The cold chain in the production area of fruits and vegetables is the primary link to reduce product loss and improve product quality,but it is also a weak link.With the application of big data technology in cold chai...The cold chain in the production area of fruits and vegetables is the primary link to reduce product loss and improve product quality,but it is also a weak link.With the application of big data technology in cold chain logistics,intelligent devices,and technologies have become important carriers for improving the efficiency of cold chain logistics in fruit and vegetable production areas,extending the shelf life of fruits and vegetables,and reducing fruit and vegetable losses.They have many advantages in fruit and vegetable pre-cooling,sorting and packaging,testing,warehousing,transportation,and other aspects.This article summarizes the rapidly developing and widely used intelligent technologies at home and abroad in recent years,including automated guided vehicle intelligent handling based on electromagnetic or optical technology,intelligent sorting based on sensors,electronic optics,and other technologies,intelligent detection based on computer vision technology,intelligent transportation based on perspective imaging technology,etc.It analyses and studies the innovative research and achievements of various scholars in applying intelligent technology in fruit and vegetable cold chain storage,sorting,detection,transportation,and other links,and improves the efficiency of fruit and vegetable cold chain logistics.However,applying intelligent technology in fruit and vegetable cold chain logistics also faces many problems.The challenges of high cost,difficulty in technological integration,and talent shortages have limited the development of intelligent technology in the field of fruit and vegetable cold chains.To solve the current problems,it is proposed that costs be controlled through independent research and development,technological innovation,and other means to lower the entry threshold for small enterprises.Strengthen integrating intelligent technology and cold chain logistics systems to improve data security and system compatibility.At the same time,the government should introduce relevant policies,provide necessary financial support,and establish talent training mechanisms.Accelerate the development and improvement of intelligent technology standards in the field of cold chain logistics.Through technological innovation,cost control,talent cultivation,and policy guidance,we aim to promote the upgrading of the agricultural industry and provide ideas for improving the quality and efficiency of fruit and vegetable cold chain logistics.展开更多
An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circu...An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circuit and dial switch. The hardware structure and software flow chart of the system are described in details in this paper. The robot is driven by rear wheel motors, and the real-time position of the robot is determined by the ground information collected by infrared sensors. The heading direction of robot is adjusted by steering engine installed in front wheel, and the open angle of manipulator is controlled by the other steering engine which can ensure the robot moving chessmen accurately and quickly during the moving process. The test shows that the kind of intelligent chess robot can complete the task in a fast and accurate way.展开更多
Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine ...Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine consisting of six parts: decompile, grammar parsing, control flow and data flow analysis, safety analysis, and comprehensive evaluation. In the comprehensive evaluation, we obtain a weight vector of 29 evaluation indexes using the analytic hierarchy process. During this process, the detection engine exports a list of suspicious API. On the basis of this list, the evaluation part of the engine performs a compre- hensive evaluation of the hazard assessment of software sample. Finally, hazard classification is given for the software. The false positive rate of our approach for detecting rnalware samples is 4. 7% and normal samples is 7.6%. The experimental results show that the accuracy rate of our approach is almost similar to the method based on virus signatures. Compared with the method based on virus signatures, our approach performs well in detecting unknown malware. This approach is promising for the application of malware detection.展开更多
In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artif...In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artificial immune system, in which static malware analysis and dynamic malware analysis techniques are combined, and antigens are generated by encoding the characteristics extracted from the malware. Based on negative selection algorithm, the mature detectors are generated. By introducing clonal selection algorithm, the detectors with higher affinity are selected to undergo a proliferation and somatic hyper-mutation process, so that more excellent detector offspring can be generated. Experimental result shows that the detection model has a higher detection rate for unknown smartphone malware, and better detection performance can be achieved by increasing the clone generation.展开更多
