The retinal blood vessel analysis has been widely used in the diagnoses of diseases by ophthalmologists. According to the complex morphological characteristics of the blood vessels in normal and abnormal images, an au...
This paper details the mechanical and electronic design of a modular snake robot, the Little Red (LR). 3-D printing technology is applied to shorten the manufacturing cycle. With power, sensing, communication and cont...
详细信息
In linear wireless sensor networks, if the nodes can listen and receive packet at any time, a better balance between energy consumption and delay can be achieved by using opportunistic relay (such as TE-OR). In order ...
详细信息
The participation of UCAS at TREC Precision Medicine 2017 aims to evaluate the effectiveness of integrating semantic evidence to enhance medical information retrieval system. Benefited from the success of distributed ...
详细信息
Quantization rate is a crucial measure of complexity in determining stabilizability of control systems subject to quantized state measurements. This paper investigates quantization complexity for a class of nonlinear ...
详细信息
Quantization rate is a crucial measure of complexity in determining stabilizability of control systems subject to quantized state measurements. This paper investigates quantization complexity for a class of nonlinear systems which are subjected to disturbances of unknown statistics and unknown bounds. This class of systems includes linear stablizable systems as special cases. Two lower bounds on the quantization rates are derived which guarantee input-to-state stabilizability for continuous-time and sampled-data feedback strategies, respectively. Simulation examples are provided to validate the results.
We study distributed filtering for a class of uncertain systems over corrupted communication channels. We propose a distributed robust Kalman filter with stochastic gains, through which upper bounds of the conditional...
详细信息
To deal with the junk e-mail problem caused by the e-mail address leakage for a majority of Internet users, this paper presents a new privacy protection model in which the e-mail address of the user is treated as a pi...
详细信息
To deal with the junk e-mail problem caused by the e-mail address leakage for a majority of Internet users, this paper presents a new privacy protection model in which the e-mail address of the user is treated as a piece of privacy information concealed. Through an interaction pattern that involves three parties and uses an e-mail address code in the place of an e-mail address, the proposed model can prevent the e-mail address from being leaked, thus effectively resolving the junk e-mail problem. We compare the proposed anti-spam method with the filtering technology based on machine learning. The result shows that 100% spams can be filtered out in our scheme, indicating the effectiveness of the proposed anti-spam method.
Under the background of massive computing resources in power grid, smart grid has become the direction and trend of power industry development. In order to ensure the safe and stable operation of smart grid, the monit...
详细信息
As one of the important tasks in computer vision, target detection has become an important research hotspot in the past 20 years and has been widely used. It aims to quickly and accurately identify and locate a large ...
As one of the important tasks in computer vision, target detection has become an important research hotspot in the past 20 years and has been widely used. It aims to quickly and accurately identify and locate a large number of objects of predefined categories in a given image. According to the model training method, the algorithms can be divided into two types: single-stage detection algorithm and two-stage detection algorithm. In this paper, the representative algorithms of each stage are introduced in detail. Then the public and special datasets commonly used in target detection are introduced, and various representative algorithms are analyzed and compared in this field. Finally, the potential challenges for target detection are prospected.
Considering the carbon emission reduction and energy saving, the electric vehicles (EVs) have been identified as a promising alternative to classical fossil fuel-driven vehicles. Consequently, the Electric Vehicle Rou...
详细信息
Considering the carbon emission reduction and energy saving, the electric vehicles (EVs) have been identified as a promising alternative to classical fossil fuel-driven vehicles. Consequently, the Electric Vehicle Route Planning with Recharging (EVRC) problem extends traditional routing problems to take the limited capacity of the vehicle's battery into consideration. In order to avoid the depletion of battery, planned detours should be introduced to recharge the battery. As the previous research works mainly focused on the three assumptions: (1) EVs will be fully charged when they get a CS; (2) The charging time rises linearly as the battery charge level ascends;(3) Serve time is not considered in the whole process. However, in the actual situations, the location of the used charging stations and the amount of charge are decision variables. In addition, the charging function is not linear. In this work, we propose an integrated route and charging planning for EVs, and take partial charging, nonlinear charging functions as well as serve time into consideration. The experimental result shows that it leads to infeasible or excessively costly solutions when the serve time and the features of partial and nonlinear charging process are ignored.
暂无评论