Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The m...Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
With the continual growth of the variety and complexity of network crime means, the traditional packet feature matching cannot detect all kinds of intrusion behaviors completely. It is urgent to reassemble network str...With the continual growth of the variety and complexity of network crime means, the traditional packet feature matching cannot detect all kinds of intrusion behaviors completely. It is urgent to reassemble network stream to perform packet processing at a semantic level above the network layer. This paper presents an efficient TCP stream reassembly mechanism for real-time processing of high-speed network traffic. By analyzing the characteristics of network stream in high-speed network and TCP connection establishment process, several polices for designing the reassembly mechanism are built. Then, the reassembly implementation is elaborated in accordance with the policies. Finally, the reassembly mechanism is compared with the traditional reassembly mechanism by the network traffic captured in a typical gigabit gateway. Experiment results illustrate that the reassembly mechanism is efficient and can satisfy the real-time property requirement of traffic analysis system in high-speed network.展开更多
For the inefficiency and inaccuracy of appraisal method of traditional estate appraisal theory, the real estate appraisal system based on GIS and BP neural network was established. The structure of the system was desi...For the inefficiency and inaccuracy of appraisal method of traditional estate appraisal theory, the real estate appraisal system based on GIS and BP neural network was established. The structure of the system was designed which includes appraisal model, trade case, GIS database and query analysis module. With the help of the L-M algorithm in MATLAB software, BP neural network was improved and the trade cases were trained, then the BP neural network which has already been trained was tested. At the same time, the BP neural and GIS were put together to construct the hedonic price estimate model. The C# and ArcGIS9.3 were used to achieve the system in VS2008. City basic geographic data and real estate related information were used as the basic data in practice. The results show that the functions of querying, adding and editing the spatial data and attribute data are achieved and also the efficiency and accuracy of real estate are improved, so that the new method of real estate is provided by the system.展开更多
In this paper, the model of the online real-time information transmission network, such as wechat, micro-blog, and QQ network, is proposed and built, based on the connection properties between users of the online real...In this paper, the model of the online real-time information transmission network, such as wechat, micro-blog, and QQ network, is proposed and built, based on the connection properties between users of the online real-time information transmission network, and combined with the local world evolving characteristics in complex network, then the statistical topological properties of the network is obtained by numerical simulation. Furthermore, we simulated the process of information transmission on the network, according to the actual characteristics of the online real-time information transmission. Statistics show that the degree distribution presents the characteristics of scale free network, presenting power law distribution, while the average path length, the average clustering coefficient and the average size of the network also has a power-law relationship, moreover, the model parameters has no effect on power-law exponent. The spread of information on the network represents obvious fluctuation scaling, reflecting the characteristics that information transmission fluctuates over time.展开更多
This article presents a novel approach for the measurement and estimation of network traffic utilization between network nodes in heterogeneous environment. This research investigates performance evaluation of network...This article presents a novel approach for the measurement and estimation of network traffic utilization between network nodes in heterogeneous environment. This research investigates performance evaluation of network interface on heterogeneous services and technologies environment. This study proposes an enhanced equation to evaluate the performance of network interface via Little Law and Queuing theories to improve the evaluation algorithm. To get accuracy results on the performance of simulation model, it measures (verify and validate) data from Local Area Network (real network environment). This project uses network management tool to capture those data and Fluke Optiview device to generate traffic. As a result, this simulation model can provide a good approximation of the real traffic observed in the real network environment. Through laboratory and field experiments, the result shows that the model via simulation is capable of approximating the performance of network utilization and traffic over heterogeneous services and techniques within a minimum error range.展开更多
In this paper, verification of real-time pricing systems of electricity is considered using a probabilistic Boolean network (PBN). In real-time pricing systems, electricity conservation is achieved by manipulating the...In this paper, verification of real-time pricing systems of electricity is considered using a probabilistic Boolean network (PBN). In real-time pricing systems, electricity conservation is achieved by manipulating the electricity price at each time. A PBN is widely used as a model of complex systems, and is appropriate as a model of real-time pricing systems. Using the PBN-based model, real-time pricing systems can be quantitatively analyzed. In this paper, we propose a verification method of real-time pricing systems using the PBN-based model and the probabilistic model checker PRISM. First, the PBN-based model is derived. Next, the reachability problem, which is one of the typical verification problems, is formulated, and a solution method is derived. Finally, the effectiveness of the proposed method is presented by a numerical example.展开更多
In this paper, we investigate the influences of network delay on QoE (Quality of Experience) such as the operability of haptic interface device and the fairness between players for soft objects in a networked real-tim...In this paper, we investigate the influences of network delay on QoE (Quality of Experience) such as the operability of haptic interface device and the fairness between players for soft objects in a networked real-time game subjectively and objectively. We handle a networked balloon bursting game in which two players burst balloons (i.e., soft objects) in a 3D virtual space by using haptic interface devices, and the players compete for the number of burst balloons. As a result, we find that the operability depends on the network delay from the local terminal to the other terminal, and the fairness is mainly dependent on the difference in network delay between the players’ terminals. We confirm that there exists a trade-off relationship between the operability and the fairness. We also see that the contribution of the fairness is larger than that of the operability to the comprehensive quality (i.e., the weighted sum of the operability and fairness). Assessment results further show that the output timing of terminals should be adjusted to the terminal which has the latest output timing to maintain the fairness when the difference in network delay between the terminals is large. In this way, the comprehensive quality at each terminal can be maintained as high as possible.展开更多
