We continue the study of (extended) spiking neural P systems with exhaustive use of rules by considering these computing devices as language generators. Specifically, a step is associated with a symbol according to th...
详细信息
The design of DNA sequences is one of the most practical and important research topics in DNA computing. We adopt taboo search algorithm and improve the method for the systematic design of equal-length DNA sequences, ...
详细信息
The design of DNA sequences is one of the most practical and important research topics in DNA computing. We adopt taboo search algorithm and improve the method for the systematic design of equal-length DNA sequences, which can satisfy certain combinatorial and thermodynamic constraints. Using taboo search algorithm, our method can avoid trapping into local optimization and can nd a set of good DNA sequences satisfying required constraints.
By introducing a predictive mechanism with small-world connections, we propose a new motion protocol for self-driven flocks. The small-world connections are implemented by randomly adding long-range interactions from ...
详细信息
By introducing a predictive mechanism with small-world connections, we propose a new motion protocol for self-driven flocks. The small-world connections are implemented by randomly adding long-range interactions from the leader to a few distant agents, namely, pseudoleaders. The leader can directly affect the pseudoleaders, thereby influencing all the other agents through them efficiently. Moreover, these pseudoleaders are able to predict the leader’s motion several steps ahead and use this information in decision making towards coherent flocking with more stable formation. It is shown that drastic improvement can be achieved in terms of both the consensus performance and the communication cost. From the engineering point of view, the current protocol allows for a significant improvement in the cohesion and rigidity of the formation at a fairly low cost of adding a few long-range links embedded with predictive capabilities. Significantly, this work uncovers an important feature of flocks that predictive capability and long-range links can compensate for the insufficiency of each other. These conclusions are valid for both the attractive and repulsive swarm model and the Vicsek model.
For depth information estimation of microscope defocus image, a blur parameter model of defocus image based on Markov random field has been present. It converts problem of depth estimation into optimization problem. A...
详细信息
We consider the problem of looking for small universal spiking neural P systems with exhaustive use of rules, which was formulated as an open problem by Gheorghe Paun in a survey paper. Here, spiking neural P systems ...
详细信息
ISBN:
(纸本)9781424427246
We consider the problem of looking for small universal spiking neural P systems with exhaustive use of rules, which was formulated as an open problem by Gheorghe Paun in a survey paper. Here, spiking neural P systems are used in two versions: as devices computing functions and as devices generating sets of numbers, with two ways of encoding the result of a computation. As devices of computing functions, if we associate the result with the distance between the first two spikes emitted by the output neuron, we produce a universal computing spiking neural P system with exhaustive use of rules (without delay) having 125 neurons;if we introduce the usual way of defining the result of a computation in membrane systems to encode the result, namely, the number of spikes emitted during a computation, then a universal computing system (without delay) with 126 neurons is also obtained in the sense of the exhaustive use of rules. For spiking neural P systems used as generators of sets of numbers, we construct a universal system (without delay) by using 128 neurons under the first way of defining the computation result, and a system (without delay) by using 127 neurons under the second way of defining the computation result.
To attack block cipher systems, it is inevitable to handle the bit-substitutions, such as S-box, cycle left shift, and expansion substitutions. In this paper, a DNA sticker algorithm for bit-substitution such as cycle...
详细信息
To attack block cipher systems, it is inevitable to handle the bit-substitutions, such as S-box, cycle left shift, and expansion substitutions. In this paper, a DNA sticker algorithm for bit-substitution such as cycle left shift is proposed. The proposed algorithm requires two equal long memory strands. The first memory strand stores the original binary string. while the second memory strand stores the resulting binary string, With the proposed algorithm, cycle left shift is performed on a mass of equal long binary strings, and the computation complexity of the cycle left shift is O(n) for all n-bit binary strings. Furthermore. this work indicates that block cipher systems with a 64-bit key are perhaps insecure. This paper presents clear evidence of the ability of DNA computing to perform intractable computation problems. (c) 2008 Elsevier Inc. All rights reserved.
To detect the anomalous events in the time series we propose a new idea that we can view the time series of traffic flows as a nonstationary Poisson process associated with superstatistics theory. According to the sup...
详细信息
ISBN:
(纸本)9780769531090
To detect the anomalous events in the time series we propose a new idea that we can view the time series of traffic flows as a nonstationary Poisson process associated with superstatistics theory. According to the superstatistics theory, the complex dynamic system may have a large fluctuationary of intensive quantities on large time scales which causes the system to behave as nonstationarity and nonlinearity which are also the characteristics of network traffic flows. This new idea provides us a novel way to partition the nonstationary traffic time series into small stationary segments which can be modeled by Poisson distribution in sub-second time scales. Different segments follow Poisson distribution with different distribution parameters which are named slow changing parameter compared to the fast changing traffic flows and the series of distribution parameter follows certain distribution too. We use this slow changing parameter of the segments as the key determinant factor of system to describe the network characteristic. To distinguish between the :normal traffic and anomalous traffic we calculate hurst parameter of slow changing parameter. By analysing the hurst parameter series we successfully detect some of the anomalous events.
On visual tracking, a particle filter algorithm was presented to track a moving target under clutter environment which can deal with rotation, scale changes, variations in the light source and partial occlusions. So i...
详细信息
ISBN:
(纸本)9781424421138
On visual tracking, a particle filter algorithm was presented to track a moving target under clutter environment which can deal with rotation, scale changes, variations in the light source and partial occlusions. So it can track the target with robustness. The proposed method was based on particle filter, integrated with color histogram in the measurement model, and the system model was second order autoregressive process. The algorithm took into account the latest observations and the tracked target can be rigid or non-rigid. Also the method can run in real-time. The experimental results confirm that the method is effective even when the monocular camera is moving and the target object is partially occluded in a clutter background.
A transient, six-cylinder diesel engine model for cold test has been developed for analyzing the engine fault through the engine torque curve. The model is based on physically working cycle, thermodynamic theory and d...
详细信息
ISBN:
(纸本)9780769534978
A transient, six-cylinder diesel engine model for cold test has been developed for analyzing the engine fault through the engine torque curve. The model is based on physically working cycle, thermodynamic theory and dynamics mechanism. The simulation of this model, implemented on Matlab/Simulink, can not only achieve engine faults detection before hot test, but also indicate different causes of engine faults, such as initial phase change, intake valve closing-time delay, and so on. It is shown that the diesel engine model for cold test proves its significance to improving cold test technology.
This paper introduced a novel high performance algorithm and VLSI architectures for achieving bit plane coding (BPC) in word level sequential and parallel mode. The proposed BPC algorithm adopts the techniques of co...
详细信息
This paper introduced a novel high performance algorithm and VLSI architectures for achieving bit plane coding (BPC) in word level sequential and parallel mode. The proposed BPC algorithm adopts the techniques of coding pass prediction and parallel & pipeline to reduce the number of accessing memory and to increase the ability of concurrently processing of the system, where all the coefficient bits of a code block could be coded by only one scan. A new parallel bit plane architecture (PA) was proposed to achieve word-level sequential coding. Moreover, an efficient high-speed architecture (HA) was presented to achieve multi-word parallel coding. Compared to the state of the art, the proposed PA could reduce the hardware cost more efficiently, though the throughput retains one coefficient coded per clock. While the proposed HA could perform coding for 4 coefficients belonging to a stripe column at one intra-clock cycle, so that coding for an NxN code-block could be completed in approximate N2/4 intra-clock cycles. Theoretical analysis and experimental results demonstrate that the proposed designs have high throughput rate with good performance in terms of speedup to cost, which can be good alternatives for low power applications.
暂无评论