To improve drying uniformity and anthocyanin content of the raspberry puree dried in a continuous microwave dryer,the effects of process parameters(microwave intensity,air velocity,and drying time)on evaluation indexe...To improve drying uniformity and anthocyanin content of the raspberry puree dried in a continuous microwave dryer,the effects of process parameters(microwave intensity,air velocity,and drying time)on evaluation indexes(average temperature,average moisture content,average retention rate of the total anthocyanin content,temperature contrast value,and moisture dispersion value)were investigated via the response surface method(RSM)and the artificial neural network(ANN)with genetic algorithm(GA).The results showed that the microwave intensity and drying time dominated the changes of evaluation indexes.Overall,the ANN model was superior to the RSM model with better estimation ability,and higher drying uniformity and anthocyanin retention rate were achieved for the ANN-GA model compared with RSM.The optimal parameters were microwave intensity of 5.53 W•g^(-1),air velocity of 1.22 m·s^(-1),and drying time of 5.85 min.This study might provide guidance for process optimization of microwave drying berry fruits.展开更多
The demand for cybersecurity is rising recently due to the rapid improvement of network technologies.As a primary defense mechanism,an intrusion detection system(IDS)was anticipated to adapt and secure com-puting infr...The demand for cybersecurity is rising recently due to the rapid improvement of network technologies.As a primary defense mechanism,an intrusion detection system(IDS)was anticipated to adapt and secure com-puting infrastructures from the constantly evolving,sophisticated threat land-scape.Recently,various deep learning methods have been put forth;however,these methods struggle to recognize all forms of assaults,especially infrequent attacks,because of network traffic imbalances and a shortage of aberrant traffic samples for model training.This work introduces deep learning(DL)based Attention based Nested U-Net(ANU-Net)for intrusion detection to address these issues and enhance detection performance.For this IDS model,the first data preprocessing is carried out in three stages:duplication elimi-nation,label transformation,and data normalization.Then the features are extracted and selected based on the Improved Flower Pollination Algorithm(IFPA).The Improved Monarchy Butterfly Optimization Algorithm(IMBO),a new metaheuristic,is used to modify the hyper-parameters in ANU-Net,effectively increasing the learning rate for spatial-temporal information and resolving the imbalance problem.Through the use of parallel programming,the MapReduce architecture reduces computation complexity while signifi-cantly accelerating processing.Three publicly available data sets were used to evaluate and test the approach.The investigational outcomes suggest that the proposed technique can more efficiently boost the performances of IDS under the scenario of unbalanced data.The proposed method achieves above 98%accuracy and classifies various attacks significantly well compared to other classifiers.展开更多
ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we...ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem.展开更多
In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this pape...In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general security model for ID-based proxy multi-signature (ID-PMS) schemes. Then, we show how to construct a secure ID-PMS scheme from a secure ID-based signature scheme, and prove that the security of the construction can be reduced to the security of the original ID-based signature scheme.展开更多
A 330-500 GHz zero-biased broadband monolithic integrated tripler is reported. The measured results show that the maximum efficiency and the maximum output power are 2% and 194μW at 348 GHz. The saturation characteri...A 330-500 GHz zero-biased broadband monolithic integrated tripler is reported. The measured results show that the maximum efficiency and the maximum output power are 2% and 194μW at 348 GHz. The saturation characteristic test shows that the output i dB compression point is about -8.5 dBm at 334 GHz and the maximum efficiency is obtained at the point, which is slightly below the 1 dB compression point. Compared with the conventional hybrid integrated circuit, a major advantage of the monolithic integrated circuit is the significant improvement of reliability and consistency. In this work, a terahertz monolithic frequency multiplier at this band is designed and fabricated.展开更多
