In this paper, an optimized rmlicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-base...In this paper, an optimized rmlicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-based hierarchical network figures out an average confidence degree by means of messages from its child nodes. The cluster head only accepts a message from the child node whose confidence degree is higher than the average. Meanwhile, it updates the confidence degrees for each of its child nodes by comparing the aggregation value and the received messages, and regards them as the weight of exactness of messages from nodes. A sensor node is judged to be rmlicious if its weight value is lower than the predefined threshold. Comparative simulation results verify that the proposed WCF algorithm is better than the Weighted Trust Evaluation (WTE) in terms of the detection ratio and the false alarm ratio. More specifically, with the WCF, the detection ratio is significantly improved and the false alarm ratio is observably reduced, especially when the malicious node ratio is 0.25 or greater. When 40% of 100 sensors are malicious, the detection accuracy is above 90% and the false alarm ratio is nearly only 1.8%.展开更多
In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte...In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice.展开更多
This paper proposes a spatially denoising algorithm using filtering-based noise estimation for an image corrupted by Gaussian noise.The proposed algorithm consists of two stages:estimation and elimination of noise den...This paper proposes a spatially denoising algorithm using filtering-based noise estimation for an image corrupted by Gaussian noise.The proposed algorithm consists of two stages:estimation and elimination of noise density.To adaptively deal with variety of the noise amount,a noisy input image is firstly filtered by a lowpass filter.Standard deviation of the noise is computed from different images between the noisy input and its filtered image.In addition,a modified Gaussian noise removal filter based on the local statistics such as local weighted mean,local weighted activity and local maximum is used to control the degree of noise suppression.Experiments show the effectiveness of the proposed algorithm.展开更多
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies...Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.展开更多
The reasonable measuring of particle weight and effective sampling of particle state are consid- ered as two important aspects to obtain better estimation precision in particle filter. Aiming at the comprehensive trea...The reasonable measuring of particle weight and effective sampling of particle state are consid- ered as two important aspects to obtain better estimation precision in particle filter. Aiming at the comprehensive treatment of above problems, a novel two-stage prediction and update particle filte- ring algorithm based on particle weight optimization in multi-sensor observation is proposed. Firstly, combined with the construction of muhi-senor observation likelihood function and the weight fusion principle, a new particle weight optimization strategy in multi-sensor observation is presented, and the reliability and stability of particle weight are improved by decreasing weight variance. In addi- tion, according to the prediction and update mechanism of particle filter and unscented Kalman fil- ter, a new realization of particle filter with two-stage prediction and update is given. The filter gain containing the latest observation information is used to directly optimize state estimation in the frame- work, which avoids a large calculation amount and the lack of universality in proposal distribution optimization way. The theoretical analysis and experimental results show the feasibility and efficiency of the proposed algorithm.展开更多
Based on the advantages and disadvantages of the standard median filter and the standard wean filter, a new Adaptive Weighted Mean Filter(AWFM) was proposed in this paper. The filter window's size of every pixel wa...Based on the advantages and disadvantages of the standard median filter and the standard wean filter, a new Adaptive Weighted Mean Filter(AWFM) was proposed in this paper. The filter window's size of every pixel was adaptively adjusted. Then the suspidons noise points were examined by certain rules. After that, the authors calculate the weighting factors of the pixels by weighting function which was canstructed according to the differences between their gray values and the median value of all elements in the window. Finally they use the weighted average of gray values to substitute the gray value of the central pixel in the window. The results indicate that this filtering method is not only effective for impulse noise like median filter, but also better than the standard median filters. Compared with conventional filter, this filter methed can effectivdy suppress the mixture noise of images, and protect image's details well.展开更多
In this study, particular matrices which is called P-matrices were defined for the action of the Steenrod powers on the polynomial algebra and it was shown that they can be used to calculate the action of Steenrod pow...In this study, particular matrices which is called P-matrices were defined for the action of the Steenrod powers on the polynomial algebra and it was shown that they can be used to calculate the action of Steenrod powers on product of two generators. Finally an algorithm was given to obtain these matrices.展开更多
