With abundant wind resources and high pressure imposed on en-vironmental protection, wind power development has a promising future. Butdue to intermittent nature, wind power can bring into full play only if being con-...With abundant wind resources and high pressure imposed on en-vironmental protection, wind power development has a promising future. Butdue to intermittent nature, wind power can bring into full play only if being con-nected into power grid to ensure its supply reliability and continuity, aswell as operational economy. However, technical and market barriers haveprevented wind power from integrating into power grid. To foster wind powerdevelopment, these barriers should be removed by both government incentivepolicies and sophisticated technologies.展开更多
Objective: To evaluate the efficiency of an implanted chip system on blood pressure regulation. Methods: The mean arterial pressure (MAP) and heart rate (HR) were recorded in anesthetized rabbits. Based on the set poi...Objective: To evaluate the efficiency of an implanted chip system on blood pressure regulation. Methods: The mean arterial pressure (MAP) and heart rate (HR) were recorded in anesthetized rabbits. Based on the set point theory, an implanted chip system was designed to regulate the blood pressure by stimulating the aortic depressor nerve (ADN) according to the feedback of blood pressure. The blood pressure regulation induced by the implanted chip system was carried out twice (lasted for 15 min and 60 min respectively) and the change of MAP and HR during the regulation was compared with the control. Results: There was a significant decrease of MAP during the first regulation ([-32.0 ± 6.6] mmHg) and second regulation ([-27.4 ± 6.2] mmHg) compared with the control (P<0.01). The HR was also significantly decreased during regulation compared with the control. Both MAP and HR returned to the baseline immediately without rebound after the regulation ceased. Conclusion: The implanted chip system can regulate the blood pressure successfully and keep the blood pressure in a lower constant level without adaptation.展开更多
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash...The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.展开更多
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight...Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed.展开更多
In this paper, a novel admission scheme is proposed which provides high degrees of quality of service (QoS) guarantees for multimedia traffic carried in mobile networks. The proposed scheme combines the admission cont...In this paper, a novel admission scheme is proposed which provides high degrees of quality of service (QoS) guarantees for multimedia traffic carried in mobile networks. The proposed scheme combines the admission control and bandwidth reservation to guarantee QoS requirements. It considers both local information and remote information to determine whether to accept or reject a connection. In order to embody the characteristics of the algorithms proposed in the article, two traditional algorithms of admission control are used for comparison. In the end of the paper the simulation analyses are given and the results show that the proposed algorithm can adjust the bandwidth according to the current status of networks and decrease the probability of connections forcibly dropped. The most important thing is that the algorithm is based on the multimedia communications and can guarantee the QoS of real time connections through decreasing the bandwidth of non real time connections.展开更多
It is difficult to knowall the relations between Snort rules. To deal with this problem, the topological relations between Snort rules are classified based on the set theory, and a method for calculating the topologic...It is difficult to knowall the relations between Snort rules. To deal with this problem, the topological relations between Snort rules are classified based on the set theory, and a method for calculating the topological relations between Snort rules is proposed. In the existing methods for analyzing the relations of Snort rules, the relations are usually determined only according to the header information of the Snort rules. Without considering the actions of Snort rules, the proposed method improves upon the existing methods and it can classify and calculate the topological relations between Snort rules according to both headers and options information of Snort rules. In addition, the proposed method is implemented by the functional language Haskell. The experimental results showthat the topological relations between Snort rules can be calculated rapidly and effectively. The proposed method also provides an important basis for conflict detection in the succeeding Snort rules.展开更多
A semi-empirical interatomic potential formalism,the second-nearest-neighbor modified embedded-atom method(2NN MEAM),has been applied to obtaining interatomic potentials for the Co-W and Al-W binary system using previ...A semi-empirical interatomic potential formalism,the second-nearest-neighbor modified embedded-atom method(2NN MEAM),has been applied to obtaining interatomic potentials for the Co-W and Al-W binary system using previously developed MEAM potentials of Co,Al and W.The potential parameters were determined by fitting the experimental data on the enthalpy of formation,lattice parameter,melting point and elastic constants.The present potentials generally reproduce the fundamental physical properties of the Co-W and Al-W systems accurately.The lattice parameters,the enthalpy of formation,the thermal stability and the elastic constants match well with experiment and the first-principles results.The enthalpy of mixing and the enthalpy of formation and mixing of liquid are in good agreement with CALPHAD calculations.The potentials can be easily combined with already-developed MEAM potentials for binary cobalt systems and can be used to describe Co-Al-W-based multicomponent alloys,especially for interfacial properties.展开更多
