Pub Date : 2015-10-01DOI: 10.1109/ICEDIF.2015.7280198
Chen Long, Tao Sun, Lizhi Cheng
In this paper, we present an efficient algorithm for sparse signal recovery with high exact recovery rate. The main idea of the algorithm is to combine two existing methods: linearized Bregman algorithm and reweighting technique. Compared with other available methods, such as reweighted Basis Pursuit (BP) and linearized Bregman, the proposed algorithm has a much lower computational complexity with higher probability of successful recovery. Numerical experiments demonstrate its efficiency and accuracy.
{"title":"Reweighted linearized Bregman algorithm for sparse signal recovery","authors":"Chen Long, Tao Sun, Lizhi Cheng","doi":"10.1109/ICEDIF.2015.7280198","DOIUrl":"https://doi.org/10.1109/ICEDIF.2015.7280198","url":null,"abstract":"In this paper, we present an efficient algorithm for sparse signal recovery with high exact recovery rate. The main idea of the algorithm is to combine two existing methods: linearized Bregman algorithm and reweighting technique. Compared with other available methods, such as reweighted Basis Pursuit (BP) and linearized Bregman, the proposed algorithm has a much lower computational complexity with higher probability of successful recovery. Numerical experiments demonstrate its efficiency and accuracy.","PeriodicalId":355975,"journal":{"name":"2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF)","volume":"13 35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129017996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICEDIF.2015.7280156
Zhigang Yu, Guiying Li
Robust pole assignment problem for linear systems with uncertainty is studied in this paper. The proposed gradient flow optimization algorithm is used to solve the Sylvester equations, in order that the close-loop control systems have the desired robust poles, namely, the uniformly asymptotically stable performance. The feedback gain matrix of the synthesized system can be derived from the gradient flow optimization algorithm. Robust pole assignment for linear system via the gradient flow optimization algorithm is examined in illustrative example that shows that the proposed approach has an important effect on continuous linear system with uncertainty.
{"title":"Robust pole assignment for continuous linear system based on optimization","authors":"Zhigang Yu, Guiying Li","doi":"10.1109/ICEDIF.2015.7280156","DOIUrl":"https://doi.org/10.1109/ICEDIF.2015.7280156","url":null,"abstract":"Robust pole assignment problem for linear systems with uncertainty is studied in this paper. The proposed gradient flow optimization algorithm is used to solve the Sylvester equations, in order that the close-loop control systems have the desired robust poles, namely, the uniformly asymptotically stable performance. The feedback gain matrix of the synthesized system can be derived from the gradient flow optimization algorithm. Robust pole assignment for linear system via the gradient flow optimization algorithm is examined in illustrative example that shows that the proposed approach has an important effect on continuous linear system with uncertainty.","PeriodicalId":355975,"journal":{"name":"2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132374110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICEDIF.2015.7280154
Jiankang Liu, Yunzhong Fu, Zhenyu Han, Hongya Fu
In order to promote the high frequency performance of open architecture CNC system, an embedded CNC controller combining FPGA (Field Programmable Gate Array) technology and real-time Ethernet communication bus was designed, which consisted of an embedded ARM (Advanced RISC Machines) processor and an FPGA. An open source CNC software running under Linux operating system was customized to accommodate the ARM processor, in which interpolation and motion control modules were implemented in FPGA for better real-time performance. Meanwhile, the FPGA also acted as the master node communicating with servo drivers via EPL (Ethernet Powerlink) network. The EPL stack was implemented with a Nios II soft processor in the FPGA. Experimental results have shown that the designed system worked properly.
