This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
The expansion of a thick-walled hollow cylinder in soil is of non-self-similar nature that the stress/deformation paths are not the same for different soil material points.As a result,this problem cannot be solved by ...The expansion of a thick-walled hollow cylinder in soil is of non-self-similar nature that the stress/deformation paths are not the same for different soil material points.As a result,this problem cannot be solved by the common self-similar-based similarity techniques.This paper proposes a novel,exact solution for rigorous drained expansion analysis of a hollow cylinder of critical state soils.Considering stress-dependent elastic moduli of soils,new analytical stress and displacement solutions for the nonself-similar problem are developed taking the small strain assumption in the elastic zone.In the plastic zone,the cavity expansion response is formulated into a set of first-order partial differential equations(PDEs)with the combination use of Eulerian and Lagrangian descriptions,and a novel solution algorithm is developed to efficiently solve this complex boundary value problem.The solution is presented in a general form and thus can be useful for a wide range of soils.With the new solution,the non-self-similar nature induced by the finite outer boundary is clearly demonstrated and highlighted,which is found to be greatly different to the behaviour of cavity expansion in infinite soil mass.The present solution may serve as a benchmark for verifying the performance of advanced numerical techniques with critical state soil models and be used to capture the finite boundary effect for pressuremeter tests in small-sized calibration chambers.展开更多
The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information ...The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests.展开更多
In order to optimize the embedded system implementation for Ethernet-based computer numerical control (CNC) system, it is very necessary to establish the performance analysis model and further adopt the codesign met...In order to optimize the embedded system implementation for Ethernet-based computer numerical control (CNC) system, it is very necessary to establish the performance analysis model and further adopt the codesign method from the control, communication and computing perspectives. On the basis of analyzing real-time Ethemet, system architecture, time characteristic parameters of control-loop ere, a performance analysis model for real-time Ethemet-based CNC system was proposed, which is able to include the timing effects caused by the implementation platform in the simulation. The key for establishing the model is accomplished by designing the error analysis module and the controller nodes. Under the restraint of CPU resource and communication bandwidth, the experiment with a case study was conducted, and the results show that if the deadline miss ratio of data packets is 0.2%, then the percentage error is 1.105%. The proposed model can be used at several stages of CNC system development.展开更多
As multimedia data sharing increases,data security in mobile devices and its mechanism can be seen as critical.Biometrics combines the physiological and behavioral qualities of an individual to validate their characte...As multimedia data sharing increases,data security in mobile devices and its mechanism can be seen as critical.Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time.Humans incorporate physiological attributes like a fingerprint,face,iris,palm print,finger knuckle print,Deoxyribonucleic Acid(DNA),and behavioral qualities like walk,voice,mark,or keystroke.The main goal of this paper is to design a robust framework for automatic face recognition.Scale Invariant Feature Transform(SIFT)and Speeded-up Robust Features(SURF)are employed for face recognition.Also,we propose a modified Gabor Wavelet Transform for SIFT/SURF(GWT-SIFT/GWT-SURF)to increase the recognition accuracy of human faces.The proposed scheme is composed of three steps.First,the entropy of the image is removed using Discrete Wavelet Transform(DWT).Second,the computational complexity of the SIFT/SURF is reduced.Third,the accuracy is increased for authentication by the proposed GWT-SIFT/GWT-SURF algorithm.A comparative analysis of the proposed scheme is done on real-time Olivetti Research Laboratory(ORL)and Poznan University of Technology(PUT)databases.When compared to the traditional SIFT/SURF methods,we verify that the GWT-SIFT achieves the better accuracy of 99.32%and the better approach is the GWT-SURF as the run time of the GWT-SURF for 100 images is 3.4 seconds when compared to the GWT-SIFT which has a run time of 4.9 seconds for 100 images.展开更多
In this paper, a mathematical model of real-time simulation is given, and the problem of convergence on real-time Runge-Kutta algorithms is analysed. At last a theorem on the relation between the order of compensation...In this paper, a mathematical model of real-time simulation is given, and the problem of convergence on real-time Runge-Kutta algorithms is analysed. At last a theorem on the relation between the order of compensation and the convergent order of real-time algorithm is proved.展开更多
