Cardiovascular disease, and in particular ischemic heart disease (IHD), is a major cause of morbidity and mortality in the very elderly (〉 80 years) worldwide. These patients represent a rapidly growing cohort pr...Cardiovascular disease, and in particular ischemic heart disease (IHD), is a major cause of morbidity and mortality in the very elderly (〉 80 years) worldwide. These patients represent a rapidly growing cohort presenting for percntaneous coronary intervention (PCI), now constituting more than one in five patients treated with PCI in real-world practice. Furthermore, they often have greater ischemic burden than their younger counterparts, suggesting that they have greater scope of benefit from coronary revascularization therapy. Despite this, the very elderly are frequently under-represented in clinical revascularization trials and historically there has been a degree of physician reluctance in referring them for PCI procedures, with perceptions of disappointing outcomes, low success and high complication rates. Several issues have contributed to this, including the tendency for older patients with IHD to present late, with atypical symptoms or non-diagnostic ECGs, and reservations regarding their procedural risk-to-benefit ratio, due to shorter life expectancy, presence of comorbidities and increased bleeding risk from antiplatelet and anticoagulation medications. However, advances in PCI technology and techniques over the past decade have led to better outcomes and lower risk of complications and the existing body of evidence now indicates that the very elderly actually derive more relative benefit from PCI than younger populations. Importantly, this applies to all PCI settings: elective, urgent and emergency. This review discusses the role of PCI in the very elderly presenting with chronic stable IHD, non ST-elevation acute coronary syndrome, and ST-elevation myocardial infarction. It also addresses the clinical challenges met when considering PCI in this cohort and the ongoing need for research and development to further improve outcomes in these challenging patients.展开更多
Background The efficacy and safety of non-vitamin K antagonist oral anticoagulants (NOACs) and warfarin in Asian octogenarian atrial fibrillation (AF) patients have not been established in a real-world setting. We...Background The efficacy and safety of non-vitamin K antagonist oral anticoagulants (NOACs) and warfarin in Asian octogenarian atrial fibrillation (AF) patients have not been established in a real-world setting. We aimed to evaluate the efficacy and safety of NOACs and warfarin in Korean octogenarian patients. Methods A total of 293 consecutive patients aged 〉 80 years with non-valvular AF who had taken either NOACs 048 cases, 50.5%) or warfarin (145 cases, 49.5%) were retrospectively reviewed. The efficacy outcome was the com- posite of stroke or systemic embolism. The safety outcome was major bleeding. Results The follow-up duration was 375 patient-years ( 172 patient-years with NOACs and 203 patient-years with warfarin). Patients on NOACs were slightly older (P = 0.006) and had slightly higher HAS-BLED scores (P = 0.034). The efficacy of both anticoagulants was high (1.16% for NOACs vs. 2.98% for warfarin per 100 pa- tient-years, P = 0.46). The safety outcome was relatively high in both NOACs and warfarin groups (8.96% vs. 12.46%, P = 0.29). The effi- cacy and safety outcomes tended to decrease non-significantly in low dose NOACs than in common dose NOACs or warfarin (0.85% vs. 1.84% vs. 2.98% in efficacy outcome, P = 0.69; and 6.97% vs. 13.29% vs. 12.46% in safety outcome, P = 0.34). Conclusions NOACs were highly effective for prevention of stroke or systemic embolism in Asian octogenarian AF patients. However, major bleeding occurred excessively high in both anticoagulant groups. Further study is required on the optimal anticoagulant regimen in octogenarian population.展开更多
Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,s...Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.展开更多
Cascading failures are common phenomena in many of real-world networks,such as power grids,Internet,transportation networks and social networks.It's worth noting that once one or a few users on a social network ar...Cascading failures are common phenomena in many of real-world networks,such as power grids,Internet,transportation networks and social networks.It's worth noting that once one or a few users on a social network are unavailable for some reasons,they are more likely to influence a large portion of social network.Therefore,an effective mitigation strategy is very critical for avoiding or reducing the impact of cascading failures.In this paper,we firstly quantify the user loads and construct the processes of cascading dynamics,then elaborate the more reasonable mechanism of sharing the extra user loads with considering the features of social networks,and further propose a novel mitigation strategy on social networks against cascading failures.Based on the realworld social network datasets,we evaluate the effectiveness and efficiency of the novel mitigation strategy.The experimental results show that this mitigation strategy can reduce the impact of cascading failures effectively and maintain the network connectivity better with lower cost.These findings are very useful for rationally advertising and may be helpful for avoiding various disasters of cascading failures on many real-world networks.展开更多
