Most traditional alarm systems cannot address security threats in a satisfactory manner. To alleviate this problem, we developed a high-confidence cyber-physical alarm system (CPAS), a new kind of alarm systems. This ...
详细信息
ISBN:
(纸本)9781424497799
Most traditional alarm systems cannot address security threats in a satisfactory manner. To alleviate this problem, we developed a high-confidence cyber-physical alarm system (CPAS), a new kind of alarm systems. This system establishes the connection of the Internet (i.e. TCP/IP) through GPRS/CDMA/3G. It achieves mutual communication control among terminal equipments, human machine interfaces and users by using the existing mobile communication network. The CPAS will enable the transformation in alarm mode from traditional one-way alarm to two-way alarm. The system has been successfully applied in practice. The results show that the CPAS could avoid false alarms and satisfy residents' security needs.
Automatical verification of time sensitive protocols is a difficult research topic in formal analyses, with the key problem being how to simply and efficiently check time constraints led by time stamps. TSPVT, which a...
详细信息
Automatical verification of time sensitive protocols is a difficult research topic in formal analyses, with the key problem being how to simply and efficiently check time constraints led by time stamps. TSPVT, which automatically verifies time sensitive protocols, was developed from the SPVT(security protocol verifying tool) in the Objective Caml language. TSPVT takes time sensitive protocols in an extended π-like calculus model with time events as its input model, then translates the π-like calculus model into a Horn logic model P extended by the time constraint system. The Horn logic model P is composed of a set of rules for honest participants as well as another set of rules for attackers. In the verification period, TSPVT computes the fix point of P when the tool needs to process the X-resolution among rules within the time constraint system and then verifies the authentication of the protocol based on the fixed point. A simplified description of the verification process using TSPVT is given in detail using the Denning-Sacco protocol as an example, with the results showing the validity of the verifier.
This work presents a (numerical) technique to the local stability analysis of feedback linearizing control schemes for a class of uncertain nonlinear systems. A nonlinear decomposition of vector functions is applied t...
This work presents a (numerical) technique to the local stability analysis of feedback linearizing control schemes for a class of uncertain nonlinear systems. A nonlinear decomposition of vector functions is applied to transform the Lyapunov stability conditions into a set of state-and parameter-dependent LMI (linear matrix inequality) constraints, which are numerically solved in a finite set of points. The proposed method can deal with a large class of nonlinear systems as well as very complex Lyapunov function candidates. In addition, a maximized level set of the Lyapunov function is proposed as an estimate of the system stability region.
It my great pleasure and honor to welcome you to FoSER 2010: The FSE/SDP Workshop on the Future of Software engineering Research. This workshop was organized in collaboration with and made possible by generous support...
详细信息
ISBN:
(纸本)9781450304276
It my great pleasure and honor to welcome you to FoSER 2010: The FSE/SDP Workshop on the Future of Software engineering Research. This workshop was organized in collaboration with and made possible by generous support from the Software Design and Productivity Coordinating Group (SDP) of the U.S. National Coordination Office (NCO) for Networking and Information Technology Research and Development (NITRD), and the National science Foundation (NSF). This one-time, international working conference has brought together top academic and industrial researchers and government research funding agency personnel from around the world to engage in an extended discussion of consequential new ideas about the future of our field. The ideas produced by this workshop will be disseminated in two forms. First, the position papers accepted by the program committee will be published in a companion to the Proceedings of FSE-18. Second, the workshop findings will be published subsequently in a special report by NITRD/SDP. The call for papers for FoSER 2010 solicited 4-page position papers with new ideas about the future of software and software-reliant systems, and the research that will be needed to meet future needs. Papers were expected to be creative and thought-provoking, and to articulate compelling new perspectives, positions, problem formulations, assumptions and approaches. The workshop did not seek, and did not accept, technical research papers or abstracts. The workshop received a total of 139 position papers. Of these, 90 papers (65%) were accepted. Each paper was reviewed by at least two members of the workshop program committee. The committee was asked to accept all papers presenting significant new ideas about how our field should move forward. Copyright 2010 ACM.
This paper is concerned with understanding the connection between the existing Internet congestion control algorithms and the optimal control theory. The available resource allocation controllers are mainly devised to...