In downlink cellular multiple users in multiple cells systems using beams, the should cooperate to generate beams to improve the spectrum efficiency. A mathematical model for the multi-cell multi-user downlink transm...In downlink cellular multiple users in multiple cells systems using beams, the should cooperate to generate beams to improve the spectrum efficiency. A mathematical model for the multi-cell multi-user downlink transmission is established, and the gradients of the variables including beamfonning filters, receiving filters and transmitting power are calculated. Then, a gradient-project-based cooperative beamforming scheme is proposed in which each user iteratively adjusts bearnforming variables in the direction of the gradients and projects onto feasible spaces. The information exchange protocol needed to support the scheme is also described. Simulation results show that the proposed scheme can achieve an average spectral efficiency of about 5 bit/( s · Hz · cell). The results show that cooperative beamforming can improve the spectrum efficiency of the cellular systems.展开更多
Due to not requiring channel state information (CSI) at both the transmitter and the receiver, noncoherent ultra-wideband (UWB) incurs a performance penalty of approximately 3 dB in the required signal to noise ra...Due to not requiring channel state information (CSI) at both the transmitter and the receiver, noncoherent ultra-wideband (UWB) incurs a performance penalty of approximately 3 dB in the required signal to noise ratio (SNR) compared to the coherent case. To overcome the gap, an effective differential encoding and decoding scheme for multiband UWB systems is proposed. The proposed scheme employs the parallel concatenation of two recursive differential unitary space-frequency encoders at the transmitter. At the receiver, two component decoders iteratively decode information bits by interchanging soft metric values between each other. To reduce the computation complexity, a decoding algorithm which only uses transition probability to calculate the log likelihood ratios (LLRs) for the decoded bits is given. Simulation results show that the proposed scheme can dramatically outperform the conventional differential and even coherent detection at high SNR with a few iterations.展开更多
Aiming at the inaccessible problem of remote embedded devices update and maintenance, this paper presents a method using general packet radio service (GPRS) to achieve update based on the embedded real-time operatin...Aiming at the inaccessible problem of remote embedded devices update and maintenance, this paper presents a method using general packet radio service (GPRS) to achieve update based on the embedded real-time operating system (RTOS) μC/OS-Ⅱ. It introduces architecture of the system first. And then it uses LPC1768 chip as the central processing unit, SIM900A module for data transmission, and SST25VF016B to store the data. To ensure accuracy of the data transmis- sion, cyclic redundancy code (CRC) is adopted. The software uses fixed bootstrap and mutable update program, and thus the embedded devices can still normally start in case of update failure. Finally, high stability and extensive adaptability of the system are verified by experimental data.展开更多
A system of number recognition with a graphic user interface (GUI) is implemented on the embedded development platform by using the fuzzy pattern recognition method. An application interface (API) of uC/ OS-Ⅱ is ...A system of number recognition with a graphic user interface (GUI) is implemented on the embedded development platform by using the fuzzy pattern recognition method. An application interface (API) of uC/ OS-Ⅱ is used to implement the features of multi-task concurrency and the communications among tasks. Handwriting function is implemented by the improvement of the interface provided by the platform. Fuzzy pattern recognition technology based on fuzzy theory is used to analyze the input of handwriting. A primary system for testing is implemented. It can receive and analyze user inputs from both keyboard and touch-screen. The experimental results show that the embedded fuzzy recognition system which uses the technology which integrates two ways of fuzzy recognition can retain a high recognition rate and reduce hardware requirements.展开更多
In order to solve the problems of mining monitor and control systems during the construction process of digital mining combined with network and embedded technologies, the kernel access equipment of a mining monitor a...In order to solve the problems of mining monitor and control systems during the construction process of digital mining combined with network and embedded technologies, the kernel access equipment of a mining monitor and control system was proposed and designed. It is the architecture of a mining embedded network multifunctional substation. This paper presents the design of hardware and software of the substation in detail. Finally, the system’s ef- ficiency was validated through experimentation.展开更多