The parametric temporal data model captures a real world entity in a single tuple, which reduces query language complexity. Such a data model, however, is difficult to be implemented on top of conventional databases b...The parametric temporal data model captures a real world entity in a single tuple, which reduces query language complexity. Such a data model, however, is difficult to be implemented on top of conventional databases because of its unfixed attribute sizes. XML is a matured technology and can be an elegant solution for such challenge. Representing data in XML trigger a question about storage efficiency. The goal of this work is to provide a straightforward answer to such a question. To this end, we compare three different storage models for the parametric temporal data model and show that XML is not worse than any other approaches. Furthermore, XML outperforms the other storages under certain conditions. Therefore, our simulation results provide a positive indication that the myth about XML is not true in the parametric temporal data model.展开更多
As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are ...As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are valuable for malware analysis,but how to exploit those permission patterns for malware detection remains an open issue.In this paper,we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect Then a framework based on contrasting permission patterns is presented for Android malware detection.According to the proposed framework,an ensemble classifier,Enclamald,is further developed to detect whether an application is potentially malicious.Every contrasting permission pattern is acting as a weak classifier in Enclamald,and the weighted predictions of involved weak classifiers are aggregated to the final result.Experiments on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection.展开更多
Propeller blade width measurement has been extensively studied in the past using direct and indirect methods, and it plays a great role in determining the quality of the finished products. It has surveyed that previou...Propeller blade width measurement has been extensively studied in the past using direct and indirect methods, and it plays a great role in determining the quality of the finished products. It has surveyed that previous techniques are usually time-consuming and erroneous due to a large number of points to be processed in blade width measurement. This paper proposes a new method of measuring blade width using two images acquired from different viewpoints of the same blade. And a new feature points matching approach for propeller blade image is proposed in stereo vision measurement. Based on these, pixel coordinates of contour points of the blade in two images are extracted and converted to real world coordinates by image algorithm and binocular stereo machine vision theory. Then, from the real world coordinates, the blade width at any position can be determined by simple geometrical method.展开更多
In order to apply overbooking idea in Chinese railway freight industry to improve revenue, a Markov decision process(dynamic programming) model for railway freight reservation was formulated and the overbooking limit ...In order to apply overbooking idea in Chinese railway freight industry to improve revenue, a Markov decision process(dynamic programming) model for railway freight reservation was formulated and the overbooking limit level was proposed as a control policy. However, computing the dynamic programming treatment needs six nested loops and this will be burdensome for real-world problems. To break through the calculation limit, the properties of value function were analyzed and the overbooking protection level was proposed to reduce the calculating quantity. The simulation experiments show that the overbooking protection level for the lower-fare class is higher than that for the higher-fare class, so the overbooking strategy is nested by fare class. Besides, by analyzing the influence on the overbooking strategy of freight arrival probability and cancellation probability, the proposed approach is efficient and also has a good application prospect in reality. Also, compared with the existing reservation(FCFS), the overbooking strategy performs better in the fields of vacancy reduction and revenue improvement.展开更多
Many problems in rock engineering are limited by our imperfect knowledge of the material properties and failure mechanics of rock masses. Mining problems are somewhat unique, however, in that plenty of real world expe...Many problems in rock engineering are limited by our imperfect knowledge of the material properties and failure mechanics of rock masses. Mining problems are somewhat unique, however, in that plenty of real world experience is generally available and can be turned into valuable experimental data.Every pillar that is developed, or stope that is mined, represents a full-scale test of a rock mechanics design. By harvesting these data, and then using the appropriate statistical techniques to interpret them,mining engineers have developed powerful design techniques that are widely used around the world.Successful empirical methods are readily accepted because they are simple, transparent, practical, and firmly tethered to reality. The author has been intimately associated with empirical