Opinion (sentiment) analysis on big data streams from the constantly generated text streams on social media networks to hundreds of millions of online consumer reviews provides many organizations in every field with o...Opinion (sentiment) analysis on big data streams from the constantly generated text streams on social media networks to hundreds of millions of online consumer reviews provides many organizations in every field with opportunities to discover valuable intelligence from the massive user generated text streams. However, the traditional content analysis frameworks are inefficient to handle the unprecedentedly big volume of unstructured text streams and the complexity of text analysis tasks for the real time opinion analysis on the big data streams. In this paper, we propose a parallel real time sentiment analysis system: Social Media Data Stream Sentiment Analysis Service (SMDSSAS) that performs multiple phases of sentiment analysis of social media text streams effectively in real time with two fully analytic opinion mining models to combat the scale of text data streams and the complexity of sentiment analysis processing on unstructured text streams. We propose two aspect based opinion mining models: Deterministic and Probabilistic sentiment models for a real time sentiment analysis on the user given topic related data streams. Experiments on the social media Twitter stream traffic captured during the pre-election weeks of the 2016 Presidential election for real-time analysis of public opinions toward two presidential candidates showed that the proposed system was able to predict correctly Donald Trump as the winner of the 2016 Presidential election. The cross validation results showed that the proposed sentiment models with the real-time streaming components in our proposed framework delivered effectively the analysis of the opinions on two presidential candidates with average 81% accuracy for the Deterministic model and 80% for the Probabilistic model, which are 1% - 22% improvements from the results of the existing literature.展开更多
A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and...A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and then each search bar was tracked using Kalman filter between frames. The lane detection performance was evaluated and demonstrated in ways of receiver operating characteristic, dice similarity coefficient and real-time performance. For lane departure detection, a lane departure risk evaluation model based on lasting time and frequency was effectively executed on the ARM-based platform. Experimental results indicate that the algorithm generates satisfactory lane detection results under different traffic and lighting conditions, and the proposed warning mechanism sends effective warning signals, avoiding most false warning.展开更多
Real-time electricity price( RTEP) influence factor extraction is essential to forecasting accurate power system electricity prices. At present,new electricity price forecasting models have been studied to improve pre...Real-time electricity price( RTEP) influence factor extraction is essential to forecasting accurate power system electricity prices. At present,new electricity price forecasting models have been studied to improve predictive accuracy,ignoring the extraction and analysis of RTEP influence factors. In this study,a correlation analysis method is proposed based on stochastic matrix theory.Firstly, an augmented matrix is formulated, including RTEP influence factor data and RTEP state data. Secondly, data correlation analysis results are obtained given the statistical characteristics of source data based on stochastic matrix theory.Mean spectral radius( MSR) is used as the measure of correlativity.Finally,the proposed method is evaluated in New England electricity markets and compared with the BP neural network forecasting method. Experimental results show that the extracted index system comprehensively generalizes RTEP influence factors,which play a significant role in improving RTEP forecasting accuracy.展开更多
Today with certainty, the petroleum industry is fostering sanguinely the fields’ development programs for the optimization of reservoir characterization through worth-full appliances of computer analysis techniques. ...Today with certainty, the petroleum industry is fostering sanguinely the fields’ development programs for the optimization of reservoir characterization through worth-full appliances of computer analysis techniques. The time element is of prime importance for optimistic petroleum development projects. Therefore, the frontline of “Real-time Analysis” is added into the applications of computer solving techniques for achieving and sketching up the real-time cost effectiveness in analyzing field development programs. It focuses on the phases of real-time well test data acquisition system, real-time secure access to the well test data either on field or in office and real-time data interpretation unit. This interface will yield the productive results for the field of reservoir’s pressure transient analysis and wells’ systems analysis by following the up-to-date preferred, accurate and effective well test analytical principles with modern real-time computer applications and techniques. It also lays emphasis for the comfort and reliability of data in creating best interpersonal working modes within a reputable and esteemed petroleum development organization.展开更多
A real-time monitoring and 3D visualization analysis system is proposed for dam foundation curtain grouting. Based on the real-time control technology, the optimization method and the set theory, a mathematical model ...A real-time monitoring and 3D visualization analysis system is proposed for dam foundation curtain grouting. Based on the real-time control technology, the optimization method and the set theory, a mathematical model of the system is established. The real-time collection and transmission technology of the grouting data provides a data foundation for the system. The real-time grouting monitoring and dynamic alarming method helps the system control the grouting quality during the grouting process, thus, the abnormalities of grouting, such as jacking and hydraulic uplift, can be effectively controlled. In addition, the 3D grouting visualization analysis technology is proposed to establish the grouting information model(GIM). The GIM provides a platform to visualize and analyze the grouting process and results. The system has been applied to a hydraulic project of China as a case study, and the application results indicate that the real-time grouting monitoring and 3D visualization analysis for the grouting process can help engineers control the grouting quality more efficiently.展开更多
