Wireless sensor network consists of hundreds or thousands of low cost, low power, and self-organizing tiny sensor nodes that are deployed within the sensor network. Sensor network is susceptible to physical attacks du...
详细信息
Wireless sensor network consists of hundreds or thousands of low cost, low power, and self-organizing tiny sensor nodes that are deployed within the sensor network. Sensor network is susceptible to physical attacks due to deprived power and restricted resource capability and is exposed to external environment for transmitting and receiving data. Node capture attack is one of the most menacing attack in the wireless sensor network and may be physically captured by an adversary for extracting confidential information regarding cryptographic keys, node's unique id, and so forth, from its memory to eliminate the confidentiality and integrity of the wireless links. Node capture attack suffers from severe security breach and tremendous network cost. We propose an empirically designed multiple objectives node capture attack algorithm based on optimization functions as an effective solution against the attacking efficiency of node capture attack. Finding robust assailant optimization-particle swarm optimization and genetic algorithm (FiRAO-PG) consists of multiple objectives: maximum node participation, maximum key participation, and minimum resource expenditure to find optimal nodes using PSO and GA. It will leverage a comprehensive tool to destroy maximum portion of the network realizing cost-effectiveness and higher attacking efficiency. The simulation results manifest that FiRAO-PG can provide higher fraction of compromised traffic than matrix algorithm (MA) so the attacking efficiency of FiRAO-PG is higher.
The self-organizing hidden Markov model map (SOHMMM) introduces a hybrid integration of the self-organizing map (SOM) and the hidden Markov model (HMM). Its scaled, online gradient descent unsupervised learning algori...
详细信息
The self-organizing hidden Markov model map (SOHMMM) introduces a hybrid integration of the self-organizing map (SOM) and the hidden Markov model (HMM). Its scaled, online gradient descent unsupervised learning algorithm is an amalgam of the SOM unsupervised training and the HMM reparameterized forward-backward techniques. In essence, with each neuron of the SOHMMM lattice, an HMM is associated. The image of an input sequence on the SOHMMM mesh is defined as the location of the best matching reference HMM. Model tuning and adaptation can take place directly from raw data, within an automated context. The SOHMMM can accommodate and analyze deoxyribonucleic acid, ribonucleic acid, protein chain molecules, and generic sequences of high dimensionality and variable lengths encoded directly in nonnumerical/symbolic alphabets. Furthermore, the SOHMMM is capable of integrating and exploiting latent information hidden in the spatiotemporal dependencies/correlations of sequences' elements.
The theory of unit memory repetitive processes is used to investigate local convergence and stability properties of algorithms fbr the solution of discrete optimal control problems. in particular, the properties are a...
详细信息
The theory of unit memory repetitive processes is used to investigate local convergence and stability properties of algorithms fbr the solution of discrete optimal control problems. in particular, the properties are addressed of a method for finding the correct solution of an optimal control problem where the model used for optimisation is different from reality. Limit profile and stability concepts of unit memory linear repetitive process theory are employed to demonstrate optimality and to obtain necessary and sufficient conditions for convergence. Two main stability theorems are obtained from different approaches and their equivalence is proved: The theoretical results are verified through simulation and numerical analysis, and it is demonstrated that repetitive process theory provides a useful tool for the analysis of iterative algorithms for the solution of dynamic optimal control problems.
In order to accurately identify the dynamic health of shearer, reducing operating trouble and production accident of shearer and improving coal production efficiency further, a dynamic health assessment approach for s...
详细信息
In order to accurately identify the dynamic health of shearer, reducing operating trouble and production accident of shearer and improving coal production efficiency further, a dynamic health assessment approach for shearer based on artificial immune algorithm was proposed. The key technologies such as system framework, selecting the indicators for shearer dynamic health assessment, and health assessment model were provided, and the flowchart of the proposed approach was designed. A simulation example, with an accuracy of 96%, based on the collected data from industrial production scene was provided. Furthermore, the comparison demonstrated that the proposed method exhibited higher classification accuracy than the classifiers based on back propagation-neural network (BP-NN) and support vector machine (SVM) methods. Finally, the proposed approach was applied in an engineering problem of shearer dynamic health assessment. The industrial application results showed that the paper research achievements could be used combining with shearer automation control system in fully mechanized coal face. The simulation and the application results indicated that the proposed method was feasible and outperforming others.
During stretch bending, considerable springback will occur after a tube has been plastically bent. To predict the springback, a simplified two-flange model for stretch bending of a rectangular tube has been developed ...
详细信息
During stretch bending, considerable springback will occur after a tube has been plastically bent. To predict the springback, a simplified two-flange model for stretch bending of a rectangular tube has been developed in which the strain history has been considered. A comparison has been made between the springback predicted by this model and experimental data, which shows rough agreement. Based on this model, a real time closed-loop control algorithm is developed.
For assessing hearing aid algorithms, a method is sought to shift the threshold of a speech-in-noise test to (mostly positive) signal-to-noise ratios (SNRs) that allow discrimination across algorithmic settings and ar...