{"title":"Design of an industrial Ethernet based embedded open architecture CNC system","authors":"Jiankang Liu, Yunzhong Fu, Zhenyu Han, Hongya Fu","doi":"10.1109/ICEDIF.2015.7280154","DOIUrl":"https://doi.org/10.1109/ICEDIF.2015.7280154","url":null,"abstract":"In order to promote the high frequency performance of open architecture CNC system, an embedded CNC controller combining FPGA (Field Programmable Gate Array) technology and real-time Ethernet communication bus was designed, which consisted of an embedded ARM (Advanced RISC Machines) processor and an FPGA. An open source CNC software running under Linux operating system was customized to accommodate the ARM processor, in which interpolation and motion control modules were implemented in FPGA for better real-time performance. Meanwhile, the FPGA also acted as the master node communicating with servo drivers via EPL (Ethernet Powerlink) network. The EPL stack was implemented with a Nios II soft processor in the FPGA. Experimental results have shown that the designed system worked properly.","PeriodicalId":355975,"journal":{"name":"2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF)","volume":"127 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132089911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICEDIF.2015.7280219
Yanben Wang, Wandong Cai, Ru Wang
In this paper, we present an improved SIS propagation model based on social contact probability on social networks. On social networks, the contact probability between nodes is decided by their social active degree and their social distance; the contact probability of two directly connected nodes is usually less than 1; if two nodes are not directly connected, the contact probability of two nodes is decided by the length of the shortest path between them. We carried out simulation experiment on SIS model on BA scale-free network to study the influence of the social contact probability. The model provides an idea for studying the propagation rule of disease, attitude, fads, social opinion on social network.
{"title":"Propagation dynamics based on social contact probability on social network","authors":"Yanben Wang, Wandong Cai, Ru Wang","doi":"10.1109/ICEDIF.2015.7280219","DOIUrl":"https://doi.org/10.1109/ICEDIF.2015.7280219","url":null,"abstract":"In this paper, we present an improved SIS propagation model based on social contact probability on social networks. On social networks, the contact probability between nodes is decided by their social active degree and their social distance; the contact probability of two directly connected nodes is usually less than 1; if two nodes are not directly connected, the contact probability of two nodes is decided by the length of the shortest path between them. We carried out simulation experiment on SIS model on BA scale-free network to study the influence of the social contact probability. The model provides an idea for studying the propagation rule of disease, attitude, fads, social opinion on social network.","PeriodicalId":355975,"journal":{"name":"2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125450939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICEDIF.2015.7280225
Lichao Gao, Mingqi An, Quansheng Zhao
It was very important for geophysical exploration to study the electromagnetic wave transient propagation characteristic in the lossy medium. A method for computing the electromagnetic wave transient propagation characteristic in layered medium based on the finite element simulation software COMSOL multi-physics was studied and the absorbing boundary condition and numerical stability condition were analyzed. The two layer medium model was set up and the numerical modeling of the plane wave propagating characteristic was conducted. It was found that the temporal fluctuation characteristic analysis of electromagnetic wave propagation in multilayer medium might provides an indication of the boundary position.
{"title":"Computing the plane electromagnetic wave transient propagation in lossy medium based on COMSOL","authors":"Lichao Gao, Mingqi An, Quansheng Zhao","doi":"10.1109/ICEDIF.2015.7280225","DOIUrl":"https://doi.org/10.1109/ICEDIF.2015.7280225","url":null,"abstract":"It was very important for geophysical exploration to study the electromagnetic wave transient propagation characteristic in the lossy medium. A method for computing the electromagnetic wave transient propagation characteristic in layered medium based on the finite element simulation software COMSOL multi-physics was studied and the absorbing boundary condition and numerical stability condition were analyzed. The two layer medium model was set up and the numerical modeling of the plane wave propagating characteristic was conducted. It was found that the temporal fluctuation characteristic analysis of electromagnetic wave propagation in multilayer medium might provides an indication of the boundary position.","PeriodicalId":355975,"journal":{"name":"2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134394294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICEDIF.2015.7280151
Cheng Lu, Ruitang Mao, Yongqiang Zhang, Yi Zhou
This paper studies a new switch QR decomposition adaptive filtering algorithm for acoustic echo cancellation (AEC). Based on the flexible p-TA-QR-LS algorithm, the proposed algorithm employs an efficient switching scheme based on voice activity detection and linear prediction, which enables it to distinguish the significant and insignificant input speech periods. The resultant variable mode p-TA-QR-LS algorithm can work with two switching modes (p=1 and N) and is thus suitable for AEC problem where the needs for convergence enhancement and for computational complexity reduction can be balanced.