To achieve an optimal trade-off between video quality and energy efficiency in the uplink streaming of multi-user Scalable Video Coding (SVC) videos in relay-based Orthogonal Frequency Division Multiple Access (OFDMA)...To achieve an optimal trade-off between video quality and energy efficiency in the uplink streaming of multi-user Scalable Video Coding (SVC) videos in relay-based Orthogonal Frequency Division Multiple Access (OFDMA) cellular networks, a cross-layer design framework that jointly selects the Transmission Policy (TP) for SVC video frames, assigns OFDMA subcarriers, and allocates power for each subcarrier is proposed. We apply the dual decomposition method to the problem, and obtain a TP selection subproblem for each SVC video adaptation and a resource allocation subproblem of Joint Subcarrier, Relay and Power Allocation (JSRPA). A second level of dual decomposition is used to divide the JSRPA problem into independent subcarrier subproblems. The proposed Crosslayer Trade-off Optimization (CTO) algorithm is sub-distributed with significantly low complexity. A performance evaluation with typical SVC video traces demonstrates that the proposed algorithm is able to converge and efficiently achieve the optimal trade-off between the video quality and energy consumption at the MSs for uplink SVC streaming.展开更多
Multi-model approach can significantly improve the prediction performance of soft sensors in the process with multiple operational conditions.However,traditional clustering algorithms may result in overlapping phenome...Multi-model approach can significantly improve the prediction performance of soft sensors in the process with multiple operational conditions.However,traditional clustering algorithms may result in overlapping phenomenon in subclasses,so that edge classes and outliers cannot be effectively dealt with and the modeling result is not satisfactory.In order to solve these problems,a new feature extraction method based on weighted kernel Fisher criterion is presented to improve the clustering accuracy,in which feature mapping is adopted to bring the edge classes and outliers closer to other normal subclasses.Furthermore,the classified data are used to develop a multiple model based on support vector machine.The proposed method is applied to a bisphenol A production process for prediction of the quality index.The simulation results demonstrate its ability in improving the data classification and the prediction performance of the soft sensor.展开更多
In Pakistan more than 10 million people are living with Hepatitis C virus (HCV), with high morbidity and mortality. This article reviews the prevalence, genotypes and factors associated with HCV infection in the Pakis...In Pakistan more than 10 million people are living with Hepatitis C virus (HCV), with high morbidity and mortality. This article reviews the prevalence, genotypes and factors associated with HCV infection in the Pakistani population. A literature search was performed by using the keywords; HCV prevalence, genotypes and risk factors in a Pakistani population, in Pubmed, PakMediNet and Google scholar. Ninetyone different studies dating from 1994 to May 2009 were included in this study, and weighted mean and standard error of each population group was calculated. Percentage prevalence of HCV was 4.95% ± 0.53% in the general adult population, 1.72% ± 0.24% in the pediatric population and 3.64% ± 0.31% in a young population applying for recruitment, whereas a very high 57% ± 17.7% prevalence was observed in injecting drug users and 48.67% ± 1.75% in a multi-transfused population. Most prevalent genotype of HCV was 3a. HCV prevalence was moderate in the general population but very high in injecting drug users and multi-transfused populations. This data suggests that the major contributing factors towards increased HCV prevalence include unchecked blood transfusions and reuse of injection syringes. Awareness programs are required to decrease the future burden of HCV in the Pakistani population.展开更多
A novel multiresolution pyramidal edge detector, based on adaptive weighted fuzzy mean(AWFM)filtering and fuzzy linking model, is presented in this paper. The algorithm first constructs a pyramidal structure by repeti...A novel multiresolution pyramidal edge detector, based on adaptive weighted fuzzy mean(AWFM)filtering and fuzzy linking model, is presented in this paper. The algorithm first constructs a pyramidal structure by repetitive AWFM filtering and subsampling of original image. Then it utilizes multiple heuristic linking criteria between the edge nodes of two adjacent levels and considers the linkage as a fuzzy model, which is trained offline. Through this fuzzy linking model, the boundaries detected at coarse resolution are propagated and refined to the bottom level from the coarse-to fine edge detection. The validation experiment results demonstrate that the proposed approach has superior performance compared with standard fixed resolution detector andprevious multiresolution approach, especially in impulse noise environment.展开更多
