This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem...This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.展开更多
Vector control schemes have recently been used to drive linear induction motors(LIM)in high-performance applications.This trend promotes the development of precise and efficient control schemes for individual motors.T...Vector control schemes have recently been used to drive linear induction motors(LIM)in high-performance applications.This trend promotes the development of precise and efficient control schemes for individual motors.This research aims to present a novel framework for speed and thrust force control of LIM using space vector pulse width modulation(SVPWM)inverters.The framework under consideration is developed in four stages.To begin,MATLAB Simulink was used to develop a detailed mathematical and electromechanical dynamicmodel.The research presents a modified SVPWM inverter control scheme.By tuning the proportional-integral(PI)controller with a transfer function,optimized values for the PI controller are derived.All the subsystems mentioned above are integrated to create a robust simulation of the LIM’s precise speed and thrust force control scheme.The reference speed values were chosen to evaluate the performance of the respective system,and the developed system’s response was verified using various data sets.For the low-speed range,a reference value of 10m/s is used,while a reference value of 100 m/s is used for the high-speed range.The speed output response indicates that themotor reached reference speed in amatter of seconds,as the delay time is between 8 and 10 s.The maximum amplitude of thrust achieved is less than 400N,demonstrating the controller’s capability to control a high-speed LIM with minimal thrust ripple.Due to the controlled speed range,the developed system is highly recommended for low-speed and high-speed and heavy-duty traction applications.展开更多
The purpose of this paper is to construct near-vector spaces using a result by Van der Walt, with Z<sub>p</sub> for p a prime, as the underlying near-field. There are two notions of near-vector spaces, we ...The purpose of this paper is to construct near-vector spaces using a result by Van der Walt, with Z<sub>p</sub> for p a prime, as the underlying near-field. There are two notions of near-vector spaces, we focus on those studied by André [1]. These near-vector spaces have recently proven to be very useful in finite linear games. We will discuss the construction and properties, give examples of these near-vector spaces and give its application in finite linear games.展开更多
Various index structures have recently been proposed to facilitate high-dimensional KNN queries, among which the techniques of approximate vector presentation and one-dimensional (1D) transformation can break the curs...Various index structures have recently been proposed to facilitate high-dimensional KNN queries, among which the techniques of approximate vector presentation and one-dimensional (1D) transformation can break the curse of dimensionality. Based on the two techniques above, a novel high-dimensional index is proposed, called Bit-code and Distance based index (BD). BD is based on a special partitioning strategy which is optimized for high-dimensional data. By the definitions of bit code and transformation function, a high-dimensional vector can be first approximately represented and then transformed into a 1D vector, the key managed by a B+-tree. A new KNN search algorithm is also proposed that exploits the bit code and distance to prune the search space more effectively. Results of extensive experiments using both synthetic and real data demonstrated that BD out- performs the existing index structures for KNN search in high-dimensional spaces.展开更多
In this paper,We study the global attractor and its properties on in nite lattice dynamical system FitzHugh-Nagumo in a weighted space lσ^2×lσ^2.We prove the existence and uniqueness of the solution to the latt...In this paper,We study the global attractor and its properties on in nite lattice dynamical system FitzHugh-Nagumo in a weighted space lσ^2×lσ^2.We prove the existence and uniqueness of the solution to the lattice dynamical system FitzHugh-Nagumo in lσ^2×lσ^2.Then we get a bounded absorbing set,which suggests the existence of global attractors.Finally,we study the uniform boundedness and the upper semicontinuity of the global attractor.展开更多
Wiener amalgam spaces are a class of function spaces where the function’s local and global behavior can be easily distinguished. These spaces are ex-tensively used in Harmonic analysis that originated in the work of ...Wiener amalgam spaces are a class of function spaces where the function’s local and global behavior can be easily distinguished. These spaces are ex-tensively used in Harmonic analysis that originated in the work of Wiener. In this paper: we first introduce a two-variable exponent amalgam space (L<sup>q</sup><sup>()</sup>,l<sup>p</sup><sup>()</sup>)(Ω). Secondly, we investigate some basic properties of these spaces, and finally, we study their dual.展开更多
