This paper investigates the distributed formation control problem for a group of mobile Euler-Lagrange agents to achieve global stabilization by using virtual tensegrity structures. Firstly, a systematic approach to d...
详细信息
Short message is one of the most common communication media for mobile subscribers, so major mobile operators are devoted to improve their Short Message Service (SMS). However, the annoying and undesired messages, als...
详细信息
ISBN:
(纸本)9781467384155
Short message is one of the most common communication media for mobile subscribers, so major mobile operators are devoted to improve their Short Message Service (SMS). However, the annoying and undesired messages, also named message spam or simply spam, not only worsen the users' experience, but also cause their complaints on SMS. In this paper, we present a novel Chinese SMS spam filtering framework based on AdaBoost algorithm to provide accurate and effective short messages classification. Three content-based weak filters are introduced to boost the performance of final classification decision. Results from Receiver Operating Characteristics (ROC) analysis prove the proposed method has such advantages as higher efficiency and fewer parameters over those established SMS spam filtering methods. The application of the proposed method is expected to block the most spam for mobile subscribers and improve the service quality of SMS. With simple data processing and few training parameters, the proposed method can be applied into the practice of short text classification.
Real time bidding (RTB) is emerged with the rapid development and integration of Internet and big data, and it has become the most important business model for online computational advertising. In RTB-based advertisin...
详细信息
Real time bidding (RTB) is emerged with the rapid development and integration of Internet and big data, and it has become the most important business model for online computational advertising. In RTB-based advertising markets, Demand Side Platforms (DSPs) aim to help the advertisers buy ad impressions matched with their target audiences. Due to the existence of discount rate, the advertising effect may be diminished when displaying the advertisements multiple times to the same target audience. As such, frequency capping is widely considered as a crucial issue faced by most advertisers. In this paper, we mainly consider the frequency capping problems in RTB advertising markets, and establish a two-stage optimization model for advertisers and DSPs. Utilizing the computational experiment approach, we design two experiments to validate our model. The experimental results show that under different discount rates, the optimal frequency caps are different. Moreover, when considering all the discount rates, there exists an optimal frequency cap, at which the expected maximum revenue can be obtained in the long run.
In this paper, we propose a time division multiple access(TDMA) based protocol that works on slightly modified IEEE802.15.4 network in star topology for secured and unsecured low latency deterministic networks(LLDN) f...
详细信息
ISBN:
(纸本)9781467374439
In this paper, we propose a time division multiple access(TDMA) based protocol that works on slightly modified IEEE802.15.4 network in star topology for secured and unsecured low latency deterministic networks(LLDN) for industrial control systems. This protocol ensures total superframe time as low as ten milliseconds as compared to minimum possible superframe time of 15.36 milliseconds. In these networks, Each end device transmits its data frame in their allotted timeslot. The timeslot and inter timeslot spacing is optimized for channel bandwidth utilization and reliable data frame exchange. While this TDMA based protocol eliminates the risk of frame collisions to great extent, MAC sub-layer tweaking improves the non-determinism of the network and increases its bandwidth efficiency. We also investigate the security impact on the performance of LLDN. A mathematical model is developed that takes empirical values as input and predicts the worst case arrival times of network devices at coordinator. Experiments were conducted to evaluate the suggested protocol and mathematical model.
This paper is concerned with the distributed fusion estimation problem for linear system observed by multirate sensors in the environment of wireless sensor networks(WSNs). Rates of the sampling, estimation, transmiss...
详细信息
ISBN:
(纸本)9781467374439
This paper is concerned with the distributed fusion estimation problem for linear system observed by multirate sensors in the environment of wireless sensor networks(WSNs). Rates of the sampling, estimation, transmission in the WSNs are different. The distributed fusion estimation is composed of two stages. At the first stage, every sensor in the WSNs collects measurements of its own to generate a local estimation, then the local estimations from the neighboring sensors and the neighbour's neighbor sensors are further collected to form the fusion estimation at the second stage. The main result is that a distributed fusion estimation algorithm is presented which is simple and low energy consumption. The performance, namely, the effectiveness and the stability of the algorithm under multiple sensors, is analyzed. A numerical example is given to show the feasibility and effectiveness of the presented algorithm.
This paper is concerned with adaptive filter and its application in SINS/GPS/DVS integrated navigation. A novel adaptive filter, namely, SH–STF, is presented by combining the Sage–Husa(SH) adaptive filter with the s...
