首页 > 最新文献

2013 IEEE Third International Conference on Information Science and Technology (ICIST)最新文献

英文 中文
Stability analysis of uncertain systems with time-varying delays via simplified Lyapunov-Krasovskii functionals 基于简化Lyapunov-Krasovskii泛函的时变时滞不确定系统稳定性分析
Zhenyu Li, Jun Zhou, Yonghui Sun
Uncertainties and time delays exist in practical control systems, which often lead to instability or performance degradation. The existing stability conditions for delay systems are mainly divided into two categories: delay-independent conditions and delay-dependent ones. In general, delay-dependent conditions are less conservative than those of delay-independent ones. In order to reduce conservativeness of these results, many researchers have made unremitting efforts. In particular, with improved Lyapunov-Krasovskii functionals, together with linear matrix inequalities (LMI) approach, we study robust stability of time-varying delay systems with parametric uncertainties. In this paper we first re-visit some delay-dependent LMI stability criteria. Then the stability analysis process is made more concise by simplifying Lyapunov-Krasovskii functionals, which can be graded more easily, and thus results in stability conditions of less conservativeness. Finally, using the single-machine-infinite-bus system as application, we illustrate upper bounds of time delay in the system that are allowable for the system to be robustly stable. Numeric simulation verifies validity of the suggested methods.
在实际控制系统中存在不确定性和时滞,往往会导致系统不稳定或性能下降。现有的时滞系统稳定条件主要分为两类:时滞无关条件和时滞相关条件。一般来说,延迟相关条件比延迟无关条件保守性更小。为了降低这些结果的保守性,许多研究者做出了不懈的努力。特别地,我们利用改进的Lyapunov-Krasovskii泛函,结合线性矩阵不等式(LMI)方法,研究了具有参数不确定性的时变时滞系统的鲁棒稳定性。在本文中,我们首先重新研究了一些与时滞相关的LMI稳定性准则。然后,通过简化Lyapunov-Krasovskii泛函,使稳定性分析过程更加简洁,更容易进行分级,从而得到保守性较小的稳定性条件。最后,以单机无限总线系统为例,给出了系统鲁棒稳定所允许的系统时延上界。数值仿真验证了所提方法的有效性。
{"title":"Stability analysis of uncertain systems with time-varying delays via simplified Lyapunov-Krasovskii functionals","authors":"Zhenyu Li, Jun Zhou, Yonghui Sun","doi":"10.1109/ICIST.2013.6747551","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747551","url":null,"abstract":"Uncertainties and time delays exist in practical control systems, which often lead to instability or performance degradation. The existing stability conditions for delay systems are mainly divided into two categories: delay-independent conditions and delay-dependent ones. In general, delay-dependent conditions are less conservative than those of delay-independent ones. In order to reduce conservativeness of these results, many researchers have made unremitting efforts. In particular, with improved Lyapunov-Krasovskii functionals, together with linear matrix inequalities (LMI) approach, we study robust stability of time-varying delay systems with parametric uncertainties. In this paper we first re-visit some delay-dependent LMI stability criteria. Then the stability analysis process is made more concise by simplifying Lyapunov-Krasovskii functionals, which can be graded more easily, and thus results in stability conditions of less conservativeness. Finally, using the single-machine-infinite-bus system as application, we illustrate upper bounds of time delay in the system that are allowable for the system to be robustly stable. Numeric simulation verifies validity of the suggested methods.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132522632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbol timing offset tracking for DRM receiver DRM接收机的符号定时偏移跟踪
Guoche Qin, Ming Yan, Guorong Hu
Orthogonal frequency division multiplexing (OFDM) system performance degrades due to symbol misalignment. We propose a symbol synchronization scheme based on channel estimation (CE). We applied linear interpolation in time domain and Winner filter in frequency domain to implement CE. The first path time delay of channel determines symbol timing offset. We perform inverse fast Fourier transform (IFFT) to obtain channel impulse response (CIR) after linear interpolation in CE. Zero-padding and windowing are used to increase accuracy before IFFT. We propose a criteria to judge the first path time delay and search for the first path of channel according to CIR profile. The criteria is statistically based on a large amount of simulation results. The simulation results illustrate that the proposed solution is effective to eliminate the effect of multipath fading channel in digital radio mondiale (DRM) system.
