Despite the series-parallel hybrid electric vehicle inherits the performance advantages from both series and parallel hybrid electric vehicle, few researches about the series-parallel hybrid electric vehicle have been...Despite the series-parallel hybrid electric vehicle inherits the performance advantages from both series and parallel hybrid electric vehicle, few researches about the series-parallel hybrid electric vehicle have been revealed because of its complex co nstruction and control strategy. In this paper, a series-parallel hybrid electric bus as well as its control strategy is revealed, and a control parameter optimization approach using the real-valued genetic algorithm is proposed. The optimization objective is to minimize the fuel consumption while sustain the battery state of charge, a tangent penalty function of state of charge(SOC) is embodied in the objective function to recast this multi-objective nonlinear optimization problem as a single linear optimization problem. For this strategy, the vehicle operating mode is switched based on the vehicle speed, and an "optimal line" typed strategy is designed for the parallel control. The optimization parameters include the speed threshold for mode switching, the highest state of charge allowed, the lowest state of charge allowed and the scale factor of the engine optimal torque to the engine maximum torque at a rotational speed. They are optimized through numerical experiments based on real-value genes, arithmetic crossover and mutation operators. The hybrid bus has been evaluated at the Chinese Transit Bus City Driving Cycle via road test, in which a control area network-based monitor system was used to trace the driving schedule. The test result shows that this approach is feasible for the control parameter optimization. This approach can be applied to not only the novel construction presented in this paper, but also other types of hybrid electric vehicles.展开更多
Point-wise negative selection algorithms,which generate their detector sets based on point of self data,have lower training efficiency and detection rate.To solve this problem,a self region based real-valued negative ...Point-wise negative selection algorithms,which generate their detector sets based on point of self data,have lower training efficiency and detection rate.To solve this problem,a self region based real-valued negative selection algorithm is presented.In this new approach,the continuous self region is defined by the collection of self data,the partial training takes place at the training stage according to both the radius of self region and the cosine distance between gravity of the self region and detector candidate,and variable detectors in the self region are deployed.The algorithm is tested using the triangle shape of self region in the 2-D complement space and KDD CUP 1999 data set.Results show that,more information can be provided when the training self points are used together as a whole,and compared with the point-wise negative selection algorithm,the new approach can improve the training efficiency of system and the detection rate significantly.展开更多
The real-valued self set in immunity-based network intrusion detection system (INIDS) has some defects: multi-area and overlapping, which are ignored before. The detectors generated by this kind of self set may hav...The real-valued self set in immunity-based network intrusion detection system (INIDS) has some defects: multi-area and overlapping, which are ignored before. The detectors generated by this kind of self set may have the problem of boundary holes between self and nonself regions, and the generation efficiency is low, so that, the self set needs to be optimized before generation stage. This paper proposes a self set optimization algorithm which uses the modified clustering algorithm and Gaussian distribution theory. The clustering deals with multi-area and the Gaussian distribution deals with the overlapping. The algorithm was tested by Iris data and real network data, and the results show that the optimized self set can solve the problem of boundary holes, increase the efficiency of detector generation effectively, and improve the system's detection rate.展开更多
The root multiple signal classification(root-MUSIC) algorithm is one of the most important techniques for direction of arrival(DOA) estimation. Using a uniform linear array(ULA) composed of M sensors, this metho...The root multiple signal classification(root-MUSIC) algorithm is one of the most important techniques for direction of arrival(DOA) estimation. Using a uniform linear array(ULA) composed of M sensors, this method usually estimates L signal DOAs by finding roots that lie closest to the unit circle of a(2M-1)-order polynomial, where L 〈 M. A novel efficient root-MUSIC-based method for direction estimation is presented, in which the order of polynomial is efficiently reduced to 2L. Compared with the unitary root-MUSIC(U-root-MUSIC) approach which involves real-valued computations only in the subspace decomposition stage, both tasks of subspace decomposition and polynomial rooting are implemented with real-valued computations in the new technique,which hence shows a significant efficiency advantage over most state-of-the-art techniques. Numerical simulations are conducted to verify the correctness and efficiency of the new estimator.展开更多