Based on input-output approach, the robust stability and stabilization problems for uncertain singular systems with time-varying delays are investigated. The parameter uncertainties are assumed to be norm-bounded and ...Based on input-output approach, the robust stability and stabilization problems for uncertain singular systems with time-varying delays are investigated. The parameter uncertainties are assumed to be norm-bounded and the time-varying delays include both discrete delay and distributed delay. By introducing a new input-output model, the time-delay system is embedded in a family of systems with a forward system without time delay and a dynamical feedback uncertainty. A sufficient and necessary condition, which guarantees the system regular, impulse-free and stable for all admissible uncertainties, is obtained. Based on the strict linear matrix inequality, the desired robust state feedback controller is also obtained. Finally, a numerical example is provided to demonstrate the application of the proposed method.展开更多
In this paper, the problem of adaptive tracking control for a class of nonlinear large scale systems with unknown parameters entering linearly is discussed. Based on the theory of input output linearization of nonli...In this paper, the problem of adaptive tracking control for a class of nonlinear large scale systems with unknown parameters entering linearly is discussed. Based on the theory of input output linearization of nonlinear systems, direct adaptive control schemes are presented to achieve bounded tracking. The proposed control schemes are robust with respect to the uncertainties in interconnection structure as well as subsystem dynamics. A numerical example is given to illustrate the efficiency of this method.展开更多
The mass of the embedded systems are driven by second batteries, not by wired power supply. So saving energy is one of the main design goals for embedded system. In this paper we present a new technique for modelling ...The mass of the embedded systems are driven by second batteries, not by wired power supply. So saving energy is one of the main design goals for embedded system. In this paper we present a new technique for modelling and solving the dynamic power management (DPM) problem for embedded systems with complex behavioural characteristics. First we model a power-managed embedded computing system as a controllable Flow Chart. Then we use the Poisson process for optimisation, and give the power management algorithm by the help of Dynamic Voltage Scaling (DVS) technology. At last we built the experi- mental model using the PXA 255 Processors. The experimental results showed that the proposed technique can achieve more than 12% power saving compared to other existing DPM techniques.展开更多
A novel non-coherent detection scheme for differential frequency hopping(DFH)system is proposedin asynchronous multi-user environments over Rayleigh-fading channels.The synchronous and asyn-chronous multi-user perform...A novel non-coherent detection scheme for differential frequency hopping(DFH)system is proposedin asynchronous multi-user environments over Rayleigh-fading channels.The synchronous and asyn-chronous multi-user performances of DFH with the conventional detection scheme and this novel detectionscheme are analyzed,respectively.The performance results are validated with simulation.The results ofanalyses and simulations prove two conclusions.Firstly,the performance of asynchronous multi-user DFHsystem overcomes that of synchronous multi-user DFH system over Rayleigh-fading channel.Secondly,the novel detection scheme can achieve better performance than the conventional non-coherent detectionscheme in asynchronous multi-user environments.展开更多
This paper presents a cascaded Hidden Markov Model (HMM), which allows state's transition, skip and duration. The cascaded HMM extends the way of HMM pattern description of Handwritten Chinese Character (HCC) and...This paper presents a cascaded Hidden Markov Model (HMM), which allows state's transition, skip and duration. The cascaded HMM extends the way of HMM pattern description of Handwritten Chinese Character (HCC) and depicts the behavior of handwritten curve more reliably in terms of the statistic probability. Hence character segmentation and labeling are unnecessary. Viterbi algorithm is integrated in the cascaded HMM after the whole sample sequence of a HCC is input. More than 26,000 component samples are used tor training 407 handwritten component HMMs. At the improved training stage 94 models of 94 Chinese characters are gained by 32,000 samples, Compared with the Segment HMMs approach, the recognition rate of this model tier the tirst candidate is 87.89% and the error rate could be reduced by 12.4%.展开更多
文摘With abundant wind resources and high pressure imposed on en-vironmental protection, wind power development has a promising future. Butdue to intermittent nature, wind power can bring into full play only if being con-nected into power grid to ensure its supply reliability and continuity, aswell as operational economy. However, technical and market barriers haveprevented wind power from integrating into power grid. To foster wind powerdevelopment, these barriers should be removed by both government incentivepolicies and sophisticated technologies.
