Storing and querying XML (eXtensible Markup Language) data in relational form can exploit various services offered by modern relational database management systems (RDBMSs). Due to structural complexity of XML, there ...Storing and querying XML (eXtensible Markup Language) data in relational form can exploit various services offered by modern relational database management systems (RDBMSs). Due to structural complexity of XML, there are many equivalent relational mapping schemes for the same XML data and queries. In this paper, we propose the adaptive XML to relational mapping (AX2RM) system, which considers finding optimal XML to relational (X2R) mapping as four separate but correlated procedures: logical database design, data scale estimation, workload transformation, and physical database design. We view the whole process as an autonomic computing problem and formalize the adaptive X2R mapping problem. Search spaces for each procedure are investigated individually, and five approaches for finding the optimal mapping are studied. We propose an integrated approach with greedy pruning (IT-GP), which views the mapping procedures as a whole and exploits heuristic rules in each procedure to prune impossible mappings as early as possible. Evaluation of these approaches shows the validity and high efficiency of IT-GP.展开更多
A Fault detection and isolation(FDI)scheme for discrete time-delay system is proposed in this paper,which can not only detect but also isolate the faults.A time delay operator is introduced to resolve the problem bro...A Fault detection and isolation(FDI)scheme for discrete time-delay system is proposed in this paper,which can not only detect but also isolate the faults.A time delay operator is introduced to resolve the problem brought by the time-delay system.The design and computation for the FDI system is carried by computer math tool Maple,which can easily deal with the symbolic computation.Residuals in the form of parity space can be deduced from the recursion of the system equations.Further more,a generalized residual set is created using the freedom of the parity space redundancy.Thus,both fault detection and fault isolation have been accomplished.The proposed method has been verified by a numerical example.展开更多
The randomness and complexity of urban traffic scenes make it a difficult task for self-driving cars to detect drivable areas, Inspired by human driving behaviors, we propose a novel method of drivable area detection ...The randomness and complexity of urban traffic scenes make it a difficult task for self-driving cars to detect drivable areas, Inspired by human driving behaviors, we propose a novel method of drivable area detection for self-driving cars based on fusing pixel information from a monocular camera with spatial information from a light detection and ranging (LIDAR) scanner, Similar to the bijection of collineation, a new concept called co-point mapping, which is a bijection that maps points from the LIDAR scanner to points on the edge of the image segmentation, is introduced in the proposed method, Our method posi- tions candidate drivable areas through self-learning models based on the initial drivable areas that are obtained by fusing obstacle information with superpixels, In addition, a fusion of four features is applied in order to achieve a more robust performance, In particular, a feature called drivable degree (DD) is pro- posed to characterize the drivable degree of the LIDAR points, After the initial drivable area is characterized by the features obtained through self-learning, a Bayesian framework is utilized to calculate the final probability map of the drivable area, Our approach introduces no common hypothesis and requires no training steps; yet it yields a state-of-art performance when tested on the ROAD-KITTI benchmark, Experimental results demonstrate that the proposed method is a general and efficient approach for detecting drivable area,展开更多
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworth...Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15.展开更多
Most existing overlay multicast approaches refuse to consider any network layer support no matter whether it is available or not. This design principle greatly increases the complexity of the routing algorithms and ma...Most existing overlay multicast approaches refuse to consider any network layer support no matter whether it is available or not. This design principle greatly increases the complexity of the routing algorithms and makes the overlay topologies incompatible with the underlying network. To address these issues, topology-aware overlay multicast over IP multicast networks (TOMIMN) was proposed as a novel overlay multicast protocol, which exploits the cooperation between end-hosts and IP multicast routers to construct a topology-aware overlay tree. Through a little modification to protocol independent multicast sparse mode (PIM-SM), a multicast router is able to receive registration from nearby group members and redirect passing-by join requests to them. Due to the multicast router's support, TOMIMN organizes its group members into an overlay multicast tree efficiently, which matches the physical network topology well.展开更多
This letter introduces a 4th order active RC complex filter with 1.SMHz center frequency and 1MHz bandwidth. The total harmonic distortion of the filter is less than -60dB and the image rejection ratio is greater than...This letter introduces a 4th order active RC complex filter with 1.SMHz center frequency and 1MHz bandwidth. The total harmonic distortion of the filter is less than -60dB and the image rejection ratio is greater than 60dB. A novel technique is also proposed in this letter to automatically adjust the variation of the time constant. The advantages of the proposed method are its high precision and simplicity. Using 5bits control words, the tuning error is less than ±1.6%.展开更多