正交频分复用(OFDM)系统的性能由于符号不对准而下降。提出了一种基于信道估计(CE)的符号同步方案。我们在时域应用线性插值,在频域应用赢家滤波来实现CE。信道的第一路径时间延迟决定符号时序偏移。我们通过快速傅立叶反变换(IFFT)来获得CE线性插值后的信道脉冲响应(CIR)。在IFFT之前,使用零填充和窗口来提高精度。提出了一种判断信道第一路径时延的准则,并根据CIR配置文件搜索信道第一路径。该准则基于大量的仿真结果进行统计。仿真结果表明,该方案能够有效地消除数字无线电(DRM)系统中多径衰落信道的影响。
{"title":"Symbol timing offset tracking for DRM receiver","authors":"Guoche Qin, Ming Yan, Guorong Hu","doi":"10.1109/ICIST.2013.6747721","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747721","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) system performance degrades due to symbol misalignment. We propose a symbol synchronization scheme based on channel estimation (CE). We applied linear interpolation in time domain and Winner filter in frequency domain to implement CE. The first path time delay of channel determines symbol timing offset. We perform inverse fast Fourier transform (IFFT) to obtain channel impulse response (CIR) after linear interpolation in CE. Zero-padding and windowing are used to increase accuracy before IFFT. We propose a criteria to judge the first path time delay and search for the first path of channel according to CIR profile. The criteria is statistically based on a large amount of simulation results. The simulation results illustrate that the proposed solution is effective to eliminate the effect of multipath fading channel in digital radio mondiale (DRM) system.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131007922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three-dimensional dynamic simulation of landslide disaster 滑坡灾害三维动态模拟
Yong Li, R. An, Huayi Wu
For facilitating the analysis and representation of geology disaster, the three-dimensional dynamic simulation techniques of landslide disaster are presented in this paper. Combining with practical survey data, virtual geographic environments are reconstructed. Landslide disaster process and the generated impulse wave are simulated by three-dimensional visual techniques. The details of geology disaster are successfully exhibited, e.g. landslide motion, water wave propagation and run-up with wave divergence and amplitude fading. The experimental results based on reservoir bank slope demonstrated the practicability and effectiveness of the methodology.
为了便于对地质灾害进行分析和表征,本文提出了滑坡灾害三维动态模拟技术。结合实际调查数据,重构虚拟地理环境。利用三维可视化技术对滑坡灾害过程及其产生的冲击波进行了模拟。成功地展示了滑坡运动、水波传播、涨落等地质灾害的细节。以水库岸坡为例的试验结果验证了该方法的实用性和有效性。
{"title":"Three-dimensional dynamic simulation of landslide disaster","authors":"Yong Li, R. An, Huayi Wu","doi":"10.1109/ICIST.2013.6747644","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747644","url":null,"abstract":"For facilitating the analysis and representation of geology disaster, the three-dimensional dynamic simulation techniques of landslide disaster are presented in this paper. Combining with practical survey data, virtual geographic environments are reconstructed. Landslide disaster process and the generated impulse wave are simulated by three-dimensional visual techniques. The details of geology disaster are successfully exhibited, e.g. landslide motion, water wave propagation and run-up with wave divergence and amplitude fading. The experimental results based on reservoir bank slope demonstrated the practicability and effectiveness of the methodology.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127951223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Toward active and efficient privacy protection for Android 为Android提供积极有效的隐私保护
Yuhao Luo, Dawu Gu, Juanru Li
Although Android has introduced many security mechanisms, users often expose privacy information to attacker due to the system's defensive privacy protecting policy. The problem is that for most inexperienced users, no mandatory protection is provided. To address this issue, we propose a data-centric privacy enhancement design to actively restrict privacy violation on Android. The main idea is to first build trusted database by introducing secure enhanced kernel and data-at-rest encryption. Then, the system enforces an isolation of applications with privacy data access privilege mode. The design focuses on data protection and keeps persistent mandatory access control model from kernel to application layer, and could resist most common privacy leakage attacks. Compared with other heavyweight isolation scheme, the overhead is also controlled into an acceptable range due to our lightweight design principle.
