The cold chain in the production area of fruits and vegetables is the primary link to reduce product loss and improve product quality,but it is also a weak link.With the application of big data technology in cold chai...The cold chain in the production area of fruits and vegetables is the primary link to reduce product loss and improve product quality,but it is also a weak link.With the application of big data technology in cold chain logistics,intelligent devices,and technologies have become important carriers for improving the efficiency of cold chain logistics in fruit and vegetable production areas,extending the shelf life of fruits and vegetables,and reducing fruit and vegetable losses.They have many advantages in fruit and vegetable pre-cooling,sorting and packaging,testing,warehousing,transportation,and other aspects.This article summarizes the rapidly developing and widely used intelligent technologies at home and abroad in recent years,including automated guided vehicle intelligent handling based on electromagnetic or optical technology,intelligent sorting based on sensors,electronic optics,and other technologies,intelligent detection based on computer vision technology,intelligent transportation based on perspective imaging technology,etc.It analyses and studies the innovative research and achievements of various scholars in applying intelligent technology in fruit and vegetable cold chain storage,sorting,detection,transportation,and other links,and improves the efficiency of fruit and vegetable cold chain logistics.However,applying intelligent technology in fruit and vegetable cold chain logistics also faces many problems.The challenges of high cost,difficulty in technological integration,and talent shortages have limited the development of intelligent technology in the field of fruit and vegetable cold chains.To solve the current problems,it is proposed that costs be controlled through independent research and development,technological innovation,and other means to lower the entry threshold for small enterprises.Strengthen integrating intelligent technology and cold chain logistics systems to improve data security and system compatibility.At the same time,the government should introduce relevant policies,provide necessary financial support,and establish talent training mechanisms.Accelerate the development and improvement of intelligent technology standards in the field of cold chain logistics.Through technological innovation,cost control,talent cultivation,and policy guidance,we aim to promote the upgrading of the agricultural industry and provide ideas for improving the quality and efficiency of fruit and vegetable cold chain logistics.展开更多
To ensure revulsive driving of intelligent vehicles at intersections, a method is presented to detect and recognize the traffic lights. First, the stabling siding at intersections is detected by applying Hough transfo...To ensure revulsive driving of intelligent vehicles at intersections, a method is presented to detect and recognize the traffic lights. First, the stabling siding at intersections is detected by applying Hough transformation. Then, the colors of traffic lights are detected with color space transformation. Finally, self-associative memory is used to recognize the countdown characters of the traffic lights. Test results at 20 real intersections show that the ratio of correct stabling siding recognition reaches up to 90%;and the ratios of recognition of traffic lights and divided characters are 85% and 97%, respectively. The research proves that the method is efficient for the detection of stabling siding and is robust enough to recognize the characters from images with noise and broken edges.展开更多
In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge...In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge is introduced into the past tense operator, and then a new temporal epistemic logic LTLKP is obtained, so that LTLKP can naturally and precisely describe the system's reliability. Secondly, a set of prior algorithms are designed to calculate the maximal reachable depth and the length of the longest of loop free paths in the structure based on the graph structure theory. Finally, some theorems are proposed to show how to approximate the complete threshold with the diameter and recurrence diameter. The proposed work resolves the completeness threshold problem so that the completeness of bounded model checking can be guaranteed.展开更多
AIM:To validate high definition endoscopes with Fujinon intelligent chromoendoscopy(FICE) in colonoscopy.METHODS:The image quality of normal white light endoscopy(WLE),that of the 10 available FICE filters and that of...AIM:To validate high definition endoscopes with Fujinon intelligent chromoendoscopy(FICE) in colonoscopy.METHODS:The image quality of normal white light endoscopy(WLE),that of the 10 available FICE filters and that of a gold standard(0.2% indigo carmine dye) were compared.RESULTS:FICE-filter 4 [red,green,and blue(RGB) wavelengths of 520,500,and 405 nm,respectively] provided the best images for evaluating the vascular pattern compared to white light.The mucosal surface was best assessed using filter 4.However,the views obtained were not rated significantly better than those observed with white light.The "gold standard",indigo carmine(IC) dye,was found to be superior to both white light and filter 4.Filter 6(RGB wavelengths of 580,520,and 460 nm,respectively) allowed for exploration of the IC-stained mucosa.When assessing mucosal polyps,both FICE with magnification,and magnification following dye spraying were superior to the same techniques without magnification and to white light imaging.In the presence of suboptimal bowel preparation,observation with the FICE mode was possible,and endoscopists considered it to be superior to observation with white light.CONCLUSION:FICE-filter 4 with magnification improves the image quality of the colonic vascular patterns obtained with WLE.展开更多