design for his entire career, but his previous publications have described the application of individual techniques to specific problems. The focus of this paper is the process used to develop a successful empirical method. A sixstage process is described: identification of the problem, and of the end users of the final product; development of a conceptual rock mechanics model, and identification of the key parameters in that model;identification of measures for each of the key parameters, and the development of new measures(such as rating scales) where necessary; data sources and data collection; statistical analysis; and packaging of the final product. Each of these stages has its own potential rewards and pitfalls, which will be illustrated by incidents from the author's own experience. The ultimate goal of this paper is to provide a new and deeper appreciation for empirical techniques, as well as some guidelines and opportunities for future developers.展开更多
A novel approach was presented to solve the navigation problem of autonomous mobile robots in unknown environments with dense obstacles based on a univector field method. In an obstacle-free environment, a robot is en...A novel approach was presented to solve the navigation problem of autonomous mobile robots in unknown environments with dense obstacles based on a univector field method. In an obstacle-free environment, a robot is ensured to reach the goal position with the desired posture by following the univector field. Contrariwise, the univector field cannot guarantee that the robot will avoid obstacles in environments. In order to create an intelligent mobile robot being able to perform the obstacle avoidance task while following the univector field, Dyna-Q algorithm is developed to train the robot in learning moving directions to attain a collision-free path for its navigation. Simulations on the computer as well as experiments on the real world prove that the proposed algorithm is efficient for training the robot in reaching the goal position with the desired final orientation.展开更多
Recently, the Internet of Things (loT) has attracted more and more attention. Multimedia sensor network plays an important role in the IoT, and audio event detection in the multimedia sensor net- works is one of the...Recently, the Internet of Things (loT) has attracted more and more attention. Multimedia sensor network plays an important role in the IoT, and audio event detection in the multimedia sensor net- works is one of the most important applications for the Internet of Things. In practice, it is hard to get enough real-world samples to generate the classifi- ers for some special audio events (e.g., car-crash- ing in the smart traffic system). In this paper, we introduce a TrAdaBoost-based method to solve the above problem. By using the proposed approach, we can train a strong classifier by using only a tiny amount of real-world data and a large number of more easily collected samples (e.g., collected from TV programs), even when the real-world data is not sufficient to train a model alone. We deploy this ap- proach in a smart traffic system to evaluate its per- formance, and the experiment evaluations demonstrate that our method can achieve satisfying results.展开更多
There is a deviation between actual and theoretical perceived positions of virtual object in stereoscop-ic display.Therefore,methods for precise position perception in real world are proposed in this paper.The causes ...There is a deviation between actual and theoretical perceived positions of virtual object in stereoscop-ic display.Therefore,methods for precise position perception in real world are proposed in this paper.The causes for the deviation are analyzed on the basis of geometrical optics .Then deviation correctionsare performed by error compensation with mathematic method and by remodeling virtual viewpoint dynami-cally with the movement of physical viewpoint.Experimental results show that these methods can reducethe position deviation to less than 10 millimeter,meeting the requirements for direct manipulation in mul-ti-sensory virtual environment.展开更多
Nowadays, a considerably large number of documents are available over many online news sites (e.g., CNN and NYT). Therefore, the utilization of these online documents, for example, the discovery of a burst topic and i...Nowadays, a considerably large number of documents are available over many online news sites (e.g., CNN and NYT). Therefore, the utilization of these online documents, for example, the discovery of a burst topic and its evolution, is a significant challenge. In this paper, a novel topic model, called intermittent Evolution LDA (iELDA) is proposed. In iELDA, the time-evolving documents are divided into many small epochs. iELDA utilizes the detected global topics as priors to guide the detection of an emerging topic and keep track of its evolution over different epochs. As a natural extension of the traditional Latent Dirichlet Allocation (LDA) and Dynamic Topic Model (DTM), iELDA has an advantage: it can discover the intermittent recurring pattern of a burst topic. We apply iELDA to real-world data from NYT; the results demonstrate that the proposed iELDA can appropriately capture a burst topic and track its intermittent evolution as well as produce a better predictive ability than other related topic models.展开更多