This paper provides theoretical foundation for the problem of localization in multi-robot formations. Sufficient and necessary conditions for completely localizing a formation of mobile robots/vehicles in SE(2) based ...This paper provides theoretical foundation for the problem of localization in multi-robot formations. Sufficient and necessary conditions for completely localizing a formation of mobile robots/vehicles in SE(2) based on distributed sensor networks and graph rigidity are proposed. A method for estimating the quality of localizations via a linearized weighted least-squares algorithm is presented, which considers incomplete and noisy sensory information. The approach in this paper had been implemented in a multi-robot system of five car-like robots equipped with omni-directional cameras and IEEE 802.11b wireless network.展开更多
A novel approach is proposed for improving adaptive feedback cancellation using a variable step-size affine projection algorithm(VSS-APA) based on global speech absence probability(GSAP).The variable step-size of the ...A novel approach is proposed for improving adaptive feedback cancellation using a variable step-size affine projection algorithm(VSS-APA) based on global speech absence probability(GSAP).The variable step-size of the proposed VSS-APA is adjusted according to the GSAP of the current frame.The weight vector of the adaptive filter is updated by the probability of the speech absence.The performance measure of acoustic feedback cancellation is evaluated using normalized misalignment.Experimental results demonstrate that the proposed approach has better performance than the normalized least mean square(NLMS) and the constant step-size affine projection algorithms.展开更多
The non-linearity problem of aircraft system could not be overcome by using the MEMS sensor only.In order to improve the accuracy of aerial vehicle attitude,an aircraft attitude estimation of the MEMS sensor based on ...The non-linearity problem of aircraft system could not be overcome by using the MEMS sensor only.In order to improve the accuracy of aerial vehicle attitude,an aircraft attitude estimation of the MEMS sensor based on modified particle filter is proposed.The aircraft attitude is optimized by the conjugate gradient method,and the drift error of gyroscope is reduced.Moreover,the particle weight is updated by the observed value to obtain an optimized state estimate.Finally,the conjugate gradient method and the modified particle filter are weightily combined to determine the optimal weighting factor.The attitude estimation is carried out with STM32 and MEMS sensor as the core to design system.The experimental results show that the static and dynamic attitude estimation performances of the aircraft are improved.The performances are well,the attitude data is relatively stable,and the tracking characteristics are better.Moreover,it has better robustness and stability.展开更多
For the multisensor system with correlated measurement noises and unknown noise statistics, based on the solution of the matrix equations for correlation function, the on-line estimators of the noise variances and cro...For the multisensor system with correlated measurement noises and unknown noise statistics, based on the solution of the matrix equations for correlation function, the on-line estimators of the noise variances and cross-covariances is obtained. Further, a self-tuning weighted measurement fusion Kalman filter is presented, based on the Riccati equation. By the Dynamic Error System Analysis (DESA) method, it rigorously proved that the presented self-tuning weighted measurement fusion Kalman filter converges to the optimal weighted measurement fusion steady-state Kalman filter in a realization or with probability one, so that it has asymptotic global optimality. A simulation example for a target tracking system with 3-sensor shows that the presented self-tuning measurement fusion Kalman fuser converges to the optimal steady-state measurement fusion Kalman fuser.展开更多
With the rapid development of integrated circuit(IC)technology,reusable intelligent property(IP)core design is widely valued by the industry.Based on the in-depth study of the functional characteristics of advanced mi...With the rapid development of integrated circuit(IC)technology,reusable intelligent property(IP)core design is widely valued by the industry.Based on the in-depth study of the functional characteristics of advanced microcontroller bus architecture(AMBA),a design scheme of IP core is presented,and it is divided into the functional modules,and the structural design of the IP core is completed.The relationship between the internal modules of the IP core is clarified,and the top-down design method is used to build the internal architecture of the IP core.The IP core interface module,register module,baud rate module,transmit module,receive module,and interrupt module are designed in detail by using Verilog language.The simulation results show that the designed IP core supports serial peripheral interface(SPI)protocol,the function coverage of IP core reaches 100%,the maximum working frequency reaches 200 MHz,and the resource occupancy rate is less than 15%.The reusable IP core can support multiple data formats,multiple timing transmission modes,and master/slave operation modes,reducing the resource consumption of hardware circuits and having stronger applicability.展开更多