A series of water absorption tests on dried soft rock have been conducted by the intelligent testing system for water absorption tests in deep soft rock, including tests of water absorption with and without pres- sure...A series of water absorption tests on dried soft rock have been conducted by the intelligent testing system for water absorption tests in deep soft rock, including tests of water absorption with and without pres- sure. The results show that the water absorbing capacity of rock with a certain pressure is larger than that of rock without pressure: however, the relationship between the water absorbing percentage and the time can be expressed by w(t) = a(l - e^-bt). In hi-logarithmic coordinates, the hydrophilic relationship with time in tests with pressure could be characterized by linearity, while they present concave or convex in tests without pressure. Based on the hypothesis that each influential factor is irrelevant and they have a linear correlation with the water absorbing capacity, we calculated the weight coefficient of each factor according to experimental results under different conditions. The calculations demonstrate that the effec- tive porosity, content of smectite and kaolinite are all positively correlated with the water absorption capacity of rock; meanwhile, the fractal dimension of the effective pores presents a negative correlation with the water absorption capacity of rock. The water absorption capacity with pressure increases with increasing illite, chlorite and chlorite/smectite formation and a decrease in illite/smectite formation and the fractal dimension of the effective pores, while it is opposite in tests without pressure. The weight coefficient of smectite is smallest among positive factors, and the fractal dimension of the effective pores is the smallest amongst the negative factors.展开更多
The paper puts forward a variance-time plots method based on slide-window mechanism tocalculate the Hurst parameter to detect Distribute Denial of Service(DDoS)attack in real time.Basedon fuzzy logic technology that c...The paper puts forward a variance-time plots method based on slide-window mechanism tocalculate the Hurst parameter to detect Distribute Denial of Service(DDoS)attack in real time.Basedon fuzzy logic technology that can adjust itself dynamically under the fuzzy rules,an intelligent DDoSjudgment mechanism is designed.This new method calculates the Hurst parameter quickly and detectsDDoS attack in real time.Through comparing the detecting technologies based on statistics andfeature-packet respectively under different experiments,it is found that the new method can identifythe change of the Hurst parameter resulting from DDoS attack traffic with different intensities,andintelligently judge DDoS attack self-adaptively in real time.展开更多
In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artif...In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artificial immune system, in which static malware analysis and dynamic malware analysis techniques are combined, and antigens are generated by encoding the characteristics extracted from the malware. Based on negative selection algorithm, the mature detectors are generated. By introducing clonal selection algorithm, the detectors with higher affinity are selected to undergo a proliferation and somatic hyper-mutation process, so that more excellent detector offspring can be generated. Experimental result shows that the detection model has a higher detection rate for unknown smartphone malware, and better detection performance can be achieved by increasing the clone generation.展开更多
An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circu...An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circuit and dial switch. The hardware structure and software flow chart of the system are described in details in this paper. The robot is driven by rear wheel motors, and the real-time position of the robot is determined by the ground information collected by infrared sensors. The heading direction of robot is adjusted by steering engine installed in front wheel, and the open angle of manipulator is controlled by the other steering engine which can ensure the robot moving chessmen accurately and quickly during the moving process. The test shows that the kind of intelligent chess robot can complete the task in a fast and accurate way.展开更多