Confocal laser endomicroscopy is a novel imaging technology,which allows realtime visualization and inter-pretation of microscopic details in live tissues. Although several potential uses have been identified for this...Confocal laser endomicroscopy is a novel imaging technology,which allows realtime visualization and inter-pretation of microscopic details in live tissues. Although several potential uses have been identified for this technology,no data are available regarding its real-worlduses. We report the results of an email-based survey of experts in North America regarding their use of the technology.展开更多
The paper proposes a novel algorithm to get the encryption matrix. Firstly, a chaotic sequence generated by Chebyshev chaotic neural networks is converted into a series of low-order integer matrices from which availab...The paper proposes a novel algorithm to get the encryption matrix. Firstly, a chaotic sequence generated by Chebyshev chaotic neural networks is converted into a series of low-order integer matrices from which available encryption matrices are selected. Then, a higher order encryption matrix relating real world application is constructed by means of tensor production method based on selected encryption matrices. The results show that the proposed algorithm can produce a "one-time pad cipher" encryption matrix with high security; and the encryption results have good chaos and auto-correlation with the natural frequency of the plaintext being hidden and homogenized.展开更多
From the physical science, we know the force comes from the reaction between at least two objects. But, in the reality world, we can see some kind force of an existence does not come from outside. For instance, when a...From the physical science, we know the force comes from the reaction between at least two objects. But, in the reality world, we can see some kind force of an existence does not come from outside. For instance, when a person takes the action such as speaking, movement of arms, we cannot see any force loaded from outside of this person. Then, here is the question: Where does this kind of force come from? This paper is to demonstrate to prove that there is the second source of force, which comes from internal of a kind of object.展开更多
This paper will apply a politically oriented description-critique paradigm developed from the works of Whitehall and Grewell that offers a way to examine works of popular culture, particularly Mars-based science ficti...This paper will apply a politically oriented description-critique paradigm developed from the works of Whitehall and Grewell that offers a way to examine works of popular culture, particularly Mars-based science fiction films. Because of the unique nature of these films, primarily which they are set in a future and distant world, they allow us to explore the socio-political landscape in which they were created from a remove that does not exist in "real-world" based works. Specifically we will be examining the governing power (in any particular Mars-based science fiction film) that might be either wielded by business interests or governmental interests. Although it is possible to have both a strong government and a strong business in a society, in many Mars-based science fiction films, government and business seem to represent two sides of a continuum. The stronger the business power structure in the film, the weaker the governmental power structure, and vice-versa.展开更多
In this paper, the author refers to the Latin translation of the Kitab Ihsa 'al' Ulum of Al-Frabi made by Dominicus Gundissalinus in the Xllth Century in Toledo, Spain. This text under the Latin title De scientiis w...In this paper, the author refers to the Latin translation of the Kitab Ihsa 'al' Ulum of Al-Frabi made by Dominicus Gundissalinus in the Xllth Century in Toledo, Spain. This text under the Latin title De scientiis was one of the most influential texts of the Arab and Persian world in the western Latin Europe. It is an introductory text into all until known sciences written for students and laymen (illiterate) who want to study one of these sciences. The text of Al-Farabi discusses the seven liberal arts, all of the works on physics of Aristotle and includes some reflexions on metaphysics, political philosophy and theology. There are two important points: (1) All sciences have a theoretical and practical aspect. All sciences are sciences of principles and causes and their application to the practical world. (2) The so called prima philosophia is the political philosophy and not metaphysics. In this respect, Al-Farabi subordinates theology as a science of the religious laws to politics as a science of civil laws. In the same respect, he combines, under the famous sentence of Plato that philosophers are the governors and the very well companions of mankind, politics with theology展开更多