虽然Android引入了许多安全机制,但由于系统的防御性隐私保护策略,用户经常将隐私信息暴露给攻击者。问题是,对于大多数没有经验的用户,没有提供强制性保护。为了解决这个问题,我们提出了一个以数据为中心的隐私增强设计,以积极限制Android上的隐私侵犯。其主要思想是首先通过引入安全增强的内核和静态数据加密来构建可信数据库。然后,系统对具有隐私数据访问权限模式的应用程序实施隔离。该设计注重数据保护,保持了从内核到应用层的持久强制访问控制模型,能够抵御大多数常见的隐私泄露攻击。与其他重量级隔离方案相比,由于我们的轻量化设计原则,开销也被控制在可接受的范围内。
{"title":"Toward active and efficient privacy protection for Android","authors":"Yuhao Luo, Dawu Gu, Juanru Li","doi":"10.1109/ICIST.2013.6747691","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747691","url":null,"abstract":"Although Android has introduced many security mechanisms, users often expose privacy information to attacker due to the system's defensive privacy protecting policy. The problem is that for most inexperienced users, no mandatory protection is provided. To address this issue, we propose a data-centric privacy enhancement design to actively restrict privacy violation on Android. The main idea is to first build trusted database by introducing secure enhanced kernel and data-at-rest encryption. Then, the system enforces an isolation of applications with privacy data access privilege mode. The design focuses on data protection and keeps persistent mandatory access control model from kernel to application layer, and could resist most common privacy leakage attacks. Compared with other heavyweight isolation scheme, the overhead is also controlled into an acceptable range due to our lightweight design principle.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125296839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of urban intelligent traffic signal control system for large special events 面向大型特殊活动的城市智能交通信号控制系统设计
Yinfen Xie
The holding of large special events usually cause great pressure on urban traffic in short time. How to ensure the smooth flow of traffic during large special events and minimize the impact on urban normal traffic is an urgent problem to solve. Intelligent traffic management system plays an important role in traffic management of large special events, and traffic signal control is one of its the most basic and important method. This paper studies the plan for traffic signal control, the primary functions of traffic signal control system and the optimization method.
大型特殊活动的举办通常会在短时间内对城市交通造成很大的压力。如何保证大型特殊活动期间的交通畅通,尽量减少对城市正常交通的影响,是一个亟待解决的问题。智能交通管理系统在大型特殊事件交通管理中发挥着重要作用,交通信号控制是其最基本、最重要的方法之一。本文研究了交通信号控制方案、交通信号控制系统的主要功能和优化方法。
{"title":"Design of urban intelligent traffic signal control system for large special events","authors":"Yinfen Xie","doi":"10.1109/ICIST.2013.6747739","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747739","url":null,"abstract":"The holding of large special events usually cause great pressure on urban traffic in short time. How to ensure the smooth flow of traffic during large special events and minimize the impact on urban normal traffic is an urgent problem to solve. Intelligent traffic management system plays an important role in traffic management of large special events, and traffic signal control is one of its the most basic and important method. This paper studies the plan for traffic signal control, the primary functions of traffic signal control system and the optimization method.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126673721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel key derivation method for eavesdropper in LTE system LTE系统中一种新的窃听密钥提取方法
Jianhua Peng, Wenjian Zhang, Kaizhi Huang
The security mechanism of LTE system, which provides radio communication and its services with secure network, is much more perfect than that of 3G. This paper puts forward a novel method for key derivation based on the idea of combination of vulnerabilities in both radio interface and core-network in perspective of eavesdropper. The radio child-keys are produced according to the security algorithm list provided by plain radio message and parent-key obtained, and the right key is decided by comparing the plain context with the decrypted context. It is proved that the radio child-key is able to be obtained in this way according to the analysis of feasibility and complexity.
LTE系统的安全机制比3G要完善得多,它以安全的网络提供无线电通信及其业务。本文从窃听者的角度出发,提出了一种基于无线电接口和核心网漏洞相结合的密钥派生方法。根据无线电明文报文提供的安全算法列表和获得的父密钥生成无线电子密钥,并通过将明文上下文与解密后的上下文进行比较来确定正确的密钥。通过对可行性和复杂性的分析,证明了用这种方法获得无线电子密钥是可行的。
{"title":"A novel key derivation method for eavesdropper in LTE system","authors":"Jianhua Peng, Wenjian Zhang, Kaizhi Huang","doi":"10.1109/ICIST.2013.6747829","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747829","url":null,"abstract":"The security mechanism of LTE system, which provides radio communication and its services with secure network, is much more perfect than that of 3G. This paper puts forward a novel method for key derivation based on the idea of combination of vulnerabilities in both radio interface and core-network in perspective of eavesdropper. The radio child-keys are produced according to the security algorithm list provided by plain radio message and parent-key obtained, and the right key is decided by comparing the plain context with the decrypted context. It is proved that the radio child-key is able to be obtained in this way according to the analysis of feasibility and complexity.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114159234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive packet sampling method based on the prediction of availability using exponential smoothing 基于指数平滑可用性预测的自适应分组采样方法
Jingfu Wang, Ruiying Li, Wuyue Ren
In order to improve the accuracy of sampling and reduce resource consumption in network availability testing, a new kind of adaptive sampling method is proposed in this paper. It adjusts sampling probability over time according to network condition. Its basic sampling method is simple random sampling. The network availability is predicted based on exponential smoothing method. Comparing the measured value of availability with the predicted one, we can decide whether the sampling parameter now used is suitable for the network condition. A liner rule is advanced to decide how to adjust the sampling probability over time. Taking the tactical Internet as an example, efficiency of this sampling method is compared with that of simply random sampling. The result shows that the accuracy of the sampling method is higher than simply random sampling when the size of sample is equal, and the result would be more obvious when traffic burst occurs.
