An experimental platform accompanying with the improved Roberts algorithm has been developed to achieve accurate and real-time edge detection of surface defects on heavy rails.Detection results of scratching defects s...An experimental platform accompanying with the improved Roberts algorithm has been developed to achieve accurate and real-time edge detection of surface defects on heavy rails.Detection results of scratching defects show that the improved Roberts operator can attain accurate positioning to defect contour and get complete edge information.Meanwhile,a decreasing amount of interference noises as well as more precise characteristic parameters of the extracted defects can also be confirmed for the improved algorithm.Furthermore,the BP neural network adopted for defects classification with the improved Roberts operator can obtain the target training precision with 98 iterative steps and time of 2s while that of traditional Roberts operator is 118 steps and 4s.Finally,an enhanced defects identification rate of 13.33%has also been confirmed after the Roberts operator is improved.The proposed detecting platform will be positive in producing high-quality heavy rails and guaranteeing the national transportation safety.展开更多
Wireless sensor networks can be used to monitor the interested region by deploying dense sensor nodes. Coverage is a primary metric to evaluate the capacity of monitoring. In this paper, we focus on the coverage probl...Wireless sensor networks can be used to monitor the interested region by deploying dense sensor nodes. Coverage is a primary metric to evaluate the capacity of monitoring. In this paper, we focus on the coverage problem under border effects, where the sensor nodes are distributed in a circle-shaped region randomly. Under this scenario, we derive the expected coverage of the sensor node and the total network coverage provided by n sensor nodes accurately by probability. These findings are useful to determine the related parameters (sensing range, number of sensor nodes and radius of monitored region) for a specific network coverage ratio. Simulation results demonstrate that our analysis is correct and effective.展开更多
Cloud manufacturing has become a reality. It requires sensing and capturing heterogeneous manufacturing resources and extensive data analysis through the industrial internet. However,the cloud computing and serviceori...Cloud manufacturing has become a reality. It requires sensing and capturing heterogeneous manufacturing resources and extensive data analysis through the industrial internet. However,the cloud computing and serviceoriented architecture are slightly inadequate in dynamic manufacturing resource management. This paper integrates the technology of edge computing and microservice and develops an intelligent edge gateway for internet of thing(IoT)-based manufacturing. Distributed manufacturing resources can be accessed through the edge gateway,and cloud-edge collaboration can be realized. The intelligent edge gateway provides a solution for complex resource ubiquitous perception in current manufacturing scenarios. Finally,a prototype system is developed to verify the effectiveness of the intelligent edge gateway.展开更多
An ultra-dense network scenario is a scene where a large number of people assemble in a limited area to generate centralized broadband data traffic requirements.Because ultra-dense networks generate enormous traffic p...An ultra-dense network scenario is a scene where a large number of people assemble in a limited area to generate centralized broadband data traffic requirements.Because ultra-dense networks generate enormous traffic pressure,traditional network capabilities are not enough to accommodate the user s needs.Based on the description of ultra-dense network architecture,we analyze millimeter wave radio spectrum,high gain beam forming,physical layer frame structure,resource concentration and edge computing technology.In addition,the cooperative technology required by overlay and interference symbiosis in the dense network architecture as well as the access control technology of centralized access is analyzed and discussed comprehensively.展开更多
Financial statements (FS) are tools which provide information to users for making business decisions. Among the organizations, banks are the firms which conducted and did business with risks. In particular, commerci...Financial statements (FS) are tools which provide information to users for making business decisions. Among the organizations, banks are the firms which conducted and did business with risks. In particular, commercial banks continue to play a dominant role in the whole system, and local commercial banks still have an edge in its widespread network across the country over foreign banks. This article is going to present the survey which clarifies the role of FS in commercial banks' loan decisions in Vietnam. Moreover, this paper also discusses FS's quality currently, thereby making suggestions for enterprises to enhance the usefulness of accounting information in borrowing activities. This paper has taken performance with 74 official employees in commercial banks in Vietnam. The results indicated the qualitative characteristics of banks when disclosing the financial statements. This article also gave the six oriented solutions to improvement of the loan decision-making by banks.展开更多
Point-of-interest(POI) recommendation is a popular topic on location-based social networks(LBSNs).Geographical proximity,known as a unique feature of LBSNs,significantly affects user check-in behavior.However,most of ...Point-of-interest(POI) recommendation is a popular topic on location-based social networks(LBSNs).Geographical proximity,known as a unique feature of LBSNs,significantly affects user check-in behavior.However,most of prior studies characterize the geographical influence based on a universal or personalized distribution of geographic distance,leading to unsatisfactory recommendation results.In this paper,the personalized geographical influence in a two-dimensional geographical space is modeled using the data field method,and we propose a semi-supervised probabilistic model based on a factor graph model to integrate different factors such as the geographical influence.Moreover,a distributed learning algorithm is used to scale up our method to large-scale data sets.Experimental results based on the data sets from Foursquare and Gowalla show that our method outperforms other competing POI recommendation techniques.展开更多