Analysis of a four-dimensional displacement vector on the fabric of space-time in the special or general case into two Four-dimensional vectors, according to specific conditions leads to the splitting of the total fab...Analysis of a four-dimensional displacement vector on the fabric of space-time in the special or general case into two Four-dimensional vectors, according to specific conditions leads to the splitting of the total fabric of space-time into a positive subspace-time that represents the space of causality and a negative subspace-time which represents a space without causality, thus, in the special case, we have new transformations for the coordinates of space and time modified from Lorentz transformations specific to each subspace, where the contraction of length disappears and the speed of light is no longer a universal constant. In the general case, we have new types of matric tensor, one for positive subspace-time and the other for negative subspace-time. We also find that the speed of the photon decreases in positive subspace-time until it reaches zero and increases in negative subspace-time until it reaches the speed of light when the photon reaches the Schwarzschild radius.展开更多
By using an existence theorems of maximal elements for a family of set-valued mappings in G-convex spaces due to the author, some new nonempty intersection theorems for a family of set-valued mappings were established...By using an existence theorems of maximal elements for a family of set-valued mappings in G-convex spaces due to the author, some new nonempty intersection theorems for a family of set-valued mappings were established in noncompact product G-convex spaces. As applications, some equilibrium existence theorems for a system of generalized vector equilibrium problems were proved in noncompact product G-convex spaces. These theorems unify, improve and generalize some important known results in literature.展开更多
By using an existence theorems of maximal elements for a family of set-valued mappings in G-convex spaces due to the author, some new nonempty intersection theorems for a family of set-valued mappings were established...By using an existence theorems of maximal elements for a family of set-valued mappings in G-convex spaces due to the author, some new nonempty intersection theorems for a family of set-valued mappings were established in noncompact product G-convex spaces. As applications, some equilibrium existence theorems for a system of generalized vector equilibrium problems were proved in noncompact product G-convex spaces. These theorems unify, improve and generalize some important known results in literature.展开更多
We identify the functions whose polynomial multiples are weak* dense in Qp spaces and prove that if |f(z)| ≥ |g(z)| and g is cyclic in Qp, then f is cyclic in Qp. We also show that the multiplication operato...We identify the functions whose polynomial multiples are weak* dense in Qp spaces and prove that if |f(z)| ≥ |g(z)| and g is cyclic in Qp, then f is cyclic in Qp. We also show that the multiplication operator Mx on Qp spaces is cellular indecomposable.展开更多
Predicting anomalous behaviour of a running process using system call trace is a common practice among security community and it is still an active research area. It is a typical pattern recognition problem and can be...Predicting anomalous behaviour of a running process using system call trace is a common practice among security community and it is still an active research area. It is a typical pattern recognition problem and can be dealt with machine learning algorithms. Standard system call datasets were employed to train these algorithms. However, advancements in operating systems made these datasets outdated and un-relevant. Australian Defence Force Academy Linux Dataset (ADFA-LD) and Australian Defence Force Academy Windows Dataset (ADFA-WD) are new generation system calls datasets that contain labelled system call traces for modern exploits and attacks on various applications. In this paper, we evaluate performance of Modified Vector Space Representation technique on ADFA-LD and ADFA-WD datasets using various classification algorithms. Our experimental results show that our method performs well and it helps accurately distinguishing process behaviour through system calls.展开更多
Power Quality (PQ) combined disturbances become common along with ubiquity of voltage flickers and harmonics. This paper presents a novel approach to classify the different patterns of PQ combined disturbances. The cl...Power Quality (PQ) combined disturbances become common along with ubiquity of voltage flickers and harmonics. This paper presents a novel approach to classify the different patterns of PQ combined disturbances. The classification system consists of two parts, namely the feature extraction and the automatic recognition. In the feature extraction stage, Phase Space Reconstruction (PSR), a time series analysis tool, is utilized to construct disturbance signal trajectories. For these trajectories, several indices are proposed to form the feature vectors. Support Vector Machines (SVMs) are then implemented to recognize the different patterns and to evaluate the efficiencies. The types of disturbances discussed include a combination of short-term dis-turbances (voltage sags, swells) and long-term disturbances (flickers, harmonics), as well as their homologous single ones. The feasibilities of the proposed approach are verified by simulation with thousands of PQ events. Comparison studies based on Wavelet Transform (WT) and Artificial Neural Network (ANN) are also reported to show its advantages.展开更多