Social media has become an inevitable part of our lives in the age of network society. People establish multiple identities for themselves, with or without references to the real world, and behave according to those i...Social media has become an inevitable part of our lives in the age of network society. People establish multiple identities for themselves, with or without references to the real world, and behave according to those identities. Self-made components of virtual presence are not limited to identities only; many users also create hyper-personalities for themselves with the help of new technologies. Then, the fundamental question becomes: Why do people create self-made identities and hyper-personalities to portray or hide themselves in social media environments? The answer to this question has certain connections and implications for behaviors of social media users. Therefore, researchers have investigated why some people find social media attractive and attend whenever possible, while others are afraid of social media and hesitate to attend. Positive and negative behaviors of social media users can be classified as braggadocian and preventative. Braggadocian behaviors are related to courageously taking advantage of social media, whereas preventative behaviors are concerned with avoidance of social media. The dominant behavioral pattern of a user depends on what one can achieve through attending or preventing social media. This paper first discusses basic elements of human behavior that drive social media such as altruism, hedonism, connectionism, homophily, multiple identities, memetics, narcissism, and tribalism. Then, it focuses on precautionary elements of human behavior such as avoidance, escape, blocking, fear, hiding, removal, and protectionism. Whether they are attentive or not, one thing is clear: People refrain or enrich their own lives in social media rather than being abused or watching others in industrial media.展开更多
文摘Cardiovascular disease, and in particular ischemic heart disease (IHD), is a major cause of morbidity and mortality in the very elderly (〉 80 years) worldwide. These patients represent a rapidly growing cohort presenting for percntaneous coronary intervention (PCI), now constituting more than one in five patients treated with PCI in real-world practice. Furthermore, they often have greater ischemic burden than their younger counterparts, suggesting that they have greater scope of benefit from coronary revascularization therapy. Despite this, the very elderly are frequently under-represented in clinical revascularization trials and historically there has been a degree of physician reluctance in referring them for PCI procedures, with perceptions of disappointing outcomes, low success and high complication rates. Several issues have contributed to this, including the tendency for older patients with IHD to present late, with atypical symptoms or non-diagnostic ECGs, and reservations regarding their procedural risk-to-benefit ratio, due to shorter life expectancy, presence of comorbidities and increased bleeding risk from antiplatelet and anticoagulation medications. However, advances in PCI technology and techniques over the past decade have led to better outcomes and lower risk of complications and the existing body of evidence now indicates that the very elderly actually derive more relative benefit from PCI than younger populations. Importantly, this applies to all PCI settings: elective, urgent and emergency. This review discusses the role of PCI in the very elderly presenting with chronic stable IHD, non ST-elevation acute coronary syndrome, and ST-elevation myocardial infarction. It also addresses the clinical challenges met when considering PCI in this cohort and the ongoing need for research and development to further improve outcomes in these challenging patients.
文摘Background The efficacy and safety of non-vitamin K antagonist oral anticoagulants (NOACs) and warfarin in Asian octogenarian atrial fibrillation (AF) patients have not been established in a real-world setting. We aimed to evaluate the efficacy and safety of NOACs and warfarin in Korean octogenarian patients. Methods A total of 293 consecutive patients aged 〉 80 years with non-valvular AF who had taken either NOACs 048 cases, 50.5%) or warfarin (145 cases, 49.5%) were retrospectively reviewed. The efficacy outcome was the com- posite of stroke or systemic embolism. The safety outcome was major bleeding. Results The follow-up duration was 375 patient-years ( 172 patient-years with NOACs and 203 patient-years with warfarin). Patients on NOACs were slightly older (P = 0.006) and had slightly higher HAS-BLED scores (P = 0.034). The efficacy of both anticoagulants was high (1.16% for NOACs vs. 2.98% for warfarin per 100 pa- tient-years, P = 0.46). The safety outcome was relatively high in both NOACs and warfarin groups (8.96% vs. 12.46%, P = 0.29). The effi- cacy and safety outcomes tended to decrease non-significantly in low dose NOACs than in common dose NOACs or warfarin (0.85% vs. 1.84% vs. 2.98% in efficacy outcome, P = 0.69; and 6.97% vs. 13.29% vs. 12.46% in safety outcome, P = 0.34). Conclusions NOACs were highly effective for prevention of stroke or systemic embolism in Asian octogenarian AF patients. However, major bleeding occurred excessively high in both anticoagulant groups. Further study is required on the optimal anticoagulant regimen in octogenarian population.
基金National Key Basic Research Program of China (973 Program) under Grant No.2012CB315802 and No.2013CB329102.National Natural Science Foundation of China under Grant No.61171102 and No.61132001.New generation broadband wireless mobile communication network Key Projects for Science and Technology Development under Grant No.2011ZX03002-002-01,Beijing Nova Program under Grant No.2008B50 and Beijing Higher Education Young Elite Teacher Project under Grant No.YETP0478
文摘Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.