A more recent branch of natural computing is DNA computing. At the theoretical level, DNA computing is powerful. This is due to the fact that DNA structure and processing suggest a series of new data structures and op...A more recent branch of natural computing is DNA computing. At the theoretical level, DNA computing is powerful. This is due to the fact that DNA structure and processing suggest a series of new data structures and operations, and to the fact of the massive parallelism. The insertion-deletion system (insdel system) is a DNA computing model based on two genetic operations: insertion and deletion which, working together, are very powerful, leading to characterizations of recursively enumerable lan- guages. When designing an insdel computer, it is natural to try to keep the underlying model as simple as possible. One idea is to use either only insertion operations or only deletion operations. By helping with a weak coding and a morphism, the family INS4^7DEL0^0 is equal to the family of recursively enumerable languages. It is an open problem proposed by Martin-Vide et al. on whether or not the parameters 4 and 7 appearing here can be replaced by smaller numbers. In this paper, our positive answer to this question is that INS2^4DEL0^0 can also play the same role as insertion and deletion. We suppose that the INS2^4DEL0^0 may be the least only-insertion insdel system in this situation. We will give some reasons supporting this conjecture in our paper.展开更多
In cooperative multiagent systems, to learn the optimal policies of multiagents is very difficult. As the numbers of states and actions increase exponentially with the number of agents, their action policies become mo...In cooperative multiagent systems, to learn the optimal policies of multiagents is very difficult. As the numbers of states and actions increase exponentially with the number of agents, their action policies become more intractable. By learning these value functions, an agent can learn its optimal action policies for a task. If a task can be decomposed into several subtasks and the agents have learned the optimal value functions for each subtask, this knowledge can be helpful for the agents in learning the optimal action policies for the whole task when they are acting simultaneously. When merging the agents’ independently learned optimal value functions, a novel multiagent online reinforcement learning algorithm LU-Q is proposed. By applying a transformation to the individually learned value functions, the constraints on the optimal value functions of each subtask are loosened. In each learning iteration process in algorithm LU-Q, the agents’ joint action set in a state is processed. Some actions of that state are pruned from the available action set according to the defined multiagent value function in LU-Q. As the items of the available action set of each state are reduced gradually in the iteration process of LU-Q, the convergence of the value functions is accelerated. LU-Q’s effectiveness, soundness and convergence are analyzed, and the experimental results show that the learning performance of LU-Q is better than the performance of standard Q learning.展开更多
Simulation and optimization are the key points of virtual product development (VPD). Traditional engineering simulation software and optimization methods are inadequate to analyze the optimization problems because of ...Simulation and optimization are the key points of virtual product development (VPD). Traditional engineering simulation software and optimization methods are inadequate to analyze the optimization problems because of its computational inefficiency. A systematic design optimization strategy by using statistical methods and mathematical optimization technologies is proposed. This method extends the design of experiments (DOE) and the simulation metamodel technologies. Metamodels are built to in place of detailed simulation codes based on effectively DOE, and then be linked to optimization routines for fast analysis, or serve as a bridge for integrating simulation software across different domains. A design optimization of composite material structure is used to demonstrate the newly introduced methodology.展开更多
With the rapid development of information technology, adopting advanced distributed computing technology to construct robot control system is becoming an effective approach gradually. This paper proposes a distributed...With the rapid development of information technology, adopting advanced distributed computing technology to construct robot control system is becoming an effective approach gradually. This paper proposes a distributed loosely coupled software architecture based on Agent and CORBA to control multiple robots. This model provides the robot user with agent control units at the semantic level and CORBA provides function interfaces to agent at the syntax level, which shows a good adaptability, flexibility and transparence.展开更多