The reliability of real-time embedded software directly determines the reliability of the whole real-time embedded sys- tem, and the effective software testing is an important way to ensure software quality and reliab...The reliability of real-time embedded software directly determines the reliability of the whole real-time embedded sys- tem, and the effective software testing is an important way to ensure software quality and reliability. Based on the analysis of the characteristics of real-time embedded software, the formal method is introduced into the real-time embedded software testing field and the real-time extended finite state machine (RT-EFSM) model is studied firstly. Then, the time zone division method of real-time embedded system is presented and the definition and description methods of time-constrained transition equivalence class (timeCTEC) are presented. Furthermore, the approaches of the testing sequence and test case generation are put forward. Finally, the proposed method is applied to a typical avionics real- time embedded software testing practice and the examples of the timeCTEC, testing sequences and test cases are given. With the analysis of the testing result, the application verification shows that the proposed method can effectively describe the real-time embedded software state transition characteristics and real-time requirements and play the advantages of the formal methods in accuracy, effectiveness and the automation supporting. Combined with the testing platform, the real-time, closed loop and automated simulation testing for real-time embedded software can be realized effectively.展开更多
We propose a scheme capable of performing complete Bell-state analysis for a single-photon hybrid entangled state.Our single-photon state is encoded in both polarization and frequency degrees of freedom.The setup of t...We propose a scheme capable of performing complete Bell-state analysis for a single-photon hybrid entangled state.Our single-photon state is encoded in both polarization and frequency degrees of freedom.The setup of the scheme is composed of polarizing beam splitters,half wave plates,frequency shifters,and independent wavelength division multiplexers,which are feasible using current technology.We also show that with this setup we can perform complete two-photon Bell-state analysis schemes for polarization degrees of freedom.Moreover,it can also be used to perform the teleportation scheme between different degrees of freedom.This setup may allow extensive applications in current quantum communications.展开更多
In the ultrasonic nondestructive evaluation of the quality of solid state welded joints, such as friction bonding and diffusion bonding, the main difficulty is the identification of micro defects which are most likel...In the ultrasonic nondestructive evaluation of the quality of solid state welded joints, such as friction bonding and diffusion bonding, the main difficulty is the identification of micro defects which are most likely to emerge in the welding process. The ultrasonic echo on the screen of a commercial ultrasonic detector due to a micro defect is so weak that it is completely masked by noise, and impossible to be pointed out. In the present paper, wavelet analysis (WA) is utilized to process A scan ultrasonic signals from weak bonding defects in friction bonding joints and porosity in diffusion bonding joints. First, perception of WA for engineers is given, which demonstrates the physical mechanism of WA when applied to signal processing. From this point of view, WA can be understood easily and more thoroughly. Then the signals from welding joints are decomposed into a time scale plane by means of WA. We notice that noise and the signal echo attributed to the micro defect occupy different scales, which make it possible to enhance the signal to noise ratio of the signals by proper selection and threshold processing of the time scale components of the signals, followed by reconstruction of the processed components.展开更多
A state/event fault tree(SEFT)is a modeling technique for describing the causal chains of events leading to failure in software-controlled complex systems.Such systems are ubiquitous in all areas of everyday life,and ...A state/event fault tree(SEFT)is a modeling technique for describing the causal chains of events leading to failure in software-controlled complex systems.Such systems are ubiquitous in all areas of everyday life,and safety and reliability analyses are increasingly required for these systems.SEFTs combine elements from the traditional fault tree with elements from state-based techniques.In the context of the real-time safety-critical systems,SEFTs do not describe the time properties and important timedependent system behaviors that can lead to system failures.Further,SEFTs lack the precise semantics required for formally modeling time behaviors.In this paper,we present a qualitative analysis method for SEFTs based on transformation from SEFT to timed automata(TA),and use the model checker UPPAAL to verify system requirements’properties.The combination of SEFT and TA is an important step towards an integrated design and verification process for real-time safety-critical systems.Finally,we present a case study of a powerboat autopilot system to confirm our method is viable and valid after achieving the verification goal step by step.展开更多