In wireless communication environment, the time-varying channel and angular spreads caused by multipath fading and the mobility of Mobile Stations (MS) degrade the performance of the conventional Direction-Of-Arrival ...In wireless communication environment, the time-varying channel and angular spreads caused by multipath fading and the mobility of Mobile Stations (MS) degrade the performance of the conventional Direction-Of-Arrival (DOA) tracking algorithms. On the other hand, although the DOA estimation methods based on the Maximum Likelihood (ML) principle have higher resolution than the beamforming and the subspace based methods, prohibitively heavy computation limits their practical applications. This letter first proposes a new suboptimal DOA estimation algorithm that combines the advantages of the lower complexity of subspace algorithm and the high accuracy of ML based algo- rithms, and then proposes a Kalman filtering based tracking algorithm to model the dynamic property of directional changes for mobile terminals in such a way that the association between the estimates made at different time points is maintained. At each stage during tracking process, the current suboptimal estimates of DOA are treated as measurements, predicted and updated via a Kalman state equation, hence adaptive tracking of moving MS can be carried out without the need to perform unduly heavy computations. Computer simulation results show that this proposed algorithm has better per- formance of DOA estimation and tracking of MS than the conventional ML or subspace based algo- rithms in terms of accuracy and robustness.展开更多
The intelligent environment needs Human-Computer Interactive technology (HCI) and a projector projects screen on wall in the intelligent environments. We propose the front-face detection from four captured images re...The intelligent environment needs Human-Computer Interactive technology (HCI) and a projector projects screen on wall in the intelligent environments. We propose the front-face detection from four captured images related to the intelligent room for the deaf. Our proposal purpose is that a deaf user faces wall displaying everywhere. system gets the images from four cameras, and detects the user region from a silhouette image using a different method, detects and cuts a motion body region from a different image, and cuts the vertexchest region from the cut body region image. The system attempts to find front-face using Haar-like feature, and selects a detected front-face image from the vertex-chest region. We estimate the front-face detection of recognition rate, which shows somewhat successfully.展开更多
Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine ...Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine consisting of six parts: decompile, grammar parsing, control flow and data flow analysis, safety analysis, and comprehensive evaluation. In the comprehensive evaluation, we obtain a weight vector of 29 evaluation indexes using the analytic hierarchy process. During this process, the detection engine exports a list of suspicious API. On the basis of this list, the evaluation part of the engine performs a compre- hensive evaluation of the hazard assessment of software sample. Finally, hazard classification is given for the software. The false positive rate of our approach for detecting rnalware samples is 4. 7% and normal samples is 7.6%. The experimental results show that the accuracy rate of our approach is almost similar to the method based on virus signatures. Compared with the method based on virus signatures, our approach performs well in detecting unknown malware. This approach is promising for the application of malware detection.展开更多
Vehicular Ad Hoc Network (VANET) has emerged as a new wireless network for vehicular communications. To provide a flexible and high reliable communication service in VANET, vehicles are clustered to construct many s...Vehicular Ad Hoc Network (VANET) has emerged as a new wireless network for vehicular communications. To provide a flexible and high reliable communication service in VANET, vehicles are clustered to construct many small networks (clusters) so that channel interferences and flooding messages can be limited. This research presents a novel Multi-Resolution Relative Speed Detection (MRSD) model to improve the clustering algorithm in VANET without using Global Positioning System (GPS). MRSD uses the Moving Average Convergence Divergence (MACD), the Momentum of Received Signal Strength (MRSS), and Artificial Neural Networks (ANNs) to estimate the motion state and the relative speed of a vehicle based purely on Received Signal Strength. The proposed MRSD model is accurate with the assistance of the intelligent classification, and incurs less overhead in the cluster head election than that of other algorithms.展开更多
An integrated implementation framework of an intelligent recommendation system for outdoor video advertising is proposed, which is based on the analysis of audiences' characteristics. Firstly, the images of the scene...An integrated implementation framework of an intelligent recommendation system for outdoor video advertising is proposed, which is based on the analysis of audiences' characteristics. Firstly, the images of the scene and the people who view the video advertisements are captured by the net- work camera deployed on the video advertising terminal side. Then audiences' characteristics can be obtained by applying computer vision technologies : face detection, face tracking, gender recogni- tion and age estimation. Finally, an intelligent recommendation algorithm is designed to decide the most fitting video ads for each terminal according to multi-dimensional statistical information of its reover, a novel face detection method and a new face tracking method have been proposed to meet the practical requirements of the system, of which the average Fl-score is O. 988 and 0. 951 respec- tively.展开更多