This study examined Japanese patents in terms of the quantitative characteristics of application documents that resulted in the acquisition of rights in order to clarify the relationship between the features and paten...This study examined Japanese patents in terms of the quantitative characteristics of application documents that resulted in the acquisition of rights in order to clarify the relationship between the features and patentability of applications. The groups of approved applications and those that had not been approved were compared for 12 variables: publication time lag; numbers of inventors, classifications, pages, figures, tables, claims, priority claims, countries for priority claims, cited patents, and cited non-patent documents; and median of citation age. Furthermore, the authors carried out the experiments in which patent applications were automatically classified into two groups by the machine learning method, random forests. As a result, statistically significant differences between the two groups were observed for the following variables (p 〈 .001): the numbers of inventors, pages, figures, claims, priority claims, and countries for priority claims were significantly larger in the group of approved applications, while the time lag until publication was smaller. In particular, the publication time lag and the numbers of inventors, pages, and figures were variables representing the features that largely contribute to discriminating approved applications in the classification using random forests, which implies that these have relatively strong relationships with patentability.展开更多
Most existing applications of centroidal Voronoi tessellations(CVTs) lack consideration of the length of the cluster boundaries.In this paper we propose a new model and algorithms to produce segmentations which would ...Most existing applications of centroidal Voronoi tessellations(CVTs) lack consideration of the length of the cluster boundaries.In this paper we propose a new model and algorithms to produce segmentations which would minimize the total energy—a sum of the classic CVT energy and the weighted length of cluster boundaries.To distinguish it with the classic CVTs,we call it an Edge-Weighted CVT(EWCVT).The concept of EWCVT is expected to build a mathematical base for all CVT related data classifications with requirement of smoothness of the cluster boundaries.The EWCVT method is easy in implementation,fast in computation,and natural for any number of clusters.展开更多
基金Acknowledgements This paper was supported by the National Natural Science Foundation of China under Cant No. 61170219 the Natural Science Foundation Project of CQ CSTC under Grants No. 2009BB2278, No201 1jjA40028 the 2011 Talent Plan of Chongqing Higher Education.
文摘In this paper, an optimized rmlicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-based hierarchical network figures out an average confidence degree by means of messages from its child nodes. The cluster head only accepts a message from the child node whose confidence degree is higher than the average. Meanwhile, it updates the confidence degrees for each of its child nodes by comparing the aggregation value and the received messages, and regards them as the weight of exactness of messages from nodes. A sensor node is judged to be rmlicious if its weight value is lower than the predefined threshold. Comparative simulation results verify that the proposed WCF algorithm is better than the Weighted Trust Evaluation (WTE) in terms of the detection ratio and the false alarm ratio. More specifically, with the WCF, the detection ratio is significantly improved and the false alarm ratio is observably reduced, especially when the malicious node ratio is 0.25 or greater. When 40% of 100 sensors are malicious, the detection accuracy is above 90% and the false alarm ratio is nearly only 1.8%.
基金supported by the National Science Foundation of China (No.61373040,No.61173137)The Ph.D.Pro-grams Foundation of Ministry of Education of China(20120141110073)Key Project of Natural Science Foundation of Hubei Province (No.2010CDA004)
文摘In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice.
基金supported by the Korea Science and Engineering Foundation(KOSEF) grant fund by the Korea Govern-ment(MEST)(No.2011-0000148)the Ministry of Knowledge Economy,Korea under the Infor mation Technology Research Center support programsupervised by the National IT Industry Promotion Agency(NIPA-2011-C1090-1121-0010)
文摘This paper proposes a spatially denoising algorithm using filtering-based noise estimation for an image corrupted by Gaussian noise.The proposed algorithm consists of two stages:estimation and elimination of noise density.To adaptively deal with variety of the noise amount,a noisy input image is firstly filtered by a lowpass filter.Standard deviation of the noise is computed from different images between the noisy input and its filtered image.In addition,a modified Gaussian noise removal filter based on the local statistics such as local weighted mean,local weighted activity and local maximum is used to control the degree of noise suppression.Experiments show the effectiveness of the proposed algorithm.
