frequency intelligence information processing system" are discussed, which are scene information fusion, dynamic reconfigurable system, hierarchical and modulardesign, and sustainable development. Then the conclusion thatthe cognitive SWOTHR can cause the performance improvement is gotten.展开更多
In order to study the problem of intelligent information processing in new types of imaging fuze, the method of extracting the invariance features of target images is adopted, and radial basis function neural network ...In order to study the problem of intelligent information processing in new types of imaging fuze, the method of extracting the invariance features of target images is adopted, and radial basis function neural network is used to recognize targets. Owing to its ability of parallel processing, its robustness and generalization, the method can realize the recognition of the conditions of missile-target encounters, and meet the requirements of real-time recognition in the imaging fuze. It is shown that based on artificial neural network target recognition and burst point control are feasible.展开更多
The packet classification is a fundamental process in provisioning security and quality of service for many intelligent network-embedded systems running in the Internet of Things(IoT).In recent years,researchers have ...The packet classification is a fundamental process in provisioning security and quality of service for many intelligent network-embedded systems running in the Internet of Things(IoT).In recent years,researchers have tried to develop hardware-based solutions for the classification of Internet packets.Due to higher throughput and shorter delays,these solutions are considered as a major key to improving the quality of services.Most of these efforts have attempted to implement a software algorithm on the FPGA to reduce the processing time and enhance the throughput.The proposed architectures,however,cannot reach a compromise among power consumption,memory usage,and throughput rate.In view of this,the architecture proposed in this paper contains a pipelinebased micro-core that is used in network processors to classify packets.To this end,three architectures have been implemented using the proposed micro-core.The first architecture performs parallel classification based on header fields.The second one classifies packets in a serial manner.The last architecture is the pipeline-based classifier,which can increase performance by nine times.The proposed architectures have been implemented on an FPGA chip.The results are indicative of a reduction in memory usage as well as an increase in speedup and throughput.The architecture has a power consumption of is 1.294w,and its throughput with a frequency of 233 MHz exceeds 147 Gbps.展开更多
September 10 ~12 ,2008,Lyon,France The IIP conference series provides aforumfor engineers andscientistsin academia,university andindustryto present theirlatest researchfindings in any aspects of intelligent informatio...September 10 ~12 ,2008,Lyon,France The IIP conference series provides aforumfor engineers andscientistsin academia,university andindustryto present theirlatest researchfindings in any aspects of intelligent information processing.This ti me , we especially encourage papers on Knowledge Discovery , Knowledge Management ,Intelligent Agents , Machine Learning, Autonomic Reasoning etc.We also welcome papers that highlight successful modern applications of IIP,such as Biomedicine ,Bioinformatics ,e-Services ,e-Learning, Business Intelligence.IIP2008 attempts to meet the needs of a large and diverse community.展开更多
This paper discusses the progress of computer integrated processing (CIPS) of coal-preparation and then preserits an intelligence controlled production-process, device-maintenance and production-management system of...This paper discusses the progress of computer integrated processing (CIPS) of coal-preparation and then preserits an intelligence controlled production-process, device-maintenance and production-management system of coal- preparation based on multi-agents (IICMMS-CP). The construction of the IICMMS-CP, the distributed network control system based on live intelligence control stations and the strategy of implementing distributed intelligence control system are studied in order to overcome the disadvantages brought about by the wide use of the PLC system by coaipreparation plants. The software frame, based on a Multi-Agent Intelligence Control and Maintenance Management integrated system, is studied and the implemention methods of IICMMS-CP are discussed. The characteristics of distributed architecture, cooperation and parallel computing meet the needs of integrated control of coal-preparation plants with large-scale spatial production distribution, densely-related processes and complex systems. Its application further improves the reliability and precision of process control, accuracy of fault identification and intelligence of production adjustment, establishes a technical basis for system integration and flexible production. The main function of the system has been tested in a coal-preparation plant to good effect in stabilizing product quality, improving efficiency and reducing consumption.展开更多
Scheduling problem is a well-known combinatorial optimization problem.An effective improved estimation of distribution algorithm(IEDA) was proposed for minimizing the makespan of the unrelated parallel machine schedul...Scheduling problem is a well-known combinatorial optimization problem.An effective improved estimation of distribution algorithm(IEDA) was proposed for minimizing the makespan of the unrelated parallel machine scheduling problem(UPMSP).Mathematical description was given for the UPMSP.The IEDA which was combined with variable neighborhood search(IEDA_VNS) was proposed to solve the UPMSP in order to improve local search ability.A new encoding method was designed for representing the feasible solutions of the UPMSP.More knowledge of the UPMSP were taken consideration in IEDA_ VNS for probability matrix which was based the processing time matrix.The simulation results show that the proposed IEDA_VNS can solve the problem effectively.展开更多