文摘Objective: To evaluate the efficiency of an implanted chip system on blood pressure regulation. Methods: The mean arterial pressure (MAP) and heart rate (HR) were recorded in anesthetized rabbits. Based on the set point theory, an implanted chip system was designed to regulate the blood pressure by stimulating the aortic depressor nerve (ADN) according to the feedback of blood pressure. The blood pressure regulation induced by the implanted chip system was carried out twice (lasted for 15 min and 60 min respectively) and the change of MAP and HR during the regulation was compared with the control. Results: There was a significant decrease of MAP during the first regulation ([-32.0 ± 6.6] mmHg) and second regulation ([-27.4 ± 6.2] mmHg) compared with the control (P<0.01). The HR was also significantly decreased during regulation compared with the control. Both MAP and HR returned to the baseline immediately without rebound after the regulation ceased. Conclusion: The implanted chip system can regulate the blood pressure successfully and keep the blood pressure in a lower constant level without adaptation.
基金The National Natural Science Foundation of China(No.71071033)the Innovation Project of Jiangsu Postgraduate Education(No.CX10B_058Z)
文摘The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.
文摘Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed.
文摘In this paper, a novel admission scheme is proposed which provides high degrees of quality of service (QoS) guarantees for multimedia traffic carried in mobile networks. The proposed scheme combines the admission control and bandwidth reservation to guarantee QoS requirements. It considers both local information and remote information to determine whether to accept or reject a connection. In order to embody the characteristics of the algorithms proposed in the article, two traditional algorithms of admission control are used for comparison. In the end of the paper the simulation analyses are given and the results show that the proposed algorithm can adjust the bandwidth according to the current status of networks and decrease the probability of connections forcibly dropped. The most important thing is that the algorithm is based on the multimedia communications and can guarantee the QoS of real time connections through decreasing the bandwidth of non real time connections.
基金The National Natural Science Foundation of China(No.60973122,61572256)
文摘It is difficult to knowall the relations between Snort rules. To deal with this problem, the topological relations between Snort rules are classified based on the set theory, and a method for calculating the topological relations between Snort rules is proposed. In the existing methods for analyzing the relations of Snort rules, the relations are usually determined only according to the header information of the Snort rules. Without considering the actions of Snort rules, the proposed method improves upon the existing methods and it can classify and calculate the topological relations between Snort rules according to both headers and options information of Snort rules. In addition, the proposed method is implemented by the functional language Haskell. The experimental results showthat the topological relations between Snort rules can be calculated rapidly and effectively. The proposed method also provides an important basis for conflict detection in the succeeding Snort rules.