To obtain the pyrolysis characteristics and kinetics of preparation process of sludge-based activated carbon by ZnCl2 activation method (i.e.the pyrolysis process of the sludge with ZnCl2 activation),the characteris...To obtain the pyrolysis characteristics and kinetics of preparation process of sludge-based activated carbon by ZnCl2 activation method (i.e.the pyrolysis process of the sludge with ZnCl2 activation),the characteristic of mass loss and gas products generated during pyrolysis of the sludge with ZnCl2 activation were analyzed by thermogravimetric analysis coupled with Fourier Transform Infrared Spectroscopy (TG-FTIR).The kinetic parameters were calculated by the Coats-Redfem method and the mechanism models were established.The role of ZnCl2 in the pyrolysis process of the sludge with ZnCl2 activation was also illustrated through the comparison of the pyrolysis characteristics and kinetics of the sludge with and without ZnCl2 activation.The results showed that the pyrolysis process of the sludge with ZnCl2 activation can be divided into four stages including the dehydration of sludge and initial depolymerization of a small portion of organics matters,the decomposition of large molecular organic matters into small molecular intermediates,the further degradation of intermediates and volatilization of ZnCl2,and the decomposition of inorganic minerals and undecomposed organic matters.CO2,CO,CH4,H2O,some aldehydes and carboxylic acids are the major pyrolysis gaseous products.The activation energies and pre-exponential factors are in the range of 28.84-206.42 kJ/mol and 9885.16-8.08× 1011 min-1,respectively.During the pyrolysis of sludge,ZnC12 not only can function as a dehydration agent and inhibit the formation of tar,but also can peptize the organic matters in the sludge,making them easier to be decomposed.展开更多
Aiming at large error when inertial devices measure the roll angle under high overload conditions,the article designs one kind of roll angle measurement system based on magneto-resistive sensor which calculates the ro...Aiming at large error when inertial devices measure the roll angle under high overload conditions,the article designs one kind of roll angle measurement system based on magneto-resistive sensor which calculates the roll angle by micro controller STM32.Experiment results of a triaxial turntable show that using magneto-resistive sensor to measure roll angle is feasible and of high accuracy,and it can calculate the roll angle of the conventional projectile with the error in 1°.展开更多
This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen ...This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen as the CPU of the embedded server with a linux operation system( OS) environment. The embedded server provides multiple interfaces for supporting various application scenarios. The whole network is based on local area network and adopts the Browser / Server( B / S) model. The monitoring and control node is as a browser endpoint and the remote node with an embedded server is as a server endpoint. Users can easily acquire various sensors information through writing Internet protocol address of remote node on the computer browser. Compared with client / server( C / S) mode,B / S model needs less maintain and can be applicable to large user group. In addition,a simple network management protocol( SNMP) is used for management of devices in Internet protocol( IP) networks. The results of the demonstration experiment show that the proposed system gives good support to manage the network from different user terminals and allows the users to better interact with the ambient environment.展开更多
A field-programmable gate array(FPGA)based high-speed broadband data acquisition system is designed.The system has a dual channel simultaneous acquisition function.The maximum sampling rate is 500 MSa/s and bandwidth ...A field-programmable gate array(FPGA)based high-speed broadband data acquisition system is designed.The system has a dual channel simultaneous acquisition function.The maximum sampling rate is 500 MSa/s and bandwidth is200 MHz,which solves the large bandwidth,high-speed signal acquisition and processing problems.At present,the data acquisition system is successfully used in broadband receiver test systems.展开更多
Considering wireless sensor network characteristics,this paper uses network simulator,version2(NS-2)algorithm to improve Ad hoc on-demand distance vector(AODV)routing algorithm,so that it can be applied to wireless se...Considering wireless sensor network characteristics,this paper uses network simulator,version2(NS-2)algorithm to improve Ad hoc on-demand distance vector(AODV)routing algorithm,so that it can be applied to wireless sensor networks.After studying AODV routing protocol,a new algorithm called Must is brought up.This paper introduces the background and algorithm theory of Must,and discusses the details about how to implement Must algorithm.At last,using network simulator(NS-2),the performance of Must is evaluated and compared with that of AODV.Simulation results show that the network using Must algorithm has perfect performance.展开更多