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at ...This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.展开更多
In this paper, the multistability issue is discussed for delayed complex-valued recurrent neural networks with discontinuous real-imaginary-type activation functions. Based on a fixed theorem and stability definition,...In this paper, the multistability issue is discussed for delayed complex-valued recurrent neural networks with discontinuous real-imaginary-type activation functions. Based on a fixed theorem and stability definition, sufficient criteria are established for the existence and stability of multiple equilibria of complex-valued recurrent neural networks. The number of stable equilibria is larger than that of real-valued recurrent neural networks, which can be used to achieve high-capacity associative memories. One numerical example is provided to show the effectiveness and superiority of the presented results.展开更多
A method for integer ambiguity resolution in the global positioning system (GPS) multi-reference station network real time kinematic (RTK) is proposed. First, the barycenter of the triangle of reference stations f...A method for integer ambiguity resolution in the global positioning system (GPS) multi-reference station network real time kinematic (RTK) is proposed. First, the barycenter of the triangle of reference stations for ambiguity resolution is taken as a reference point. The satellite which has the largest elevation angle with the reference point is selected as a reference satellite. The parameters for constructing the weight matrix of carrier phase observation and the criteria for checking the correctness of integer ambiguity resolution of a network are obtained. Then, the wide ambiguity is calculated by a linear combination method of dualband observation. And the LI ambiguity is obtained by a nonionosphere combination method. The Kalman filter is introduced to refine the floating-point solution of ambiguity and estimate the real-time tropospheric delay. Finally, the cofactor matrix of ambiguity is de-correlated by Z-transformation to reduce the searching space of the integer ambiguity solution and improve the efficiency of the least-squares ambiguity decorrelation adjustment (LAMBDA) algorithm. The experimental results show that this method can reliably obtain the integer ambiguity solution among multi-reference stations with 40 epochs.展开更多
As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usuall...As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usually battery-powered. Among these requirements, real-time communication is one of the big research challenges in wireless sensor networks because most of query messages carry time information. To meet this requirement, recently several real-time medium access control protocols have been proposed for wireless sensor networks in the literature because waiting time to share medium on each node is one of main source for end-to-end delay. In this paper, we first introduce the specific requirement of wireless sensor real-time MAC protocol. Then, a collection of recent wireless sensor real-time MAC protocols are surveyed, classified, and described emphasizing their advantages and disadvantages whenever possible. Finally we present a dis-cussion about the challenges of current wireless sensor real-time MAC protocols in the literature, and show the conclusion in the end.展开更多
To transition from conventional to intelligent real estate, the real estate industry must enhance its embrace of disruptive technology. Even though the real estate auction market has grown in importance in the financi...To transition from conventional to intelligent real estate, the real estate industry must enhance its embrace of disruptive technology. Even though the real estate auction market has grown in importance in the financial, economic, and investment sectors, few artificial intelligence-based research has tried to predict the auction values of real estate in the past. According to the objectives of this research, artificial intelligence and statistical methods will be used to create forecasting models for real estate auction prices. A multiple regression model and an artificial neural network are used in conjunction with one another to build the forecasting models. For the empirical study, the study utilizes data from Ghana apartment auctions from 2016 to 2020 to anticipate auction prices and evaluate the forecasting accuracy of the various models available at the time. Compared to the conventional Multiple Regression Analysis, using artificial intelligence systems for real estate appraisal is becoming a more viable option (MRA). The Artificial Neural network model exhibits the most outstanding performance, and efficient zonal segmentation based on the auction evaluation price enhances the model’s prediction accuracy even more. There is a statistically significant difference between the two models when it comes to forecasting the values of real estate auctions.展开更多
In this paper, a modeling algorithm developed by transferring the adaptive fuzzy inference neural network into an on-line real time algorithm, combining the algorithm with conventional system identification method and...In this paper, a modeling algorithm developed by transferring the adaptive fuzzy inference neural network into an on-line real time algorithm, combining the algorithm with conventional system identification method and applying them to separate identification of nonlinear multi-variable systems is introduced and discussed.展开更多
文摘Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
基金National High-Tech Research and Development Program of China (863 Program) (No.2007AA01Z309)
文摘With the continual growth of the variety and complexity of network crime means, the traditional packet feature matching cannot detect all kinds of intrusion behaviors completely. It is urgent to reassemble network stream to perform packet processing at a semantic level above the network layer. This paper presents an efficient TCP stream reassembly mechanism for real-time processing of high-speed network traffic. By analyzing the characteristics of network stream in high-speed network and TCP connection establishment process, several polices for designing the reassembly mechanism are built. Then, the reassembly implementation is elaborated in accordance with the policies. Finally, the reassembly mechanism is compared with the traditional reassembly mechanism by the network traffic captured in a typical gigabit gateway. Experiment results illustrate that the reassembly mechanism is efficient and can satisfy the real-time property requirement of traffic analysis system in high-speed network.
