Signals from infrared detector are very weak in SO2 concentration measuring system.In order to improve the sensitivity of detection,combining with filter correlation technology and infrared absorption principle,the we...Signals from infrared detector are very weak in SO2 concentration measuring system.In order to improve the sensitivity of detection,combining with filter correlation technology and infrared absorption principle,the weak signal processing circuit is designed according to correlation detection technology.Under laboratory conditions,system performance of SO2 concentration is tested,and the experimental data are analyzed and processed.Then relationship of SO2 concentration and the measuring voltage is provided to prove that the design improves measuring sensitivity of the system.展开更多
In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web spam.Web spam is one of the serious pr...In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web spam.Web spam is one of the serious problems for search engines,and many methods have been proposed for spam detection.We exploit the content features of non-spam in contrast to those of spam.The content features for non-spam pages always possess lots of statistical regularities; but those for spam pages possess very few statistical regularities,because spam pages are made randomly in order to increase the page rank.In this paper,we summarize the regularities distributions of content features for non-spam pages,and propose the calculating probability formulae of the entropy and independent n-grams respectively.Furthermore,we put forward the calculation formulae of multi features correlation.Among them,the notable content features may be used as auxiliary information for spam detection.展开更多
Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculatin...Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication,data,energy,etc.,to detect and evaluate vehicle nodes.However,it is difficult to effectively assess the trust level of a vehicle node only by message forwarding,data consistency,and energy sufficiency.In order to resolve these problems,a novel mechanism and a new trust calculating model is proposed in this paper.First,the four tuple method is adopted,to qualitatively describing various types of nodes of IoV;Second,analyzing the behavioral features and correlation of various nodes based on route forwarding rate,data forwarding rate and physical location;third,designing double layer detection feature parameters with the ability to detect uncooperative nodes and malicious nodes;fourth,establishing a node correlative detection model with a double layer structure by combining the network layer and the perception layer.Accordingly,we conducted simulation experiments to verify the accuracy and time of this detection method under different speed-rate topological conditions of IoV.The results show that comparing with methods which only considers energy or communication parameters,the method proposed in this paper has obvious advantages in the detection of uncooperative and malicious nodes of IoV;especially,with the double detection feature parameters and node correlative detection model combined,detection accuracy is effectively improved,and the calculation time of node detection is largely reduced.展开更多
The phase modulation and the closed-loop controller can generate electrical crosstalk-coupling in digital closed- loop fibre optic gyro. Four electrical cross-coupling paths are verified by the open-loop testing appro...The phase modulation and the closed-loop controller can generate electrical crosstalk-coupling in digital closed- loop fibre optic gyro. Four electrical cross-coupling paths are verified by the open-loop testing approach. It is found the variation of ramp amplitude will lead to the alternation of gyro bias. The amplitude and the phase parameters of the electrical crosstalk signal are measured by lock-in amplifier, and the variation of gyro bias is confirmed to be caused by the alternation of phase according to the amplitude of the ramp. A digital closed-loop fibre optic gyro electrical crosstalk-coupling model is built by approximating the electrical cross-coupling paths as a proportion and integration segment. The results of simulation and experiment show that the modulation signal electrical crosstalk-coupling can cause the dead zone of the gyro when a small angular velocity is inputted, and it could also lead to a periodic vibration of the bias error of the gyro when a large angular velocity is inputted.展开更多
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorith...To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.展开更多
In this paper,shock train motion in a Mach number 2.7 duct is studied experimentally,and large numbers of schlieren images are obtained by a high-speed camera.An image processing method based on Maximum Correlation De...In this paper,shock train motion in a Mach number 2.7 duct is studied experimentally,and large numbers of schlieren images are obtained by a high-speed camera.An image processing method based on Maximum Correlation Detection(MCD)is proposed to detect shock train motion from the schlieren images,based on which the key structures,e.g.,separation positions and separation shock angles on the top and bottom walls,can be analysed in detail.The oscillations of the shock train are generated by rhombus and ellipse shafts at various excitation frequencies.According to the analysis of MCD results,the distributions of the frequency components of shock train oscillation generated by the two shafts are distinctly different,in which the motion generated by the ellipse shaft is much smoother;shock train motion is mainly characterized by the oscillation of separation position while the separation shock strength is not so sensitive to downstream disturbance;there is a hysteresis loop relation between the downstream pressure and separation position.展开更多
文摘Signals from infrared detector are very weak in SO2 concentration measuring system.In order to improve the sensitivity of detection,combining with filter correlation technology and infrared absorption principle,the weak signal processing circuit is designed according to correlation detection technology.Under laboratory conditions,system performance of SO2 concentration is tested,and the experimental data are analyzed and processed.Then relationship of SO2 concentration and the measuring voltage is provided to prove that the design improves measuring sensitivity of the system.