基金supported by the National Key Technology R&D Program of China under Grant No.2012BAH46B04
文摘Cascading failures are common phenomena in many of real-world networks,such as power grids,Internet,transportation networks and social networks.It's worth noting that once one or a few users on a social network are unavailable for some reasons,they are more likely to influence a large portion of social network.Therefore,an effective mitigation strategy is very critical for avoiding or reducing the impact of cascading failures.In this paper,we firstly quantify the user loads and construct the processes of cascading dynamics,then elaborate the more reasonable mechanism of sharing the extra user loads with considering the features of social networks,and further propose a novel mitigation strategy on social networks against cascading failures.Based on the realworld social network datasets,we evaluate the effectiveness and efficiency of the novel mitigation strategy.The experimental results show that this mitigation strategy can reduce the impact of cascading failures effectively and maintain the network connectivity better with lower cost.These findings are very useful for rationally advertising and may be helpful for avoiding various disasters of cascading failures on many real-world networks.
基金supported by the National Research Foundation in Korea through contract N-12-NM-IR05
文摘The parametric temporal data model captures a real world entity in a single tuple, which reduces query language complexity. Such a data model, however, is difficult to be implemented on top of conventional databases because of its unfixed attribute sizes. XML is a matured technology and can be an elegant solution for such challenge. Representing data in XML trigger a question about storage efficiency. The goal of this work is to provide a straightforward answer to such a question. To this end, we compare three different storage models for the parametric temporal data model and show that XML is not worse than any other approaches. Furthermore, XML outperforms the other storages under certain conditions. Therefore, our simulation results provide a positive indication that the myth about XML is not true in the parametric temporal data model.
基金This work was supported by Deakin Cyber Security Research Cluster National Natural Science Foundation of China under Grant Nos. 61304067 and 61202211 +1 种基金 Guangxi Key Laboratory of Trusted Software No. kx201325 the Fundamental Research Funds for the Central Universities under Grant No 31541311314.
文摘As the risk of malware is sharply increasing in Android platform,Android malware detection has become an important research topic.Existing works have demonstrated that required permissions of Android applications are valuable for malware analysis,but how to exploit those permission patterns for malware detection remains an open issue.In this paper,we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect Then a framework based on contrasting permission patterns is presented for Android malware detection.According to the proposed framework,an ensemble classifier,Enclamald,is further developed to detect whether an application is potentially malicious.Every contrasting permission pattern is acting as a weak classifier in Enclamald,and the weighted predictions of involved weak classifiers are aggregated to the final result.Experiments on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection.
基金Supported by the Natural Science Foundation of China (50975133)the Innovative Foundation for Ph.D of the Jiangsu Province, China (2010-227)
文摘Propeller blade width measurement has been extensively studied in the past using direct and indirect methods, and it plays a great role in determining the quality of the finished products. It has surveyed that previous techniques are usually time-consuming and erroneous due to a large number of points to be processed in blade width measurement. This paper proposes a new method of measuring blade width using two images acquired from different viewpoints of the same blade. And a new feature points matching approach for propeller blade image is proposed in stereo vision measurement. Based on these, pixel coordinates of contour points of the blade in two images are extracted and converted to real world coordinates by image algorithm and binocular stereo machine vision theory. Then, from the real world coordinates, the blade width at any position can be determined by simple geometrical method.
基金Project(2010QZZD021)supported by the Fundamental Research Funds for the Central Universities,ChinaProject(2015F024)supported by China Railway Science and Technology Research Development Program
文摘In order to apply overbooking idea in Chinese railway freight industry to improve revenue, a Markov decision process(dynamic programming) model for railway freight reservation was formulated and the overbooking limit level was proposed as a control policy. However, computing the dynamic programming treatment needs six nested loops and this will be burdensome for real-world problems. To break through the calculation limit, the properties of value function were analyzed and the overbooking protection level was proposed to reduce the calculating quantity. The simulation experiments show that the overbooking protection level for the lower-fare class is higher than that for the higher-fare class, so the overbooking strategy is nested by fare class. Besides, by analyzing the influence on the overbooking strategy of freight arrival probability and cancellation probability, the proposed approach is efficient and also has a good application prospect in reality. Also, compared with the existing reservation(FCFS), the overbooking strategy performs better in the fields of vacancy reduction and revenue improvement.