An intelligent camera for surface defect inspection is presented which can pre-process the surface image of a rolled strip and pick defective areas out at a spead of 1 600 meters per minute. The camera is made up of a...An intelligent camera for surface defect inspection is presented which can pre-process the surface image of a rolled strip and pick defective areas out at a spead of 1 600 meters per minute. The camera is made up of a high speed line CCD, a 60 Mb/s CCD digitizer with correlated double sampling function, and a field programmable gate array(FPGA), which can quickly distinguish defective areas using a perceptron embedded in FPGA thus the data to be further processed would dramatically be reduced. Some experiments show that the camera can meet high producing speed, and reduce cost and complexity of automation surface inspection systems.展开更多
While vehicle detection on highways has been reported before, to the best of our knowledge, intelligent monitoring system that aims at detecting hydraulic excavators and dump trucks on state-owned land has not been ex...While vehicle detection on highways has been reported before, to the best of our knowledge, intelligent monitoring system that aims at detecting hydraulic excavators and dump trucks on state-owned land has not been explored thoroughly yet. In this paper, we present an automatic, video-based algorithm for detecting hydraulic excavators and dump trucks. Derived from lessons learned from video processing, we proposed methods for foreground detection based on an improved frame difference algorithm, and then detected hydraulic excavators and dump trucks in the respective region of interest. From our analysis, we proposed methods based on inverse valley feature of mechanical arm and spatial-temporal reasoning for hydraulic excavator detection. In addition, we explored dump truck detection strategies that combine structured component projection with the spatial relationship. Experiments on real-monitoring sites demonstrated the promising performance of our system.展开更多
基金National Natural Science Foundation of China(32301718)Chinese Academy of Agricultural Sciences under the Special Institute-level Coordination Project for Basic Research Operating Costs(S202328)。
文摘The cold chain in the production area of fruits and vegetables is the primary link to reduce product loss and improve product quality,but it is also a weak link.With the application of big data technology in cold chain logistics,intelligent devices,and technologies have become important carriers for improving the efficiency of cold chain logistics in fruit and vegetable production areas,extending the shelf life of fruits and vegetables,and reducing fruit and vegetable losses.They have many advantages in fruit and vegetable pre-cooling,sorting and packaging,testing,warehousing,transportation,and other aspects.This article summarizes the rapidly developing and widely used intelligent technologies at home and abroad in recent years,including automated guided vehicle intelligent handling based on electromagnetic or optical technology,intelligent sorting based on sensors,electronic optics,and other technologies,intelligent detection based on computer vision technology,intelligent transportation based on perspective imaging technology,etc.It analyses and studies the innovative research and achievements of various scholars in applying intelligent technology in fruit and vegetable cold chain storage,sorting,detection,transportation,and other links,and improves the efficiency of fruit and vegetable cold chain logistics.However,applying intelligent technology in fruit and vegetable cold chain logistics also faces many problems.The challenges of high cost,difficulty in technological integration,and talent shortages have limited the development of intelligent technology in the field of fruit and vegetable cold chains.To solve the current problems,it is proposed that costs be controlled through independent research and development,technological innovation,and other means to lower the entry threshold for small enterprises.Strengthen integrating intelligent technology and cold chain logistics systems to improve data security and system compatibility.At the same time,the government should introduce relevant policies,provide necessary financial support,and establish talent training mechanisms.Accelerate the development and improvement of intelligent technology standards in the field of cold chain logistics.Through technological innovation,cost control,talent cultivation,and policy guidance,we aim to promote the upgrading of the agricultural industry and provide ideas for improving the quality and efficiency of fruit and vegetable cold chain logistics.