基金Supported by National Naturai Science Foundation of China (61273104, 61021002, 61104097), and Projects of Major Interna-tional (Regional) Joint Research Program National Natural Science Foundation of China (61120106010)
基金Project(41061041)supported by the National Natural Science Foundation of ChinaProject(2010gzs0084)supported by the Natural Science Foundation of Jiangxi Province,China
文摘For the inefficiency and inaccuracy of appraisal method of traditional estate appraisal theory, the real estate appraisal system based on GIS and BP neural network was established. The structure of the system was designed which includes appraisal model, trade case, GIS database and query analysis module. With the help of the L-M algorithm in MATLAB software, BP neural network was improved and the trade cases were trained, then the BP neural network which has already been trained was tested. At the same time, the BP neural and GIS were put together to construct the hedonic price estimate model. The C# and ArcGIS9.3 were used to achieve the system in VS2008. City basic geographic data and real estate related information were used as the basic data in practice. The results show that the functions of querying, adding and editing the spatial data and attribute data are achieved and also the efficiency and accuracy of real estate are improved, so that the new method of real estate is provided by the system.
文摘In this paper, the model of the online real-time information transmission network, such as wechat, micro-blog, and QQ network, is proposed and built, based on the connection properties between users of the online real-time information transmission network, and combined with the local world evolving characteristics in complex network, then the statistical topological properties of the network is obtained by numerical simulation. Furthermore, we simulated the process of information transmission on the network, according to the actual characteristics of the online real-time information transmission. Statistics show that the degree distribution presents the characteristics of scale free network, presenting power law distribution, while the average path length, the average clustering coefficient and the average size of the network also has a power-law relationship, moreover, the model parameters has no effect on power-law exponent. The spread of information on the network represents obvious fluctuation scaling, reflecting the characteristics that information transmission fluctuates over time.
文摘This article presents a novel approach for the measurement and estimation of network traffic utilization between network nodes in heterogeneous environment. This research investigates performance evaluation of network interface on heterogeneous services and technologies environment. This study proposes an enhanced equation to evaluate the performance of network interface via Little Law and Queuing theories to improve the evaluation algorithm. To get accuracy results on the performance of simulation model, it measures (verify and validate) data from Local Area Network (real network environment). This project uses network management tool to capture those data and Fluke Optiview device to generate traffic. As a result, this simulation model can provide a good approximation of the real traffic observed in the real network environment. Through laboratory and field experiments, the result shows that the model via simulation is capable of approximating the performance of network utilization and traffic over heterogeneous services and techniques within a minimum error range.
文摘In this paper, verification of real-time pricing systems of electricity is considered using a probabilistic Boolean network (PBN). In real-time pricing systems, electricity conservation is achieved by manipulating the electricity price at each time. A PBN is widely used as a model of complex systems, and is appropriate as a model of real-time pricing systems. Using the PBN-based model, real-time pricing systems can be quantitatively analyzed. In this paper, we propose a verification method of real-time pricing systems using the PBN-based model and the probabilistic model checker PRISM. First, the PBN-based model is derived. Next, the reachability problem, which is one of the typical verification problems, is formulated, and a solution method is derived. Finally, the effectiveness of the proposed method is presented by a numerical example.