文摘Many problems in rock engineering are limited by our imperfect knowledge of the material properties and failure mechanics of rock masses. Mining problems are somewhat unique, however, in that plenty of real world experience is generally available and can be turned into valuable experimental data.Every pillar that is developed, or stope that is mined, represents a full-scale test of a rock mechanics design. By harvesting these data, and then using the appropriate statistical techniques to interpret them,mining engineers have developed powerful design techniques that are widely used around the world.Successful empirical methods are readily accepted because they are simple, transparent, practical, and firmly tethered to reality. The author has been intimately associated with empirical design for his entire career, but his previous publications have described the application of individual techniques to specific problems. The focus of this paper is the process used to develop a successful empirical method. A sixstage process is described: identification of the problem, and of the end users of the final product; development of a conceptual rock mechanics model, and identification of the key parameters in that model;identification of measures for each of the key parameters, and the development of new measures(such as rating scales) where necessary; data sources and data collection; statistical analysis; and packaging of the final product. Each of these stages has its own potential rewards and pitfalls, which will be illustrated by incidents from the author's own experience. The ultimate goal of this paper is to provide a new and deeper appreciation for empirical techniques, as well as some guidelines and opportunities for future developers.
基金Project(2010-0012609) supported by the Basic Science Research Program,Korea
文摘A novel approach was presented to solve the navigation problem of autonomous mobile robots in unknown environments with dense obstacles based on a univector field method. In an obstacle-free environment, a robot is ensured to reach the goal position with the desired posture by following the univector field. Contrariwise, the univector field cannot guarantee that the robot will avoid obstacles in environments. In order to create an intelligent mobile robot being able to perform the obstacle avoidance task while following the univector field, Dyna-Q algorithm is developed to train the robot in learning moving directions to attain a collision-free path for its navigation. Simulations on the computer as well as experiments on the real world prove that the proposed algorithm is efficient for training the robot in reaching the goal position with the desired final orientation.
基金supported by the National Natural Science Foundation of China(No.60821001)the National Basic Research Program of China(No.2007CB311203)
文摘Recently, the Internet of Things (loT) has attracted more and more attention. Multimedia sensor network plays an important role in the IoT, and audio event detection in the multimedia sensor net- works is one of the most important applications for the Internet of Things. In practice, it is hard to get enough real-world samples to generate the classifi- ers for some special audio events (e.g., car-crash- ing in the smart traffic system). In this paper, we introduce a TrAdaBoost-based method to solve the above problem. By using the proposed approach, we can train a strong classifier by using only a tiny amount of real-world data and a large number of more easily collected samples (e.g., collected from TV programs), even when the real-world data is not sufficient to train a model alone. We deploy this ap- proach in a smart traffic system to evaluate its per- formance, and the experiment evaluations demonstrate that our method can achieve satisfying results.
基金supported by the National Natural Science Foundation of China(No.60674052)
文摘There is a deviation between actual and theoretical perceived positions of virtual object in stereoscop-ic display.Therefore,methods for precise position perception in real world are proposed in this paper.The causes for the deviation are analyzed on the basis of geometrical optics .Then deviation correctionsare performed by error compensation with mathematic method and by remodeling virtual viewpoint dynami-cally with the movement of physical viewpoint.Experimental results show that these methods can reducethe position deviation to less than 10 millimeter,meeting the requirements for direct manipulation in mul-ti-sensory virtual environment.
基金supported by the National Basic Research Program of China under Grant No. 2012CB316400the National High Technology Research and Development Program of China under Grant No. 2012AA012505the Fundamental Research Funds for the Central Universities
文摘Nowadays, a considerably large number of documents are available over many online news sites (e.g., CNN and NYT). Therefore, the utilization of these online documents, for example, the discovery of a burst topic and its evolution, is a significant challenge. In this paper, a novel topic model, called intermittent Evolution LDA (iELDA) is proposed. In iELDA, the time-evolving documents are divided into many small epochs. iELDA utilizes the detected global topics as priors to guide the detection of an emerging topic and keep track of its evolution over different epochs. As a natural extension of the traditional Latent Dirichlet Allocation (LDA) and Dynamic Topic Model (DTM), iELDA has an advantage: it can discover the intermittent recurring pattern of a burst topic. We apply iELDA to real-world data from NYT; the results demonstrate that the proposed iELDA can appropriately capture a burst topic and track its intermittent evolution as well as produce a better predictive ability than other related topic models.