In the field of mobile robotics,human tracking has emerged as an important objective for facilitating human-robot interaction.In this paper,we propose a particle-filter-based walking prediction model that will address...In the field of mobile robotics,human tracking has emerged as an important objective for facilitating human-robot interaction.In this paper,we propose a particle-filter-based walking prediction model that will address an occlusion situation.Since the target being tracked is a human leg,a motion model for a leg is required.The validity of the proposed model is verified experimentally.展开更多
Sale-leaseback is paid special focus on for its great application in China in recent years.By giving a detailed analysis,an analysis of the features of sale-leaseback and a study of the risks of it are given in this p...Sale-leaseback is paid special focus on for its great application in China in recent years.By giving a detailed analysis,an analysis of the features of sale-leaseback and a study of the risks of it are given in this paper.Then a quantitative analysis of commercial real estate sale-leaseback is carried out.The scientific theoretical analysis is provided in this paper for risk assessment in commercial real estate sale-leaseback mode in China.An effective approach is put forward for sale-leaseback project evaluation and prevention of risk.A useful means is given to supervise commerciai real estate sale-leaseback mode for relevant departments and a certain contribution is made to a further sound development of commercial real estate sale-leaseback mode.展开更多
Recently,both the importance and awareness relating to food safety relating to agrochemicals,chemical fertilizers,the pollution of ecosystem and unwholesome foods are growing rapidly.For the same reason,the purchaser&...Recently,both the importance and awareness relating to food safety relating to agrochemicals,chemical fertilizers,the pollution of ecosystem and unwholesome foods are growing rapidly.For the same reason,the purchaser's curiosity increases to know about the production process which can be accomplished by production traceability system.The traceability system can store and superintend the specific attribute information about products regarding the productive centre,producer and production finish data.The products undergo various circulation processes and they are being managed by individually constructed traceability system.Thus,it is difficult for the producer and the consumer to guarantee the safety from transpirable issues about the falsification of production traceability because the traceability information can be re-produced by forging through various ways.So in this paper,we proposed a system for integrated management of agro-fishery products based on quick response code(QR-code)for forgery prevention which may help to solve these issues.The proposed system makes QR-code using production information provided by producer.And then it is provided to the distributor and the consumer through integrated service model using the QR-code.Therefore,this system make sure to provide the same production traceability about the products to the distributor and the consumer and always keeps both updated with the same information.展开更多
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection ag...Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively.展开更多
Applying calculation method in alloy design should be an important tendency due to its characters of inexpensive cost, high efficiency and prediction. DOS calculations of AuSn, AsSn and SbSn Sn- based alloys have ...Applying calculation method in alloy design should be an important tendency due to its characters of inexpensive cost, high efficiency and prediction. DOS calculations of AuSn, AsSn and SbSn Sn- based alloys have been investigated by employing DV - Xa method, in which different cluster models were adopted to calculate electron structure.It is proved that some regulations must be taken into ac- count in order to carry out alloy design calculation successfully,which are described in this paper in detail.展开更多
The viscose rayon was pretreated with four different pre-treatment reagents respectively, and the preparation ofactivated carbon fibers (ACF) was performed undersame carbonizing and activating conditions. The poresize...The viscose rayon was pretreated with four different pre-treatment reagents respectively, and the preparation ofactivated carbon fibers (ACF) was performed undersame carbonizing and activating conditions. The poresize distribution, the specific surface area, and the porestructure parameter of these viscose - based ACF werestudied by using quartz spring balance BET- weightmethod. The experiment result indicates that the poresize distribution and the pore structure parameter ofACF is varied by using different pretreatment reagents.展开更多