To facilitate rapid analysis of the oscillation stability mechanism in modular multilevel converter-based high voltage direct current(MMC-HVDC)systems and streamline the simulation process for determining MMC impedanc...To facilitate rapid analysis of the oscillation stability mechanism in modular multilevel converter-based high voltage direct current(MMC-HVDC)systems and streamline the simulation process for determining MMC impedance characteristics,a simplified mathematical simulation model for MMC closed-loop impedance is developed using the harmonic state space method.This model considers various control strategies and includes both AC-side and DC-side impedance models.By applying a Nyquist criterion-based impedance analysis method,the stability mechanisms on the AC and DC sides of the MMC are examined.In addition,a data-driven oscillation stability analysis method is also proposed,leveraging a global sensitivity algorithm based on fast model results to identify key parameters influencing MMC oscillation stability.Based on sensitivity analysis results,a parameter adjustment strategy for oscillation suppression is proposed.The simulation results from the MATLAB/Simulinkbased MMC model validate the effectiveness of the proposed method.展开更多
An efficient observability analysis method is proposed to enable online detection of performance degradation of an optimization-based sliding window visual-inertial state estimation framework.The proposed methodology ...An efficient observability analysis method is proposed to enable online detection of performance degradation of an optimization-based sliding window visual-inertial state estimation framework.The proposed methodology leverages numerical techniques in nonlinear observability analysis to enable online evaluation of the system observability and indication of the state estimation performance.Specifically,an empirical observability Gramian based approach is introduced to efficiently measure the observability condition of the windowed nonlinear system,and a scalar index is proposed to quantify the average system observability.The proposed approach is specialized to a challenging optimizationbased sliding window monocular visual-inertial state estimation formulation and evaluated through simulation and experiments to assess the efficacy of the methodology.The analysis result shows that the proposed approach can correctly indicate degradation of the state estimation accuracy with real-time performance.展开更多
For the system with the fuzzy failure state, the effects of the input random variables and the fuzzy failure state on the fuzzy probability of failure for the structural system are studied, and the moment-independence...For the system with the fuzzy failure state, the effects of the input random variables and the fuzzy failure state on the fuzzy probability of failure for the structural system are studied, and the moment-independence global sensitivity analysis(GSA) model is proposed to quantitatively measure these effects. According to the fuzzy random theory, the fuzzy failure state is transformed into an equivalent new random variable for the system, and the complementary function of the membership function of the fuzzy failure state is defined as the cumulative distribution function(CDF) of the new random variable. After introducing the new random variable, the equivalent performance function of the original problem is built. The difference between the unconditional fuzzy probability of failure and conditional fuzzy probability of failure is defined as the moment-independent GSA index. In order to solve the proposed GSA index efficiently, the Kriging-based algorithm is developed to estimate the defined moment-independence GSA index. Two engineering examples are employed to verify the feasibility and rationality of the presented GSA model, and the advantages of the developed Kriging method are also illustrated.展开更多
We present a deterministic nondestructive hyperentangled Bell state analysis protocol for photons entangled in three degrees of freedom(DOFs),including polarization,spatial-mode,and time-bin DOFs.The polarization Bell...We present a deterministic nondestructive hyperentangled Bell state analysis protocol for photons entangled in three degrees of freedom(DOFs),including polarization,spatial-mode,and time-bin DOFs.The polarization Bell state analyzer and spatial-mode Bell state analyzer are constructed by polarization parity-check quantum nondemolition detector(P-QND)and spatial-mode parity-check quantum nondemolition detector(S-QND)using cross-Kerr nonlinearity,respectively.The time-bin Bell state analyzer is constructed by the swap gate for polarization state and time-bin state of a photon(P-T swap gate)and P-QND.The Bell states analyzer for one DOF will not destruct the Bell states of other two DOFs,so the polarization-spatial-time-bin hyperentangled Bell states can be determinately distinguished without destruction.This deterministic nondestructive state analysis method has useful applications in quantum information protocols.展开更多
The municipalities of Ubatuba, Campos do Jord?o, and S?o José dos Campos are located in the region of S?o Paulo State (Brazil). These municipalities are recognized nationally for having an elevated number of reco...The municipalities of Ubatuba, Campos do Jord?o, and S?o José dos Campos are located in the region of S?o Paulo State (Brazil). These municipalities are recognized nationally for having an elevated number of recorded landslides on slopes and embankments. In addition, these municipalities contain multiple areas that are at risk for landslides. Various soil landslides occurred in these municipalities in January 2013, when real-time climactic and geotechnical variables were monitored by automatic rain gauges, humidity sensors and soil temperature and suction devices. The resulting data were used to understand the functions of each variable in the occurrence of land- slides. Analyses of rainfall, humidity and soil temperature were used with field investigations to formulate a hypothesis regarding the predominant rupture mechanism and the role of each monitored variable in the deflagration of the soil landslides that occurred in the three studied municipalities. The geotechnical variable data revealed that both temperature and soil moisture contents played fundamental roles in the deflagration of shallow planar landslides in urban areas. The hourly rain intensity and/or rainfall accumulation for 24 and/or 72 h were responsible for the deflagration of the landslides that occurred in the studied areas, along with the existing anthropic constraints in the risk areas. Significant variations did not occur in the soil suction data during the landslides, principally due to the unsatisfactory sensor precision when reading field suction between –10 and?–100 kPA (±25%).展开更多