This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment ...This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment is apt to result in notable service isomorphs. And moreover, as the environment cannot assure the stability of network communication and device services, the situation gets worse. Therefore, it becomes urgent to simplify user operations and let them take full and highly efficient advantage of the environments. Super-Service-Odented Architecture (SSOA) is an Serrice-Otiented Architecture (SOA)-based architecture for service management and organization in peryasive environments. With combining one kind of isomorphic services into a super service, SSOA provides better scalability and quick, convenient service invocations. Also, the complexity and instability of services, and network types are transparent, and system performance is highly promoted under the architecture.展开更多
An intelligent camera for surface defect inspection is presented which can pre-process the surface image of a rolled strip and pick defective areas out at a spead of 1 600 meters per minute. The camera is made up of a...An intelligent camera for surface defect inspection is presented which can pre-process the surface image of a rolled strip and pick defective areas out at a spead of 1 600 meters per minute. The camera is made up of a high speed line CCD, a 60 Mb/s CCD digitizer with correlated double sampling function, and a field programmable gate array(FPGA), which can quickly distinguish defective areas using a perceptron embedded in FPGA thus the data to be further processed would dramatically be reduced. Some experiments show that the camera can meet high producing speed, and reduce cost and complexity of automation surface inspection systems.展开更多
The detection performance is evaluated for our proposed analog multiuser receiver in Ultra-WideBand (UWB) transmitted-reference system. In the presence of dense multipath and multi-access signals,the performance analy...The detection performance is evaluated for our proposed analog multiuser receiver in Ultra-WideBand (UWB) transmitted-reference system. In the presence of dense multipath and multi-access signals,the performance analysis is difficult due to the complicated waveform of received impulse. We develop an approach to analyze the steady-state Signal-to-Interference-plus-Noise (SINR) of the detector output. The multipath-spread impulse is fitted to an exponentially decaying profile in the analysis. A closed-form expression of steady-state SINR is further deduced for the proposed Least Minimum Square (LMS) detector. The analysis is validated by simulations in Line-Of-Sight (LOS) and Non-Line-Of-Sight (NLOS) channel respectively. Based on the theoretical results,the multipath delay spread is employed to determine the optimal width of the integration window of the detector.展开更多
A support vector machine (SVM) based multiuser detection (MUD) scheme in code-division multi- ple-access (CDMA) system is proposed. In this scheme, the equivalent support vector (SV) is obtained through a kern...A support vector machine (SVM) based multiuser detection (MUD) scheme in code-division multi- ple-access (CDMA) system is proposed. In this scheme, the equivalent support vector (SV) is obtained through a kernel sparsity approximation algorithm, which avoids the conventional costly quadratic pro-gramming (QP) procedure in SVM. Besides, the coefficient of the SV is attained through the solution to a generalized eigenproblem. Simulation results show that the proposed scheme has almost the same bit er-ror rate (BER) as the standard SVM and is better than minimum mean square error (MMSE) scheme. Meanwhile, it has a low comoutation complexity.展开更多
In this paper, the climbing obstacle capability of the previous special cable inspection robot ( Model Number: XS1T-1) is analyzed. Static equations are established to analyze the relationships between the external...In this paper, the climbing obstacle capability of the previous special cable inspection robot ( Model Number: XS1T-1) is analyzed. Static equations are established to analyze the relationships between the external forces and the maximum height of an obstacle. Parameters affecting the obstacle crossing ability are obtained. According to the analysis results, an innovated small volume, simple structure and light weight climbing mechanism is proposed (Model Number: XS1T-2). A simplified kinematics model of the mechanism is established. With two powered wheels, the obstacle crossing ability of the XSIT-2 is improved apparently. For the robot moving without deflection, the relationships of two powered input torques are deduced. The comparison of the simulation results clearly shows that the climbing ability of XS1T-2 is obviously improved, and it can meet the demands of inspection.展开更多
The intelligent environment needs Human-Computer Interactive technology (HCI) and a projector projects screen on wall in the intelligent environments. We propose the front-face detection from four captured images re...The intelligent environment needs Human-Computer Interactive technology (HCI) and a projector projects screen on wall in the intelligent environments. We propose the front-face detection from four captured images related to the intelligent room for the deaf. Our proposal purpose is that a deaf user faces wall displaying everywhere. system gets the images from four cameras, and detects the user region from a silhouette image using a different method, detects and cuts a motion body region from a different image, and cuts the vertexchest region from the cut body region image. The system attempts to find front-face using Haar-like feature, and selects a detected front-face image from the vertex-chest region. We estimate the front-face detection of recognition rate, which shows somewhat successfully.展开更多
