首页 > 最新文献

2010 IEEE Youth Conference on Information, Computing and Telecommunications最新文献

英文 中文
Relay protocol improvement and frame structure design base on overhearing mechanism and physical network coding 基于监听机制和物理网络编码的中继协议改进和帧结构设计
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713109
Qiong Huang, Ming-jing Ni, Lun Tang, Rong Chai, Qianbin Chen
Under the background of TDD mode and LTE-Advanced scene, in this paper, we combine physical network coding with relay technology in order to make physical network coding-decode and forward(PNC-DF)together with physical network coding-amplify and forward(PNC-AF)transfer mode can be used to improve network throughput by using interference. Because of the ability to listen to the multi-user relay service, we need to optimize and select user group of physical network coding. In this paper, we use over-hearing mechanism in order to optimize user group, even more we also need to improve the department of transport protocol on delay. At last, depending on improved transport protocol, we design two kinds of frame structure which could adapt to improved transfer model. The simulation result shows that PNC-DF and PNC-AF with over-hearing mechanism could reduce the bit error rate.
在TDD模式和LTE-Advanced场景的背景下,本文将物理网络编码与中继技术相结合,使得物理网络编码-解码-转发(PNC-DF)与物理网络编码-放大-转发(PNC-AF)传输模式可以利用干扰来提高网络吞吐量。由于能够监听多用户中继业务,需要对物理网络编码的用户组进行优化选择。在本文中,为了优化用户组,我们使用了监听机制,更需要改进传输部门的延迟协议。最后,根据改进的传输协议,设计了两种能够适应改进传输模型的帧结构。仿真结果表明,带超听机制的PNC-DF和PNC-AF可以降低误码率。
{"title":"Relay protocol improvement and frame structure design base on overhearing mechanism and physical network coding","authors":"Qiong Huang, Ming-jing Ni, Lun Tang, Rong Chai, Qianbin Chen","doi":"10.1109/YCICT.2010.5713109","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713109","url":null,"abstract":"Under the background of TDD mode and LTE-Advanced scene, in this paper, we combine physical network coding with relay technology in order to make physical network coding-decode and forward(PNC-DF)together with physical network coding-amplify and forward(PNC-AF)transfer mode can be used to improve network throughput by using interference. Because of the ability to listen to the multi-user relay service, we need to optimize and select user group of physical network coding. In this paper, we use over-hearing mechanism in order to optimize user group, even more we also need to improve the department of transport protocol on delay. At last, depending on improved transport protocol, we design two kinds of frame structure which could adapt to improved transfer model. The simulation result shows that PNC-DF and PNC-AF with over-hearing mechanism could reduce the bit error rate.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pixel level image fusion based on linear structure tensor 基于线性结构张量的像素级图像融合
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713105
B. Lu, Chunli Miao, Hui Wang
A pixel-level image fusion method based on linear structure tensor is proposed within wavelet framework. Structure tensor, which describes local structure information with its eigenvalues and eigenvectors, is adopted to design a feature selection algorithm to reconstruct high-frequency wavelet coefficients of fused image. Experimental results on grayscale and color images show that the linear structure tensor based fusion scheme can preserve more details.
提出了一种在小波框架下基于线性结构张量的像素级图像融合方法。利用结构张量的特征值和特征向量来描述局部结构信息,设计了一种特征选择算法来重建融合图像的高频小波系数。在灰度和彩色图像上的实验结果表明,基于线性结构张量的融合方案可以保留更多的细节。
{"title":"Pixel level image fusion based on linear structure tensor","authors":"B. Lu, Chunli Miao, Hui Wang","doi":"10.1109/YCICT.2010.5713105","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713105","url":null,"abstract":"A pixel-level image fusion method based on linear structure tensor is proposed within wavelet framework. Structure tensor, which describes local structure information with its eigenvalues and eigenvectors, is adopted to design a feature selection algorithm to reconstruct high-frequency wavelet coefficients of fused image. Experimental results on grayscale and color images show that the linear structure tensor based fusion scheme can preserve more details.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134015231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
VNSS: A network security sandbox for virtual computing environment VNSS:面向虚拟计算环境的网络安全沙箱
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713128
Gao Xiaopeng, Wan Sumei, Chen Xianqin
With the number of applications running upon the virtualized system increased, the virtual network circumstance becomes more and more complicated; the consequent security problems thereby have been a concern for industrial and academic fields. However, the current solutions are mostly confined to the enforcement of several patchy-works on system which still requires proficient hacking skills for administrators and cannot ensure continuous protection for VM, resulting in potential security risks. In this paper we present a framework (VNSS) which provides both guarantee of distinct security level requirement and full-lifecycle protection for VM. We have implemented a prototype system based on Xen hypervisor to evaluate our framework. The experiment results demonstrate that our framework can provide continuous protection for virtual network environment.