Line drawings, as a concise form, can be recognized by infants and even chimpanzees. Recently, how the visual system processes line-drawings attracts more and more attention from psychology, cognitive science and comp...Line drawings, as a concise form, can be recognized by infants and even chimpanzees. Recently, how the visual system processes line-drawings attracts more and more attention from psychology, cognitive science and computer science. The neuroscientific studies revealed that line drawings generate similar neural actions as color photographs, which give insights on how to efficiently process big media data. In this paper, we present a comprehensive survey on line drawing studies, including cognitive mechanism of visual perception, computational models in computer vision and intelligent process in diverse media applications. Major debates, challenges and solutions that have been addressed over the years are discussed. Finally some of the ensuing challenges in line drawing studies are outlined.展开更多
Injection molding is one of the most widely used material processing methods in producing plastic products with complex geometries and high precision. The determination of process parameters is important in obtaining ...Injection molding is one of the most widely used material processing methods in producing plastic products with complex geometries and high precision. The determination of process parameters is important in obtaining qualified products and maintaining product quality. This article reviews the recent studies and developments of the intelligent methods applied in the process parameter determination of injection molding. These intelligent methods are classified into three categories: Case-based reasoning methods, expert sys- tem-based methods, and data fitting and optimization methods. A framework of process parameter determination is proposed after comprehensive discussions. Finally, the conclusions and future research topics are discussed.展开更多
Presently,the service performance of new-generation high-tech equipment is directly affected by the manufacturing quality of complex thin-walled components.A high-efficiency and quality manufacturing of these complex ...Presently,the service performance of new-generation high-tech equipment is directly affected by the manufacturing quality of complex thin-walled components.A high-efficiency and quality manufacturing of these complex thin-walled components creates a bottleneck that needs to be solved urgently in machinery manufacturing.To address this problem,the collaborative manufacturing of structure shape and surface integrity has emerged as a new process that can shorten processing cycles,improve machining qualities,and reduce costs.This paper summarises the research status on the material removal mechanism,precision control of structure shape,machined surface integrity control and intelligent process control technology of complex thin-walled components.Numerous solutions and technical approaches are then put forward to solve the critical problems in the high-performance manufacturing of complex thin-wall components.The development status,challenge and tendency of collaborative manufacturing technologies in the high-efficiency and quality manufacturing of complex thin-wall components is also discussed.展开更多
A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile...A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile applications for millions of users by taking advantage of the scale and flexibility of shared physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data and applications in shared data centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used n a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet nspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for ntelligence flow processing to protect from possible network attacks inside a data center network展开更多
This paper describes a person identifcation method for a mobile robot which performs specifc person following under dynamic complicated environments like a school canteen where many persons exist.We propose a distance...This paper describes a person identifcation method for a mobile robot which performs specifc person following under dynamic complicated environments like a school canteen where many persons exist.We propose a distance-dependent appearance model which is based on scale-invariant feature transform(SIFT) feature.SIFT is a powerful image feature that is invariant to scale and rotation in the image plane and also robust to changes of lighting condition.However,the feature is weak against afne transformations and the identifcation power will thus be degraded when the pose of a person changes largely.We therefore use a set of images taken from various directions to cope with pose changes.Moreover,the number of SIFT feature matches between the model and an input image will decrease as the person becomes farther away from the camera.Therefore,we also use a distance-dependent threshold.The person following experiment was conducted using an actual mobile robot,and the quality assessment of person identifcation was performed.展开更多
文摘With the rapid development of sports,the number of sports images has increased dramatically.Intelligent and automatic processing and analysis of moving images are significant,which can not only facilitate users to quickly search and access moving images but also facilitate staff to store and manage moving image data and contribute to the intellectual development of the sports industry.In this paper,a method of table tennis identification and positioning based on a convolutional neural network is proposed,which solves the problem that the identification and positioning method based on color features and contour features is not adaptable in various environments.At the same time,the learning methods and techniques of table tennis detection,positioning,and trajectory prediction are studied.A deep learning framework for recognition learning of rotating flying table tennis is put forward.The mechanism and methods of positioning,trajectory prediction,and intelligent automatic processing of moving images are studied,and the self-built data sets are trained and verified.
文摘In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military intelligence database are discussed. On this condition, a new data-mining arithmetic based on relation intelligence database is presented according to the preference information and the requirement of time limit given by the commander. Furthermore, a simple calculative example is presented to prove the arithmetic with better maneuverability. Lastly, the problem of how to process the intelligence data mined from the intelligence database is discussed.