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
基金funding support from the National Key Research and Development Program of China(Grant No.2023YFB2604004)the National Natural Science Foundation of China(Grant No.52108374)the“Taishan”Scholar Program of Shandong Province,China(Grant No.tsqn201909016)。
文摘The expansion of a thick-walled hollow cylinder in soil is of non-self-similar nature that the stress/deformation paths are not the same for different soil material points.As a result,this problem cannot be solved by the common self-similar-based similarity techniques.This paper proposes a novel,exact solution for rigorous drained expansion analysis of a hollow cylinder of critical state soils.Considering stress-dependent elastic moduli of soils,new analytical stress and displacement solutions for the nonself-similar problem are developed taking the small strain assumption in the elastic zone.In the plastic zone,the cavity expansion response is formulated into a set of first-order partial differential equations(PDEs)with the combination use of Eulerian and Lagrangian descriptions,and a novel solution algorithm is developed to efficiently solve this complex boundary value problem.The solution is presented in a general form and thus can be useful for a wide range of soils.With the new solution,the non-self-similar nature induced by the finite outer boundary is clearly demonstrated and highlighted,which is found to be greatly different to the behaviour of cavity expansion in infinite soil mass.The present solution may serve as a benchmark for verifying the performance of advanced numerical techniques with critical state soil models and be used to capture the finite boundary effect for pressuremeter tests in small-sized calibration chambers.
文摘The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests.
基金Projects(50875090,50905063) supported by the National Natural Science Foundation of ChinaProject(2009AA04Z111) supported by the National High Technology Research and Development Program of China+2 种基金Project(20090460769) supported by China Postdoctoral Science FoundationProject(2011ZM0070) supported by the Fundamental Research Funds for the Central Universities in ChinaProject(S2011010001155) supported by the Natural Science Foundation of Guangdong Province,China
文摘In order to optimize the embedded system implementation for Ethernet-based computer numerical control (CNC) system, it is very necessary to establish the performance analysis model and further adopt the codesign method from the control, communication and computing perspectives. On the basis of analyzing real-time Ethemet, system architecture, time characteristic parameters of control-loop ere, a performance analysis model for real-time Ethemet-based CNC system was proposed, which is able to include the timing effects caused by the implementation platform in the simulation. The key for establishing the model is accomplished by designing the error analysis module and the controller nodes. Under the restraint of CPU resource and communication bandwidth, the experiment with a case study was conducted, and the results show that if the deadline miss ratio of data packets is 0.2%, then the percentage error is 1.105%. The proposed model can be used at several stages of CNC system development.
文摘As multimedia data sharing increases,data security in mobile devices and its mechanism can be seen as critical.Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time.Humans incorporate physiological attributes like a fingerprint,face,iris,palm print,finger knuckle print,Deoxyribonucleic Acid(DNA),and behavioral qualities like walk,voice,mark,or keystroke.The main goal of this paper is to design a robust framework for automatic face recognition.Scale Invariant Feature Transform(SIFT)and Speeded-up Robust Features(SURF)are employed for face recognition.Also,we propose a modified Gabor Wavelet Transform for SIFT/SURF(GWT-SIFT/GWT-SURF)to increase the recognition accuracy of human faces.The proposed scheme is composed of three steps.First,the entropy of the image is removed using Discrete Wavelet Transform(DWT).Second,the computational complexity of the SIFT/SURF is reduced.Third,the accuracy is increased for authentication by the proposed GWT-SIFT/GWT-SURF algorithm.A comparative analysis of the proposed scheme is done on real-time Olivetti Research Laboratory(ORL)and Poznan University of Technology(PUT)databases.When compared to the traditional SIFT/SURF methods,we verify that the GWT-SIFT achieves the better accuracy of 99.32%and the better approach is the GWT-SURF as the run time of the GWT-SURF for 100 images is 3.4 seconds when compared to the GWT-SIFT which has a run time of 4.9 seconds for 100 images.
文摘In this paper, a mathematical model of real-time simulation is given, and the problem of convergence on real-time Runge-Kutta algorithms is analysed. At last a theorem on the relation between the order of compensation and the convergent order of real-time algorithm is proved.