This is an extended version of the same titled paper presented at the 21st CIRED. It discusses a new technique for identification and location of defective insulator strings in power lines based on the analysis of hig...This is an extended version of the same titled paper presented at the 21st CIRED. It discusses a new technique for identification and location of defective insulator strings in power lines based on the analysis of high frequency signals generated by corona effect. Damaged insulator strings may lead to loss of insulation and hence to the corona effect, in other words, to partial discharges. These partial discharges can be detected by a system composed of a capacitive coupling device (region between the phase and the metal body of a current transformer), a data acquisition board and a computer. Analyzing the waveform of these partial discharges through a neural network based software, it is possible to identify and locate the defective insulator string. This paper discusses how this software analysis works and why its technique is suitable for this application. Hence the results of key tests performed along the development are discussed, pointing out the main factors that affect their performance.展开更多
A new method for image edge detection based on a pulse neural network is proposed in this paper. The network is locally connected. The external input of each neuron of the network is gray value of the corresponding pi...A new method for image edge detection based on a pulse neural network is proposed in this paper. The network is locally connected. The external input of each neuron of the network is gray value of the corresponding pixel. The synchrony of the neuron and its neighbors is detected by detection neurons. The edge of the image can be read off at minima of the total activity of the detection neurons.展开更多
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen...The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.展开更多
This paper investigates the traffic properties before and after assembly at edge node of Ethernet over optical burst switching (OBS) network for the first time. Burst and inter-arrival time distributions are simulat...This paper investigates the traffic properties before and after assembly at edge node of Ethernet over optical burst switching (OBS) network for the first time. Burst and inter-arrival time distributions are simulated under time-based and length-based assembly schemes. Self-similar traffic Hurst parameter is compared through R/S and V/T plot. Finally three self-similar traffic generating methods are given. Simulation resuhs demonstrate that, muhi-source traffic increases self-similar degree, however after assembly, time-based scheme can decrease self similar degree, and aggregated burst size is close to Gaussian distribution. Length-based method has no effects on the self-similarity of input traffic. RMD is fit for study of burst network with large self-similarity.展开更多
Six new chrysophycean stomatocysts ornamented with reticulum were illustrated based on SEM observation. They were described following the guidelines of the International Statospore Working Group (ISWG). All samples we...Six new chrysophycean stomatocysts ornamented with reticulum were illustrated based on SEM observation. They were described following the guidelines of the International Statospore Working Group (ISWG). All samples were collected from the Great Xing'an Mountains, China. Their taxonomic characteristics and habitats were described to provide new information on the biodiversity of chrysophycean stomatocysts. As is common with many morphotypes, their biological affinities remain unknown.展开更多
Publish/subscribe(pub/sub) paradigm is the main communication model for Information-Centric Network(ICN) proposals.A key issue for pub/sub system is how to route the content objects to the correct subscribers,and ICN ...Publish/subscribe(pub/sub) paradigm is the main communication model for Information-Centric Network(ICN) proposals.A key issue for pub/sub system is how to route the content objects to the correct subscribers,and ICN is no exception.ICN network would be divided into core domain and many edge domains as today's internet does.HHR(Hierarchy Hybrid Routing scheme) is presented for ICN:A Chord-like routing scheme is used in core domain,while edge domains routing structure can be classified into three categories,Local Routing(LR),Delivery of Local Publication to Core domain(DLPC),and Remote Publication Routing into edge domain(RPR).LR can be decided by each edge domain,which determined by many factors,such as locality characteristic for pub/sub information and local policies.A hierarchical routing algorithm is proposed to solve DLPC and RPR simultaneously.Simulation results demonstrate that HHR can be fast deployed,and can be applied in large scale network or dynamic subscription environment.展开更多
A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Wi...A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Windows(VFW) video capture technology,multi-threaded network communication idea and WinSock Socket in Visual C++ 6.0.In the end,client/server(C/S) communication model based on TCP/IP protocol has been developed.Experimental results show that the method can achieve the multiple welding seam video's real-time transmission in LAN.Moreover,the Canny operator is used to realize the edge feature extraction of the seam image which is captured by the client,so that the edge of the seam extracted is continuous and clear.展开更多