It is still a laborious work to consult massive multidisciplinary geological maps which are scattered in different geological departments,and hard to give full play to the potential application value of geological map...It is still a laborious work to consult massive multidisciplinary geological maps which are scattered in different geological departments,and hard to give full play to the potential application value of geological map. Along with the network,the development of communication and computer technology,especially with the Web2.0 technology arisen,provides opportunities to the web for sharing of geological maps. Web fast sharing platform of massive geological maps( WSPGM) is based on the Flex technology development,using B/S architecture,with map navigation,search,display,security and other functions of the software system. Through the map pretreatment and asynchronous communication the system can display any size of geological map,and through the range limits,rights management,sharing system and watermark logo to take effective security on geological map. On the basis of this system,with the Jilin University web sharing system of geological map,the system can greatly improve the efficiency of using geological map. for research.展开更多
基金the National Natural Science Foundation of China (No. 60603044)the China Postdoctoral Science Foundation (No. 20070411179)the Program for Changjiang Scholars and Innovative Research Team in University of China (No. IRT0652)
文摘Storing and querying XML (eXtensible Markup Language) data in relational form can exploit various services offered by modern relational database management systems (RDBMSs). Due to structural complexity of XML, there are many equivalent relational mapping schemes for the same XML data and queries. In this paper, we propose the adaptive XML to relational mapping (AX2RM) system, which considers finding optimal XML to relational (X2R) mapping as four separate but correlated procedures: logical database design, data scale estimation, workload transformation, and physical database design. We view the whole process as an autonomic computing problem and formalize the adaptive X2R mapping problem. Search spaces for each procedure are investigated individually, and five approaches for finding the optimal mapping are studied. We propose an integrated approach with greedy pruning (IT-GP), which views the mapping procedures as a whole and exploits heuristic rules in each procedure to prune impossible mappings as early as possible. Evaluation of these approaches shows the validity and high efficiency of IT-GP.
基金National Natural Science Foundation of China(No.60574081)
文摘A Fault detection and isolation(FDI)scheme for discrete time-delay system is proposed in this paper,which can not only detect but also isolate the faults.A time delay operator is introduced to resolve the problem brought by the time-delay system.The design and computation for the FDI system is carried by computer math tool Maple,which can easily deal with the symbolic computation.Residuals in the form of parity space can be deduced from the recursion of the system equations.Further more,a generalized residual set is created using the freedom of the parity space redundancy.Thus,both fault detection and fault isolation have been accomplished.The proposed method has been verified by a numerical example.
基金This research was partially supported by the National Natural Science Foundation of China (61773312), the National Key Research and Development Plan (2017YFC0803905), and the Program of Introducing Talents of Discipline to University (B13043).
文摘The randomness and complexity of urban traffic scenes make it a difficult task for self-driving cars to detect drivable areas, Inspired by human driving behaviors, we propose a novel method of drivable area detection for self-driving cars based on fusing pixel information from a monocular camera with spatial information from a light detection and ranging (LIDAR) scanner, Similar to the bijection of collineation, a new concept called co-point mapping, which is a bijection that maps points from the LIDAR scanner to points on the edge of the image segmentation, is introduced in the proposed method, Our method posi- tions candidate drivable areas through self-learning models based on the initial drivable areas that are obtained by fusing obstacle information with superpixels, In addition, a fusion of four features is applied in order to achieve a more robust performance, In particular, a feature called drivable degree (DD) is pro- posed to characterize the drivable degree of the LIDAR points, After the initial drivable area is characterized by the features obtained through self-learning, a Bayesian framework is utilized to calculate the final probability map of the drivable area, Our approach introduces no common hypothesis and requires no training steps; yet it yields a state-of-art performance when tested on the ROAD-KITTI benchmark, Experimental results demonstrate that the proposed method is a general and efficient approach for detecting drivable area,
基金The National High-Tech Research and Development (863) Program of China (No. 2005AA145110, No. 2006AA01Z436) The Natural Science Foundation of Shanghai (No. 05ZR14083) The Pudong New Area Technology Innovation Public Service Platform of China (No. PDPT2005-04)
文摘Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15.
文摘Most existing overlay multicast approaches refuse to consider any network layer support no matter whether it is available or not. This design principle greatly increases the complexity of the routing algorithms and makes the overlay topologies incompatible with the underlying network. To address these issues, topology-aware overlay multicast over IP multicast networks (TOMIMN) was proposed as a novel overlay multicast protocol, which exploits the cooperation between end-hosts and IP multicast routers to construct a topology-aware overlay tree. Through a little modification to protocol independent multicast sparse mode (PIM-SM), a multicast router is able to receive registration from nearby group members and redirect passing-by join requests to them. Due to the multicast router's support, TOMIMN organizes its group members into an overlay multicast tree efficiently, which matches the physical network topology well.
