Scale Invariance Feature Transform (SIFT) is quite suitable for image matching because of its invariance to image scaling, rotation and slight changes in illumination or viewpoint. However, due to high computation com...
详细信息
A recently proposed Bayesian tracking procedure for sensor networks approximates the update equation, which involves non-linear measurements, with a simple equation using the maximum likelihood (ML) estimate of the un...
详细信息
A recently proposed Bayesian tracking procedure for sensor networks approximates the update equation, which involves non-linear measurements, with a simple equation using the maximum likelihood (ML) estimate of the unknown state. This approach permits a numerically efficient implementation of the tracking procedure, and is suitable for a distributed implementation. In this paper we study the extent to which this approach approximates the theoretical Bayesian solution. We provide conditions to guarantee that the approximation becomes asymptotically exact, as the number of nodes becomes large. This result is relevant in applications where each sensor obtains a measurement with limited information about the state, but a large number of sensors is available. We apply our result to a case study, and present numerical simulations, showing that the approximation error becomes negligible for a relatively small number of nodes.
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed t...
详细信息
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.
Considering of advanced lung cancer progression rule,Semi-parameter varying coefficient model is *** index investigating in different time is lead into as input,and tumor progress is used as output,in order to explore...
详细信息
Considering of advanced lung cancer progression rule,Semi-parameter varying coefficient model is *** index investigating in different time is lead into as input,and tumor progress is used as output,in order to explore the mapping relationship of time-changing index and tumor,2-step estimation method(BPLS)is used to estimate the coefficients of the *** parameters estimating,B-spline approximation is needed,time factor is lead into model by B-spline,and logistic semi-parametric varying coefficient model is used for longitudinal data logistic varying coefficient modeling,PWLSE method is proposed for variable *** tumor size is prognosis via checking index by this time,and tumor progression probability can be calculated through checking index of this *** can aid clinical doctor to know tumor progress situation,and take measure to control tumor serious changing *** experiments,we found,this modeling method is reasonable and effective,and it can forecast tumor size effectively and can indicate doctor to prolong survival time of patients by taking corresponding medical measures.
This paper proposes a method that applies particle systems to simulate results of hydrological erosion caused by spout, like riverbeds. The terrain model is divided into two layers. The first one stores heights data (...
详细信息
ISBN:
(纸本)9788086943725
This paper proposes a method that applies particle systems to simulate results of hydrological erosion caused by spout, like riverbeds. The terrain model is divided into two layers. The first one stores heights data (typical heightfield) while the second is reserved for hardness data. This data structure enables fast and simple implementation of terrain deformation. We present the construction of a particle system terrain modifier, its main attributes and how they influence the final product of the modelling process. The proposed technique behaves like in classical particle systems. It uses emitter as element that control starting location, direction and quantity of particles in a given simulation environment. We choose parameters for particles such as: the current position, directional angle, linear velocity, rotation angle, rotation velocity and the size which define its zone of influence for landscape modification processes. Each emitted particle is moving (rolling) over the surface of terrain structure making deformations at its current position. Scale of the modifications depends on particle parameters and landscape structure susceptibility for modifications process under the particle influence zone. The proposed method is not intended to simulate physically erosion process, but focuses on its results for exploitation in virtual environments in real-time simulations and rapid prototyping of virtual terrains.
The paper gives an analysis of a variable-geometry suspension system. Since the system also affects both the wheel camber angle and the additional steering angle, the coordination of steering and wheel tilting can be ...
详细信息
The paper gives an analysis of a variable-geometry suspension system. Since the system also affects both the wheel camber angle and the additional steering angle, the coordination of steering and wheel tilting can be handled by this system. Since the nonlinear effects of the system are significant, the paper gives a detailed set-based analysis for the possibilities and constrains. A nonlinear polynomial SOS (Sum-of-Squares) programming method is applied to present the advantages of the variable-geometry suspension system.
This work presents an early evaluation of FPGA-based hardware thermal emulation methodology based on artificial heat sources and temperature sensors that can be used in real-time thermal simulation infrastructure. Mai...
详细信息
This work presents an early evaluation of FPGA-based hardware thermal emulation methodology based on artificial heat sources and temperature sensors that can be used in real-time thermal simulation infrastructure. Main functional blocks of a microprocessor are emulated as controllable heaters - blocks with resources configured for artificially high power dissipation. Based on power inputs from an architecture-level simulator the power dissipated by the heaters is adjusted and their temperature is measured by embedded thermal sensors based on ring oscillators (RO). This allows for real-time thermal emulation of future multi-core microprocessor systems considering long time constants of whole cooling packages and also effects such as thermal coupling between the cores.
The paper proposes the design of the speed of road vehicles, which minimizes control energy and fuel consumption while keeping travelling time and, moreover, considers the local traffic information to avoid conflicts ...
详细信息
The paper proposes the design of the speed of road vehicles, which minimizes control energy and fuel consumption while keeping travelling time and, moreover, considers the local traffic information to avoid conflicts in congestions. Topographic data and speed limits on the road are incorporated into the design of fuel efficient operation of the vehicle. Since the biased consideration of fuel consumption may lead to the reduction of speed, the traffic flow in the surroundings of the vehicle may be impaired. Thus, the information about the local traffic is an important factor considering the wider transportation system. In the paper the energy-efficient predicted cruise control strategy is presented, which is able to adapt to the motion of the surrounding vehicles. In this way a balance between the designed speed and the flow of the local traffic can be guaranteed.
Cloud Computing has reached a maturity state and high level of popularity that various Cloud services have become a part of our lives. The Internet of Things provides a way to improve social networking by interdiscipl...
详细信息
Cloud Computing has reached a maturity state and high level of popularity that various Cloud services have become a part of our lives. The Internet of Things provides a way to improve social networking by interdisciplinary efforts that can be effectively supported by Cloud Computing solutions. In this article we propose novel approaches for composing and interoperating Cloud solutions to support IoT functionality. We exemplify how to manage, share and process user data produced by mobile devices in different IaaS clouds.
The purpose of Demand Response (DR) is to guarantee that the power grid runs in an efficient and stable status by letting the consumers participate in the grid operation. Numerous studies of DR modeling and analysis a...
详细信息
ISBN:
(纸本)9781479938414
The purpose of Demand Response (DR) is to guarantee that the power grid runs in an efficient and stable status by letting the consumers participate in the grid operation. Numerous studies of DR modeling and analysis are implemented for consumers in the residential and commercial sectors, while the studies on the DR in the industrial sector are relatively immature. The ability to participate in DR differs due to the differences in the production processes of different industries. In this paper, we analyze the process and characteristics of cement production, one of the biggest industrial power consumers in China. A simulation model for cement plant based on the start probability of process equipment is also described. Simulation results of a case study show how the plant's loads shift under a Time-of-use (TOU) application.
暂无评论