A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's cert...A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.展开更多
Let φ and ψ be linear fractional self\|maps of the unit disk D and X a separable Hilbert space. In this paper we completely characterize the weak compactness of the product operators of a composition operation C φ...Let φ and ψ be linear fractional self\|maps of the unit disk D and X a separable Hilbert space. In this paper we completely characterize the weak compactness of the product operators of a composition operation C φ with another one's adjoint C * ψ on the vector\|valued Bergman space B 1(X) for forms C φC * ψ and C * ψC φ.展开更多
A new class of support vector machine, nil-support vector machine, isdiscussed which can handle both classification and regression. We focus on nu-support vector machineregression and use it for phase space prediction...A new class of support vector machine, nil-support vector machine, isdiscussed which can handle both classification and regression. We focus on nu-support vector machineregression and use it for phase space prediction of chaotic time series. The effectiveness of themethod is demonstrated by applying it to the Henon map. This study also compares nu-support vectormachine with back propagation (BP) networks in order to better evaluate the performance of theproposed methods. The experimental results show that the nu-support vector machine regressionobtains lower root mean squared error than the BP networks and provides an accurate chaotic timeseries prediction. These results can be attributable to the fact that nu-support vector machineimplements the structural risk minimization principle and this leads to better generalization thanthe BP networks.展开更多
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computat...Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.展开更多
The Householder transformation-norm structure function in L2 vector space of linear algebra is introduced, and the edge enhancement for remote sensing images is realized. The experiment result is compared with traditi...The Householder transformation-norm structure function in L2 vector space of linear algebra is introduced, and the edge enhancement for remote sensing images is realized. The experiment result is compared with traditional Laplacian and Sobel edge enhancements and it shows that the effect of the new method is better than that of the traditional algorithms.展开更多
This paper deals with embedding theorems on Campanato-Marrey spaces formed by degenerate vector fields, which include Honnander and Grushin type of vector fields. These embedding theorems are somewhat different from t...This paper deals with embedding theorems on Campanato-Marrey spaces formed by degenerate vector fields, which include Honnander and Grushin type of vector fields. These embedding theorems are somewhat different from the known Poincare estimates. The main ingredients of the proofs rely on the fractional maximal functions. These results evidently have applications to the regularity of subelliptic PDE.展开更多
文摘This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project under grant number(RGP.2/111/43).
文摘Vector control schemes have recently been used to drive linear induction motors(LIM)in high-performance applications.This trend promotes the development of precise and efficient control schemes for individual motors.This research aims to present a novel framework for speed and thrust force control of LIM using space vector pulse width modulation(SVPWM)inverters.The framework under consideration is developed in four stages.To begin,MATLAB Simulink was used to develop a detailed mathematical and electromechanical dynamicmodel.The research presents a modified SVPWM inverter control scheme.By tuning the proportional-integral(PI)controller with a transfer function,optimized values for the PI controller are derived.All the subsystems mentioned above are integrated to create a robust simulation of the LIM’s precise speed and thrust force control scheme.The reference speed values were chosen to evaluate the performance of the respective system,and the developed system’s response was verified using various data sets.For the low-speed range,a reference value of 10m/s is used,while a reference value of 100 m/s is used for the high-speed range.The speed output response indicates that themotor reached reference speed in amatter of seconds,as the delay time is between 8 and 10 s.The maximum amplitude of thrust achieved is less than 400N,demonstrating the controller’s capability to control a high-speed LIM with minimal thrust ripple.Due to the controlled speed range,the developed system is highly recommended for low-speed and high-speed and heavy-duty traction applications.