In order to reach the best numerical properties with the numerical manifold method(NMM),uniform finite element meshes are always favorite while constructing mathematical covers,where all the elements are congruent.In ...In order to reach the best numerical properties with the numerical manifold method(NMM),uniform finite element meshes are always favorite while constructing mathematical covers,where all the elements are congruent.In the presence of steep gradients or strong singularities,in principle,the locally-defined special functions can be added into the NMM space by means of the partition of unity,but they are not available to those complex problems with heterogeneity or nonlinearity,necessitating local refinement on uniform meshes.This is believed to be one of the most important open issues in NMM.In this study multilayer covers are proposed to solve this issue.In addition to the first layer cover which is the global cover and covers the whole problem domain,the second and higher layer covers with smaller elements,called local covers,are used to cover those local regions with steep gradients or strong singularities.The global cover and the local covers have their own partition of unity,and they all participate in the approximation to the solution.Being advantageous over the existing procedures,the proposed approach is easy to deal with any arbitrary-layer hanging nodes with no need to construct super-elements with variable number of edge nodes or introduce the Lagrange multipliers to enforce the continuity between small and big elements.With no limitation to cover layers,meanwhile,the creation of an even error distribution over the whole problem domain is significantly facilitated.Some typical examples with steep gradients or strong singularities are analyzed to demonstrate the capacity of the proposed approach.展开更多
We propose a weighted model to explain the self-organizing formation of scale-free phenomenon in nongrowth random networks. In this model, we use multiple-edges to represent the connections between vertices and define...We propose a weighted model to explain the self-organizing formation of scale-free phenomenon in nongrowth random networks. In this model, we use multiple-edges to represent the connections between vertices and define the weight of a multiple-edge as the total weights of all single-edges within it and the strength of a vertex as the sum of weights for those multiple-edges attached to it. The network evolves according to a vertex strength preferential selection mechanism. During the evolution process, the network always holds its totM number of vertices and its total number of single-edges constantly. We show analytically and numerically that a network will form steady scale-free distributions with our model. The results show that a weighted non-growth random network can evolve into scMe-free state. It is interesting that the network also obtains the character of an exponential edge weight distribution. Namely, coexistence of scale-free distribution and exponential distribution emerges.展开更多
基金Supported by the National Natural Science Foundation of China(No.51174151)Major Scientific Research Projects of Hubei Provincial Department of Education(No.2010Z19003)+1 种基金Natural Science Foundation of Science and Technology Department of Hubei Province(No.2010CDB03403)Student Research Fund of WUST(No.14ZRB047)
文摘An experimental platform accompanying with the improved Roberts algorithm has been developed to achieve accurate and real-time edge detection of surface defects on heavy rails.Detection results of scratching defects show that the improved Roberts operator can attain accurate positioning to defect contour and get complete edge information.Meanwhile,a decreasing amount of interference noises as well as more precise characteristic parameters of the extracted defects can also be confirmed for the improved algorithm.Furthermore,the BP neural network adopted for defects classification with the improved Roberts operator can obtain the target training precision with 98 iterative steps and time of 2s while that of traditional Roberts operator is 118 steps and 4s.Finally,an enhanced defects identification rate of 13.33%has also been confirmed after the Roberts operator is improved.The proposed detecting platform will be positive in producing high-quality heavy rails and guaranteeing the national transportation safety.
基金the National Natural Science Foundation of China(No.60473001,60572037)
文摘Wireless sensor networks can be used to monitor the interested region by deploying dense sensor nodes. Coverage is a primary metric to evaluate the capacity of monitoring. In this paper, we focus on the coverage problem under border effects, where the sensor nodes are distributed in a circle-shaped region randomly. Under this scenario, we derive the expected coverage of the sensor node and the total network coverage provided by n sensor nodes accurately by probability. These findings are useful to determine the related parameters (sensing range, number of sensor nodes and radius of monitored region) for a specific network coverage ratio. Simulation results demonstrate that our analysis is correct and effective.
基金supported by the National Key Research and Development Program of China (No.2020YFB1710500)the Primary Research & Development Plan of Jiangsu Province(No.BE2021091)。
文摘Cloud manufacturing has become a reality. It requires sensing and capturing heterogeneous manufacturing resources and extensive data analysis through the industrial internet. However,the cloud computing and serviceoriented architecture are slightly inadequate in dynamic manufacturing resource management. This paper integrates the technology of edge computing and microservice and develops an intelligent edge gateway for internet of thing(IoT)-based manufacturing. Distributed manufacturing resources can be accessed through the edge gateway,and cloud-edge collaboration can be realized. The intelligent edge gateway provides a solution for complex resource ubiquitous perception in current manufacturing scenarios. Finally,a prototype system is developed to verify the effectiveness of the intelligent edge gateway.