基金Project(51274167)supported by the National Natural Science Foundation of ChinaProject(LQ14E010002)supported by the Zhejiang Provincial Natural Science Foundation of ChinaProject(2E24692)supported by the KIST Institutional Programs,Korea
文摘A semi-empirical interatomic potential formalism,the second-nearest-neighbor modified embedded-atom method(2NN MEAM),has been applied to obtaining interatomic potentials for the Co-W and Al-W binary system using previously developed MEAM potentials of Co,Al and W.The potential parameters were determined by fitting the experimental data on the enthalpy of formation,lattice parameter,melting point and elastic constants.The present potentials generally reproduce the fundamental physical properties of the Co-W and Al-W systems accurately.The lattice parameters,the enthalpy of formation,the thermal stability and the elastic constants match well with experiment and the first-principles results.The enthalpy of mixing and the enthalpy of formation and mixing of liquid are in good agreement with CALPHAD calculations.The potentials can be easily combined with already-developed MEAM potentials for binary cobalt systems and can be used to describe Co-Al-W-based multicomponent alloys,especially for interfacial properties.
基金The National Natural Science Foundation of China(No.61001103)the National Science and Technology Major Project of China (No.2008ZX03003-005)the National Basic Research Program ofChina(973 Program) (No.2007CB310603)
文摘In downlink cellular multiple users in multiple cells systems using beams, the should cooperate to generate beams to improve the spectrum efficiency. A mathematical model for the multi-cell multi-user downlink transmission is established, and the gradients of the variables including beamfonning filters, receiving filters and transmitting power are calculated. Then, a gradient-project-based cooperative beamforming scheme is proposed in which each user iteratively adjusts bearnforming variables in the direction of the gradients and projects onto feasible spaces. The information exchange protocol needed to support the scheme is also described. Simulation results show that the proposed scheme can achieve an average spectral efficiency of about 5 bit/( s · Hz · cell). The results show that cooperative beamforming can improve the spectrum efficiency of the cellular systems.
基金The Higher Education Technology Foundation of Huawei Technologies Co, Ltd (NoYJCB2005016WL)
文摘Due to not requiring channel state information (CSI) at both the transmitter and the receiver, noncoherent ultra-wideband (UWB) incurs a performance penalty of approximately 3 dB in the required signal to noise ratio (SNR) compared to the coherent case. To overcome the gap, an effective differential encoding and decoding scheme for multiband UWB systems is proposed. The proposed scheme employs the parallel concatenation of two recursive differential unitary space-frequency encoders at the transmitter. At the receiver, two component decoders iteratively decode information bits by interchanging soft metric values between each other. To reduce the computation complexity, a decoding algorithm which only uses transition probability to calculate the log likelihood ratios (LLRs) for the decoded bits is given. Simulation results show that the proposed scheme can dramatically outperform the conventional differential and even coherent detection at high SNR with a few iterations.
文摘Aiming at the inaccessible problem of remote embedded devices update and maintenance, this paper presents a method using general packet radio service (GPRS) to achieve update based on the embedded real-time operating system (RTOS) μC/OS-Ⅱ. It introduces architecture of the system first. And then it uses LPC1768 chip as the central processing unit, SIM900A module for data transmission, and SST25VF016B to store the data. To ensure accuracy of the data transmis- sion, cyclic redundancy code (CRC) is adopted. The software uses fixed bootstrap and mutable update program, and thus the embedded devices can still normally start in case of update failure. Finally, high stability and extensive adaptability of the system are verified by experimental data.
基金Pre-Research Project of the National Natural Science Foundation of China supported by Southeast University ( NoXJ0605227)
文摘A system of number recognition with a graphic user interface (GUI) is implemented on the embedded development platform by using the fuzzy pattern recognition method. An application interface (API) of uC/ OS-Ⅱ is used to implement the features of multi-task concurrency and the communications among tasks. Handwriting function is implemented by the improvement of the interface provided by the platform. Fuzzy pattern recognition technology based on fuzzy theory is used to analyze the input of handwriting. A primary system for testing is implemented. It can receive and analyze user inputs from both keyboard and touch-screen. The experimental results show that the embedded fuzzy recognition system which uses the technology which integrates two ways of fuzzy recognition can retain a high recognition rate and reduce hardware requirements.