An efficient algorithm for the representation and approximation of linear time-varying systems is presented via the fast real-valued discrete Gabor transform. Compared with the existing algorithm based on the traditio...An efficient algorithm for the representation and approximation of linear time-varying systems is presented via the fast real-valued discrete Gabor transform. Compared with the existing algorithm based on the traditional complex-valued discrete Gabor transform, the proposed algorithm runs faster, can more easily be implemented in software or hardware, and leads to a more compact representation. Simulation results are given for demonstration.展开更多
A new method is presented to estimate two-dimensional (2-D) Direction-of-Arrival (DOA) angles of narrowband real-valued signals impinging on a L-shape Arrays(LA). The basic idea of the proposed method is to incr...A new method is presented to estimate two-dimensional (2-D) Direction-of-Arrival (DOA) angles of narrowband real-valued signals impinging on a L-shape Arrays(LA). The basic idea of the proposed method is to increase both the effective aperture size and the number of sensors by employing the conjugate invariance property of real-valued signals. Thus, the proposed method can provide a more precise DOA and detect more signals than the Cross-Correlation Matrix Method (CCMM). Numerical simulation results are presented to support the theory.展开更多
Some factors influencing the intelligibility of the enhanced whisper in the joint time-frequency domain are evaluated. Specifically, both the spectrum density and different regions of the enhanced spectrum are analyze...Some factors influencing the intelligibility of the enhanced whisper in the joint time-frequency domain are evaluated. Specifically, both the spectrum density and different regions of the enhanced spectrum are analyzed. Experimental results show that for a spectrum of some density, the joint time-frequency gain-modification based speech enhancement algorithm achieves significant improvement in intelligibility. Additionally, the spectrum region where the estimated spectrum is smaller than the clean spectrum, is the most important region contributing to intelligibility improvement for the enhanced whisper. The spectrum region where the estimated spectrum is larger than twice the size of the clean spectrum is detrimental to speech intelligibility perception within the whisper context.展开更多
We propose a low complexity iterative algorithm for band limited signal extrapolation. The extrapolation method is based on the decomposition of finite segments of the signal via truncated series of real-valued linear...We propose a low complexity iterative algorithm for band limited signal extrapolation. The extrapolation method is based on the decomposition of finite segments of the signal via truncated series of real-valued linear prolate functions. Our theoretical derivation shows that given a truncated series (up to a selectable value) of prolate functions, it is possible to extrapolate the band limited function elsewhere if each extrapolated portion of the function is subject only to moderate truncation errors that we quantify in this paper. The effects of different sources of errors have been analyzed via extensive simulations. We have investigated a property of the signal decomposition formula based on linear prolate functions whereby the integration interval does not need to be symmetric with respect to the origin while time-shifted prolate functions are used in the series.展开更多
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been pr...Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.展开更多
This hybrid methodology for structural health monitoring (SHM) is based on immune algorithms (IAs) and symbolic time series analysis (STSA). Real-valued negative selection (RNS) is used to detect damage detection and ...This hybrid methodology for structural health monitoring (SHM) is based on immune algorithms (IAs) and symbolic time series analysis (STSA). Real-valued negative selection (RNS) is used to detect damage detection and adaptive immune clonal selection algorithm (AICSA) is used to localize and quantify the damage. Data symbolization by using STSA alleviates the effects of harmful noise in raw acceleration data. This paper explains the mathematical basis of STSA and the procedure of the hybrid methodology. It also describes the results of an simulation experiment on a five-story shear frame structure that indicated the hybrid strategy can efficiently and precisely detect, localize and quantify damage to civil engineering structures in the presence of measurement noise.展开更多
Based on compressive sensing and fractional discrete cosine transform(DCT)via polynomial interpolation(PI-FrDCT),an image encryption algorithm is proposed,in which the compression and encryption of an image are accomp...Based on compressive sensing and fractional discrete cosine transform(DCT)via polynomial interpolation(PI-FrDCT),an image encryption algorithm is proposed,in which the compression and encryption of an image are accomplished simultaneously.It can keep information secret more effectively with low data transmission.Three-dimensional piecewise and nonlinear chaotic maps are employed to obtain a generating sequence and the exclusive OR(XOR)matrix,which greatly enlarge the key space of the encryption system.Unlike many other fractional transforms,the output of PI-FrDCT is real,which facilitates the storage,transmission and display of the encrypted image.Due to the introduction of a plain-image-dependent disturbance factor,the initial values and system parameters of the encryption scheme are determined by cipher keys and plain-image.Thus,the proposed encryption scheme is very sensitive to the plain-image,which makes the encryption system more secure.Experimental results demonstrate the validity and the reliability of the proposed encryption algorithm.展开更多