This paper mainly studies observability and detectability for continuous-time stochastic Markov jump systems.Two concepts called W-observability and W-detectability for such systems are introduced,which are shown to c...This paper mainly studies observability and detectability for continuous-time stochastic Markov jump systems.Two concepts called W-observability and W-detectability for such systems are introduced,which are shown to coincide with various notions of observability and detectability reported recently in literature,such as exact observability,exact detectability and detectability.Besides,by introducing an accumulated energy function,some efficient criteria and interesting properties for both W-observability and W-detectability are obtained.展开更多
Assessing machine's performance through comparing the same or similar machines is important to implement intelligent maintenance for swarm machine.In this paper,an outlier mining based abnormal machine detection a...Assessing machine's performance through comparing the same or similar machines is important to implement intelligent maintenance for swarm machine.In this paper,an outlier mining based abnormal machine detection algorithm is proposed for this purpose.Firstly,the outlier mining based on clustering is introduced and the definition of cluster-based global outlier factor(CBGOF) is presented.Then the modified swarm intelligence clustering(MSIC) algorithm is suggested and the outlier mining algorithm based on MSIC is proposed.The algorithm can not only cluster machines according to their performance but also detect possible abnormal machines.Finally,a comparison of mobile soccer robots' performance proves the algorithm is feasible and effective.展开更多
Auto-focus is very important for capturing sharp human face centered images in digital and smart phone cameras. With the development of image sensor technology, these cameras support more and more highresolution image...Auto-focus is very important for capturing sharp human face centered images in digital and smart phone cameras. With the development of image sensor technology, these cameras support more and more highresolution images to be processed. Currently it is difficult to support fast auto-focus at low power consumption on high-resolution images. This work proposes an efficient architecture for an Ada Boost-based face-priority auto-focus. The architecture supports block-based integral image computation to improve the processing speed on high-resolution images; meanwhile, it is reconfigurable so that it enables the sub-window adaptive cascade classification, which greatly improves the processing speed and reduces power consumption. Experimental results show that 96% detection rate in average and 58 fps(frame per second) detection speed are achieved for the1080p(1920×1080) images. Compared with the state-of-the-art work, the detection speed is greatly improved and power consumption is largely reduced.展开更多
Previous experimental and theoretical studies have demonstrated that a weak signal can be amplified and optimized by the assistance of noise. The response of the system undergoes stochastic resonance(SR) like behavior...Previous experimental and theoretical studies have demonstrated that a weak signal can be amplified and optimized by the assistance of noise. The response of the system undergoes stochastic resonance(SR) like behavior. The underlying mechanisms are fairly simple and robust. This phenomenon has been observed in a large variety of systems, including physical and biological systems. In the nervous system, the majority of synaptic input is too weak to make neurons fire a spike. This weak(or subthreshold) signals detection is very important for animal survival, and pulse detection is a simple but basic task of neuronal information transmission and processing. Some studies have found that subthreshold signals can be transmitted by the application of external noise. However, neurons are subjected to various kinds of inherent noise. Recently, theoretical work has revealed that this inherent noise improves signals detection ability. The detection ability of a single neuron is limited, and the neuronal circuit can perform this task very well by detecting the synchronization of presynaptic potentials. Here, we review recent studies of subthreshold detection by both single neurons and neuronal circuits.展开更多
An important task of Internet congestion control is inhibiting sporadic data flow to maintain a suitable window size or route queue length. Such a requirement is just consistent with the basic idea and function of a m...An important task of Internet congestion control is inhibiting sporadic data flow to maintain a suitable window size or route queue length. Such a requirement is just consistent with the basic idea and function of a moving average filter. In this paper one prior Internet congestion control model, named transmission control protocol (TCP)/random early detection (RED) stroboscopic model, is studied, and then one new scheme is proposed to enlarge its stable domain, where a simple moving average filter is introduced to inhibit sporadic data flow as possible. In the novel scheme the bifurcation phenomenon is postponed without any extra controller. The effectiveness of the new scheme is verified by theoretical analyses and numerical simulations.展开更多