详细信息
For assessing hearing aid algorithms, a method is sought to shift the threshold of a speech-in-noise test to (mostly positive) signal-to-noise ratios (SNRs) that allow discrimination across algorithmic settings and are most relevant for hearing-impaired listeners in daily life. Hence, time-compressed speech with higher speech rates was evaluated to parametrically increase the difficulty of the test while preserving most of the relevant acoustical speech cues. A uniform and a non-uniform algorithm were used to compress the sentences of the German Oldenburg Sentence Test at different speech rates. In comparison, the non-uniform algorithm exhibited greater deviations from the targeted time compression, as well as greater changes of the phoneme duration, spectra, and modulation spectra. Speech intelligibility for fast Oldenburg sentences in background noise at different SNRs was determined with 48 normal-hearing listeners. The results confirmed decreasing intelligibility with increasing speech rate. Speech had to be compressed to more than 30% of its original length to reach 50% intelligibility at positive SNRs. Characteristics influencing the discrimination ability of the test for assessing effective SNR changes were investigated. Subjective and objective measures indicated a clear advantage of the uniform algorithm in comparison to the non-uniform algorithm for the application in speech-in-noise tests. (C) 2014 Acoustical Society of America.
作者:
Peserico, EMIT
Comp Sci & Artificial Intelligence Lab Cambridge MA 02139 USA
In the context of competitive analysis of online algorithms for the k-server problem, it has been conjectured that every randomized, memoryless online algorithm exhibits the highest competitive ratio against an offlin...
详细信息
In the context of competitive analysis of online algorithms for the k-server problem, it has been conjectured that every randomized, memoryless online algorithm exhibits the highest competitive ratio against an offline adversary that is lazy, i.e., that will issue requests forcing it to move one of its own servers only when this is strictly necessary to force a move on the part of the online algorithm. We prove that, in general, this lazy adversary conjecture fails. Moreover, it fails in a very strong sense: there are adversaries which perform arbitrarily better than any other adversary which is even slightly "lazier."
Pedestrian detection with large intraclass variations is still a challenging task in computer vision. In this paper, we propose a novel pedestrian detection method based on Random Forest. Firstly, we generate a few lo...
详细信息
Pedestrian detection with large intraclass variations is still a challenging task in computer vision. In this paper, we propose a novel pedestrian detection method based on Random Forest. Firstly, we generate a few local templates with different sizes and different locations in positive exemplars. Then, the Random Forest is built whose splitting functions are optimized by maximizing class purity of matching the local templates to the training samples, respectively. To improve the classification accuracy, we adopt a boosting-like algorithm to update the weights of the training samples in a layer-wise fashion. During detection, the trained Random Forest will vote the category when a sliding window is input. Our contributions are the splitting functions based on local template matching with adaptive size and location and iteratively weight updating method. We evaluate the proposed method on 2 well known challenging datasets: TUD pedestrians and INRIA pedestrians. The experimental results demonstrate that our method achieves state-of-the-art or competitive performance.
The storage energy of high frequency reactive component for the switched mode power converter is a new factor to assess the performance. The instability of the switched-mode converter under the peak current control mo...
详细信息
The storage energy of high frequency reactive component for the switched mode power converter is a new factor to assess the performance. The instability of the switched-mode converter under the peak current control mode is examined for its storage energy. Bifurcation and chaos of the storage energy in the inductor and capacitor are observed based on the stroboscopic map. The boundary of maximum storage energy is given to be an alternative to study the instability of the system in this study. Zero energy is obtained in stable period 1 and the storage energy with the same value and opposite direction is obtained in period 2. The simulation results of bifurcation and chaos of energy are obtained under different parameters and verified by experiment. The boundary of instability of energy stored in the reactive component under various parameters is formulated and a single equation can be used to indicate the factors. These results can provide a new guideline to design a stable system and provide a new control algorithm for power electronic system.
Extended discrete shearlet provides a directional multiresolution decomposition. It has been mathematically shown that extended discrete shearlet is a more efficient representation for the signals containing distribut...
详细信息
Extended discrete shearlet provides a directional multiresolution decomposition. It has been mathematically shown that extended discrete shearlet is a more efficient representation for the signals containing distributed discontinuities such as edges, compared to discrete wavelet. Multiresolution analyses such as curvelet and ridgelet share similar properties, yet their directional representations are significantly different from that of extended discrete shearlet. Taking advantage of the unique properties of directional representation of extended discrete shearlet, we develop an image watermark algorithm based on the largest information entropy. In proposed algorithm, firstly, 1-level extended discrete shearlet transform decomposes the test image into directional components on horizontal cone;each directional component reflects directional features and textured features differently. Next, the directional component whose information entropy is the highest is selected to carry watermark. Compared with related algorithms based on DWT and DCT, the proposed algorithm tends to obtain preferable invisibility when it is robust against common attacks.
暂无评论