随着运行在虚拟系统上的应用程序数量的增加,虚拟网络环境变得越来越复杂;由此产生的安全问题已成为工业界和学术界关注的问题。然而,目前的解决方案大多局限于在系统上执行几个补丁,对管理员来说仍然需要熟练的黑客技能,无法保证对VM的持续保护,存在潜在的安全风险。本文提出了一个为虚拟机提供不同安全级别要求和全生命周期保护的框架(VNSS)。我们已经实现了一个基于Xen hypervisor的原型系统来评估我们的框架。实验结果表明,该框架能够为虚拟网络环境提供持续的保护。
{"title":"VNSS: A network security sandbox for virtual computing environment","authors":"Gao Xiaopeng, Wan Sumei, Chen Xianqin","doi":"10.1109/YCICT.2010.5713128","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713128","url":null,"abstract":"With the number of applications running upon the virtualized system increased, the virtual network circumstance becomes more and more complicated; the consequent security problems thereby have been a concern for industrial and academic fields. However, the current solutions are mostly confined to the enforcement of several patchy-works on system which still requires proficient hacking skills for administrators and cannot ensure continuous protection for VM, resulting in potential security risks. In this paper we present a framework (VNSS) which provides both guarantee of distinct security level requirement and full-lifecycle protection for VM. We have implemented a prototype system based on Xen hypervisor to evaluate our framework. The experiment results demonstrate that our framework can provide continuous protection for virtual network environment.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134251862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A decentralized approach with fewer coding nodes for network coding multicast 网络编码多播的一种编码节点少的分散方法
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713087
Xiao Sun
Previous works on network coding have mainly focused on the throughput and the cost of bandwidth, but few cares about saving resources used to code. In this paper we present a decentralized algorithm to construct network coding solutions, which reduces the number of coding nodes. We showed the dynamic topology greatly affected the network coding solutions, which may improve coding solution or reduce the coding nodes and we also analyzed some useful behaviors in feasible network coding solutions. By the nodes independently attempting those behaviors in dynamic topology, we introduce a fully decentralized algorithm of constructing coding solution. By simulation we found our approach has excellent performance, which achieves the approximate throughput compared to completely Randomized Network Coding, but only employing 10%–20% of nodes to code.
以往关于网络编码的研究主要集中在吞吐量和带宽成本上,很少有人关心如何节省用于编码的资源。本文提出了一种分散的网络编码解构造算法,减少了编码节点的数量。研究表明,动态拓扑结构对网络编码方案有很大的影响,可以改善编码方案或减少编码节点,并分析了可行网络编码方案的一些有用行为。通过节点在动态拓扑中独立尝试这些行为,我们引入了一种完全分散的构造编码解的算法。通过仿真,我们发现我们的方法具有优异的性能,与完全随机网络编码相比,它达到了近似的吞吐量,但只使用10%-20%的节点进行编码。
{"title":"A decentralized approach with fewer coding nodes for network coding multicast","authors":"Xiao Sun","doi":"10.1109/YCICT.2010.5713087","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713087","url":null,"abstract":"Previous works on network coding have mainly focused on the throughput and the cost of bandwidth, but few cares about saving resources used to code. In this paper we present a decentralized algorithm to construct network coding solutions, which reduces the number of coding nodes. We showed the dynamic topology greatly affected the network coding solutions, which may improve coding solution or reduce the coding nodes and we also analyzed some useful behaviors in feasible network coding solutions. By the nodes independently attempting those behaviors in dynamic topology, we introduce a fully decentralized algorithm of constructing coding solution. By simulation we found our approach has excellent performance, which achieves the approximate throughput compared to completely Randomized Network Coding, but only employing 10%–20% of nodes to code.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132786322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual speech recognition using Convolutional VEF snake and canonical correlations 基于卷积VEF蛇和典型相关的视觉语音识别
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713068
Kun Lu, Yuwei Wu, Yunde Jia
This paper presents a novel approach for automatic visual speech recognition using Convolutional VEF snake and canonical correlations. The utterance image sequences of isolated Chinese words are recorded with a head-mounted camera, and we use Convolutional VEF snake model to detect and track lip boundary rapidly and accurately. Geometric and motion features are both extracted from lip contour sequences and concatenated to form a joint feature descriptor. Canonical correlation is applied to measure the similarity of two utterance feature matrices and a linear discriminant function is introduced to make further improvement on the recognition accuracy. Experimental results demonstrate that our approach is promising and the joint feature descriptor is more robust than individual ones.