文摘Opinion (sentiment) analysis on big data streams from the constantly generated text streams on social media networks to hundreds of millions of online consumer reviews provides many organizations in every field with opportunities to discover valuable intelligence from the massive user generated text streams. However, the traditional content analysis frameworks are inefficient to handle the unprecedentedly big volume of unstructured text streams and the complexity of text analysis tasks for the real time opinion analysis on the big data streams. In this paper, we propose a parallel real time sentiment analysis system: Social Media Data Stream Sentiment Analysis Service (SMDSSAS) that performs multiple phases of sentiment analysis of social media text streams effectively in real time with two fully analytic opinion mining models to combat the scale of text data streams and the complexity of sentiment analysis processing on unstructured text streams. We propose two aspect based opinion mining models: Deterministic and Probabilistic sentiment models for a real time sentiment analysis on the user given topic related data streams. Experiments on the social media Twitter stream traffic captured during the pre-election weeks of the 2016 Presidential election for real-time analysis of public opinions toward two presidential candidates showed that the proposed system was able to predict correctly Donald Trump as the winner of the 2016 Presidential election. The cross validation results showed that the proposed sentiment models with the real-time streaming components in our proposed framework delivered effectively the analysis of the opinions on two presidential candidates with average 81% accuracy for the Deterministic model and 80% for the Probabilistic model, which are 1% - 22% improvements from the results of the existing literature.
基金Project(51175159)supported by the National Natural Science Foundation of ChinaProject(2013WK3024)supported by the Science andTechnology Planning Program of Hunan Province,ChinaProject(CX2013B146)supported by the Hunan Provincial InnovationFoundation for Postgraduate,China
文摘A technology for unintended lane departure warning was proposed. As crucial information, lane boundaries were detected based on principal component analysis of grayscale distribution in search bars of given number and then each search bar was tracked using Kalman filter between frames. The lane detection performance was evaluated and demonstrated in ways of receiver operating characteristic, dice similarity coefficient and real-time performance. For lane departure detection, a lane departure risk evaluation model based on lasting time and frequency was effectively executed on the ARM-based platform. Experimental results indicate that the algorithm generates satisfactory lane detection results under different traffic and lighting conditions, and the proposed warning mechanism sends effective warning signals, avoiding most false warning.
基金National Natural Science Foundation of China(No.61701104)the “13th Five Year Plan” Research Foundation of Jilin Provincial Department of Education,China(No.JJKH2017018KJ)
文摘Real-time electricity price( RTEP) influence factor extraction is essential to forecasting accurate power system electricity prices. At present,new electricity price forecasting models have been studied to improve predictive accuracy,ignoring the extraction and analysis of RTEP influence factors. In this study,a correlation analysis method is proposed based on stochastic matrix theory.Firstly, an augmented matrix is formulated, including RTEP influence factor data and RTEP state data. Secondly, data correlation analysis results are obtained given the statistical characteristics of source data based on stochastic matrix theory.Mean spectral radius( MSR) is used as the measure of correlativity.Finally,the proposed method is evaluated in New England electricity markets and compared with the BP neural network forecasting method. Experimental results show that the extracted index system comprehensively generalizes RTEP influence factors,which play a significant role in improving RTEP forecasting accuracy.
文摘Today with certainty, the petroleum industry is fostering sanguinely the fields’ development programs for the optimization of reservoir characterization through worth-full appliances of computer analysis techniques. The time element is of prime importance for optimistic petroleum development projects. Therefore, the frontline of “Real-time Analysis” is added into the applications of computer solving techniques for achieving and sketching up the real-time cost effectiveness in analyzing field development programs. It focuses on the phases of real-time well test data acquisition system, real-time secure access to the well test data either on field or in office and real-time data interpretation unit. This interface will yield the productive results for the field of reservoir’s pressure transient analysis and wells’ systems analysis by following the up-to-date preferred, accurate and effective well test analytical principles with modern real-time computer applications and techniques. It also lays emphasis for the comfort and reliability of data in creating best interpersonal working modes within a reputable and esteemed petroleum development organization.
基金Supported by the Innovative Research Groups of the National Natural Science Foundation of China(No.51321065)the National Natural Science Foundation of China(No.51339003 and No.51439005)
文摘A real-time monitoring and 3D visualization analysis system is proposed for dam foundation curtain grouting. Based on the real-time control technology, the optimization method and the set theory, a mathematical model of the system is established. The real-time collection and transmission technology of the grouting data provides a data foundation for the system. The real-time grouting monitoring and dynamic alarming method helps the system control the grouting quality during the grouting process, thus, the abnormalities of grouting, such as jacking and hydraulic uplift, can be effectively controlled. In addition, the 3D grouting visualization analysis technology is proposed to establish the grouting information model(GIM). The GIM provides a platform to visualize and analyze the grouting process and results. The system has been applied to a hydraulic project of China as a case study, and the application results indicate that the real-time grouting monitoring and 3D visualization analysis for the grouting process can help engineers control the grouting quality more efficiently.