An“Intrusion Detection System”(IDS)is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network.Signature-based IDSs employ an attack signature...An“Intrusion Detection System”(IDS)is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network.Signature-based IDSs employ an attack signature database to identify intrusions.This indicates that the system can only identify known attacks and cannot identify brand-new or unidentified assaults.In Wireless 6G IoT networks,signature-based IDSs can be useful to detect a wide range of known attacks such as viruses,worms,and Trojans.However,these networks have specific requirements and constraints,such as the need for real-time detection and low-power operation.To meet these requirements,the IDS algorithm should be designed to be efficient in terms of resource usage and should include a mechanism for updating the attack signatures to keep up with evolving threats.This paper provides a solution for a signature-based intrusion detection system in wireless 6G IoT Networks,in which three different algorithms were used and implemented by using python and JavaScript programming languages and an accuracy of 98.9%is achieved.展开更多
Uncertain local flexural stiffness is recognized as one of the main barriers against the application of existing damage detection and performance degradation alarming techniques to real-world beams.Therefore,damage lo...Uncertain local flexural stiffness is recognized as one of the main barriers against the application of existing damage detection and performance degradation alarming techniques to real-world beams.Therefore,damage localization of beams with original uncertainty has been investigated to ensure their safety.For the beam before serving,it should be simply supported and subject to static load.Based on the concept of suppositional partition,a new loading pattern and mid-span displacement data processing method has been proposed.Actual local flexural stiffness value of each partition can be obtained by solving a set of linear equations.The obtained stiffness data can be used to establish the finite element model of beams.Subsequently,dynamic excitation and mode identification should be carried out for the beam in service.Mode shape curvature index is employed to detect the position of damage.It was validated by example that actual damage and original uncertainty of local flexural stiffness can be differentiated by this new method effectively.The combination of static load and dynamic excitation can keep the serviceability of beam.展开更多
By means of programs GTMPAC based- on generalized triangle method,analysis and synthesis of mechanism design in accordance with absolutely graphicalmethod( absolutely germetrical method) are developed.In this paper,we...By means of programs GTMPAC based- on generalized triangle method,analysis and synthesis of mechanism design in accordance with absolutely graphicalmethod( absolutely germetrical method) are developed.In this paper,we make aspecial study about centering- point curve and circling- point curve and couplercurves based on Ball’s points.展开更多
Self-organizing map(SOM) proposed by Kohonen has obtained certain achievements in solving the traveling salesman problem(TSP).To improve Kohonen SOM,an effective initialization and parameter modification method is dis...Self-organizing map(SOM) proposed by Kohonen has obtained certain achievements in solving the traveling salesman problem(TSP).To improve Kohonen SOM,an effective initialization and parameter modification method is discussed to obtain a faster convergence rate and better solution.Therefore,a new improved self-organizing map(ISOM)algorithm is introduced and applied to four traveling salesman problem instances for experimental simulation,and then the result of ISOM is compared with those of four SOM algorithms:AVL,KL,KG and MSTSP.Using ISOM,the average error of four travelingsalesman problem instances is only 2.895 0%,which is greatly better than the other four algorithms:8.51%(AVL),6.147 5%(KL),6.555%(KG) and 3.420 9%(MSTSP).Finally,ISOM is applied to two practical problems:the Chinese 100 cities-TSP and102 counties-TSP in Shanxi Province,and the two optimal touring routes are provided to the tourists.展开更多
基金Supported by the National Natural Science Foundation of China(32072352)。
文摘To improve drying uniformity and anthocyanin content of the raspberry puree dried in a continuous microwave dryer,the effects of process parameters(microwave intensity,air velocity,and drying time)on evaluation indexes(average temperature,average moisture content,average retention rate of the total anthocyanin content,temperature contrast value,and moisture dispersion value)were investigated via the response surface method(RSM)and the artificial neural network(ANN)with genetic algorithm(GA).The results showed that the microwave intensity and drying time dominated the changes of evaluation indexes.Overall,the ANN model was superior to the RSM model with better estimation ability,and higher drying uniformity and anthocyanin retention rate were achieved for the ANN-GA model compared with RSM.The optimal parameters were microwave intensity of 5.53 W•g^(-1),air velocity of 1.22 m·s^(-1),and drying time of 5.85 min.This study might provide guidance for process optimization of microwave drying berry fruits.