基金supported by National Hi-tech Research and Development Program of China (863 Program, Grant No. 2006AA11A127)
文摘Despite the series-parallel hybrid electric vehicle inherits the performance advantages from both series and parallel hybrid electric vehicle, few researches about the series-parallel hybrid electric vehicle have been revealed because of its complex co nstruction and control strategy. In this paper, a series-parallel hybrid electric bus as well as its control strategy is revealed, and a control parameter optimization approach using the real-valued genetic algorithm is proposed. The optimization objective is to minimize the fuel consumption while sustain the battery state of charge, a tangent penalty function of state of charge(SOC) is embodied in the objective function to recast this multi-objective nonlinear optimization problem as a single linear optimization problem. For this strategy, the vehicle operating mode is switched based on the vehicle speed, and an "optimal line" typed strategy is designed for the parallel control. The optimization parameters include the speed threshold for mode switching, the highest state of charge allowed, the lowest state of charge allowed and the scale factor of the engine optimal torque to the engine maximum torque at a rotational speed. They are optimized through numerical experiments based on real-value genes, arithmetic crossover and mutation operators. The hybrid bus has been evaluated at the Chinese Transit Bus City Driving Cycle via road test, in which a control area network-based monitor system was used to trace the driving schedule. The test result shows that this approach is feasible for the control parameter optimization. This approach can be applied to not only the novel construction presented in this paper, but also other types of hybrid electric vehicles.
基金Sponsored by the National Natural Science Foundation of China (Grant No. 60671049)the Subject Chief Foundation of Harbin (Grant No.2003AFXXJ013)+1 种基金the Education Department Research Foundation of Heilongjiang Province(Grant No. 10541044, 1151G012)the Postdoctor Foundation of Heilongjiang Province(Grant No.LBH-Z05092)
文摘Point-wise negative selection algorithms,which generate their detector sets based on point of self data,have lower training efficiency and detection rate.To solve this problem,a self region based real-valued negative selection algorithm is presented.In this new approach,the continuous self region is defined by the collection of self data,the partial training takes place at the training stage according to both the radius of self region and the cosine distance between gravity of the self region and detector candidate,and variable detectors in the self region are deployed.The algorithm is tested using the triangle shape of self region in the 2-D complement space and KDD CUP 1999 data set.Results show that,more information can be provided when the training self points are used together as a whole,and compared with the point-wise negative selection algorithm,the new approach can improve the training efficiency of system and the detection rate significantly.
基金Supported by the National Natural Science Foundation of China (No. 60671049, 61172168)and Graduate Innovation Project of Heilongjiang (No. YJSCX2011-034HLI)
文摘The real-valued self set in immunity-based network intrusion detection system (INIDS) has some defects: multi-area and overlapping, which are ignored before. The detectors generated by this kind of self set may have the problem of boundary holes between self and nonself regions, and the generation efficiency is low, so that, the self set needs to be optimized before generation stage. This paper proposes a self set optimization algorithm which uses the modified clustering algorithm and Gaussian distribution theory. The clustering deals with multi-area and the Gaussian distribution deals with the overlapping. The algorithm was tested by Iris data and real network data, and the results show that the optimized self set can solve the problem of boundary holes, increase the efficiency of detector generation effectively, and improve the system's detection rate.
基金supported by the National Natural Science Foundation of China(61501142)the Shandong Provincial Natural Science Foundation(ZR2014FQ003)+1 种基金the Special Foundation of China Postdoctoral Science(2016T90289)the China Postdoctoral Science Foundation(2015M571414)
文摘The root multiple signal classification(root-MUSIC) algorithm is one of the most important techniques for direction of arrival(DOA) estimation. Using a uniform linear array(ULA) composed of M sensors, this method usually estimates L signal DOAs by finding roots that lie closest to the unit circle of a(2M-1)-order polynomial, where L 〈 M. A novel efficient root-MUSIC-based method for direction estimation is presented, in which the order of polynomial is efficiently reduced to 2L. Compared with the unitary root-MUSIC(U-root-MUSIC) approach which involves real-valued computations only in the subspace decomposition stage, both tasks of subspace decomposition and polynomial rooting are implemented with real-valued computations in the new technique,which hence shows a significant efficiency advantage over most state-of-the-art techniques. Numerical simulations are conducted to verify the correctness and efficiency of the new estimator.
