To ensure revulsive driving of intelligent vehicles at intersections, a method is presented to detect and recognize the traffic lights. First, the stabling siding at intersections is detected by applying Hough transfo...To ensure revulsive driving of intelligent vehicles at intersections, a method is presented to detect and recognize the traffic lights. First, the stabling siding at intersections is detected by applying Hough transformation. Then, the colors of traffic lights are detected with color space transformation. Finally, self-associative memory is used to recognize the countdown characters of the traffic lights. Test results at 20 real intersections show that the ratio of correct stabling siding recognition reaches up to 90%;and the ratios of recognition of traffic lights and divided characters are 85% and 97%, respectively. The research proves that the method is efficient for the detection of stabling siding and is robust enough to recognize the characters from images with noise and broken edges.展开更多
For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists ...For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists of two components, named boundary edge detection and boundary cycle detection. Then, the 1-coverage hole detection algorithm is extended to k-coverage hole scenarios. A coverage degree reduction scheme is proposed to find an independent covering set of nodes in the covered region of the target field and to reduce the coverage degree by one through sleeping those nodes. Repeat the 1-coverage hole detection algorithm and the higher order of coverage holes can be found. By iterating the above steps for k-1 times, the boundary edges and boundary cycles of all k-coverage holes can be discovered. Finally, the proposed algorithm is compared with a location-based coverage hole detection algorithm. Simulation results indicate that the proposed algorithm can accurately detect over 99% coverage holes.展开更多
An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circu...An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circuit and dial switch. The hardware structure and software flow chart of the system are described in details in this paper. The robot is driven by rear wheel motors, and the real-time position of the robot is determined by the ground information collected by infrared sensors. The heading direction of robot is adjusted by steering engine installed in front wheel, and the open angle of manipulator is controlled by the other steering engine which can ensure the robot moving chessmen accurately and quickly during the moving process. The test shows that the kind of intelligent chess robot can complete the task in a fast and accurate way.展开更多
The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization effici...The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result.展开更多
Based on the synthesis and analysis of recursive receivers, a new algorithm, namely partial grouping maximization likelihood algorithm, is proposed to achieve satisfactory performance with moderate computational compl...Based on the synthesis and analysis of recursive receivers, a new algorithm, namely partial grouping maximization likelihood algorithm, is proposed to achieve satisfactory performance with moderate computational complexity.During the analysis, some interesting properties shared by the proposed procedures are described.Finally, the performance assessment shows that the new scheme is superior to the linear detector and ordinary grouping algorithm, and achieves a bit-error rate close to that of the optimum receiver.展开更多
5-Fluorouracil (5-FU) has a broad spectrum of anti-tumor activity, widely applied to the treatment of cancers. However, it is necessary to determine the plasma concentration of 5-FU in clinical practice due to its nar...5-Fluorouracil (5-FU) has a broad spectrum of anti-tumor activity, widely applied to the treatment of cancers. However, it is necessary to determine the plasma concentration of 5-FU in clinical practice due to its narrow therapeutic index. Therefore, a simple, economic and sensitive high-performance liquid chromatography (HPLC) method was developed and validated for the determination of 5-FU in human plasma. Ethyl acetate was chosen as extraction reagent. Chromatographic separation was performed on a Diamonsil C18 column (250 mm × 4.6 mm i.d., 5 μm) with the mobile phase consisting of methanol and 20 mmol/L ammonium formate using a linear gradient elution at a flow rate of 0.8 mL/min. 5-FU and 5-bromouracil (5-BU) were detected by UV detector at 265 nm. The calibration curve was linear over the concentration range of 5—500 ng/mL and the correlation coefficient was not less than 0.992 6 for all calibration curves. The intra- and inter-day precisions were less than 10.5% and 4.3%, respectively, and the accuracy was within ±3.7%. The recovery at all concentration levels was 80.1±8.6%. 5-FU was stable under possible conditions of storing and handling. This method is proved applicable to therapeutic drug monitoring and pharmacokinetic studies of 5-FU in human.展开更多
Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied af...Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied after random deployment.In this paper,we study how mobile sensors can be efficiently relocated to achieve k-barrier coverage.In particular,two problems are studied:relocation of sensors with minimum number of mobile sensors and formation of k-barrier coverage with minimum energy cost.These two problems were formulated as 0–1 integer linear programming(ILP).The formulation is computationally intractable because of integrality and complicated constraints.Therefore,we relax the integrality and complicated constraints of the formulation and construct a special model known as RELAX-RSMN with a totally unimodular constraint coefficient matrix to solve the relaxed 0–1 ILP rapidly through linear programming.Theoretical analysis and simulation were performed to verify the effectiveness of our approach.展开更多
Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially ...Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially against group colluding attack. The group tracing is neglected in previous works. In this paper, we propose a novel multimedia group fingerprint to trace malicious middlemen along with customers. We explore the quality of the non degenerate linear shift register sequence (NDLSRS) which is convenient in group initialization and management. The theoretic analysis and simulation experiment results show that NDLSRS has good resistance against attacks from colluding groups/ members even after its volume expanded.展开更多
Based on general packet radio service(GPRS) and TCP/IP protocol,a wireless transmission system of vehicle inspection data is designed. Basic structure and work theory are expounded. SIM300 designed by SIMCOM is used f...Based on general packet radio service(GPRS) and TCP/IP protocol,a wireless transmission system of vehicle inspection data is designed. Basic structure and work theory are expounded. SIM300 designed by SIMCOM is used for client GPRS communication module. Using Winsock control of visual basic(VB),the client and server communication has been accomplished. By means of a client and server communications software,the remote wireless transmission of vehicle inspection data has been accomplished also. The server management software has been developed by using Microsoft SQL Server 2000 and VB6.0. Functions of software include import,inquiry,export and maintenance of test data.展开更多
Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The acc...Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems.展开更多
To investigate the robust fault detection (RFD) observer design for linear uncertain systems, the H_index and H∞ norm are used to describe this observer design as optimization problems. Conditions for the existence...To investigate the robust fault detection (RFD) observer design for linear uncertain systems, the H_index and H∞ norm are used to describe this observer design as optimization problems. Conditions for the existence of such a fault detection observer are given in terms of matrix inequalities. The solution is obtained by new iterative linear matrix inequality (ILMI) algorithms. The RFD observer design over finite frequency range in which Of does not have full column rank for a system is also considered. Numerical example demonstrates that the designed fault detection observer has high sensitivity to the fault and strong robustness to the unknown input.展开更多
基金The Cultivation Fund of the Key Scientific and Technical Innovation Project of Higher Education of Ministry of Education (No.705020)
文摘To ensure revulsive driving of intelligent vehicles at intersections, a method is presented to detect and recognize the traffic lights. First, the stabling siding at intersections is detected by applying Hough transformation. Then, the colors of traffic lights are detected with color space transformation. Finally, self-associative memory is used to recognize the countdown characters of the traffic lights. Test results at 20 real intersections show that the ratio of correct stabling siding recognition reaches up to 90%;and the ratios of recognition of traffic lights and divided characters are 85% and 97%, respectively. The research proves that the method is efficient for the detection of stabling siding and is robust enough to recognize the characters from images with noise and broken edges.
基金The National Natural Science Foundation of China(No.61601122,61471164,61741102)
文摘For wireless sensor networks, a simple and accurate coordinate-free k-coverage hole detection scheme is proposed. First, an algorithm is presented to detect boundary cycles of 1-coverage holes. The algorithm consists of two components, named boundary edge detection and boundary cycle detection. Then, the 1-coverage hole detection algorithm is extended to k-coverage hole scenarios. A coverage degree reduction scheme is proposed to find an independent covering set of nodes in the covered region of the target field and to reduce the coverage degree by one through sleeping those nodes. Repeat the 1-coverage hole detection algorithm and the higher order of coverage holes can be found. By iterating the above steps for k-1 times, the boundary edges and boundary cycles of all k-coverage holes can be discovered. Finally, the proposed algorithm is compared with a location-based coverage hole detection algorithm. Simulation results indicate that the proposed algorithm can accurately detect over 99% coverage holes.
