A large amount of networks are found to divide naturally into modules or communities within which the network connections are tight but between which they are sparser. However, it is still not clear that whether spars...
详细信息
A large amount of networks are found to divide naturally into modules or communities within which the network connections are tight but between which they are sparser. However, it is still not clear that whether sparse modules in which the nodes are sparsely connected internally and densely connected with other sparse or cohesive modules possibly exist and have functional meaning in complex networks. In this study, we first test BinTree Seeking method that detects both cohesive and sparse modules in a network on 4 networks with known modular structure. And then, we further study modular structure of 23 complex networks of different types and scales, and promising results indeed reveal that the sparse modules composed by the cohesively isolated nodes widely co-exist with the cohesive modules. Furthermore, the two types of modules are found often spatially closely related with each other. Compared with the cohesive modules, sizes of sparse ones are generally smaller.
In this paper, we study the global asymptotical synchronization problem of delayed complex dynamical networks with a pre-given collection of general connection topologies where synchronization cannot be achieved by us...
详细信息
In this paper, we study the global asymptotical synchronization problem of delayed complex dynamical networks with a pre-given collection of general connection topologies where synchronization cannot be achieved by using any topology alone in this collection. By using single Lyapunov and multiple Lyapunov function methods, two global asymptotical synchronization conditions with the design of switching within the pre-given collection of topologies are presented for synchronizing such complex dynamical networks. According to the topological structure of the connection matrices, we consider more general forms. Simultaneous triangularizability, diagonalizability or even symmetry of the connection matrices is no longer assumed. Finally, simulation results are used to demonstrate the effectiveness of the proposed results.
A computer vision based method was proposed to detect and track pedestrians. It worked on TLD (tracking-learning-detection) framework which was a target detection and tracking algorithm that runs the detection and tra...
详细信息
A computer vision based method was proposed to detect and track pedestrians. It worked on TLD (tracking-learning-detection) framework which was a target detection and tracking algorithm that runs the detection and tracking simultaneously and then integrated the results to update the detection and tracking modules. HOG (histograms of oriented gradients) operator and an incremental classifier based on NCC (normalized cross correlation) matching were proposed to improve the detector for the reason that TLD was prone to an error or failure when it was applied to track a pedestrian. Firstly HOG descriptor was calculated to match with the templates stored in classifier based on NCC, then the results were integrated with tracking module, and final results will be used to update the detecting module. According to the experimental results, this method has good robustness and efficiency.
Weak boundary contrast, inhomogeneous background and overlapped intensity distributions of the object and background are main causes that may lead to failure of boundary detection for many traditional active contour m...
详细信息
ISBN:
(纸本)9781479923427
Weak boundary contrast, inhomogeneous background and overlapped intensity distributions of the object and background are main causes that may lead to failure of boundary detection for many traditional active contour methods. In this paper, we propose a region-based active contour model to address these problems in both local and global ways. A localized active contour framework is developed, in which two local boundary measures are introduced for the evolution of the level set function. These measures are used to select the boundary candidates for boundary preservation such that the evolution of the contour is guided in a reasonable way. The object boundary is determined by a global boundary measure which evaluates the boundary completeness during the entire evolution process. The experiments demonstrate that our method works well against weak boundary contrast, inhomogeneous background and overlapped intensity distributions.
作者:
Shitao TuLanjuan ZhuDepartment of Automation
Shanghai Jiao Tong University and Key Laboratory of System Control and Information Processing Ministry of Education of China 200240 China
Extraction-Transformation-Loading (ETL) plays an important role in data warehouse. Typically, performance is considered the main factor in ETL projects. Actually, faulttolerance and many other aspects influence the re...
详细信息
ISBN:
(纸本)9781467327626
Extraction-Transformation-Loading (ETL) plays an important role in data warehouse. Typically, performance is considered the main factor in ETL projects. Actually, faulttolerance and many other aspects influence the results of ETL greatly especially when the time period of projects are long and transformation rules cannot be determined from beginning, such as the situation of changing business logic. To satisfy the fault-tolerance and data validation in such kinds of situation, in this paper, we introduce a fault-tolerant algorithm which gives Redo strategy for different process interrupt scenarios. Moreover, we present a compound refresh mode consisting of full and incremental refresh to guarantee data correctness in changing business logic as well as timely data migration.
This paper considers the boundary control of a star-shaped open-channel network modeled by the Saint-Venant equations. We present the boundary feedback stabilization of the Saint-Venant equations by means of a Riemann...
详细信息
This paper considers the boundary control of a star-shaped open-channel network modeled by the Saint-Venant equations. We present the boundary feedback stabilization of the Saint-Venant equations by means of a Riemann invariants method. The estimation of the parameters satisfying the stability condition is deduced. The boundary feedback control is developed to guarantee that the solution of the controlsystem decays exponentially, only by taking the water levels at the gate boundaries as the feedback.
We propose an L 1/2 -based Iterative Matrix Completion algorithm for recovering the data transmitted with limited transmission window in the lossy environment to combat the high packet-loss rate. The transmission is r...
We propose an L 1/2 -based Iterative Matrix Completion algorithm for recovering the data transmitted with limited transmission window in the lossy environment to combat the high packet-loss rate. The transmission is regarded as the sampling process of Matrix Completion, hence the existing transmitting protocol or coding methods can be used to gain more samples and not mutually exclusive to the algorithm. The simulations with real world data show the effectiveness and efficiency of the scheme even the data are transmitted in the simplest way.
The paper is concerned with the problem of robust filtering for a class of systems with state-dependent uncertainties and energy-bounded disturbance. The state-dependent uncertainties can more precisely describe many ...
详细信息
ISBN:
(纸本)9781467351942
The paper is concerned with the problem of robust filtering for a class of systems with state-dependent uncertainties and energy-bounded disturbance. The state-dependent uncertainties can more precisely describe many practical dynamic systems with parameters varying with system states, such as spring stiffness, nonlinear resistor and friction coefficient. A non-quadratic Lyapunov function is adopted, upon which the sufficient condition for the filtering performance analysis is first derived. Then, the parameter-dependent full-order filter is designed such that the corresponding filtering error system is globally asymptotically stable and guarantees a noise attenuation performance index. A numerical example of a class of tunnel diode circuit systems is provided to show the effectiveness of the derived theoretical results.
Human Flesh Search is an explosive Web phenomenon these years in China, especially when new media, such as Weibo, appeared. In this research, we present the empirical studies about growing patterns of participated Hum...
详细信息
In this paper, a two-degree-of-freedom (TDOF) controller design method for multi-inputs multi-outputs (MIMO) system with multiple time delays based on inversing decoupling is proposed. Firstly, an inversing decoupling...
详细信息
In this paper, a two-degree-of-freedom (TDOF) controller design method for multi-inputs multi-outputs (MIMO) system with multiple time delays based on inversing decoupling is proposed. Firstly, an inversing decoupling method based on the factorization of the plant is developed. Secondly, the H 2 optimal controller design method is applied to the decoupled single-input/single-output (SISO) system after the system has been decoupled. Finally, a TDOF controller is designed for the decoupled closed-loop system. Compared with other developed methods, the proposed design method has two main advantages. One is that the design procedure is simple and the obtained controllers are given in analytical form. The other is that better performance can be achieved since the TDOF control structure can isolate the disturbance from the reference. Simulations are provided to illustrate the effectiveness of the proposed design approach.
暂无评论