文摘The demand for cybersecurity is rising recently due to the rapid improvement of network technologies.As a primary defense mechanism,an intrusion detection system(IDS)was anticipated to adapt and secure com-puting infrastructures from the constantly evolving,sophisticated threat land-scape.Recently,various deep learning methods have been put forth;however,these methods struggle to recognize all forms of assaults,especially infrequent attacks,because of network traffic imbalances and a shortage of aberrant traffic samples for model training.This work introduces deep learning(DL)based Attention based Nested U-Net(ANU-Net)for intrusion detection to address these issues and enhance detection performance.For this IDS model,the first data preprocessing is carried out in three stages:duplication elimi-nation,label transformation,and data normalization.Then the features are extracted and selected based on the Improved Flower Pollination Algorithm(IFPA).The Improved Monarchy Butterfly Optimization Algorithm(IMBO),a new metaheuristic,is used to modify the hyper-parameters in ANU-Net,effectively increasing the learning rate for spatial-temporal information and resolving the imbalance problem.Through the use of parallel programming,the MapReduce architecture reduces computation complexity while signifi-cantly accelerating processing.Three publicly available data sets were used to evaluate and test the approach.The investigational outcomes suggest that the proposed technique can more efficiently boost the performances of IDS under the scenario of unbalanced data.The proposed method achieves above 98%accuracy and classifies various attacks significantly well compared to other classifiers.
基金Supported bythe National Key Basic Research andDevelopment Program (973 Program G1999035804),the NationalNatural Science Foundation of China (90204015 ,60473021) and theElitist Youth Foundation of Henan Province (021201400)
文摘ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem.
基金Supported by the National Natural Science Foundation of China (60473021) and the Science Foundation of Henan Province (0511010900)
文摘In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general security model for ID-based proxy multi-signature (ID-PMS) schemes. Then, we show how to construct a secure ID-PMS scheme from a secure ID-based signature scheme, and prove that the security of the construction can be reduced to the security of the original ID-based signature scheme.
基金Supported by the National High-Technology Research and Development Program of China under Grant No 2011AA010203the National Basic Research Program of China under Grant Nos 2011CB201704 and 2010CB327502the National Natural Science Foundation of China under Grant Nos 61434006 and 61106074
文摘A 330-500 GHz zero-biased broadband monolithic integrated tripler is reported. The measured results show that the maximum efficiency and the maximum output power are 2% and 194μW at 348 GHz. The saturation characteristic test shows that the output i dB compression point is about -8.5 dBm at 334 GHz and the maximum efficiency is obtained at the point, which is slightly below the 1 dB compression point. Compared with the conventional hybrid integrated circuit, a major advantage of the monolithic integrated circuit is the significant improvement of reliability and consistency. In this work, a terahertz monolithic frequency multiplier at this band is designed and fabricated.
基金Sponsored by the National Natural Science Foundation of China(Grant No.51008106)
文摘To obtain the pyrolysis characteristics and kinetics of preparation process of sludge-based activated carbon by ZnCl2 activation method (i.e.the pyrolysis process of the sludge with ZnCl2 activation),the characteristic of mass loss and gas products generated during pyrolysis of the sludge with ZnCl2 activation were analyzed by thermogravimetric analysis coupled with Fourier Transform Infrared Spectroscopy (TG-FTIR).The kinetic parameters were calculated by the Coats-Redfem method and the mechanism models were established.The role of ZnCl2 in the pyrolysis process of the sludge with ZnCl2 activation was also illustrated through the comparison of the pyrolysis characteristics and kinetics of the sludge with and without ZnCl2 activation.The results showed that the pyrolysis process of the sludge with ZnCl2 activation can be divided into four stages including the dehydration of sludge and initial depolymerization of a small portion of organics matters,the decomposition of large molecular organic matters into small molecular intermediates,the further degradation of intermediates and volatilization of ZnCl2,and the decomposition of inorganic minerals and undecomposed organic matters.CO2,CO,CH4,H2O,some aldehydes and carboxylic acids are the major pyrolysis gaseous products.The activation energies and pre-exponential factors are in the range of 28.84-206.42 kJ/mol and 9885.16-8.08× 1011 min-1,respectively.During the pyrolysis of sludge,ZnC12 not only can function as a dehydration agent and inhibit the formation of tar,but also can peptize the organic matters in the sludge,making them easier to be decomposed.
基金National Natural Science Foundation of China(No.61004127)
文摘Aiming at large error when inertial devices measure the roll angle under high overload conditions,the article designs one kind of roll angle measurement system based on magneto-resistive sensor which calculates the roll angle by micro controller STM32.Experiment results of a triaxial turntable show that using magneto-resistive sensor to measure roll angle is feasible and of high accuracy,and it can calculate the roll angle of the conventional projectile with the error in 1°.