基金The Cultivation Fund of the Key Scientific and Technical Innovation Project of Higher Education of Ministry of Education (No.705020)
文摘To ensure revulsive driving of intelligent vehicles at intersections, a method is presented to detect and recognize the traffic lights. First, the stabling siding at intersections is detected by applying Hough transformation. Then, the colors of traffic lights are detected with color space transformation. Finally, self-associative memory is used to recognize the countdown characters of the traffic lights. Test results at 20 real intersections show that the ratio of correct stabling siding recognition reaches up to 90%;and the ratios of recognition of traffic lights and divided characters are 85% and 97%, respectively. The research proves that the method is efficient for the detection of stabling siding and is robust enough to recognize the characters from images with noise and broken edges.
基金The National Natural Science Foundation of China (No.10974093)the Scientific Research Foundation for Senior Personnel of Jiangsu University (No.07JDG014)the Natural Science Foundation of Higher Education Institutions of Jiangsu Province (No.08KJD520015)
文摘In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge is introduced into the past tense operator, and then a new temporal epistemic logic LTLKP is obtained, so that LTLKP can naturally and precisely describe the system's reliability. Secondly, a set of prior algorithms are designed to calculate the maximal reachable depth and the length of the longest of loop free paths in the structure based on the graph structure theory. Finally, some theorems are proposed to show how to approximate the complete threshold with the diameter and recurrence diameter. The proposed work resolves the completeness threshold problem so that the completeness of bounded model checking can be guaranteed.
基金Supported by Consejería de Educación,Cultura y Deportes,Gobierno de Canarias PI2002/138,the Instituto de Salud Carlos III C03/02
文摘AIM:To validate high definition endoscopes with Fujinon intelligent chromoendoscopy(FICE) in colonoscopy.METHODS:The image quality of normal white light endoscopy(WLE),that of the 10 available FICE filters and that of a gold standard(0.2% indigo carmine dye) were compared.RESULTS:FICE-filter 4 [red,green,and blue(RGB) wavelengths of 520,500,and 405 nm,respectively] provided the best images for evaluating the vascular pattern compared to white light.The mucosal surface was best assessed using filter 4.However,the views obtained were not rated significantly better than those observed with white light.The "gold standard",indigo carmine(IC) dye,was found to be superior to both white light and filter 4.Filter 6(RGB wavelengths of 580,520,and 460 nm,respectively) allowed for exploration of the IC-stained mucosa.When assessing mucosal polyps,both FICE with magnification,and magnification following dye spraying were superior to the same techniques without magnification and to white light imaging.In the presence of suboptimal bowel preparation,observation with the FICE mode was possible,and endoscopists considered it to be superior to observation with white light.CONCLUSION:FICE-filter 4 with magnification improves the image quality of the colonic vascular patterns obtained with WLE.
文摘A series of water absorption tests on dried soft rock have been conducted by the intelligent testing system for water absorption tests in deep soft rock, including tests of water absorption with and without pres- sure. The results show that the water absorbing capacity of rock with a certain pressure is larger than that of rock without pressure: however, the relationship between the water absorbing percentage and the time can be expressed by w(t) = a(l - e^-bt). In hi-logarithmic coordinates, the hydrophilic relationship with time in tests with pressure could be characterized by linearity, while they present concave or convex in tests without pressure. Based on the hypothesis that each influential factor is irrelevant and they have a linear correlation with the water absorbing capacity, we calculated the weight coefficient of each factor according to experimental results under different conditions. The calculations demonstrate that the effec- tive porosity, content of smectite and kaolinite are all positively correlated with the water absorption capacity of rock; meanwhile, the fractal dimension of the effective pores presents a negative correlation with the water absorption capacity of rock. The water absorption capacity with pressure increases with increasing illite, chlorite and chlorite/smectite formation and a decrease in illite/smectite formation and the fractal dimension of the effective pores, while it is opposite in tests without pressure. The weight coefficient of smectite is smallest among positive factors, and the fractal dimension of the effective pores is the smallest amongst the negative factors.