文摘In order to solve the problems of mining monitor and control systems during the construction process of digital mining combined with network and embedded technologies, the kernel access equipment of a mining monitor and control system was proposed and designed. It is the architecture of a mining embedded network multifunctional substation. This paper presents the design of hardware and software of the substation in detail. Finally, the system’s ef- ficiency was validated through experimentation.
基金Project supported by the Key Program of the National NaturalScience Foundation of China (No. 60434020)the National Natural Science Foundation of China (No. 60604003)
文摘Based on input-output approach, the robust stability and stabilization problems for uncertain singular systems with time-varying delays are investigated. The parameter uncertainties are assumed to be norm-bounded and the time-varying delays include both discrete delay and distributed delay. By introducing a new input-output model, the time-delay system is embedded in a family of systems with a forward system without time delay and a dynamical feedback uncertainty. A sufficient and necessary condition, which guarantees the system regular, impulse-free and stable for all admissible uncertainties, is obtained. Based on the strict linear matrix inequality, the desired robust state feedback controller is also obtained. Finally, a numerical example is provided to demonstrate the application of the proposed method.
文摘In this paper, the problem of adaptive tracking control for a class of nonlinear large scale systems with unknown parameters entering linearly is discussed. Based on the theory of input output linearization of nonlinear systems, direct adaptive control schemes are presented to achieve bounded tracking. The proposed control schemes are robust with respect to the uncertainties in interconnection structure as well as subsystem dynamics. A numerical example is given to illustrate the efficiency of this method.
基金Project (No. 2003AA1Z2120) supported by the Hi-Tech Researchand Development Program (863) of China
文摘The mass of the embedded systems are driven by second batteries, not by wired power supply. So saving energy is one of the main design goals for embedded system. In this paper we present a new technique for modelling and solving the dynamic power management (DPM) problem for embedded systems with complex behavioural characteristics. First we model a power-managed embedded computing system as a controllable Flow Chart. Then we use the Poisson process for optimisation, and give the power management algorithm by the help of Dynamic Voltage Scaling (DVS) technology. At last we built the experi- mental model using the PXA 255 Processors. The experimental results showed that the proposed technique can achieve more than 12% power saving compared to other existing DPM techniques.
基金the National High Technology Research and Development Programme of China(No2003AA12331006)the National Natural Science Foundation Of China(No60502010)
文摘A novel non-coherent detection scheme for differential frequency hopping(DFH)system is proposedin asynchronous multi-user environments over Rayleigh-fading channels.The synchronous and asyn-chronous multi-user performances of DFH with the conventional detection scheme and this novel detectionscheme are analyzed,respectively.The performance results are validated with simulation.The results ofanalyses and simulations prove two conclusions.Firstly,the performance of asynchronous multi-user DFHsystem overcomes that of synchronous multi-user DFH system over Rayleigh-fading channel.Secondly,the novel detection scheme can achieve better performance than the conventional non-coherent detectionscheme in asynchronous multi-user environments.
文摘This paper presents a cascaded Hidden Markov Model (HMM), which allows state's transition, skip and duration. The cascaded HMM extends the way of HMM pattern description of Handwritten Chinese Character (HCC) and depicts the behavior of handwritten curve more reliably in terms of the statistic probability. Hence character segmentation and labeling are unnecessary. Viterbi algorithm is integrated in the cascaded HMM after the whole sample sequence of a HCC is input. More than 26,000 component samples are used tor training 407 handwritten component HMMs. At the improved training stage 94 models of 94 Chinese characters are gained by 32,000 samples, Compared with the Segment HMMs approach, the recognition rate of this model tier the tirst candidate is 87.89% and the error rate could be reduced by 12.4%.