文摘An intelligent line-tracking chess robot based on STM32 is introduced in this paper. Its hardware consists of photo- electric detection circuit, main control circuit, motor driven circuit, steering engine driven circuit and dial switch. The hardware structure and software flow chart of the system are described in details in this paper. The robot is driven by rear wheel motors, and the real-time position of the robot is determined by the ground information collected by infrared sensors. The heading direction of robot is adjusted by steering engine installed in front wheel, and the open angle of manipulator is controlled by the other steering engine which can ensure the robot moving chessmen accurately and quickly during the moving process. The test shows that the kind of intelligent chess robot can complete the task in a fast and accurate way.
基金supported in part by the National Natural Science Foundation of China(Grant Nos.60971082,60872049,60972073and60871042)the National Key Basic Research Program of China(Grant No.2009CB320400)+1 种基金the National Great Science Specific Project(Grant Nos.2009ZX03003-001,2009ZX03003-011and2010ZX03001003)Chinese Universities Scientific Fund,China
文摘The Internet of Things (loT) is called the world' s third wave of the information industry. As the core technology of IoT, Cognitive Radio Sensor Networks (CRSN) technology can improve spectrum utilization efficiency and lay a sofid foundation for large-scale application of IoT. Reliable spectrum sensing is a crucial task of the CR. For energy de- tection, threshold will determine the probability of detection (Pd) and the probability of false alarm Pf at the same time. While the threshold increases, Pd and Pf will both decrease. In this paper we focus on the maximum of the difference of Pd and Pf, and try to find out how to determine the threshold with this precondition. Simulation results show that the proposed method can effectively approach the ideal optimal result.
基金Supported by National Natural Science Foundation of China (No. 60372107, 10371106, 10471114)Natural Science Foundation of Jiangsu Province (No. 04KJB110097)
文摘Based on the synthesis and analysis of recursive receivers, a new algorithm, namely partial grouping maximization likelihood algorithm, is proposed to achieve satisfactory performance with moderate computational complexity.During the analysis, some interesting properties shared by the proposed procedures are described.Finally, the performance assessment shows that the new scheme is superior to the linear detector and ordinary grouping algorithm, and achieves a bit-error rate close to that of the optimum receiver.
基金Supported by National Natural Science Foundation of China (No. 30630075 and 20675056)Major State Basic Research Development Program of China ("973" Program) (No. 2006CB933303)
文摘5-Fluorouracil (5-FU) has a broad spectrum of anti-tumor activity, widely applied to the treatment of cancers. However, it is necessary to determine the plasma concentration of 5-FU in clinical practice due to its narrow therapeutic index. Therefore, a simple, economic and sensitive high-performance liquid chromatography (HPLC) method was developed and validated for the determination of 5-FU in human plasma. Ethyl acetate was chosen as extraction reagent. Chromatographic separation was performed on a Diamonsil C18 column (250 mm × 4.6 mm i.d., 5 μm) with the mobile phase consisting of methanol and 20 mmol/L ammonium formate using a linear gradient elution at a flow rate of 0.8 mL/min. 5-FU and 5-bromouracil (5-BU) were detected by UV detector at 265 nm. The calibration curve was linear over the concentration range of 5—500 ng/mL and the correlation coefficient was not less than 0.992 6 for all calibration curves. The intra- and inter-day precisions were less than 10.5% and 4.3%, respectively, and the accuracy was within ±3.7%. The recovery at all concentration levels was 80.1±8.6%. 5-FU was stable under possible conditions of storing and handling. This method is proved applicable to therapeutic drug monitoring and pharmacokinetic studies of 5-FU in human.