基金the Six Heights of Talent in Jiangsu Prov-ince(No.06-E-044).
文摘The paper puts forward a variance-time plots method based on slide-window mechanism tocalculate the Hurst parameter to detect Distribute Denial of Service(DDoS)attack in real time.Basedon fuzzy logic technology that can adjust itself dynamically under the fuzzy rules,an intelligent DDoSjudgment mechanism is designed.This new method calculates the Hurst parameter quickly and detectsDDoS attack in real time.Through comparing the detecting technologies based on statistics andfeature-packet respectively under different experiments,it is found that the new method can identifythe change of the Hurst parameter resulting from DDoS attack traffic with different intensities,andintelligently judge DDoS attack self-adaptively in real time.
基金This work was supported in part by National Natural Science Foundation of China under Grants No.61101108,National S&T Major Program under Grants No.2011ZX03002-005-01
文摘In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artificial immune system, in which static malware analysis and dynamic malware analysis techniques are combined, and antigens are generated by encoding the characteristics extracted from the malware. Based on negative selection algorithm, the mature detectors are generated. By introducing clonal selection algorithm, the detectors with higher affinity are selected to undergo a proliferation and somatic hyper-mutation process, so that more excellent detector offspring can be generated. Experimental result shows that the detection model has a higher detection rate for unknown smartphone malware, and better detection performance can be achieved by increasing the clone generation.
文摘An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circuit and dial switch. The hardware structure and software flow chart of the system are described in details in this paper. The robot is driven by rear wheel motors, and the real-time position of the robot is determined by the ground information collected by infrared sensors. The heading direction of robot is adjusted by steering engine installed in front wheel, and the open angle of manipulator is controlled by the other steering engine which can ensure the robot moving chessmen accurately and quickly during the moving process. The test shows that the kind of intelligent chess robot can complete the task in a fast and accurate way.
文摘In wireless communication environment, the time-varying channel and angular spreads caused by multipath fading and the mobility of Mobile Stations (MS) degrade the performance of the conventional Direction-Of-Arrival (DOA) tracking algorithms. On the other hand, although the DOA estimation methods based on the Maximum Likelihood (ML) principle have higher resolution than the beamforming and the subspace based methods, prohibitively heavy computation limits their practical applications. This letter first proposes a new suboptimal DOA estimation algorithm that combines the advantages of the lower complexity of subspace algorithm and the high accuracy of ML based algo- rithms, and then proposes a Kalman filtering based tracking algorithm to model the dynamic property of directional changes for mobile terminals in such a way that the association between the estimates made at different time points is maintained. At each stage during tracking process, the current suboptimal estimates of DOA are treated as measurements, predicted and updated via a Kalman state equation, hence adaptive tracking of moving MS can be carried out without the need to perform unduly heavy computations. Computer simulation results show that this proposed algorithm has better per- formance of DOA estimation and tracking of MS than the conventional ML or subspace based algo- rithms in terms of accuracy and robustness.
基金supported by the Ministry of Knowledge Economy,Korea,the ITRC(Information Technology Research Center)support program(NIA-2009-(C1090-0902-0007))the Contents Technology Research Center support program
文摘The intelligent environment needs Human-Computer Interactive technology (HCI) and a projector projects screen on wall in the intelligent environments. We propose the front-face detection from four captured images related to the intelligent room for the deaf. Our proposal purpose is that a deaf user faces wall displaying everywhere. system gets the images from four cameras, and detects the user region from a silhouette image using a different method, detects and cuts a motion body region from a different image, and cuts the vertexchest region from the cut body region image. The system attempts to find front-face using Haar-like feature, and selects a detected front-face image from the vertex-chest region. We estimate the front-face detection of recognition rate, which shows somewhat successfully.