基金supported by the Aviation Science Foundation of China
文摘The reliability of real-time embedded software directly determines the reliability of the whole real-time embedded sys- tem, and the effective software testing is an important way to ensure software quality and reliability. Based on the analysis of the characteristics of real-time embedded software, the formal method is introduced into the real-time embedded software testing field and the real-time extended finite state machine (RT-EFSM) model is studied firstly. Then, the time zone division method of real-time embedded system is presented and the definition and description methods of time-constrained transition equivalence class (timeCTEC) are presented. Furthermore, the approaches of the testing sequence and test case generation are put forward. Finally, the proposed method is applied to a typical avionics real- time embedded software testing practice and the examples of the timeCTEC, testing sequences and test cases are given. With the analysis of the testing result, the application verification shows that the proposed method can effectively describe the real-time embedded software state transition characteristics and real-time requirements and play the advantages of the formal methods in accuracy, effectiveness and the automation supporting. Combined with the testing platform, the real-time, closed loop and automated simulation testing for real-time embedded software can be realized effectively.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 11104159,61201164,and 61271238)the Open Research Fund Program of the State Key Laboratory of Low-Dimensional Quantum Physics Scientific,Tsinghua University,China+2 种基金the Open Research Fund Program of National Laboratory of Solid State Microstructures,Nanjing University,China (Grant Nos. M25020 and M25022)the Priority Academic Development Program of Jiangsu Higher Education Institutions,China,the Open Research Fund of National Mobile Communications Research Laboratory of Southeast University,China (Grant No. 2011D05)the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20123223110003)
文摘We propose a scheme capable of performing complete Bell-state analysis for a single-photon hybrid entangled state.Our single-photon state is encoded in both polarization and frequency degrees of freedom.The setup of the scheme is composed of polarizing beam splitters,half wave plates,frequency shifters,and independent wavelength division multiplexers,which are feasible using current technology.We also show that with this setup we can perform complete two-photon Bell-state analysis schemes for polarization degrees of freedom.Moreover,it can also be used to perform the teleportation scheme between different degrees of freedom.This setup may allow extensive applications in current quantum communications.
基金This work is financially supported by the Beijing Natural Science Foundation!(No.2 962 0 0 4 )
文摘In the ultrasonic nondestructive evaluation of the quality of solid state welded joints, such as friction bonding and diffusion bonding, the main difficulty is the identification of micro defects which are most likely to emerge in the welding process. The ultrasonic echo on the screen of a commercial ultrasonic detector due to a micro defect is so weak that it is completely masked by noise, and impossible to be pointed out. In the present paper, wavelet analysis (WA) is utilized to process A scan ultrasonic signals from weak bonding defects in friction bonding joints and porosity in diffusion bonding joints. First, perception of WA for engineers is given, which demonstrates the physical mechanism of WA when applied to signal processing. From this point of view, WA can be understood easily and more thoroughly. Then the signals from welding joints are decomposed into a time scale plane by means of WA. We notice that noise and the signal echo attributed to the micro defect occupy different scales, which make it possible to enhance the signal to noise ratio of the signals by proper selection and threshold processing of the time scale components of the signals, followed by reconstruction of the processed components.
基金supported by the National Natural Science Foundation of China(11832012)
文摘A state/event fault tree(SEFT)is a modeling technique for describing the causal chains of events leading to failure in software-controlled complex systems.Such systems are ubiquitous in all areas of everyday life,and safety and reliability analyses are increasingly required for these systems.SEFTs combine elements from the traditional fault tree with elements from state-based techniques.In the context of the real-time safety-critical systems,SEFTs do not describe the time properties and important timedependent system behaviors that can lead to system failures.Further,SEFTs lack the precise semantics required for formally modeling time behaviors.In this paper,we present a qualitative analysis method for SEFTs based on transformation from SEFT to timed automata(TA),and use the model checker UPPAAL to verify system requirements’properties.The combination of SEFT and TA is an important step towards an integrated design and verification process for real-time safety-critical systems.Finally,we present a case study of a powerboat autopilot system to confirm our method is viable and valid after achieving the verification goal step by step.