为了提高网络可用性测试的采样精度,减少网络可用性测试的资源消耗,提出了一种新的自适应采样方法。它根据网络状况随时间调整采样概率。其基本抽样方法是简单随机抽样。基于指数平滑法对网络可用性进行预测。将可用性的实测值与预测值进行比较,就可以判断现在使用的采样参数是否适合网络状况。提出了一个线性规则来决定如何随时间调整采样概率。以战术网络为例,与简单随机抽样的效率进行了比较。结果表明,在样本大小相同的情况下,该抽样方法的准确率高于单纯随机抽样,而在发生流量突发时,效果更为明显。
{"title":"Adaptive packet sampling method based on the prediction of availability using exponential smoothing","authors":"Jingfu Wang, Ruiying Li, Wuyue Ren","doi":"10.1109/ICIST.2013.6747627","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747627","url":null,"abstract":"In order to improve the accuracy of sampling and reduce resource consumption in network availability testing, a new kind of adaptive sampling method is proposed in this paper. It adjusts sampling probability over time according to network condition. Its basic sampling method is simple random sampling. The network availability is predicted based on exponential smoothing method. Comparing the measured value of availability with the predicted one, we can decide whether the sampling parameter now used is suitable for the network condition. A liner rule is advanced to decide how to adjust the sampling probability over time. Taking the tactical Internet as an example, efficiency of this sampling method is compared with that of simply random sampling. The result shows that the accuracy of the sampling method is higher than simply random sampling when the size of sample is equal, and the result would be more obvious when traffic burst occurs.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121340795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on omni-directional moving adsorption mechanism and its application in wall-climbing robot 全向移动吸附机理及其在爬壁机器人中的应用研究
Meiting Wang, Yongfeng Qi, Wei Jiang, Shengquan Li, Honghui Cheng, Jiatong Bao, Liuyan Lu
Aiming at the demand of glass curtain wall cleaning, an Omni-directional moving adsorption mechanism with moving, adsorption, climbing obstacle, surface-to-surface conversions functions was developed. The mechanism incorporates one motor, one driving module, one steering module. This Omni-directional moving adsorption mechanism can make the wall climbing robot not only run towards all directions in line but also rotate along definite angle at its original position without changing its posture. The vacuum coupling delivery adsorption system is designed to provide necessary adsorption force for the robot. The climbing obstacle ability and the surface-to-surface conversion course of the mechanism are analyzed. Mobile safety analysis and kinematical analysis of the wall-climbing robot with above Omni-directional moving adsorption mechanisms are discussed. The wall-climbing robot with above mechanisms can be used for operation of glass curtain plane wall and curved wall of large curvature with hidden window frames and no window frames, which is with high moving velocity, stable adsorption capability and strong wall adaptability.