基金Sponsored by the National High Technology Research and Development Program(Grant No.2012AA02A604)
文摘This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen as the CPU of the embedded server with a linux operation system( OS) environment. The embedded server provides multiple interfaces for supporting various application scenarios. The whole network is based on local area network and adopts the Browser / Server( B / S) model. The monitoring and control node is as a browser endpoint and the remote node with an embedded server is as a server endpoint. Users can easily acquire various sensors information through writing Internet protocol address of remote node on the computer browser. Compared with client / server( C / S) mode,B / S model needs less maintain and can be applicable to large user group. In addition,a simple network management protocol( SNMP) is used for management of devices in Internet protocol( IP) networks. The results of the demonstration experiment show that the proposed system gives good support to manage the network from different user terminals and allows the users to better interact with the ambient environment.
文摘A field-programmable gate array(FPGA)based high-speed broadband data acquisition system is designed.The system has a dual channel simultaneous acquisition function.The maximum sampling rate is 500 MSa/s and bandwidth is200 MHz,which solves the large bandwidth,high-speed signal acquisition and processing problems.At present,the data acquisition system is successfully used in broadband receiver test systems.
文摘Considering wireless sensor network characteristics,this paper uses network simulator,version2(NS-2)algorithm to improve Ad hoc on-demand distance vector(AODV)routing algorithm,so that it can be applied to wireless sensor networks.After studying AODV routing protocol,a new algorithm called Must is brought up.This paper introduces the background and algorithm theory of Must,and discusses the details about how to implement Must algorithm.At last,using network simulator(NS-2),the performance of Must is evaluated and compared with that of AODV.Simulation results show that the network using Must algorithm has perfect performance.
基金The MKE(Ministry of Knowledge Economy),Korea,under the ITRC(Information Technology Research Center)support program(NIPA-2013-H0301-13-2006)supervised by the NIPA(National IT Industry Promotion Agency)The National Research Foundation of Korea(NRF)grant funded by the Korea government(MEST)(2013-029812)The MKE(Ministry of Knowledge Economy),Korea,under the Human Resources Development Program for Convergence Robot Specialists support program supervised by the NIPA(National IT Industry Promotion Agency)(NIPA-2013-H1502-13-1001)
文摘In the field of mobile robotics,human tracking has emerged as an important objective for facilitating human-robot interaction.In this paper,we propose a particle-filter-based walking prediction model that will address an occlusion situation.Since the target being tracked is a human leg,a motion model for a leg is required.The validity of the proposed model is verified experimentally.
文摘Sale-leaseback is paid special focus on for its great application in China in recent years.By giving a detailed analysis,an analysis of the features of sale-leaseback and a study of the risks of it are given in this paper.Then a quantitative analysis of commercial real estate sale-leaseback is carried out.The scientific theoretical analysis is provided in this paper for risk assessment in commercial real estate sale-leaseback mode in China.An effective approach is put forward for sale-leaseback project evaluation and prevention of risk.A useful means is given to supervise commerciai real estate sale-leaseback mode for relevant departments and a certain contribution is made to a further sound development of commercial real estate sale-leaseback mode.
基金The MSIP(Ministry of Science,ICT&Future Planning),Korea,under the ITRC(Information Technology Research Center)support program(NIPA-2013-H0301-13-2006)supervised by the NIPA(National IT Industry Promotion Agency)
文摘Recently,both the importance and awareness relating to food safety relating to agrochemicals,chemical fertilizers,the pollution of ecosystem and unwholesome foods are growing rapidly.For the same reason,the purchaser's curiosity increases to know about the production process which can be accomplished by production traceability system.The traceability system can store and superintend the specific attribute information about products regarding the productive centre,producer and production finish data.The products undergo various circulation processes and they are being managed by individually constructed traceability system.Thus,it is difficult for the producer and the consumer to guarantee the safety from transpirable issues about the falsification of production traceability because the traceability information can be re-produced by forging through various ways.So in this paper,we proposed a system for integrated management of agro-fishery products based on quick response code(QR-code)for forgery prevention which may help to solve these issues.The proposed system makes QR-code using production information provided by producer.And then it is provided to the distributor and the consumer through integrated service model using the QR-code.Therefore,this system make sure to provide the same production traceability about the products to the distributor and the consumer and always keeps both updated with the same information.