本文提出了一种基于卷积VEF蛇和典型相关的自动视觉语音识别方法。利用头戴式摄像机记录孤立汉语单词的语音图像序列,利用卷积VEF蛇形模型快速准确地检测和跟踪唇边界。从唇形序列中提取几何特征和运动特征,并将其连接起来形成一个联合特征描述子。应用典型相关度量两个话语特征矩阵的相似度,并引入线性判别函数进一步提高识别精度。实验结果表明,联合特征描述子比单个特征描述子具有更强的鲁棒性。
{"title":"Visual speech recognition using Convolutional VEF snake and canonical correlations","authors":"Kun Lu, Yuwei Wu, Yunde Jia","doi":"10.1109/YCICT.2010.5713068","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713068","url":null,"abstract":"This paper presents a novel approach for automatic visual speech recognition using Convolutional VEF snake and canonical correlations. The utterance image sequences of isolated Chinese words are recorded with a head-mounted camera, and we use Convolutional VEF snake model to detect and track lip boundary rapidly and accurately. Geometric and motion features are both extracted from lip contour sequences and concatenated to form a joint feature descriptor. Canonical correlation is applied to measure the similarity of two utterance feature matrices and a linear discriminant function is introduced to make further improvement on the recognition accuracy. Experimental results demonstrate that our approach is promising and the joint feature descriptor is more robust than individual ones.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133711435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A graph-model-based structure vulnerability Analyzing method on satellite network 基于图模型的卫星网络结构脆弱性分析方法
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713084
Xiang Li, Bai Lin, DaQi Li
The satellite network has features like complex, dynamic and fuzzy. Compared to ground information systems, satellite network has more vulnerabilities that are hard to anticipate, and needs a beforehand study to ensure its safely construction. This article uses a vulnerability Analyzing method based on graph model. It uses the relatively still structure as stand point in the dynamic satellite network environment. It synthetically analyses relative vulnerabilities in the network from node level, chain level and access path level. Through simulations with the GIG application layer network structures as the scenarios, this kind of satellite network structure vulnerability analysis method gets its veracity and application value proved.
卫星网络具有复杂性、动态性和模糊性等特点。与地面信息系统相比,卫星网络存在更多难以预测的漏洞,需要事先进行研究,以确保其安全建设。本文采用了一种基于图模型的漏洞分析方法。在动态卫星网络环境中,采用相对静止的结构作为立足点。从节点级、链级和访问路径级综合分析了网络中的相关漏洞。通过以GIG应用层网络结构为场景的仿真,验证了这种卫星网络结构脆弱性分析方法的准确性和应用价值。
{"title":"A graph-model-based structure vulnerability Analyzing method on satellite network","authors":"Xiang Li, Bai Lin, DaQi Li","doi":"10.1109/YCICT.2010.5713084","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713084","url":null,"abstract":"The satellite network has features like complex, dynamic and fuzzy. Compared to ground information systems, satellite network has more vulnerabilities that are hard to anticipate, and needs a beforehand study to ensure its safely construction. This article uses a vulnerability Analyzing method based on graph model. It uses the relatively still structure as stand point in the dynamic satellite network environment. It synthetically analyses relative vulnerabilities in the network from node level, chain level and access path level. Through simulations with the GIG application layer network structures as the scenarios, this kind of satellite network structure vulnerability analysis method gets its veracity and application value proved.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116306559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Focused passive synthetic aperture 聚焦被动合成孔径
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713069
Xiongfei Zeng, Zheng Li, Haining Huang, Guiqing Sun
High accurate ranging for near-field sources requires that the array aperture should be long enough, especially for the weak underwater acoustic signal with very low frequency. The passive synthetic aperture technique can increase the array aperture artificially by the motion of physical array and signal processing. This paper applies it to the near-field ranging with focused beamforming, which provides a feasible ranging method for near-field weak signal. Theoretical analysis and simulation results both indicate: 1) the proposed method can achieve high ranging precision for near-field sources; 2) because of the error accumulation, the times of extending array would affect the ranging precision directly, and if the sizes of synthetic apertures are same, the fewer times array is extended, the better performance it owns, on the contrary, the ranging precision is independent on the speed of the towed array.