研究了一种用于声回波消除的开关QR分解自适应滤波算法。该算法在灵活的p-TA-QR-LS算法的基础上,采用基于语音活动检测和线性预测的高效切换方案,能够区分重要和不重要的输入语音周期。由此得到的变模p- ta - qr - ls算法可以在两种切换模式(p=1和N)下工作,因此适合于兼顾收敛性增强和计算复杂度降低的AEC问题。
{"title":"New variable mode QRD adaptive filtering algorithm for acoustic echo cancellation","authors":"Cheng Lu, Ruitang Mao, Yongqiang Zhang, Yi Zhou","doi":"10.1109/ICEDIF.2015.7280151","DOIUrl":"https://doi.org/10.1109/ICEDIF.2015.7280151","url":null,"abstract":"This paper studies a new switch QR decomposition adaptive filtering algorithm for acoustic echo cancellation (AEC). Based on the flexible p-TA-QR-LS algorithm, the proposed algorithm employs an efficient switching scheme based on voice activity detection and linear prediction, which enables it to distinguish the significant and insignificant input speech periods. The resultant variable mode p-TA-QR-LS algorithm can work with two switching modes (p=1 and N) and is thus suitable for AEC problem where the needs for convergence enhancement and for computational complexity reduction can be balanced.","PeriodicalId":355975,"journal":{"name":"2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132659322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICEDIF.2015.7280212
Li Qian, Zhenyuan Zhu, Jun Hu, Shuying Liu
SQL injection attack is one of the most serious security vulnerabilities in Web application system, most of these vulnerabilities are caused by lack of input validation and SQL parameters use. Typical SQL injection attack and prevention technologies are introduced in the paper. The detecting methods not only validate user input, but also use type-safe SQL parameters. SQL injection defense model is established according to the detection processes, which is effective against SQL injection vulnerabilities.
{"title":"Research of SQL injection attack and prevention technology","authors":"Li Qian, Zhenyuan Zhu, Jun Hu, Shuying Liu","doi":"10.1109/ICEDIF.2015.7280212","DOIUrl":"https://doi.org/10.1109/ICEDIF.2015.7280212","url":null,"abstract":"SQL injection attack is one of the most serious security vulnerabilities in Web application system, most of these vulnerabilities are caused by lack of input validation and SQL parameters use. Typical SQL injection attack and prevention technologies are introduced in the paper. The detecting methods not only validate user input, but also use type-safe SQL parameters. SQL injection defense model is established according to the detection processes, which is effective against SQL injection vulnerabilities.","PeriodicalId":355975,"journal":{"name":"2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132873102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICEDIF.2015.7280162
Zi Huang, Qi Liu, Zhiyuan Chen, Yuming Zhao
Pedestrian detection and recognition has become the basic research in various social fields. Convolutional neural networks have excellent learning ability and can recognize various patterns with robustness to some extent distortions and transformations. Yet, they need much more intermediate hidden units and cannot learning from unlabeled samples. In this paper, we purpose a latent training model based on the convolutional neural network. The purposed model adopts part detectors to reduce the scale of the intermediate layer. It also follows a latent training method to determine the labels of unlabeled negative parts. Last, a two-stage learning scheme is purposed to overlay the size of the network step by step. Experimental results on the public static pedestrian detection dataset, INRIA Person Dataset [1], show that our model achieves 98% of the detection accuracy and 95% of the average precision.