针对玻璃幕墙清洗的需求,研制了一种具有移动、吸附、爬障、面对面转化等功能的全方位移动吸附机构。该机构包括一个电机、一个驱动模块、一个转向模块。这种全方位移动吸附机构可以使爬壁机器人在不改变姿态的情况下,既可以向各个方向直线运动,又可以在原来的位置作一定角度的旋转。设计真空耦合输送吸附系统,为机器人提供必要的吸附力。分析了机构的爬越障碍能力和面对面转换过程。对具有上述全方位移动吸附机理的爬壁机器人进行了移动安全性分析和运动学分析。具有上述机构的爬壁机器人可用于玻璃幕墙平面墙和大曲率有隐窗框和无窗框的曲面墙的作业,移动速度快,吸附能力稳定,墙面适应性强。
{"title":"Research on omni-directional moving adsorption mechanism and its application in wall-climbing robot","authors":"Meiting Wang, Yongfeng Qi, Wei Jiang, Shengquan Li, Honghui Cheng, Jiatong Bao, Liuyan Lu","doi":"10.1109/ICIST.2013.6747539","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747539","url":null,"abstract":"Aiming at the demand of glass curtain wall cleaning, an Omni-directional moving adsorption mechanism with moving, adsorption, climbing obstacle, surface-to-surface conversions functions was developed. The mechanism incorporates one motor, one driving module, one steering module. This Omni-directional moving adsorption mechanism can make the wall climbing robot not only run towards all directions in line but also rotate along definite angle at its original position without changing its posture. The vacuum coupling delivery adsorption system is designed to provide necessary adsorption force for the robot. The climbing obstacle ability and the surface-to-surface conversion course of the mechanism are analyzed. Mobile safety analysis and kinematical analysis of the wall-climbing robot with above Omni-directional moving adsorption mechanisms are discussed. The wall-climbing robot with above mechanisms can be used for operation of glass curtain plane wall and curved wall of large curvature with hidden window frames and no window frames, which is with high moving velocity, stable adsorption capability and strong wall adaptability.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125098106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Similarity and equivalence of epistemic states 认知状态的相似性和等价性
Wenjie Xiao, Zhongxue Yang
Epistemic states is an important model introduced by Bochman for nonmonotonic inference and belief change. Taking Epistemic States as the object, a notion of similarity is presented. In order to explore the relationship between similarity and the reasoning behaviors of epistemic states, a new notion called quasi-skeptically equivalence and an operator par(.) over epistemic states were introduced. The main results show that any pair of pure finite epistemic states are quasi-skeptically equivalent if and only if their par-images are similar.
认知状态是Bochman提出的非单调推理和信念变化的重要模型。以认知状态为对象,提出了相似性的概念。为了探讨相似度与认知状态的推理行为之间的关系,引入了准怀疑等价的概念和在认知状态上的算子par(.)。主要结果表明,当且仅当任意一对纯有限认知状态的对子象相似时,它们是拟怀疑等价的。
{"title":"Similarity and equivalence of epistemic states","authors":"Wenjie Xiao, Zhongxue Yang","doi":"10.1109/ICIST.2013.6747633","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747633","url":null,"abstract":"Epistemic states is an important model introduced by Bochman for nonmonotonic inference and belief change. Taking Epistemic States as the object, a notion of similarity is presented. In order to explore the relationship between similarity and the reasoning behaviors of epistemic states, a new notion called quasi-skeptically equivalence and an operator par(.) over epistemic states were introduced. The main results show that any pair of pure finite epistemic states are quasi-skeptically equivalent if and only if their par-images are similar.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122497728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive image denoising using wavelet thresholding 基于小波阈值的自适应图像去噪
Liwen Dong
In order to preserve fine details in image denoising, we propose a scheme by assuming that the deviations of the noisy and the original wavelet coefficients of image are not always the same across the scales. The proposed algorithm considers not only the correlation of inter-scale wavelet coefficients but also the mentioned assumptions. In the process of denoising, the proposed denoising threshold can adaptively adjust itself on the basis of its position and decomposition scale. We demonstrate its effectiveness through simulations with images contaminated by additive white Gaussian noise and compare it with the classical threshold method. Experimental results show that the performance of our method can preserve image details well both in visual effect and in terms of peak signal-to-noise ratio.
为了在图像去噪中保留细节,我们提出了一种假设噪声与原始图像小波系数的偏差在不同尺度上并不总是相同的方案。该算法不仅考虑了尺度间小波系数的相关性,而且考虑了上述假设。在去噪过程中,所提出的去噪阈值可以根据其位置和分解尺度自适应调整。通过对加性高斯白噪声污染图像的仿真,验证了该方法的有效性,并与经典阈值法进行了比较。实验结果表明,该方法在视觉效果和峰值信噪比方面都能很好地保留图像细节。
{"title":"Adaptive image denoising using wavelet thresholding","authors":"Liwen Dong","doi":"10.1109/ICIST.2013.6747675","DOIUrl":"https://doi.org/10.1109/ICIST.2013.6747675","url":null,"abstract":"In order to preserve fine details in image denoising, we propose a scheme by assuming that the deviations of the noisy and the original wavelet coefficients of image are not always the same across the scales. The proposed algorithm considers not only the correlation of inter-scale wavelet coefficients but also the mentioned assumptions. In the process of denoising, the proposed denoising threshold can adaptively adjust itself on the basis of its position and decomposition scale. We demonstrate its effectiveness through simulations with images contaminated by additive white Gaussian noise and compare it with the classical threshold method. Experimental results show that the performance of our method can preserve image details well both in visual effect and in terms of peak signal-to-noise ratio.","PeriodicalId":415759,"journal":{"name":"2013 IEEE Third International Conference on Information Science and Technology (ICIST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2013 IEEE Third International Conference on Information Science and Technology (ICIST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1