详细信息
ISBN:
(纸本)9781467374439
This paper is concerned with adaptive filter and its application in SINS/GPS/DVS integrated navigation. A novel adaptive filter, namely, SH–STF, is presented by combining the Sage–Husa(SH) adaptive filter with the strong tracking filter(STF). For multirate sampling dynamic system and in consideration of observations randomly missing, SH–STF is applied to data fusion and SINS/GPS/DVS integrated navigation. Simulation results show the feasibility and effectiveness of the presented algorithm.
In this paper,we propose a time division multiple access(TDMA) based protocol that works on slightly modified IEEE 802.15.4 network in star topology for low latency deterministic networked control *** end device in ne...
详细信息
ISBN:
(纸本)9781479970186
In this paper,we propose a time division multiple access(TDMA) based protocol that works on slightly modified IEEE 802.15.4 network in star topology for low latency deterministic networked control *** end device in network transmits its data frame after certain time delay in response to periodic request from network *** time delay is optimized for channel bandwidth utilization and reliable data frame *** this TDMA based protocol eliminates the risk of frame collisions to great extent,MAC sub-layer modifications reduces the non-determinism of the network and increases its bandwidth *** were conducted to evaluate the suggested *** upon these experiments results,the proposed protocol is a feasible solution for control systems with real time constraints.
Entanglement depth characterizes the minimal number of particles in a system that are mutually entangled. For symmetric states, there is a dichotomy for entanglement depth: An N-particle symmetric state is either full...
详细信息
Entanglement depth characterizes the minimal number of particles in a system that are mutually entangled. For symmetric states, there is a dichotomy for entanglement depth: An N-particle symmetric state is either fully separable or fully entangled—the entanglement depth is either 1 or N. We show that this dichotomy property for entangled symmetric states is even stable under nonsymmetric noise. We propose an experimentally accessible method to detect entanglement depth in atomic ensembles based on a bound on the particle number population of Dicke states, and demonstrate that the entanglement depth of some Dicke states, for example the twin Fock state, is very stable even under a large arbitrary noise. Our observation can be applied to atomic Bose-Einstein condensates to infer that these systems can be highly entangled with the entanglement depth that is on the order of the system size (i.e., several thousands of atoms).
The rapidly growing amount of social interaction makes geographical names an important and indispensable medium for people in social and economic exchanges. Especially in today's information age, the frequency of ...
详细信息
ISBN:
(纸本)9781509029280
The rapidly growing amount of social interaction makes geographical names an important and indispensable medium for people in social and economic exchanges. Especially in today's information age, the frequency of usage of name information has increased greatly. In this paper, a method for the construction of a cities' names database is proposed. This will include the processing of the outcome data from the names pilot survey, the consolidation into the database, the development of the cloud service and management system based on the geographical names and zoning database, and the construction of a relatively complete set of the public service system of geographical names based on a website and touch screen interface. The method has been applied in SanYa, China successfully, and very good results have been obtained. The platform can provide not only accurate and convenient services of geographical names, but also promote its economic development and social progress.
The first issue of IEEE intelligent Transportation systems Society (ITSS) starts with survey papers on technology and security for intelligent vehicles. The first paper titled 'Intra-Vehicle Networks: A Review'...
详细信息
The first issue of IEEE intelligent Transportation systems Society (ITSS) starts with survey papers on technology and security for intelligent vehicles. The first paper titled 'Intra-Vehicle Networks: A Review' by S. Tuohy, M. Glavin, C. Hughes, E. Jones, M. Trivedi, and L. Kilmartin presents a comprehensive overview of current research on advanced intra-vehicle networks and identifies outstanding research questions for the future. J. Petit and S. E. Shladover's paper, 'Potential Cyberattacks on Automated Vehicles' analyzes the threats on autonomous automated vehicle and cooperative automated vehicle. 'A Video-Analysis-Based Railway-Road System for Detecting Hazard Situations at Level Crossings' by H. Salmane, L. Khoudour, and Y. Ruichek explores the possibility of implementing a smart video surveillance security system that is tuned toward detecting and evaluating abnormal situations induced by users in level crossing. 'Traffic Flow Prediction for Road Transportation Networks with Limited Traffic Data' by A. Abadi, T. Rajabioun, and P. A. Ioannou, uses a dynamic traffic simulator to generate flows in all links using available traffic information, estimated demand, and historical traffic data available from links equipped with sensors. The paper titled 'GNSS Multipath and Jamming Mitigation Using High-Mask-Angle Antennas and Multiple Constellations' studies the optimal antenna mask angle that maximizes the suppression of interference but still maintains the performance of a single constellation with a low-mask-angle antenna.
暂无评论