基金Supported by the Key Project of the National Natural Science Foundation of China (No.60437030) the Tianjin Natural Science Foundation (No.05YFJMJC01400).
文摘This letter introduces a 4th order active RC complex filter with 1.SMHz center frequency and 1MHz bandwidth. The total harmonic distortion of the filter is less than -60dB and the image rejection ratio is greater than 60dB. A novel technique is also proposed in this letter to automatically adjust the variation of the time constant. The advantages of the proposed method are its high precision and simplicity. Using 5bits control words, the tuning error is less than ±1.6%.
文摘A more recent branch of natural computing is DNA computing. At the theoretical level, DNA computing is powerful. This is due to the fact that DNA structure and processing suggest a series of new data structures and operations, and to the fact of the massive parallelism. The insertion-deletion system (insdel system) is a DNA computing model based on two genetic operations: insertion and deletion which, working together, are very powerful, leading to characterizations of recursively enumerable lan- guages. When designing an insdel computer, it is natural to try to keep the underlying model as simple as possible. One idea is to use either only insertion operations or only deletion operations. By helping with a weak coding and a morphism, the family INS4^7DEL0^0 is equal to the family of recursively enumerable languages. It is an open problem proposed by Martin-Vide et al. on whether or not the parameters 4 and 7 appearing here can be replaced by smaller numbers. In this paper, our positive answer to this question is that INS2^4DEL0^0 can also play the same role as insertion and deletion. We suppose that the INS2^4DEL0^0 may be the least only-insertion insdel system in this situation. We will give some reasons supporting this conjecture in our paper.
文摘In cooperative multiagent systems, to learn the optimal policies of multiagents is very difficult. As the numbers of states and actions increase exponentially with the number of agents, their action policies become more intractable. By learning these value functions, an agent can learn its optimal action policies for a task. If a task can be decomposed into several subtasks and the agents have learned the optimal value functions for each subtask, this knowledge can be helpful for the agents in learning the optimal action policies for the whole task when they are acting simultaneously. When merging the agents’ independently learned optimal value functions, a novel multiagent online reinforcement learning algorithm LU-Q is proposed. By applying a transformation to the individually learned value functions, the constraints on the optimal value functions of each subtask are loosened. In each learning iteration process in algorithm LU-Q, the agents’ joint action set in a state is processed. Some actions of that state are pruned from the available action set according to the defined multiagent value function in LU-Q. As the items of the available action set of each state are reduced gradually in the iteration process of LU-Q, the convergence of the value functions is accelerated. LU-Q’s effectiveness, soundness and convergence are analyzed, and the experimental results show that the learning performance of LU-Q is better than the performance of standard Q learning.
文摘Simulation and optimization are the key points of virtual product development (VPD). Traditional engineering simulation software and optimization methods are inadequate to analyze the optimization problems because of its computational inefficiency. A systematic design optimization strategy by using statistical methods and mathematical optimization technologies is proposed. This method extends the design of experiments (DOE) and the simulation metamodel technologies. Metamodels are built to in place of detailed simulation codes based on effectively DOE, and then be linked to optimization routines for fast analysis, or serve as a bridge for integrating simulation software across different domains. A design optimization of composite material structure is used to demonstrate the newly introduced methodology.
文摘With the rapid development of information technology, adopting advanced distributed computing technology to construct robot control system is becoming an effective approach gradually. This paper proposes a distributed loosely coupled software architecture based on Agent and CORBA to control multiple robots. This model provides the robot user with agent control units at the semantic level and CORBA provides function interfaces to agent at the syntax level, which shows a good adaptability, flexibility and transparence.
文摘It is still a laborious work to consult massive multidisciplinary geological maps which are scattered in different geological departments,and hard to give full play to the potential application value of geological map. Along with the network,the development of communication and computer technology,especially with the Web2.0 technology arisen,provides opportunities to the web for sharing of geological maps. Web fast sharing platform of massive geological maps( WSPGM) is based on the Flex technology development,using B/S architecture,with map navigation,search,display,security and other functions of the software system. Through the map pretreatment and asynchronous communication the system can display any size of geological map,and through the range limits,rights management,sharing system and watermark logo to take effective security on geological map. On the basis of this system,with the Jilin University web sharing system of geological map,the system can greatly improve the efficiency of using geological map. for research.