基金National Natural Science Foundation of China(52307127)State Key Laboratory of Power System Operation and Control(SKLD23KZ07)。
文摘To facilitate rapid analysis of the oscillation stability mechanism in modular multilevel converter-based high voltage direct current(MMC-HVDC)systems and streamline the simulation process for determining MMC impedance characteristics,a simplified mathematical simulation model for MMC closed-loop impedance is developed using the harmonic state space method.This model considers various control strategies and includes both AC-side and DC-side impedance models.By applying a Nyquist criterion-based impedance analysis method,the stability mechanisms on the AC and DC sides of the MMC are examined.In addition,a data-driven oscillation stability analysis method is also proposed,leveraging a global sensitivity algorithm based on fast model results to identify key parameters influencing MMC oscillation stability.Based on sensitivity analysis results,a parameter adjustment strategy for oscillation suppression is proposed.The simulation results from the MATLAB/Simulinkbased MMC model validate the effectiveness of the proposed method.
文摘An efficient observability analysis method is proposed to enable online detection of performance degradation of an optimization-based sliding window visual-inertial state estimation framework.The proposed methodology leverages numerical techniques in nonlinear observability analysis to enable online evaluation of the system observability and indication of the state estimation performance.Specifically,an empirical observability Gramian based approach is introduced to efficiently measure the observability condition of the windowed nonlinear system,and a scalar index is proposed to quantify the average system observability.The proposed approach is specialized to a challenging optimizationbased sliding window monocular visual-inertial state estimation formulation and evaluated through simulation and experiments to assess the efficacy of the methodology.The analysis result shows that the proposed approach can correctly indicate degradation of the state estimation accuracy with real-time performance.
基金supported by the National Natural Science Foundation of China(11702281)the Science Challenge Project(TZ2018007)the Technology Foundation Project of State Administration of Science,Technology and Industry for National Defence,PRC(JSZL2017212A001)
文摘For the system with the fuzzy failure state, the effects of the input random variables and the fuzzy failure state on the fuzzy probability of failure for the structural system are studied, and the moment-independence global sensitivity analysis(GSA) model is proposed to quantitatively measure these effects. According to the fuzzy random theory, the fuzzy failure state is transformed into an equivalent new random variable for the system, and the complementary function of the membership function of the fuzzy failure state is defined as the cumulative distribution function(CDF) of the new random variable. After introducing the new random variable, the equivalent performance function of the original problem is built. The difference between the unconditional fuzzy probability of failure and conditional fuzzy probability of failure is defined as the moment-independent GSA index. In order to solve the proposed GSA index efficiently, the Kriging-based algorithm is developed to estimate the defined moment-independence GSA index. Two engineering examples are employed to verify the feasibility and rationality of the presented GSA model, and the advantages of the developed Kriging method are also illustrated.
基金Project supported by the National Natural Science Foundation of China(Grant No.11604226)Science and Technology Program Foundation of the Beijing Municipal Commission of Education of China(Grants No.CIT&TCD201904080).
文摘We present a deterministic nondestructive hyperentangled Bell state analysis protocol for photons entangled in three degrees of freedom(DOFs),including polarization,spatial-mode,and time-bin DOFs.The polarization Bell state analyzer and spatial-mode Bell state analyzer are constructed by polarization parity-check quantum nondemolition detector(P-QND)and spatial-mode parity-check quantum nondemolition detector(S-QND)using cross-Kerr nonlinearity,respectively.The time-bin Bell state analyzer is constructed by the swap gate for polarization state and time-bin state of a photon(P-T swap gate)and P-QND.The Bell states analyzer for one DOF will not destruct the Bell states of other two DOFs,so the polarization-spatial-time-bin hyperentangled Bell states can be determinately distinguished without destruction.This deterministic nondestructive state analysis method has useful applications in quantum information protocols.
文摘The municipalities of Ubatuba, Campos do Jord?o, and S?o José dos Campos are located in the region of S?o Paulo State (Brazil). These municipalities are recognized nationally for having an elevated number of recorded landslides on slopes and embankments. In addition, these municipalities contain multiple areas that are at risk for landslides. Various soil landslides occurred in these municipalities in January 2013, when real-time climactic and geotechnical variables were monitored by automatic rain gauges, humidity sensors and soil temperature and suction devices. The resulting data were used to understand the functions of each variable in the occurrence of land- slides. Analyses of rainfall, humidity and soil temperature were used with field investigations to formulate a hypothesis regarding the predominant rupture mechanism and the role of each monitored variable in the deflagration of the soil landslides that occurred in the three studied municipalities. The geotechnical variable data revealed that both temperature and soil moisture contents played fundamental roles in the deflagration of shallow planar landslides in urban areas. The hourly rain intensity and/or rainfall accumulation for 24 and/or 72 h were responsible for the deflagration of the landslides that occurred in the studied areas, along with the existing anthropic constraints in the risk areas. Significant variations did not occur in the soil suction data during the landslides, principally due to the unsatisfactory sensor precision when reading field suction between –10 and?–100 kPA (±25%).