基金supported by Major National Science and Technology Projects(No.3) under Grant No. 2012ZX03002012
文摘Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine consisting of six parts: decompile, grammar parsing, control flow and data flow analysis, safety analysis, and comprehensive evaluation. In the comprehensive evaluation, we obtain a weight vector of 29 evaluation indexes using the analytic hierarchy process. During this process, the detection engine exports a list of suspicious API. On the basis of this list, the evaluation part of the engine performs a compre- hensive evaluation of the hazard assessment of software sample. Finally, hazard classification is given for the software. The false positive rate of our approach for detecting rnalware samples is 4. 7% and normal samples is 7.6%. The experimental results show that the accuracy rate of our approach is almost similar to the method based on virus signatures. Compared with the method based on virus signatures, our approach performs well in detecting unknown malware. This approach is promising for the application of malware detection.
文摘Vehicular Ad Hoc Network (VANET) has emerged as a new wireless network for vehicular communications. To provide a flexible and high reliable communication service in VANET, vehicles are clustered to construct many small networks (clusters) so that channel interferences and flooding messages can be limited. This research presents a novel Multi-Resolution Relative Speed Detection (MRSD) model to improve the clustering algorithm in VANET without using Global Positioning System (GPS). MRSD uses the Moving Average Convergence Divergence (MACD), the Momentum of Received Signal Strength (MRSS), and Artificial Neural Networks (ANNs) to estimate the motion state and the relative speed of a vehicle based purely on Received Signal Strength. The proposed MRSD model is accurate with the assistance of the intelligent classification, and incurs less overhead in the cluster head election than that of other algorithms.
基金Supported by the National High Technology Research and Development Program of China(No.2011AA01A102)the Important Science&Technology Project of Hainan Province(No.JDJS2013006,ZDXM2015103)the Young Talent Frontier Project of Institute of Acoustics,Chinese Academy of Sciences
文摘An integrated implementation framework of an intelligent recommendation system for outdoor video advertising is proposed, which is based on the analysis of audiences' characteristics. Firstly, the images of the scene and the people who view the video advertisements are captured by the net- work camera deployed on the video advertising terminal side. Then audiences' characteristics can be obtained by applying computer vision technologies : face detection, face tracking, gender recogni- tion and age estimation. Finally, an intelligent recommendation algorithm is designed to decide the most fitting video ads for each terminal according to multi-dimensional statistical information of its reover, a novel face detection method and a new face tracking method have been proposed to meet the practical requirements of the system, of which the average Fl-score is O. 988 and 0. 951 respec- tively.
文摘An intelligent camera for surface defect inspection is presented which can pre-process the surface image of a rolled strip and pick defective areas out at a spead of 1 600 meters per minute. The camera is made up of a high speed line CCD, a 60 Mb/s CCD digitizer with correlated double sampling function, and a field programmable gate array(FPGA), which can quickly distinguish defective areas using a perceptron embedded in FPGA thus the data to be further processed would dramatically be reduced. Some experiments show that the camera can meet high producing speed, and reduce cost and complexity of automation surface inspection systems.
文摘While vehicle detection on highways has been reported before, to the best of our knowledge, intelligent monitoring system that aims at detecting hydraulic excavators and dump trucks on state-owned land has not been explored thoroughly yet. In this paper, we present an automatic, video-based algorithm for detecting hydraulic excavators and dump trucks. Derived from lessons learned from video processing, we proposed methods for foreground detection based on an improved frame difference algorithm, and then detected hydraulic excavators and dump trucks in the respective region of interest. From our analysis, we proposed methods based on inverse valley feature of mechanical arm and spatial-temporal reasoning for hydraulic excavator detection. In addition, we explored dump truck detection strategies that combine structured component projection with the spatial relationship. Experiments on real-monitoring sites demonstrated the promising performance of our system.