基金Key discipline construction project for traditional Chinese Medicine in Guangdong province,Grant/Award Number:20220104The construction project of inheritance studio of national famous and old traditional Chinese Medicine experts,Grant/Award Number:140000020132。
文摘The epidemic characters of Omicron(e.g.large-scale transmission)are significantly different from the initial variants of COVID-19.The data generated by large-scale transmission is important to predict the trend of epidemic characters.However,the re-sults of current prediction models are inaccurate since they are not closely combined with the actual situation of Omicron transmission.In consequence,these inaccurate results have negative impacts on the process of the manufacturing and the service industry,for example,the production of masks and the recovery of the tourism industry.The authors have studied the epidemic characters in two ways,that is,investigation and prediction.First,a large amount of data is collected by utilising the Baidu index and conduct questionnaire survey concerning epidemic characters.Second,theβ-SEIDR model is established,where the population is classified as Susceptible,Exposed,Infected,Dead andβ-Recovered persons,to intelligently predict the epidemic characters of COVID-19.Note thatβ-Recovered persons denote that the Recovered persons may become Sus-ceptible persons with probabilityβ.The simulation results show that the model can accurately predict the epidemic characters.
基金supported by the National Natural Science Foundation of China(61471391)the China Postdoctoral Science Foundation(2013M542541)
文摘Based on the cognitive radar concept and the basic connotation of cognitive skywave over-the-horizon radar(SWOTHR), the system structure and information processingmechanism about cognitive SWOTHR are researched. Amongthem, the hybrid network system architecture which is thedistributed configuration combining with the centralized cognition and its soft/hardware framework with the sense-detectionintegration are proposed, and the information processing framebased on the lens principle and its information processing flowwith receive-transmit joint adaption are designed, which buildand parse the work law for cognition and its self feedback adjustment with the lens focus model and five stages informationprocessing sequence. After that, the system simulation andthe performance analysis and comparison are provided, whichinitially proves the rationality and advantages of the proposedideas. Finally, four important development ideas of futureSWOTHR toward "high frequency intelligence information processing system" are discussed, which are scene information fusion, dynamic reconfigurable system, hierarchical and modulardesign, and sustainable development. Then the conclusion thatthe cognitive SWOTHR can cause the performance improvement is gotten.
文摘In order to study the problem of intelligent information processing in new types of imaging fuze, the method of extracting the invariance features of target images is adopted, and radial basis function neural network is used to recognize targets. Owing to its ability of parallel processing, its robustness and generalization, the method can realize the recognition of the conditions of missile-target encounters, and meet the requirements of real-time recognition in the imaging fuze. It is shown that based on artificial neural network target recognition and burst point control are feasible.
文摘The packet classification is a fundamental process in provisioning security and quality of service for many intelligent network-embedded systems running in the Internet of Things(IoT).In recent years,researchers have tried to develop hardware-based solutions for the classification of Internet packets.Due to higher throughput and shorter delays,these solutions are considered as a major key to improving the quality of services.Most of these efforts have attempted to implement a software algorithm on the FPGA to reduce the processing time and enhance the throughput.The proposed architectures,however,cannot reach a compromise among power consumption,memory usage,and throughput rate.In view of this,the architecture proposed in this paper contains a pipelinebased micro-core that is used in network processors to classify packets.To this end,three architectures have been implemented using the proposed micro-core.The first architecture performs parallel classification based on header fields.The second one classifies packets in a serial manner.The last architecture is the pipeline-based classifier,which can increase performance by nine times.The proposed architectures have been implemented on an FPGA chip.The results are indicative of a reduction in memory usage as well as an increase in speedup and throughput.The architecture has a power consumption of is 1.294w,and its throughput with a frequency of 233 MHz exceeds 147 Gbps.
文摘September 10 ~12 ,2008,Lyon,France The IIP conference series provides aforumfor engineers andscientistsin academia,university andindustryto present theirlatest researchfindings in any aspects of intelligent information processing.This ti me , we especially encourage papers on Knowledge Discovery , Knowledge Management ,Intelligent Agents , Machine Learning, Autonomic Reasoning etc.We also welcome papers that highlight successful modern applications of IIP,such as Biomedicine ,Bioinformatics ,e-Services ,e-Learning, Business Intelligence.IIP2008 attempts to meet the needs of a large and diverse community.
文摘This paper discusses the progress of computer integrated processing (CIPS) of coal-preparation and then preserits an intelligence controlled production-process, device-maintenance and production-management system of coal- preparation based on multi-agents (IICMMS-CP). The construction of the IICMMS-CP, the distributed network control system based on live intelligence control stations and the strategy of implementing distributed intelligence control system are studied in order to overcome the disadvantages brought about by the wide use of the PLC system by coaipreparation plants. The software frame, based on a Multi-Agent Intelligence Control and Maintenance Management integrated system, is studied and the implemention methods of IICMMS-CP are discussed. The characteristics of distributed architecture, cooperation and parallel computing meet the needs of integrated control of coal-preparation plants with large-scale spatial production distribution, densely-related processes and complex systems. Its application further improves the reliability and precision of process control, accuracy of fault identification and intelligence of production adjustment, establishes a technical basis for system integration and flexible production. The main function of the system has been tested in a coal-preparation plant to good effect in stabilizing product quality, improving efficiency and reducing consumption.