基金supported by the National Science Foundation of China(No.61170145,61373081)the Specialized Research Fund for the Doctoral Program of Higher Education of China(No.20113704110001)+1 种基金the Technology and Development Project of Shandong(No.2013GGX10125)the Taishan Scholar Project of Shandong,China
文摘In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web spam.Web spam is one of the serious problems for search engines,and many methods have been proposed for spam detection.We exploit the content features of non-spam in contrast to those of spam.The content features for non-spam pages always possess lots of statistical regularities; but those for spam pages possess very few statistical regularities,because spam pages are made randomly in order to increase the page rank.In this paper,we summarize the regularities distributions of content features for non-spam pages,and propose the calculating probability formulae of the entropy and independent n-grams respectively.Furthermore,we put forward the calculation formulae of multi features correlation.Among them,the notable content features may be used as auxiliary information for spam detection.
基金This research is supported by the National Natural Science Foundations of China under Grants Nos.61862040,61762060 and 61762059The authors gratefully acknowledge the anonymous reviewers for their helpful comments and suggestions.
文摘Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication,data,energy,etc.,to detect and evaluate vehicle nodes.However,it is difficult to effectively assess the trust level of a vehicle node only by message forwarding,data consistency,and energy sufficiency.In order to resolve these problems,a novel mechanism and a new trust calculating model is proposed in this paper.First,the four tuple method is adopted,to qualitatively describing various types of nodes of IoV;Second,analyzing the behavioral features and correlation of various nodes based on route forwarding rate,data forwarding rate and physical location;third,designing double layer detection feature parameters with the ability to detect uncooperative nodes and malicious nodes;fourth,establishing a node correlative detection model with a double layer structure by combining the network layer and the perception layer.Accordingly,we conducted simulation experiments to verify the accuracy and time of this detection method under different speed-rate topological conditions of IoV.The results show that comparing with methods which only considers energy or communication parameters,the method proposed in this paper has obvious advantages in the detection of uncooperative and malicious nodes of IoV;especially,with the double detection feature parameters and node correlative detection model combined,detection accuracy is effectively improved,and the calculation time of node detection is largely reduced.
基金Project supported by the National High Technology Research and Development Program of China (Grant No. 2007AA04Z436)
文摘The phase modulation and the closed-loop controller can generate electrical crosstalk-coupling in digital closed- loop fibre optic gyro. Four electrical cross-coupling paths are verified by the open-loop testing approach. It is found the variation of ramp amplitude will lead to the alternation of gyro bias. The amplitude and the phase parameters of the electrical crosstalk signal are measured by lock-in amplifier, and the variation of gyro bias is confirmed to be caused by the alternation of phase according to the amplitude of the ramp. A digital closed-loop fibre optic gyro electrical crosstalk-coupling model is built by approximating the electrical cross-coupling paths as a proportion and integration segment. The results of simulation and experiment show that the modulation signal electrical crosstalk-coupling can cause the dead zone of the gyro when a small angular velocity is inputted, and it could also lead to a periodic vibration of the bias error of the gyro when a large angular velocity is inputted.
文摘The liquid crystal television spatial light modulator (LCTVSLM) characterized is usable in optical processing applications,e.g.,optical pattern recognition,associative memory, optical computing,correlation detection and optical data processing systems.The array performance and real-time optical correlation applications are reviewed.
文摘To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice.
基金supported by the National Numerical Wind Tunnel Project of China,the National Natural Science Foundation of China(Nos.12002163 and 12072157)the Natural Science Foundation of Jiangsu Province,China(No.BK20200408)+1 种基金the China Postdoctoral Science Foundation(No.2022T150321)the Key Laboratory of Hypersonic Aerodynamic Force and Heat Technology,AVIC Aerodynamics Research Institute,China。
文摘In this paper,shock train motion in a Mach number 2.7 duct is studied experimentally,and large numbers of schlieren images are obtained by a high-speed camera.An image processing method based on Maximum Correlation Detection(MCD)is proposed to detect shock train motion from the schlieren images,based on which the key structures,e.g.,separation positions and separation shock angles on the top and bottom walls,can be analysed in detail.The oscillations of the shock train are generated by rhombus and ellipse shafts at various excitation frequencies.According to the analysis of MCD results,the distributions of the frequency components of shock train oscillation generated by the two shafts are distinctly different,in which the motion generated by the ellipse shaft is much smoother;shock train motion is mainly characterized by the oscillation of separation position while the separation shock strength is not so sensitive to downstream disturbance;there is a hysteresis loop relation between the downstream pressure and separation position.