文摘An ultra-dense network scenario is a scene where a large number of people assemble in a limited area to generate centralized broadband data traffic requirements.Because ultra-dense networks generate enormous traffic pressure,traditional network capabilities are not enough to accommodate the user s needs.Based on the description of ultra-dense network architecture,we analyze millimeter wave radio spectrum,high gain beam forming,physical layer frame structure,resource concentration and edge computing technology.In addition,the cooperative technology required by overlay and interference symbiosis in the dense network architecture as well as the access control technology of centralized access is analyzed and discussed comprehensively.
文摘Financial statements (FS) are tools which provide information to users for making business decisions. Among the organizations, banks are the firms which conducted and did business with risks. In particular, commercial banks continue to play a dominant role in the whole system, and local commercial banks still have an edge in its widespread network across the country over foreign banks. This article is going to present the survey which clarifies the role of FS in commercial banks' loan decisions in Vietnam. Moreover, this paper also discusses FS's quality currently, thereby making suggestions for enterprises to enhance the usefulness of accounting information in borrowing activities. This paper has taken performance with 74 official employees in commercial banks in Vietnam. The results indicated the qualitative characteristics of banks when disclosing the financial statements. This article also gave the six oriented solutions to improvement of the loan decision-making by banks.
基金supported by National Key Basic Research Program of China(973 Program) under Grant No.2014CB340404National Natural Science Foundation of China under Grant Nos.61272111 and 61273216Youth Chenguang Project of Science and Technology of Wuhan City under Grant No. 2014070404010232
文摘Point-of-interest(POI) recommendation is a popular topic on location-based social networks(LBSNs).Geographical proximity,known as a unique feature of LBSNs,significantly affects user check-in behavior.However,most of prior studies characterize the geographical influence based on a universal or personalized distribution of geographic distance,leading to unsatisfactory recommendation results.In this paper,the personalized geographical influence in a two-dimensional geographical space is modeled using the data field method,and we propose a semi-supervised probabilistic model based on a factor graph model to integrate different factors such as the geographical influence.Moreover,a distributed learning algorithm is used to scale up our method to large-scale data sets.Experimental results based on the data sets from Foursquare and Gowalla show that our method outperforms other competing POI recommendation techniques.
文摘This is an extended version of the same titled paper presented at the 21st CIRED. It discusses a new technique for identification and location of defective insulator strings in power lines based on the analysis of high frequency signals generated by corona effect. Damaged insulator strings may lead to loss of insulation and hence to the corona effect, in other words, to partial discharges. These partial discharges can be detected by a system composed of a capacitive coupling device (region between the phase and the metal body of a current transformer), a data acquisition board and a computer. Analyzing the waveform of these partial discharges through a neural network based software, it is possible to identify and locate the defective insulator string. This paper discusses how this software analysis works and why its technique is suitable for this application. Hence the results of key tests performed along the development are discussed, pointing out the main factors that affect their performance.
文摘A new method for image edge detection based on a pulse neural network is proposed in this paper. The network is locally connected. The external input of each neuron of the network is gray value of the corresponding pixel. The synchrony of the neuron and its neighbors is detected by detection neurons. The edge of the image can be read off at minima of the total activity of the detection neurons.
基金Project(61100201) supported by National Natural Science Foundation of ChinaProject(12ZZ019) supported by Technology Innovation Research Program,Shang Municipal Education Commission,China+1 种基金Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province,ChinaProject(NCET-12-0358) supported by New Century Excellent Talentsin University,Ministry of Education,China
文摘The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.
文摘This paper investigates the traffic properties before and after assembly at edge node of Ethernet over optical burst switching (OBS) network for the first time. Burst and inter-arrival time distributions are simulated under time-based and length-based assembly schemes. Self-similar traffic Hurst parameter is compared through R/S and V/T plot. Finally three self-similar traffic generating methods are given. Simulation resuhs demonstrate that, muhi-source traffic increases self-similar degree, however after assembly, time-based scheme can decrease self similar degree, and aggregated burst size is close to Gaussian distribution. Length-based method has no effects on the self-similarity of input traffic. RMD is fit for study of burst network with large self-similarity.