文摘In this paper, we investigate the influences of network delay on QoE (Quality of Experience) such as the operability of haptic interface device and the fairness between players for soft objects in a networked real-time game subjectively and objectively. We handle a networked balloon bursting game in which two players burst balloons (i.e., soft objects) in a 3D virtual space by using haptic interface devices, and the players compete for the number of burst balloons. As a result, we find that the operability depends on the network delay from the local terminal to the other terminal, and the fairness is mainly dependent on the difference in network delay between the players’ terminals. We confirm that there exists a trade-off relationship between the operability and the fairness. We also see that the contribution of the fairness is larger than that of the operability to the comprehensive quality (i.e., the weighted sum of the operability and fairness). Assessment results further show that the output timing of terminals should be adjusted to the terminal which has the latest output timing to maintain the fairness when the difference in network delay between the terminals is large. In this way, the comprehensive quality at each terminal can be maintained as high as possible.
文摘This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61374094 and 61503338)the Natural Science Foundation of Zhejiang Province,China(Grant No.LQ15F030005)
文摘In this paper, the multistability issue is discussed for delayed complex-valued recurrent neural networks with discontinuous real-imaginary-type activation functions. Based on a fixed theorem and stability definition, sufficient criteria are established for the existence and stability of multiple equilibria of complex-valued recurrent neural networks. The number of stable equilibria is larger than that of real-valued recurrent neural networks, which can be used to achieve high-capacity associative memories. One numerical example is provided to show the effectiveness and superiority of the presented results.
基金The National Key Technology R&D Program of Chinaduring the11th Five-Year Plan Period (No2008BAJ11B05)
文摘A method for integer ambiguity resolution in the global positioning system (GPS) multi-reference station network real time kinematic (RTK) is proposed. First, the barycenter of the triangle of reference stations for ambiguity resolution is taken as a reference point. The satellite which has the largest elevation angle with the reference point is selected as a reference satellite. The parameters for constructing the weight matrix of carrier phase observation and the criteria for checking the correctness of integer ambiguity resolution of a network are obtained. Then, the wide ambiguity is calculated by a linear combination method of dualband observation. And the LI ambiguity is obtained by a nonionosphere combination method. The Kalman filter is introduced to refine the floating-point solution of ambiguity and estimate the real-time tropospheric delay. Finally, the cofactor matrix of ambiguity is de-correlated by Z-transformation to reduce the searching space of the integer ambiguity solution and improve the efficiency of the least-squares ambiguity decorrelation adjustment (LAMBDA) algorithm. The experimental results show that this method can reliably obtain the integer ambiguity solution among multi-reference stations with 40 epochs.
文摘As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usually battery-powered. Among these requirements, real-time communication is one of the big research challenges in wireless sensor networks because most of query messages carry time information. To meet this requirement, recently several real-time medium access control protocols have been proposed for wireless sensor networks in the literature because waiting time to share medium on each node is one of main source for end-to-end delay. In this paper, we first introduce the specific requirement of wireless sensor real-time MAC protocol. Then, a collection of recent wireless sensor real-time MAC protocols are surveyed, classified, and described emphasizing their advantages and disadvantages whenever possible. Finally we present a dis-cussion about the challenges of current wireless sensor real-time MAC protocols in the literature, and show the conclusion in the end.
文摘To transition from conventional to intelligent real estate, the real estate industry must enhance its embrace of disruptive technology. Even though the real estate auction market has grown in importance in the financial, economic, and investment sectors, few artificial intelligence-based research has tried to predict the auction values of real estate in the past. According to the objectives of this research, artificial intelligence and statistical methods will be used to create forecasting models for real estate auction prices. A multiple regression model and an artificial neural network are used in conjunction with one another to build the forecasting models. For the empirical study, the study utilizes data from Ghana apartment auctions from 2016 to 2020 to anticipate auction prices and evaluate the forecasting accuracy of the various models available at the time. Compared to the conventional Multiple Regression Analysis, using artificial intelligence systems for real estate appraisal is becoming a more viable option (MRA). The Artificial Neural network model exhibits the most outstanding performance, and efficient zonal segmentation based on the auction evaluation price enhances the model’s prediction accuracy even more. There is a statistically significant difference between the two models when it comes to forecasting the values of real estate auctions.
文摘In this paper, a modeling algorithm developed by transferring the adaptive fuzzy inference neural network into an on-line real time algorithm, combining the algorithm with conventional system identification method and applying them to separate identification of nonlinear multi-variable systems is introduced and discussed.