文摘The purpose of this paper is to construct near-vector spaces using a result by Van der Walt, with Z<sub>p</sub> for p a prime, as the underlying near-field. There are two notions of near-vector spaces, we focus on those studied by André [1]. These near-vector spaces have recently proven to be very useful in finite linear games. We will discuss the construction and properties, give examples of these near-vector spaces and give its application in finite linear games.
基金Project (No. [2005]555) supported by the Hi-Tech Research and De-velopment Program (863) of China
文摘Various index structures have recently been proposed to facilitate high-dimensional KNN queries, among which the techniques of approximate vector presentation and one-dimensional (1D) transformation can break the curse of dimensionality. Based on the two techniques above, a novel high-dimensional index is proposed, called Bit-code and Distance based index (BD). BD is based on a special partitioning strategy which is optimized for high-dimensional data. By the definitions of bit code and transformation function, a high-dimensional vector can be first approximately represented and then transformed into a 1D vector, the key managed by a B+-tree. A new KNN search algorithm is also proposed that exploits the bit code and distance to prune the search space more effectively. Results of extensive experiments using both synthetic and real data demonstrated that BD out- performs the existing index structures for KNN search in high-dimensional spaces.
基金Supported by The Scientic Research Foundation Funded by Hunan Provincial Education Department under grant 19A503Partially supported by Hunan Provincial Exploration of Undergraduate Research Learning and Innovative Experiment Project:2018XTUSJ008Hunan Provincial Natural Science Foundation of China under grant 2015JJ2144.
文摘In this paper,We study the global attractor and its properties on in nite lattice dynamical system FitzHugh-Nagumo in a weighted space lσ^2×lσ^2.We prove the existence and uniqueness of the solution to the lattice dynamical system FitzHugh-Nagumo in lσ^2×lσ^2.Then we get a bounded absorbing set,which suggests the existence of global attractors.Finally,we study the uniform boundedness and the upper semicontinuity of the global attractor.
文摘Wiener amalgam spaces are a class of function spaces where the function’s local and global behavior can be easily distinguished. These spaces are ex-tensively used in Harmonic analysis that originated in the work of Wiener. In this paper: we first introduce a two-variable exponent amalgam space (L<sup>q</sup><sup>()</sup>,l<sup>p</sup><sup>()</sup>)(Ω). Secondly, we investigate some basic properties of these spaces, and finally, we study their dual.
文摘Analysis of a four-dimensional displacement vector on the fabric of space-time in the special or general case into two Four-dimensional vectors, according to specific conditions leads to the splitting of the total fabric of space-time into a positive subspace-time that represents the space of causality and a negative subspace-time which represents a space without causality, thus, in the special case, we have new transformations for the coordinates of space and time modified from Lorentz transformations specific to each subspace, where the contraction of length disappears and the speed of light is no longer a universal constant. In the general case, we have new types of matric tensor, one for positive subspace-time and the other for negative subspace-time. We also find that the speed of the photon decreases in positive subspace-time until it reaches zero and increases in negative subspace-time until it reaches the speed of light when the photon reaches the Schwarzschild radius.
文摘By using an existence theorems of maximal elements for a family of set-valued mappings in G-convex spaces due to the author, some new nonempty intersection theorems for a family of set-valued mappings were established in noncompact product G-convex spaces. As applications, some equilibrium existence theorems for a system of generalized vector equilibrium problems were proved in noncompact product G-convex spaces. These theorems unify, improve and generalize some important known results in literature.
文摘By using an existence theorems of maximal elements for a family of set-valued mappings in G-convex spaces due to the author, some new nonempty intersection theorems for a family of set-valued mappings were established in noncompact product G-convex spaces. As applications, some equilibrium existence theorems for a system of generalized vector equilibrium problems were proved in noncompact product G-convex spaces. These theorems unify, improve and generalize some important known results in literature.
基金supported by NNSF of China (10771130)Specialized Research Fund for the Doctoral Program of High Education (2007056004)+1 种基金NSF of GuangdongProvince (10151503101000025)NSF of Fujian Province (2009J01004)
文摘We identify the functions whose polynomial multiples are weak* dense in Qp spaces and prove that if |f(z)| ≥ |g(z)| and g is cyclic in Qp, then f is cyclic in Qp. We also show that the multiplication operator Mx on Qp spaces is cellular indecomposable.