基金Supported by the Excellent Young Teachers Program of the Ministry of Education, P. R. China (No. 2001-1739 and No. 2003-145)
文摘An efficient algorithm for the representation and approximation of linear time-varying systems is presented via the fast real-valued discrete Gabor transform. Compared with the existing algorithm based on the traditional complex-valued discrete Gabor transform, the proposed algorithm runs faster, can more easily be implemented in software or hardware, and leads to a more compact representation. Simulation results are given for demonstration.
基金Supported by Program for New Century Excellent Talents in University
文摘A new method is presented to estimate two-dimensional (2-D) Direction-of-Arrival (DOA) angles of narrowband real-valued signals impinging on a L-shape Arrays(LA). The basic idea of the proposed method is to increase both the effective aperture size and the number of sensors by employing the conjugate invariance property of real-valued signals. Thus, the proposed method can provide a more precise DOA and detect more signals than the Cross-Correlation Matrix Method (CCMM). Numerical simulation results are presented to support the theory.
基金The National Natural Science Foundation of China(No.61301295,61273266,61301219,61201326,61003131)the Natural Science Foundation of Anhui Province(No.1308085QF100,1408085MF113)+2 种基金the Natural Science Foundation of Jiangsu Province(No.BK20130241)the Natural Science Foundation of Higher Education Institutions of Jiangsu Province(No.12KJB510021)the Doctoral Fund of Anhui University
文摘Some factors influencing the intelligibility of the enhanced whisper in the joint time-frequency domain are evaluated. Specifically, both the spectrum density and different regions of the enhanced spectrum are analyzed. Experimental results show that for a spectrum of some density, the joint time-frequency gain-modification based speech enhancement algorithm achieves significant improvement in intelligibility. Additionally, the spectrum region where the estimated spectrum is smaller than the clean spectrum, is the most important region contributing to intelligibility improvement for the enhanced whisper. The spectrum region where the estimated spectrum is larger than twice the size of the clean spectrum is detrimental to speech intelligibility perception within the whisper context.
文摘We propose a low complexity iterative algorithm for band limited signal extrapolation. The extrapolation method is based on the decomposition of finite segments of the signal via truncated series of real-valued linear prolate functions. Our theoretical derivation shows that given a truncated series (up to a selectable value) of prolate functions, it is possible to extrapolate the band limited function elsewhere if each extrapolated portion of the function is subject only to moderate truncation errors that we quantify in this paper. The effects of different sources of errors have been analyzed via extensive simulations. We have investigated a property of the signal decomposition formula based on linear prolate functions whereby the integration interval does not need to be symmetric with respect to the origin while time-shifted prolate functions are used in the series.
基金The research is supported by the National Natural Science Foundation of China under Grant No. 90304012 and No. 10331030.
文摘Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.
文摘This hybrid methodology for structural health monitoring (SHM) is based on immune algorithms (IAs) and symbolic time series analysis (STSA). Real-valued negative selection (RNS) is used to detect damage detection and adaptive immune clonal selection algorithm (AICSA) is used to localize and quantify the damage. Data symbolization by using STSA alleviates the effects of harmful noise in raw acceleration data. This paper explains the mathematical basis of STSA and the procedure of the hybrid methodology. It also describes the results of an simulation experiment on a five-story shear frame structure that indicated the hybrid strategy can efficiently and precisely detect, localize and quantify damage to civil engineering structures in the presence of measurement noise.
基金supported by National Natural Science Foundation of China(Nos.61662047 and 61462061).
文摘Based on compressive sensing and fractional discrete cosine transform(DCT)via polynomial interpolation(PI-FrDCT),an image encryption algorithm is proposed,in which the compression and encryption of an image are accomplished simultaneously.It can keep information secret more effectively with low data transmission.Three-dimensional piecewise and nonlinear chaotic maps are employed to obtain a generating sequence and the exclusive OR(XOR)matrix,which greatly enlarge the key space of the encryption system.Unlike many other fractional transforms,the output of PI-FrDCT is real,which facilitates the storage,transmission and display of the encrypted image.Due to the introduction of a plain-image-dependent disturbance factor,the initial values and system parameters of the encryption scheme are determined by cipher keys and plain-image.Thus,the proposed encryption scheme is very sensitive to the plain-image,which makes the encryption system more secure.Experimental results demonstrate the validity and the reliability of the proposed encryption algorithm.