近场源的高精度测距要求阵列孔径足够长,特别是对于频率极低的微弱水声信号。被动合成孔径技术通过物理阵列的运动和信号处理,人为地增大阵列孔径。本文将其应用于聚焦波束形成的近场测距中,为近场微弱信号的测距提供了一种可行的方法。理论分析和仿真结果均表明:1)该方法能达到较高的近场源测距精度;2)由于误差积累,阵列扩展次数将直接影响测距精度,在合成孔径大小相同的情况下,阵列扩展次数越少,测距精度越好,相反,阵列的扩展精度与拖曳阵列的速度无关。
{"title":"Focused passive synthetic aperture","authors":"Xiongfei Zeng, Zheng Li, Haining Huang, Guiqing Sun","doi":"10.1109/YCICT.2010.5713069","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713069","url":null,"abstract":"High accurate ranging for near-field sources requires that the array aperture should be long enough, especially for the weak underwater acoustic signal with very low frequency. The passive synthetic aperture technique can increase the array aperture artificially by the motion of physical array and signal processing. This paper applies it to the near-field ranging with focused beamforming, which provides a feasible ranging method for near-field weak signal. Theoretical analysis and simulation results both indicate: 1) the proposed method can achieve high ranging precision for near-field sources; 2) because of the error accumulation, the times of extending array would affect the ranging precision directly, and if the sizes of synthetic apertures are same, the fewer times array is extended, the better performance it owns, on the contrary, the ranging precision is independent on the speed of the towed array.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"758 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122986179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on the parameters of the semi-fragile watermarking based on JPEG properties 基于JPEG属性的半脆弱水印参数研究
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713082
Jun Xiao, Jiaorao Su, Zhiqiang Ma
As a new authentication technique for digital information, semi-fragile watermarking has gained great development, and since JPEG compression is one of the usually used image processing methods, more and more semi-fragile watermarking algorithms based on JPEG compression standard are proposed, but how to make full use of the properties of JPEG compression is still a problem. In this paper, the theory of semi-fragile watermarking based on properties of JPEG and DCT coefficients are introduced, and the parameters that affect the performances are analyzed theoretically and experimentally. The result of study shows that the positions of DCT coefficients used to generate watermark, the number of watermarks generated from a couple of blocks and the positions used to hide watermarks have great effect on the performances of the algorithm. Unless some special requirements exist, both the positions of coefficients used to generate and embed watermark should be chosen according to the order of zig-zag, and usually the best performance can be obtained when only one bit watermark is generated from a couple of blocks.
半脆弱水印作为一种新的数字信息认证技术,得到了很大的发展,而JPEG压缩是常用的图像处理方法之一,基于JPEG压缩标准的半脆弱水印算法越来越多,但如何充分利用JPEG压缩的特性仍然是一个问题。本文介绍了基于JPEG和DCT系数特性的半脆弱水印原理,并对影响半脆弱水印性能的参数进行了理论和实验分析。研究结果表明,用于生成水印的DCT系数的位置、由几个块生成的水印的数量以及用于隐藏水印的位置对算法的性能有很大影响。除非有特殊要求,否则用于生成和嵌入水印的系数的位置都应按照锯齿形的顺序来选择,通常在几个块中只生成一个比特的水印时可以获得最佳的性能。
{"title":"Study on the parameters of the semi-fragile watermarking based on JPEG properties","authors":"Jun Xiao, Jiaorao Su, Zhiqiang Ma","doi":"10.1109/YCICT.2010.5713082","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713082","url":null,"abstract":"As a new authentication technique for digital information, semi-fragile watermarking has gained great development, and since JPEG compression is one of the usually used image processing methods, more and more semi-fragile watermarking algorithms based on JPEG compression standard are proposed, but how to make full use of the properties of JPEG compression is still a problem. In this paper, the theory of semi-fragile watermarking based on properties of JPEG and DCT coefficients are introduced, and the parameters that affect the performances are analyzed theoretically and experimentally. The result of study shows that the positions of DCT coefficients used to generate watermark, the number of watermarks generated from a couple of blocks and the positions used to hide watermarks have great effect on the performances of the algorithm. Unless some special requirements exist, both the positions of coefficients used to generate and embed watermark should be chosen according to the order of zig-zag, and usually the best performance can be obtained when only one bit watermark is generated from a couple of blocks.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115888412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SVM inverse model-based heading control of unmanned surface vehicle 基于SVM逆模型的无人水面航行器航向控制
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713064
Sun Qiaomei, Ren Guang, Yue Jin, Qi Xiaowei
This paper describes a control methodology of SVM inverse model for unmanned surface vehicle (USV) system heading control. The method is composed of SVM inverse model and PID feedback compensation that are illustrated in detail. In the MATLAB platform, unmanned surface vehicle module and SVM control module were established. The whole system simulation was conducted. The experiments results show that the proposed SVM inverse model approach can achieve effective control of USV.