基金National Natural Science Foundations of China(Nos.61573144,61174040)
文摘Scheduling problem is a well-known combinatorial optimization problem.An effective improved estimation of distribution algorithm(IEDA) was proposed for minimizing the makespan of the unrelated parallel machine scheduling problem(UPMSP).Mathematical description was given for the UPMSP.The IEDA which was combined with variable neighborhood search(IEDA_VNS) was proposed to solve the UPMSP in order to improve local search ability.A new encoding method was designed for representing the feasible solutions of the UPMSP.More knowledge of the UPMSP were taken consideration in IEDA_ VNS for probability matrix which was based the processing time matrix.The simulation results show that the proposed IEDA_VNS can solve the problem effectively.
文摘Line drawings, as a concise form, can be recognized by infants and even chimpanzees. Recently, how the visual system processes line-drawings attracts more and more attention from psychology, cognitive science and computer science. The neuroscientific studies revealed that line drawings generate similar neural actions as color photographs, which give insights on how to efficiently process big media data. In this paper, we present a comprehensive survey on line drawing studies, including cognitive mechanism of visual perception, computational models in computer vision and intelligent process in diverse media applications. Major debates, challenges and solutions that have been addressed over the years are discussed. Finally some of the ensuing challenges in line drawing studies are outlined.
基金The authors would like to acknowledge the financial support from the National Natural Science Foundation of China (Grant Nos. 51675199 and 51635006) and the National Program on Key Basic Research Project (Grant No. 2013CB035805).
文摘Injection molding is one of the most widely used material processing methods in producing plastic products with complex geometries and high precision. The determination of process parameters is important in obtaining qualified products and maintaining product quality. This article reviews the recent studies and developments of the intelligent methods applied in the process parameter determination of injection molding. These intelligent methods are classified into three categories: Case-based reasoning methods, expert sys- tem-based methods, and data fitting and optimization methods. A framework of process parameter determination is proposed after comprehensive discussions. Finally, the conclusions and future research topics are discussed.
基金supported by the National Natural Science Foundation of China(Nos.51921003,92160301,52175415 and 52205475)the Science Center for Gas Turbine Project(No.P2022-A-IV-002-001)Natural Science Foundation of Jiangsu Province(No.BK20210295).
文摘Presently,the service performance of new-generation high-tech equipment is directly affected by the manufacturing quality of complex thin-walled components.A high-efficiency and quality manufacturing of these complex thin-walled components creates a bottleneck that needs to be solved urgently in machinery manufacturing.To address this problem,the collaborative manufacturing of structure shape and surface integrity has emerged as a new process that can shorten processing cycles,improve machining qualities,and reduce costs.This paper summarises the research status on the material removal mechanism,precision control of structure shape,machined surface integrity control and intelligent process control technology of complex thin-walled components.Numerous solutions and technical approaches are then put forward to solve the critical problems in the high-performance manufacturing of complex thin-wall components.The development status,challenge and tendency of collaborative manufacturing technologies in the high-efficiency and quality manufacturing of complex thin-wall components is also discussed.
基金supported in part by the National Key Basic Research and Development(973)Program of China(Nos.2013CB228206 and 2012CB315801)the National Natural Science Foundation of China(Nos.61233016 and 61140320)+1 种基金supported by the Intel Research Council with the title of "Security Vulnerability Analysis based on Cloud Platform with Intel IA Architecture"Huawei Corp
文摘A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile applications for millions of users by taking advantage of the scale and flexibility of shared physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data and applications in shared data centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used n a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet nspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for ntelligence flow processing to protect from possible network attacks inside a data center network
基金supported by JSPS KAKENHI (No.23700203) and NEDO Intelligent RT Software Project
文摘This paper describes a person identifcation method for a mobile robot which performs specifc person following under dynamic complicated environments like a school canteen where many persons exist.We propose a distance-dependent appearance model which is based on scale-invariant feature transform(SIFT) feature.SIFT is a powerful image feature that is invariant to scale and rotation in the image plane and also robust to changes of lighting condition.However,the feature is weak against afne transformations and the identifcation power will thus be degraded when the pose of a person changes largely.We therefore use a set of images taken from various directions to cope with pose changes.Moreover,the number of SIFT feature matches between the model and an input image will decrease as the person becomes farther away from the camera.Therefore,we also use a distance-dependent threshold.The person following experiment was conducted using an actual mobile robot,and the quality assessment of person identifcation was performed.