基金supported by the NSFC(U1536206,61232016,U1405254,61373133,61502242,71401176)BK20150925the PAPD fund
文摘Barrier coverage of wireless sensor networks is an important issue in the detection of intruders who are attempting to cross a region of interest.However,in certain applications,barrier coverage cannot be satisfied after random deployment.In this paper,we study how mobile sensors can be efficiently relocated to achieve k-barrier coverage.In particular,two problems are studied:relocation of sensors with minimum number of mobile sensors and formation of k-barrier coverage with minimum energy cost.These two problems were formulated as 0–1 integer linear programming(ILP).The formulation is computationally intractable because of integrality and complicated constraints.Therefore,we relax the integrality and complicated constraints of the formulation and construct a special model known as RELAX-RSMN with a totally unimodular constraint coefficient matrix to solve the relaxed 0–1 ILP rapidly through linear programming.Theoretical analysis and simulation were performed to verify the effectiveness of our approach.
文摘Prior group-based fingerprinting achieves better detection performance when colluders are from the same group. But in digital wholesale and needs to be identified retail, the middleman as well as customers especially against group colluding attack. The group tracing is neglected in previous works. In this paper, we propose a novel multimedia group fingerprint to trace malicious middlemen along with customers. We explore the quality of the non degenerate linear shift register sequence (NDLSRS) which is convenient in group initialization and management. The theoretic analysis and simulation experiment results show that NDLSRS has good resistance against attacks from colluding groups/ members even after its volume expanded.
文摘Based on general packet radio service(GPRS) and TCP/IP protocol,a wireless transmission system of vehicle inspection data is designed. Basic structure and work theory are expounded. SIM300 designed by SIMCOM is used for client GPRS communication module. Using Winsock control of visual basic(VB),the client and server communication has been accomplished. By means of a client and server communications software,the remote wireless transmission of vehicle inspection data has been accomplished also. The server management software has been developed by using Microsoft SQL Server 2000 and VB6.0. Functions of software include import,inquiry,export and maintenance of test data.
基金National Natural Science Foundation of China(No.61163009)。
文摘Wireless sensor networks are extremely vulnerable to various security threats.The intrusion detection method based on game theory can effectively balance the detection rate and energy consumption of the system.The accurate analysis of the attack behavior of malicious sensor nodes can help to configure intrusion detection system,reduce unnecessary system consumption and improve detection efficiency.However,the completely rational assumption of the traditional game model will cause the established model to be inconsistent with the actual attack and defense scenario.In order to formulate a reasonable and effective intrusion detection strategy,we introduce evolutionary game theory to establish an attack evolution game model based on optimal response dynamics,and then analyze the attack behavior of malicious sensor nodes.Theoretical analysis and simulation results show that the evolution trend of attacks is closely related to the number of malicious sensors in the network and the initial state of the strategy,and the attacker can set the initial strategy so that all malicious sensor nodes will eventually launch attacks.Our work is of great significance to guide the development of defense strategies for intrusion detection systems.
基金Supported by National Natural Science Foundation of China (No. 61104026)Open Fund for National Defense Key Subject Laboratory ofSmall Spacecraft Technology (No. HIT. KLOF. 2009092)
文摘To investigate the robust fault detection (RFD) observer design for linear uncertain systems, the H_index and H∞ norm are used to describe this observer design as optimization problems. Conditions for the existence of such a fault detection observer are given in terms of matrix inequalities. The solution is obtained by new iterative linear matrix inequality (ILMI) algorithms. The RFD observer design over finite frequency range in which Of does not have full column rank for a system is also considered. Numerical example demonstrates that the designed fault detection observer has high sensitivity to the fault and strong robustness to the unknown input.