详细信息
ISBN:
(纸本)9781424458363
This paper is concerned with understanding the connection between the existing Internet congestion control algorithms and the optimal control theory. The available resource allocation controllers are mainly devised to derive the state of the system to a desired equilibrium point and, therefore, they are oblivious to the transient behavior of the closed-loop system. To take into account the real-time performance of the system, rather than merely its steady-state performance, the congestion control problem should be solved by maximizing a proper utility functional as opposed to a utility function. For this reason, this work aims to investigate what utility functionals the existing congestion control algorithms maximize. In particular, it is shown that there exist meaningful utility functionals whose maximization leads to the celebrated primal, dual and primal/dual algorithms. An implication of this result is that a real network problem may be solved by regarding it as an optimal control problem on which some practical constraints, such as a real-time link capacity constraint, are imposed.
Extracting or estimating skeletal hand/finger forces using surface electro myographic (sEMG) signals poses many challenges due to cross-talk, noise, and a temporal and spatially modulated signal characteristics. Norma...
详细信息
Extracting or estimating skeletal hand/finger forces using surface electro myographic (sEMG) signals poses many challenges due to cross-talk, noise, and a temporal and spatially modulated signal characteristics. Normal sEMG measurements are based on single sensor data. In this paper, array sensors are used along with a proposed sensor fusion scheme that result in a simple Multi-Input-Single-Output (MISO) transfer function. Experimental data is used along with system identification to find this MISO system. A Genetic Algorithm (GA) approach is employed to optimize the characteristics of the MISO system. The proposed fusion-based approach is tested experimentally and indicates improvement in finger/hand force estimation.
The generating rule method is presented for incompatible and incomplete information of test data based on Bayesian theory. Firstly, the rule's conditional probability is calculated when the certainty (reliability)...
详细信息
The generating rule method is presented for incompatible and incomplete information of test data based on Bayesian theory. Firstly, the rule's conditional probability is calculated when the certainty (reliability) of the test data is the prior probability and the samples (supportability) is posterior probability. Then, Those rules whose conditional probability is bigger than a given threshold value should be preserved. Lastly, the rule is generated by logic conjunction and disjunction of all the preserved rules. The example and application analysis indicate that the algorithm is clear, the calculating process is simple and it can be easily applied to computer programs, moreover, this method can avoid the knowledge distortion and the rule losing to the maximum for generating rule.
This paper presents a new interface framework which has been added to Easy Java Simualtions' environment in order to improve its graphical features for 3D modeling. These new 3D capabilities provide users a set of...
详细信息
This paper presents a new interface framework which has been added to Easy Java Simualtions' environment in order to improve its graphical features for 3D modeling. These new 3D capabilities provide users a set of new view elements which can be used to develop models with a high degree of reality. In this way, Easy Java Simulations becomes a powerful tool to easily and quickly create 3D realistic simulations.
In order to solve the problem of image degradation caused by dust environments, an image degradation model considering multiple scattering factors caused by dust was first established using the first-order multiple sc...
详细信息
In order to solve the problem of image degradation caused by dust environments, an image degradation model considering multiple scattering factors caused by dust was first established using the first-order multiple scattering method. Then, a dark channel prior principle was applied to present an image restoration algorithm based on the image degradation model. Finally, a particle swarm optimization algorithm was applied to optimize the atmospheric light and the exposure parameters. This optimization algorithm was established according to the criterion of the image evaluation based on kirsch operator with dual threshold. By using the method an optimistic result of image restoration was obtained. The experimental results have shown that the method not only enhanced luminance and contrast, but also discovered more detail edges information. The method provided a foundation for target recognition in the dust environments.
In this study, a real-time wireless embedded EEG-based brain computer interface (BCI) system was developed for drowsiness detection in a realistic driving task. Accidents caused by driver's drowsiness behind the s...
详细信息
In this study, a real-time wireless embedded EEG-based brain computer interface (BCI) system was developed for drowsiness detection in a realistic driving task. Accidents caused by driver's drowsiness behind the steering wheel have a high fatality rate because of the marked decline in the driver's abilities of perception, recognition, and vehicle control abilities while sleepy. Therefore, real-time drowsiness monitoring is important to avoid traffic accidents. In this study, an embedded EEG-based BCI system which includes a wireless physiological signal acquisition module and an embedded signal processing module was designed, and a real-time drowsiness detection algorithm based on our unsupervised approach was implemented in the embedded signal processing module. EEG signal would be monitored and analyzed by the embedded signal processing module, and the warning tone would be triggered to prevent traffic accidents when the drowsiness condition occurred.
暂无评论