提出了一种基于支持向量机逆模型的无人水面飞行器航向控制方法。该方法由支持向量机逆模型和PID反馈补偿组成,并对其进行了详细说明。在MATLAB平台上,建立了无人水面飞行器模块和支持向量机控制模块。对整个系统进行了仿真。实验结果表明,所提出的支持向量机逆模型方法可以实现对USV的有效控制。
{"title":"SVM inverse model-based heading control of unmanned surface vehicle","authors":"Sun Qiaomei, Ren Guang, Yue Jin, Qi Xiaowei","doi":"10.1109/YCICT.2010.5713064","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713064","url":null,"abstract":"This paper describes a control methodology of SVM inverse model for unmanned surface vehicle (USV) system heading control. The method is composed of SVM inverse model and PID feedback compensation that are illustrated in detail. In the MATLAB platform, unmanned surface vehicle module and SVM control module were established. The whole system simulation was conducted. The experiments results show that the proposed SVM inverse model approach can achieve effective control of USV.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
AdaGP-Rank: Applying boosting technique to genetic programming for learning to rank AdaGP-Rank:将提升技术应用于遗传规划学习排序
Pub Date : 2010-11-01 DOI: 10.1109/YCICT.2010.5713094
Feng Wang, Xin Xu
One crucial task of learning to rank in the field of information retrieval (IR) is to determine an ordering of documents according to their degree of relevance to the user given query. In this paper, a learning method is proposed named AdaGP-Rank by applying boosting techniques to genetic programming. This approach uses genetic programming to evolve ranking functions while a process inspired from AdaBoost technique helps the evolved ranking functions concentrate on the ranking of those documents associating those ‘hard’ queries. Based on the confidence coefficients, the ranking functions obtained at each boosting round are then combined into a final strong ranker. Experiments conform that AdaGP-Rank has general better performance than several state-of-the-art ranking algorithms on the benchmark data sets.
在信息检索(IR)领域中,学习排序的一个关键任务是根据文档与用户给定查询的相关程度确定文档的排序。本文提出了一种将增强技术应用于遗传规划的学习方法AdaGP-Rank。这种方法使用遗传编程来进化排名函数,而受AdaBoost技术启发的过程有助于进化的排名函数专注于那些与“硬”查询相关的文档的排名。基于置信度系数,将每一轮提升得到的排名函数组合成最终的强排名。实验表明,在基准数据集上,AdaGP-Rank总体上优于几种最先进的排名算法。
{"title":"AdaGP-Rank: Applying boosting technique to genetic programming for learning to rank","authors":"Feng Wang, Xin Xu","doi":"10.1109/YCICT.2010.5713094","DOIUrl":"https://doi.org/10.1109/YCICT.2010.5713094","url":null,"abstract":"One crucial task of learning to rank in the field of information retrieval (IR) is to determine an ordering of documents according to their degree of relevance to the user given query. In this paper, a learning method is proposed named AdaGP-Rank by applying boosting techniques to genetic programming. This approach uses genetic programming to evolve ranking functions while a process inspired from AdaBoost technique helps the evolved ranking functions concentrate on the ranking of those documents associating those ‘hard’ queries. Based on the confidence coefficients, the ranking functions obtained at each boosting round are then combined into a final strong ranker. Experiments conform that AdaGP-Rank has general better performance than several state-of-the-art ranking algorithms on the benchmark data sets.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132535298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2010 IEEE Youth Conference on Information, Computing and Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1