基金supported by the NSFC(61173141,U1536206,61232016, U1405254,61373133,61502242,61572258)BK20150925+3 种基金Fund of Jiangsu Engineering Center of Network Monitoring(KJR1402)Fund of MOE Internet Innovation Platform(KJRP1403)CICAEETthe PAPD fund
文摘Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.
基金Supported by the National Natural Science Foundations of China(No.61300214,61170243)the Science and Technology Innovation Team Support Plan of Education Department of Henan Province(No.13IRTSTHN021)+2 种基金the Science and Technology Research Key Project of Education Department of Henan Province(No.13A413066)the Basic and Frontier Technology Research Plan of Henan Province(No.132300410148)the Funding Scheme of Young Key Teacher of Henan Province Universities,and the Key Project of Teaching Reform Research of Henan University(No.HDXJJG2013-07)
文摘The reasonable measuring of particle weight and effective sampling of particle state are consid- ered as two important aspects to obtain better estimation precision in particle filter. Aiming at the comprehensive treatment of above problems, a novel two-stage prediction and update particle filte- ring algorithm based on particle weight optimization in multi-sensor observation is proposed. Firstly, combined with the construction of muhi-senor observation likelihood function and the weight fusion principle, a new particle weight optimization strategy in multi-sensor observation is presented, and the reliability and stability of particle weight are improved by decreasing weight variance. In addi- tion, according to the prediction and update mechanism of particle filter and unscented Kalman fil- ter, a new realization of particle filter with two-stage prediction and update is given. The filter gain containing the latest observation information is used to directly optimize state estimation in the frame- work, which avoids a large calculation amount and the lack of universality in proposal distribution optimization way. The theoretical analysis and experimental results show the feasibility and efficiency of the proposed algorithm.
基金supported by the University Independent innovation program of Jinan(No.200906005)the National Natural Science Foundation of Shandong Province(No.Y2008G31)
文摘Based on the advantages and disadvantages of the standard median filter and the standard wean filter, a new Adaptive Weighted Mean Filter(AWFM) was proposed in this paper. The filter window's size of every pixel was adaptively adjusted. Then the suspidons noise points were examined by certain rules. After that, the authors calculate the weighting factors of the pixels by weighting function which was canstructed according to the differences between their gray values and the median value of all elements in the window. Finally they use the weighted average of gray values to substitute the gray value of the central pixel in the window. The results indicate that this filtering method is not only effective for impulse noise like median filter, but also better than the standard median filters. Compared with conventional filter, this filter methed can effectivdy suppress the mixture noise of images, and protect image's details well.
文摘In this study, particular matrices which is called P-matrices were defined for the action of the Steenrod powers on the polynomial algebra and it was shown that they can be used to calculate the action of Steenrod powers on product of two generators. Finally an algorithm was given to obtain these matrices.
基金partially supported by the National Natural Science Foundation of China under Grants No. 610202380, No. 60932007Major Program of National Natural Science Foundation of China under Grant No. 60932007+2 种基金Tianjin Research Program of Application Foundation and Advanced Technology under Grant No. 12JCQNJC00300Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20110032120029the Innovation Foundation of Tianjin University
文摘To achieve an optimal trade-off between video quality and energy efficiency in the uplink streaming of multi-user Scalable Video Coding (SVC) videos in relay-based Orthogonal Frequency Division Multiple Access (OFDMA) cellular networks, a cross-layer design framework that jointly selects the Transmission Policy (TP) for SVC video frames, assigns OFDMA subcarriers, and allocates power for each subcarrier is proposed. We apply the dual decomposition method to the problem, and obtain a TP selection subproblem for each SVC video adaptation and a resource allocation subproblem of Joint Subcarrier, Relay and Power Allocation (JSRPA). A second level of dual decomposition is used to divide the JSRPA problem into independent subcarrier subproblems. The proposed Crosslayer Trade-off Optimization (CTO) algorithm is sub-distributed with significantly low complexity. A performance evaluation with typical SVC video traces demonstrates that the proposed algorithm is able to converge and efficiently achieve the optimal trade-off between the video quality and energy consumption at the MSs for uplink SVC streaming.