文摘Confocal laser endomicroscopy is a novel imaging technology,which allows realtime visualization and inter-pretation of microscopic details in live tissues. Although several potential uses have been identified for this technology,no data are available regarding its real-worlduses. We report the results of an email-based survey of experts in North America regarding their use of the technology.
基金Supported by the National Natural Science Foundation of China (No. 61173036)
文摘The paper proposes a novel algorithm to get the encryption matrix. Firstly, a chaotic sequence generated by Chebyshev chaotic neural networks is converted into a series of low-order integer matrices from which available encryption matrices are selected. Then, a higher order encryption matrix relating real world application is constructed by means of tensor production method based on selected encryption matrices. The results show that the proposed algorithm can produce a "one-time pad cipher" encryption matrix with high security; and the encryption results have good chaos and auto-correlation with the natural frequency of the plaintext being hidden and homogenized.
文摘From the physical science, we know the force comes from the reaction between at least two objects. But, in the reality world, we can see some kind force of an existence does not come from outside. For instance, when a person takes the action such as speaking, movement of arms, we cannot see any force loaded from outside of this person. Then, here is the question: Where does this kind of force come from? This paper is to demonstrate to prove that there is the second source of force, which comes from internal of a kind of object.
文摘This paper will apply a politically oriented description-critique paradigm developed from the works of Whitehall and Grewell that offers a way to examine works of popular culture, particularly Mars-based science fiction films. Because of the unique nature of these films, primarily which they are set in a future and distant world, they allow us to explore the socio-political landscape in which they were created from a remove that does not exist in "real-world" based works. Specifically we will be examining the governing power (in any particular Mars-based science fiction film) that might be either wielded by business interests or governmental interests. Although it is possible to have both a strong government and a strong business in a society, in many Mars-based science fiction films, government and business seem to represent two sides of a continuum. The stronger the business power structure in the film, the weaker the governmental power structure, and vice-versa.
文摘In this paper, the author refers to the Latin translation of the Kitab Ihsa 'al' Ulum of Al-Frabi made by Dominicus Gundissalinus in the Xllth Century in Toledo, Spain. This text under the Latin title De scientiis was one of the most influential texts of the Arab and Persian world in the western Latin Europe. It is an introductory text into all until known sciences written for students and laymen (illiterate) who want to study one of these sciences. The text of Al-Farabi discusses the seven liberal arts, all of the works on physics of Aristotle and includes some reflexions on metaphysics, political philosophy and theology. There are two important points: (1) All sciences have a theoretical and practical aspect. All sciences are sciences of principles and causes and their application to the practical world. (2) The so called prima philosophia is the political philosophy and not metaphysics. In this respect, Al-Farabi subordinates theology as a science of the religious laws to politics as a science of civil laws. In the same respect, he combines, under the famous sentence of Plato that philosophers are the governors and the very well companions of mankind, politics with theology
文摘Social media has become an inevitable part of our lives in the age of network society. People establish multiple identities for themselves, with or without references to the real world, and behave according to those identities. Self-made components of virtual presence are not limited to identities only; many users also create hyper-personalities for themselves with the help of new technologies. Then, the fundamental question becomes: Why do people create self-made identities and hyper-personalities to portray or hide themselves in social media environments? The answer to this question has certain connections and implications for behaviors of social media users. Therefore, researchers have investigated why some people find social media attractive and attend whenever possible, while others are afraid of social media and hesitate to attend. Positive and negative behaviors of social media users can be classified as braggadocian and preventative. Braggadocian behaviors are related to courageously taking advantage of social media, whereas preventative behaviors are concerned with avoidance of social media. The dominant behavioral pattern of a user depends on what one can achieve through attending or preventing social media. This paper first discusses basic elements of human behavior that drive social media such as altruism, hedonism, connectionism, homophily, multiple identities, memetics, narcissism, and tribalism. Then, it focuses on precautionary elements of human behavior such as avoidance, escape, blocking, fear, hiding, removal, and protectionism. Whether they are attentive or not, one thing is clear: People refrain or enrich their own lives in social media rather than being abused or watching others in industrial media.