文摘Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively.
文摘Applying calculation method in alloy design should be an important tendency due to its characters of inexpensive cost, high efficiency and prediction. DOS calculations of AuSn, AsSn and SbSn Sn- based alloys have been investigated by employing DV - Xa method, in which different cluster models were adopted to calculate electron structure.It is proved that some regulations must be taken into ac- count in order to carry out alloy design calculation successfully,which are described in this paper in detail.
文摘The viscose rayon was pretreated with four different pre-treatment reagents respectively, and the preparation ofactivated carbon fibers (ACF) was performed undersame carbonizing and activating conditions. The poresize distribution, the specific surface area, and the porestructure parameter of these viscose - based ACF werestudied by using quartz spring balance BET- weightmethod. The experiment result indicates that the poresize distribution and the pore structure parameter ofACF is varied by using different pretreatment reagents.
文摘An“Intrusion Detection System”(IDS)is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network.Signature-based IDSs employ an attack signature database to identify intrusions.This indicates that the system can only identify known attacks and cannot identify brand-new or unidentified assaults.In Wireless 6G IoT networks,signature-based IDSs can be useful to detect a wide range of known attacks such as viruses,worms,and Trojans.However,these networks have specific requirements and constraints,such as the need for real-time detection and low-power operation.To meet these requirements,the IDS algorithm should be designed to be efficient in terms of resource usage and should include a mechanism for updating the attack signatures to keep up with evolving threats.This paper provides a solution for a signature-based intrusion detection system in wireless 6G IoT Networks,in which three different algorithms were used and implemented by using python and JavaScript programming languages and an accuracy of 98.9%is achieved.
基金Scientific and Technological Research Projects in Henan,China(No.122102210165)
文摘Uncertain local flexural stiffness is recognized as one of the main barriers against the application of existing damage detection and performance degradation alarming techniques to real-world beams.Therefore,damage localization of beams with original uncertainty has been investigated to ensure their safety.For the beam before serving,it should be simply supported and subject to static load.Based on the concept of suppositional partition,a new loading pattern and mid-span displacement data processing method has been proposed.Actual local flexural stiffness value of each partition can be obtained by solving a set of linear equations.The obtained stiffness data can be used to establish the finite element model of beams.Subsequently,dynamic excitation and mode identification should be carried out for the beam in service.Mode shape curvature index is employed to detect the position of damage.It was validated by example that actual damage and original uncertainty of local flexural stiffness can be differentiated by this new method effectively.The combination of static load and dynamic excitation can keep the serviceability of beam.
文摘By means of programs GTMPAC based- on generalized triangle method,analysis and synthesis of mechanism design in accordance with absolutely graphicalmethod( absolutely germetrical method) are developed.In this paper,we make aspecial study about centering- point curve and circling- point curve and couplercurves based on Ball’s points.
文摘Self-organizing map(SOM) proposed by Kohonen has obtained certain achievements in solving the traveling salesman problem(TSP).To improve Kohonen SOM,an effective initialization and parameter modification method is discussed to obtain a faster convergence rate and better solution.Therefore,a new improved self-organizing map(ISOM)algorithm is introduced and applied to four traveling salesman problem instances for experimental simulation,and then the result of ISOM is compared with those of four SOM algorithms:AVL,KL,KG and MSTSP.Using ISOM,the average error of four travelingsalesman problem instances is only 2.895 0%,which is greatly better than the other four algorithms:8.51%(AVL),6.147 5%(KL),6.555%(KG) and 3.420 9%(MSTSP).Finally,ISOM is applied to two practical problems:the Chinese 100 cities-TSP and102 counties-TSP in Shanxi Province,and the two optimal touring routes are provided to the tourists.