基金Supported by the National Natural Science Foundation of China(61273070)the Foundation of Priority Academic Program Development of Jiangsu Higher Education Institutions
文摘Multi-model approach can significantly improve the prediction performance of soft sensors in the process with multiple operational conditions.However,traditional clustering algorithms may result in overlapping phenomenon in subclasses,so that edge classes and outliers cannot be effectively dealt with and the modeling result is not satisfactory.In order to solve these problems,a new feature extraction method based on weighted kernel Fisher criterion is presented to improve the clustering accuracy,in which feature mapping is adopted to bring the edge classes and outliers closer to other normal subclasses.Furthermore,the classified data are used to develop a multiple model based on support vector machine.The proposed method is applied to a bisphenol A production process for prediction of the quality index.The simulation results demonstrate its ability in improving the data classification and the prediction performance of the soft sensor.
基金Supported by Higher Education Commission of Pakistan Grant No.829Pak-US Science and Technology Cooperative Program,entitled "HCV management in Pakistan"
文摘In Pakistan more than 10 million people are living with Hepatitis C virus (HCV), with high morbidity and mortality. This article reviews the prevalence, genotypes and factors associated with HCV infection in the Pakistani population. A literature search was performed by using the keywords; HCV prevalence, genotypes and risk factors in a Pakistani population, in Pubmed, PakMediNet and Google scholar. Ninetyone different studies dating from 1994 to May 2009 were included in this study, and weighted mean and standard error of each population group was calculated. Percentage prevalence of HCV was 4.95% ± 0.53% in the general adult population, 1.72% ± 0.24% in the pediatric population and 3.64% ± 0.31% in a young population applying for recruitment, whereas a very high 57% ± 17.7% prevalence was observed in injecting drug users and 48.67% ± 1.75% in a multi-transfused population. Most prevalent genotype of HCV was 3a. HCV prevalence was moderate in the general population but very high in injecting drug users and multi-transfused populations. This data suggests that the major contributing factors towards increased HCV prevalence include unchecked blood transfusions and reuse of injection syringes. Awareness programs are required to decrease the future burden of HCV in the Pakistani population.
文摘A novel multiresolution pyramidal edge detector, based on adaptive weighted fuzzy mean(AWFM)filtering and fuzzy linking model, is presented in this paper. The algorithm first constructs a pyramidal structure by repetitive AWFM filtering and subsampling of original image. Then it utilizes multiple heuristic linking criteria between the edge nodes of two adjacent levels and considers the linkage as a fuzzy model, which is trained offline. Through this fuzzy linking model, the boundaries detected at coarse resolution are propagated and refined to the bottom level from the coarse-to fine edge detection. The validation experiment results demonstrate that the proposed approach has superior performance compared with standard fixed resolution detector andprevious multiresolution approach, especially in impulse noise environment.
文摘This paper provides theoretical foundation for the problem of localization in multi-robot formations. Sufficient and necessary conditions for completely localizing a formation of mobile robots/vehicles in SE(2) based on distributed sensor networks and graph rigidity are proposed. A method for estimating the quality of localizations via a linearized weighted least-squares algorithm is presented, which considers incomplete and noisy sensory information. The approach in this paper had been implemented in a multi-robot system of five car-like robots equipped with omni-directional cameras and IEEE 802.11b wireless network.
基金Project(2010-0020163)supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education
文摘A novel approach is proposed for improving adaptive feedback cancellation using a variable step-size affine projection algorithm(VSS-APA) based on global speech absence probability(GSAP).The variable step-size of the proposed VSS-APA is adjusted according to the GSAP of the current frame.The weight vector of the adaptive filter is updated by the probability of the speech absence.The performance measure of acoustic feedback cancellation is evaluated using normalized misalignment.Experimental results demonstrate that the proposed approach has better performance than the normalized least mean square(NLMS) and the constant step-size affine projection algorithms.