基金National Natural Science Foundation of China(32301718)Chinese Academy of Agricultural Sciences under the Special Institute-level Coordination Project for Basic Research Operating Costs(S202328)。
文摘The cold chain in the production area of fruits and vegetables is the primary link to reduce product loss and improve product quality,but it is also a weak link.With the application of big data technology in cold chain logistics,intelligent devices,and technologies have become important carriers for improving the efficiency of cold chain logistics in fruit and vegetable production areas,extending the shelf life of fruits and vegetables,and reducing fruit and vegetable losses.They have many advantages in fruit and vegetable pre-cooling,sorting and packaging,testing,warehousing,transportation,and other aspects.This article summarizes the rapidly developing and widely used intelligent technologies at home and abroad in recent years,including automated guided vehicle intelligent handling based on electromagnetic or optical technology,intelligent sorting based on sensors,electronic optics,and other technologies,intelligent detection based on computer vision technology,intelligent transportation based on perspective imaging technology,etc.It analyses and studies the innovative research and achievements of various scholars in applying intelligent technology in fruit and vegetable cold chain storage,sorting,detection,transportation,and other links,and improves the efficiency of fruit and vegetable cold chain logistics.However,applying intelligent technology in fruit and vegetable cold chain logistics also faces many problems.The challenges of high cost,difficulty in technological integration,and talent shortages have limited the development of intelligent technology in the field of fruit and vegetable cold chains.To solve the current problems,it is proposed that costs be controlled through independent research and development,technological innovation,and other means to lower the entry threshold for small enterprises.Strengthen integrating intelligent technology and cold chain logistics systems to improve data security and system compatibility.At the same time,the government should introduce relevant policies,provide necessary financial support,and establish talent training mechanisms.Accelerate the development and improvement of intelligent technology standards in the field of cold chain logistics.Through technological innovation,cost control,talent cultivation,and policy guidance,we aim to promote the upgrading of the agricultural industry and provide ideas for improving the quality and efficiency of fruit and vegetable cold chain logistics.
文摘An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circuit and dial switch. The hardware structure and software flow chart of the system are described in details in this paper. The robot is driven by rear wheel motors, and the real-time position of the robot is determined by the ground information collected by infrared sensors. The heading direction of robot is adjusted by steering engine installed in front wheel, and the open angle of manipulator is controlled by the other steering engine which can ensure the robot moving chessmen accurately and quickly during the moving process. The test shows that the kind of intelligent chess robot can complete the task in a fast and accurate way.
基金supported by Major National Science and Technology Projects(No.3) under Grant No. 2012ZX03002012
文摘Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine consisting of six parts: decompile, grammar parsing, control flow and data flow analysis, safety analysis, and comprehensive evaluation. In the comprehensive evaluation, we obtain a weight vector of 29 evaluation indexes using the analytic hierarchy process. During this process, the detection engine exports a list of suspicious API. On the basis of this list, the evaluation part of the engine performs a compre- hensive evaluation of the hazard assessment of software sample. Finally, hazard classification is given for the software. The false positive rate of our approach for detecting rnalware samples is 4. 7% and normal samples is 7.6%. The experimental results show that the accuracy rate of our approach is almost similar to the method based on virus signatures. Compared with the method based on virus signatures, our approach performs well in detecting unknown malware. This approach is promising for the application of malware detection.
基金This work was supported in part by National Natural Science Foundation of China under Grants No.61101108,National S&T Major Program under Grants No.2011ZX03002-005-01
文摘In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artificial immune system, in which static malware analysis and dynamic malware analysis techniques are combined, and antigens are generated by encoding the characteristics extracted from the malware. Based on negative selection algorithm, the mature detectors are generated. By introducing clonal selection algorithm, the detectors with higher affinity are selected to undergo a proliferation and somatic hyper-mutation process, so that more excellent detector offspring can be generated. Experimental result shows that the detection model has a higher detection rate for unknown smartphone malware, and better detection performance can be achieved by increasing the clone generation.