行人检测与识别已成为社会各个领域的基础研究。卷积神经网络具有良好的学习能力,能够识别各种模式,在一定程度上具有鲁棒性。然而,它们需要更多的中间隐藏单元,并且不能从未标记的样本中学习。本文提出了一种基于卷积神经网络的潜在训练模型。该模型采用部分检测器来减小中间层的尺度。采用潜在训练法确定未标记负部分的标签。最后,一种两阶段学习方案旨在逐步覆盖网络的大小。在公共静态行人检测数据集INRIA Person dataset[1]上的实验结果表明,我们的模型达到了98%的检测准确率和95%的平均精度。
{"title":"Latent training for convolutional neural networks","authors":"Zi Huang, Qi Liu, Zhiyuan Chen, Yuming Zhao","doi":"10.1109/ICEDIF.2015.7280162","DOIUrl":"https://doi.org/10.1109/ICEDIF.2015.7280162","url":null,"abstract":"Pedestrian detection and recognition has become the basic research in various social fields. Convolutional neural networks have excellent learning ability and can recognize various patterns with robustness to some extent distortions and transformations. Yet, they need much more intermediate hidden units and cannot learning from unlabeled samples. In this paper, we purpose a latent training model based on the convolutional neural network. The purposed model adopts part detectors to reduce the scale of the intermediate layer. It also follows a latent training method to determine the labels of unlabeled negative parts. Last, a two-stage learning scheme is purposed to overlay the size of the network step by step. Experimental results on the public static pedestrian detection dataset, INRIA Person Dataset [1], show that our model achieves 98% of the detection accuracy and 95% of the average precision.","PeriodicalId":355975,"journal":{"name":"2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115022861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICEDIF.2015.7280189
Cheng Lu, Furong Liu, Hongqing Liu, Yi Zhou
This paper studies a new switch variable order affine projection algorithm (APA) for acoustic echo cancellation (AEC). Based on voice activity detection technique, a threshold calculated from the short-time energy of the far-end speech signal is derived to enable the APA to switch between the high- and low- order status. Algorithm convergence can thus be achieved when there is more input excitation and the computation cost can be saved when the input is relatively weak. To improve the applicability of the proposed algorithm to AEC, an efficient double talk detector is included to prevent algorithm divergence in double talk scenario. Simulations are conducted to verify the effectiveness of the proposed algorithm.
{"title":"A new switch affine projection algorithm for acoustic echo cancellation","authors":"Cheng Lu, Furong Liu, Hongqing Liu, Yi Zhou","doi":"10.1109/ICEDIF.2015.7280189","DOIUrl":"https://doi.org/10.1109/ICEDIF.2015.7280189","url":null,"abstract":"This paper studies a new switch variable order affine projection algorithm (APA) for acoustic echo cancellation (AEC). Based on voice activity detection technique, a threshold calculated from the short-time energy of the far-end speech signal is derived to enable the APA to switch between the high- and low- order status. Algorithm convergence can thus be achieved when there is more input excitation and the computation cost can be saved when the input is relatively weak. To improve the applicability of the proposed algorithm to AEC, an efficient double talk detector is included to prevent algorithm divergence in double talk scenario. Simulations are conducted to verify the effectiveness of the proposed algorithm.","PeriodicalId":355975,"journal":{"name":"2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123556400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-01DOI: 10.1109/ICEDIF.2015.7280222
Xunwen Su, L. Yunbo, Haiming Song, Dianguo Xu
Aggregation modelling of wind farm includes equivalence of wind turbines and simplification of the collector system. Collector network is a significant part of the wind farm. Equivalent method of collector system is very important to the quality and the effectiveness of equivalent model for wind farms. As such, two different equivalent methods of collector system are studied. They are voltage-based method and power consumption-based method. Two equivalent models are built using the above methods. A comparative analysis of the two methods is carried out by comparing with detailed model of wind farm. The simulation results show that voltage-based method is better than power consumption-based method.
{"title":"Comparison between the two equivalent methods of collector system for wind farms","authors":"Xunwen Su, L. Yunbo, Haiming Song, Dianguo Xu","doi":"10.1109/ICEDIF.2015.7280222","DOIUrl":"https://doi.org/10.1109/ICEDIF.2015.7280222","url":null,"abstract":"Aggregation modelling of wind farm includes equivalence of wind turbines and simplification of the collector system. Collector network is a significant part of the wind farm. Equivalent method of collector system is very important to the quality and the effectiveness of equivalent model for wind farms. As such, two different equivalent methods of collector system are studied. They are voltage-based method and power consumption-based method. Two equivalent models are built using the above methods. A comparative analysis of the two methods is carried out by comparing with detailed model of wind farm. The simulation results show that voltage-based method is better than power consumption-based method.","PeriodicalId":355975,"journal":{"name":"2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122553347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}