基金National Natural Science Foundation of China(No.61261029)
文摘The non-linearity problem of aircraft system could not be overcome by using the MEMS sensor only.In order to improve the accuracy of aerial vehicle attitude,an aircraft attitude estimation of the MEMS sensor based on modified particle filter is proposed.The aircraft attitude is optimized by the conjugate gradient method,and the drift error of gyroscope is reduced.Moreover,the particle weight is updated by the observed value to obtain an optimized state estimate.Finally,the conjugate gradient method and the modified particle filter are weightily combined to determine the optimal weighting factor.The attitude estimation is carried out with STM32 and MEMS sensor as the core to design system.The experimental results show that the static and dynamic attitude estimation performances of the aircraft are improved.The performances are well,the attitude data is relatively stable,and the tracking characteristics are better.Moreover,it has better robustness and stability.
基金Supported by the National Natural Science Foundation of China (No.60874063)Science and Technology Research Foundation of Heilongjiang Education Department (No.11521214)Open Fund of Key Laboratory of Electronics Engineering, College of Heilongjiang Province (Heilongjiang University)
文摘For the multisensor system with correlated measurement noises and unknown noise statistics, based on the solution of the matrix equations for correlation function, the on-line estimators of the noise variances and cross-covariances is obtained. Further, a self-tuning weighted measurement fusion Kalman filter is presented, based on the Riccati equation. By the Dynamic Error System Analysis (DESA) method, it rigorously proved that the presented self-tuning weighted measurement fusion Kalman filter converges to the optimal weighted measurement fusion steady-state Kalman filter in a realization or with probability one, so that it has asymptotic global optimality. A simulation example for a target tracking system with 3-sensor shows that the presented self-tuning measurement fusion Kalman fuser converges to the optimal steady-state measurement fusion Kalman fuser.
文摘With the rapid development of integrated circuit(IC)technology,reusable intelligent property(IP)core design is widely valued by the industry.Based on the in-depth study of the functional characteristics of advanced microcontroller bus architecture(AMBA),a design scheme of IP core is presented,and it is divided into the functional modules,and the structural design of the IP core is completed.The relationship between the internal modules of the IP core is clarified,and the top-down design method is used to build the internal architecture of the IP core.The IP core interface module,register module,baud rate module,transmit module,receive module,and interrupt module are designed in detail by using Verilog language.The simulation results show that the designed IP core supports serial peripheral interface(SPI)protocol,the function coverage of IP core reaches 100%,the maximum working frequency reaches 200 MHz,and the resource occupancy rate is less than 15%.The reusable IP core can support multiple data formats,multiple timing transmission modes,and master/slave operation modes,reducing the resource consumption of hardware circuits and having stronger applicability.
文摘This study examined Japanese patents in terms of the quantitative characteristics of application documents that resulted in the acquisition of rights in order to clarify the relationship between the features and patentability of applications. The groups of approved applications and those that had not been approved were compared for 12 variables: publication time lag; numbers of inventors, classifications, pages, figures, tables, claims, priority claims, countries for priority claims, cited patents, and cited non-patent documents; and median of citation age. Furthermore, the authors carried out the experiments in which patent applications were automatically classified into two groups by the machine learning method, random forests. As a result, statistically significant differences between the two groups were observed for the following variables (p 〈 .001): the numbers of inventors, pages, figures, claims, priority claims, and countries for priority claims were significantly larger in the group of approved applications, while the time lag until publication was smaller. In particular, the publication time lag and the numbers of inventors, pages, and figures were variables representing the features that largely contribute to discriminating approved applications in the classification using random forests, which implies that these have relatively strong relationships with patentability.
基金supported in part by the U.S.National Science Foundation under grant number DMS-0913491.
文摘Most existing applications of centroidal Voronoi tessellations(CVTs) lack consideration of the length of the cluster boundaries.In this paper we propose a new model and algorithms to produce segmentations which would minimize the total energy—a sum of the classic CVT energy and the weighted length of cluster boundaries.To distinguish it with the classic CVTs,we call it an Edge-Weighted CVT(EWCVT).The concept of EWCVT is expected to build a mathematical base for all CVT related data classifications with requirement of smoothness of the cluster boundaries.The EWCVT method is easy in implementation,fast in computation,and natural for any number of clusters.