文摘This paper proposes an architecture model to support enhanced system performance in large-scale pervasive computing environments. The muitiformity of device (or peer ) services and network types in such environment is apt to result in notable service isomorphs. And moreover, as the environment cannot assure the stability of network communication and device services, the situation gets worse. Therefore, it becomes urgent to simplify user operations and let them take full and highly efficient advantage of the environments. Super-Service-Odented Architecture (SSOA) is an Serrice-Otiented Architecture (SOA)-based architecture for service management and organization in peryasive environments. With combining one kind of isomorphic services into a super service, SSOA provides better scalability and quick, convenient service invocations. Also, the complexity and instability of services, and network types are transparent, and system performance is highly promoted under the architecture.
文摘An intelligent camera for surface defect inspection is presented which can pre-process the surface image of a rolled strip and pick defective areas out at a spead of 1 600 meters per minute. The camera is made up of a high speed line CCD, a 60 Mb/s CCD digitizer with correlated double sampling function, and a field programmable gate array(FPGA), which can quickly distinguish defective areas using a perceptron embedded in FPGA thus the data to be further processed would dramatically be reduced. Some experiments show that the camera can meet high producing speed, and reduce cost and complexity of automation surface inspection systems.
基金Supported by the Guangxi Natural Science Foundation (No.0731025, No.0731026)the Established Project by Guangxi Education Department (No.200808LX117)
文摘The detection performance is evaluated for our proposed analog multiuser receiver in Ultra-WideBand (UWB) transmitted-reference system. In the presence of dense multipath and multi-access signals,the performance analysis is difficult due to the complicated waveform of received impulse. We develop an approach to analyze the steady-state Signal-to-Interference-plus-Noise (SINR) of the detector output. The multipath-spread impulse is fitted to an exponentially decaying profile in the analysis. A closed-form expression of steady-state SINR is further deduced for the proposed Least Minimum Square (LMS) detector. The analysis is validated by simulations in Line-Of-Sight (LOS) and Non-Line-Of-Sight (NLOS) channel respectively. Based on the theoretical results,the multipath delay spread is employed to determine the optimal width of the integration window of the detector.
文摘A support vector machine (SVM) based multiuser detection (MUD) scheme in code-division multi- ple-access (CDMA) system is proposed. In this scheme, the equivalent support vector (SV) is obtained through a kernel sparsity approximation algorithm, which avoids the conventional costly quadratic pro-gramming (QP) procedure in SVM. Besides, the coefficient of the SV is attained through the solution to a generalized eigenproblem. Simulation results show that the proposed scheme has almost the same bit er-ror rate (BER) as the standard SVM and is better than minimum mean square error (MMSE) scheme. Meanwhile, it has a low comoutation complexity.
基金Supported by the National High Technology Research and Development Programene of China (No. 2006AA04Z234) and China Postdoctoral Science Foundation (No. 2.009(061051 ).
文摘In this paper, the climbing obstacle capability of the previous special cable inspection robot ( Model Number: XS1T-1) is analyzed. Static equations are established to analyze the relationships between the external forces and the maximum height of an obstacle. Parameters affecting the obstacle crossing ability are obtained. According to the analysis results, an innovated small volume, simple structure and light weight climbing mechanism is proposed (Model Number: XS1T-2). A simplified kinematics model of the mechanism is established. With two powered wheels, the obstacle crossing ability of the XSIT-2 is improved apparently. For the robot moving without deflection, the relationships of two powered input torques are deduced. The comparison of the simulation results clearly shows that the climbing ability of XS1T-2 is obviously improved, and it can meet the demands of inspection.
基金supported by the Ministry of Knowledge Economy,Korea,the ITRC(Information Technology Research Center)support program(NIA-2009-(C1090-0902-0007))the Contents Technology Research Center support program
文摘The intelligent environment needs Human-Computer Interactive technology (HCI) and a projector projects screen on wall in the intelligent environments. We propose the front-face detection from four captured images related to the intelligent room for the deaf. Our proposal purpose is that a deaf user faces wall displaying everywhere. system gets the images from four cameras, and detects the user region from a silhouette image using a different method, detects and cuts a motion body region from a different image, and cuts the vertexchest region from the cut body region image. The system attempts to find front-face using Haar-like feature, and selects a detected front-face image from the vertex-chest region. We estimate the front-face detection of recognition rate, which shows somewhat successfully.