基金Supported by the National Natural Science Foundation of China (Nos.31070181, 30870162)the Leading Academic Discipline Project of Shanghai Municipal Education Commission (No. J50401)
文摘Six new chrysophycean stomatocysts ornamented with reticulum were illustrated based on SEM observation. They were described following the guidelines of the International Statospore Working Group (ISWG). All samples were collected from the Great Xing'an Mountains, China. Their taxonomic characteristics and habitats were described to provide new information on the biodiversity of chrysophycean stomatocysts. As is common with many morphotypes, their biological affinities remain unknown.
基金supported by 973 Program(2013CB329103)NSFC Fund (61271165,61301153)Program for Changjiang Scholars and Innovative Research Team (PCSIRT) in University and the 111 Project B14039
文摘Publish/subscribe(pub/sub) paradigm is the main communication model for Information-Centric Network(ICN) proposals.A key issue for pub/sub system is how to route the content objects to the correct subscribers,and ICN is no exception.ICN network would be divided into core domain and many edge domains as today's internet does.HHR(Hierarchy Hybrid Routing scheme) is presented for ICN:A Chord-like routing scheme is used in core domain,while edge domains routing structure can be classified into three categories,Local Routing(LR),Delivery of Local Publication to Core domain(DLPC),and Remote Publication Routing into edge domain(RPR).LR can be decided by each edge domain,which determined by many factors,such as locality characteristic for pub/sub information and local policies.A hierarchical routing algorithm is proposed to solve DLPC and RPR simultaneously.Simulation results demonstrate that HHR can be fast deployed,and can be applied in large scale network or dynamic subscription environment.
基金the National Natural Science Foundation of China (No.61165008)the Natural Science Foundation of Jiangxi Province (No.20114BAB206004)the Project of Jiangxi Provincial Education Department(No.GJJ12038)
文摘A method of transmission and monitoring in local area network(LAN) for the welding seam video information of binocular vision welding robot is proposed.This paper uses MPEG-4 video CODEC functions of DivX,video for Windows(VFW) video capture technology,multi-threaded network communication idea and WinSock Socket in Visual C++ 6.0.In the end,client/server(C/S) communication model based on TCP/IP protocol has been developed.Experimental results show that the method can achieve the multiple welding seam video's real-time transmission in LAN.Moreover,the Canny operator is used to realize the edge feature extraction of the seam image which is captured by the client,so that the edge of the seam extracted is continuous and clear.
基金supported by the National Basic Research Program of China("973"Project)(Grant Nos.2011CB013505&2014CB047100)the National Natural Science Foundation of China(Grant Nos.11572009&51538001)
文摘In order to reach the best numerical properties with the numerical manifold method(NMM),uniform finite element meshes are always favorite while constructing mathematical covers,where all the elements are congruent.In the presence of steep gradients or strong singularities,in principle,the locally-defined special functions can be added into the NMM space by means of the partition of unity,but they are not available to those complex problems with heterogeneity or nonlinearity,necessitating local refinement on uniform meshes.This is believed to be one of the most important open issues in NMM.In this study multilayer covers are proposed to solve this issue.In addition to the first layer cover which is the global cover and covers the whole problem domain,the second and higher layer covers with smaller elements,called local covers,are used to cover those local regions with steep gradients or strong singularities.The global cover and the local covers have their own partition of unity,and they all participate in the approximation to the solution.Being advantageous over the existing procedures,the proposed approach is easy to deal with any arbitrary-layer hanging nodes with no need to construct super-elements with variable number of edge nodes or introduce the Lagrange multipliers to enforce the continuity between small and big elements.With no limitation to cover layers,meanwhile,the creation of an even error distribution over the whole problem domain is significantly facilitated.Some typical examples with steep gradients or strong singularities are analyzed to demonstrate the capacity of the proposed approach.
基金Supported by the National Natural Science Foundation of China under Grant No.60874080the Commonweal Application Technique Research Project of Zhejiang Province under Grant No.2012C2316the Open Project of State Key Lab of Industrial Control Technology of Zhejiang University under Grant No.ICT1107
文摘We propose a weighted model to explain the self-organizing formation of scale-free phenomenon in nongrowth random networks. In this model, we use multiple-edges to represent the connections between vertices and define the weight of a multiple-edge as the total weights of all single-edges within it and the strength of a vertex as the sum of weights for those multiple-edges attached to it. The network evolves according to a vertex strength preferential selection mechanism. During the evolution process, the network always holds its totM number of vertices and its total number of single-edges constantly. We show analytically and numerically that a network will form steady scale-free distributions with our model. The results show that a weighted non-growth random network can evolve into scMe-free state. It is interesting that the network also obtains the character of an exponential edge weight distribution. Namely, coexistence of scale-free distribution and exponential distribution emerges.