文摘Predicting anomalous behaviour of a running process using system call trace is a common practice among security community and it is still an active research area. It is a typical pattern recognition problem and can be dealt with machine learning algorithms. Standard system call datasets were employed to train these algorithms. However, advancements in operating systems made these datasets outdated and un-relevant. Australian Defence Force Academy Linux Dataset (ADFA-LD) and Australian Defence Force Academy Windows Dataset (ADFA-WD) are new generation system calls datasets that contain labelled system call traces for modern exploits and attacks on various applications. In this paper, we evaluate performance of Modified Vector Space Representation technique on ADFA-LD and ADFA-WD datasets using various classification algorithms. Our experimental results show that our method performs well and it helps accurately distinguishing process behaviour through system calls.
基金Project (No. 50437010) supported by the Key Program of the Na-tional Natural Science Foundation of China
文摘Power Quality (PQ) combined disturbances become common along with ubiquity of voltage flickers and harmonics. This paper presents a novel approach to classify the different patterns of PQ combined disturbances. The classification system consists of two parts, namely the feature extraction and the automatic recognition. In the feature extraction stage, Phase Space Reconstruction (PSR), a time series analysis tool, is utilized to construct disturbance signal trajectories. For these trajectories, several indices are proposed to form the feature vectors. Support Vector Machines (SVMs) are then implemented to recognize the different patterns and to evaluate the efficiencies. The types of disturbances discussed include a combination of short-term dis-turbances (voltage sags, swells) and long-term disturbances (flickers, harmonics), as well as their homologous single ones. The feasibilities of the proposed approach are verified by simulation with thousands of PQ events. Comparison studies based on Wavelet Transform (WT) and Artificial Neural Network (ANN) are also reported to show its advantages.
基金Supported by the National Natural Science Foun-dation of China(60573129) the Opening Foundation of State Key La-boratory of Information Security and the Opening Foundation of KeyLaboratory of Computer Network and Information Security, Ministryof Education of PRC.
文摘A vector space secret sharing scheme based on certificates is proposed in this paper. The difficulties of solving discrete logarithm assure confidential information's security, and the use of each participant's certificate makes the dealer have no need to transfer secret information to the participants. The proposed scheme is dynamic. It can effectively check cheaters and does not have secure channel requirements.
文摘Let φ and ψ be linear fractional self\|maps of the unit disk D and X a separable Hilbert space. In this paper we completely characterize the weak compactness of the product operators of a composition operation C φ with another one's adjoint C * ψ on the vector\|valued Bergman space B 1(X) for forms C φC * ψ and C * ψC φ.
文摘A new class of support vector machine, nil-support vector machine, isdiscussed which can handle both classification and regression. We focus on nu-support vector machineregression and use it for phase space prediction of chaotic time series. The effectiveness of themethod is demonstrated by applying it to the Henon map. This study also compares nu-support vectormachine with back propagation (BP) networks in order to better evaluate the performance of theproposed methods. The experimental results show that the nu-support vector machine regressionobtains lower root mean squared error than the BP networks and provides an accurate chaotic timeseries prediction. These results can be attributable to the fact that nu-support vector machineimplements the structural risk minimization principle and this leads to better generalization thanthe BP networks.
文摘Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.
基金Funded by the National Natural Science Foundation of China(No.40571100).
文摘The Householder transformation-norm structure function in L2 vector space of linear algebra is introduced, and the edge enhancement for remote sensing images is realized. The experiment result is compared with traditional Laplacian and Sobel edge enhancements and it shows that the effect of the new method is better than that of the traditional algorithms.
基金Research supported in part by he National Sience Foundation Grant # DMS93-15963
文摘This paper deals with embedding theorems on Campanato-Marrey spaces formed by degenerate vector fields, which include Honnander and Grushin type of vector fields. These embedding theorems are somewhat different from the known Poincare estimates. The main ingredients of the proofs rely on the fractional maximal functions. These results evidently have applications to the regularity of subelliptic PDE.