基金supported by the Natural Science Foundation of China under Grant No.61174078the Research Fund for the Taishan Scholar Project of Shandong Province of China+1 种基金the SDUST Research Fund under Grant No.2011KYTD105the State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources under Grant No.LAPS13018
文摘This paper mainly studies observability and detectability for continuous-time stochastic Markov jump systems.Two concepts called W-observability and W-detectability for such systems are introduced,which are shown to coincide with various notions of observability and detectability reported recently in literature,such as exact observability,exact detectability and detectability.Besides,by introducing an accumulated energy function,some efficient criteria and interesting properties for both W-observability and W-detectability are obtained.
基金the National Natural Science Foundation of China (No. 50705054)
文摘Assessing machine's performance through comparing the same or similar machines is important to implement intelligent maintenance for swarm machine.In this paper,an outlier mining based abnormal machine detection algorithm is proposed for this purpose.Firstly,the outlier mining based on clustering is introduced and the definition of cluster-based global outlier factor(CBGOF) is presented.Then the modified swarm intelligence clustering(MSIC) algorithm is suggested and the outlier mining algorithm based on MSIC is proposed.The algorithm can not only cluster machines according to their performance but also detect possible abnormal machines.Finally,a comparison of mobile soccer robots' performance proves the algorithm is feasible and effective.
基金supported in part by China Major Science and Technology (S&T) Project (Grant No. 2013ZX01033-001-001-003)National High-Tech R&D Program of China (863) (Grant Nos. 2012AA012701, 2012AA0109-04)+2 种基金National Natural Science Foundation of China (Grant No. 61274131)International S&T Cooperation Project of China (Grant No. 2012DFA11170)Importation and Development of the High-Caliber Talents Project of Beijing Municipal Institutions (Grant No. YETP0163)
文摘Auto-focus is very important for capturing sharp human face centered images in digital and smart phone cameras. With the development of image sensor technology, these cameras support more and more highresolution images to be processed. Currently it is difficult to support fast auto-focus at low power consumption on high-resolution images. This work proposes an efficient architecture for an Ada Boost-based face-priority auto-focus. The architecture supports block-based integral image computation to improve the processing speed on high-resolution images; meanwhile, it is reconfigurable so that it enables the sub-window adaptive cascade classification, which greatly improves the processing speed and reduces power consumption. Experimental results show that 96% detection rate in average and 58 fps(frame per second) detection speed are achieved for the1080p(1920×1080) images. Compared with the state-of-the-art work, the detection speed is greatly improved and power consumption is largely reduced.
基金supported by the National Natural Science Foundation of China(Grant No.11275084)the Natural Science Foundation of Gansu ProvinceChina(Grant No.1506RJZA040)
文摘Previous experimental and theoretical studies have demonstrated that a weak signal can be amplified and optimized by the assistance of noise. The response of the system undergoes stochastic resonance(SR) like behavior. The underlying mechanisms are fairly simple and robust. This phenomenon has been observed in a large variety of systems, including physical and biological systems. In the nervous system, the majority of synaptic input is too weak to make neurons fire a spike. This weak(or subthreshold) signals detection is very important for animal survival, and pulse detection is a simple but basic task of neuronal information transmission and processing. Some studies have found that subthreshold signals can be transmitted by the application of external noise. However, neurons are subjected to various kinds of inherent noise. Recently, theoretical work has revealed that this inherent noise improves signals detection ability. The detection ability of a single neuron is limited, and the neuronal circuit can perform this task very well by detecting the synchronization of presynaptic potentials. Here, we review recent studies of subthreshold detection by both single neurons and neuronal circuits.
基金the National Natural Science Foundation of China (No. 70571017)the Research Foundation from Provincial Education Department of Zhejiang of China (No. 20070928)
文摘An important task of Internet congestion control is inhibiting sporadic data flow to maintain a suitable window size or route queue length. Such a requirement is just consistent with the basic idea and function of a moving average filter. In this paper one prior Internet congestion control model, named transmission control protocol (TCP)/random early detection (RED) stroboscopic model, is studied, and then one new scheme is proposed to enlarge its stable domain, where a simple moving average filter is introduced to inhibit sporadic data flow as possible. In the novel scheme the bifurcation phenomenon is postponed without any extra controller. The effectiveness of the new scheme is verified by theoretical analyses and numerical simulations.