This study introduced an automatic authentication technique for checking the genuineness of a vehicle. The rough set-based technique was used to handle the uncertainty arisen from artifacts in the acquired images impr...This study introduced an automatic authentication technique for checking the genuineness of a vehicle. The rough set-based technique was used to handle the uncertainty arisen from artifacts in the acquired images imprinted on a vehicle. However, it has been proved to be NP-hard to find all reductions and the minimal reduction, and generally different heuristic algorithms were used to find a set of reductions and the Ganssian distribution was used to describe the uncertainty to achieve the minimal reduction. On the basis of inductive logic programming, the technique can distinguish between two similar images, as is superior to the conventional pattern-recognition technique being merely capable of classifier. Furthermore, it can avoid some failures of the technique based on the correlation coefficient to authenticate binary image. The experiments show an accuracy rate close to 93. 2%.展开更多
In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applicati...In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy.展开更多
This paper mainly discusses the multiscale computation from a chemical engineering perspective.From the application designer's perspective,we propose a new approach to investigate and develop both flexible and eff...This paper mainly discusses the multiscale computation from a chemical engineering perspective.From the application designer's perspective,we propose a new approach to investigate and develop both flexible and efficient computer architectures. Based on the requirements of applications within one category,we first induce and extract some inherent computing patterns or core computing kernels from the applications.Some computing models and innovative computing architectures will then be developed for these patterns or kernels,as well as the software mapping techniques. Finally those applications which can share and utilize those computing patterns or kernels can be executed very efficiently on those novel computing architectures. We think that the proposed approach may not be achievable within the existing technology. However,we believe that it will be available in the near future. Hence,we will describe this approach from the following four aspects:multiscale environment in the world,mesoscale as a key scale,energy minimization multiscale(EMMS)paradigm and our perspective.展开更多
A chaotic algorithm for providing a solution to the bi-level Discrete Equilibrium Network Design Problem (NDP) is discussed following an introduction of the Discrete Network Design Problem (DNDP) model and Chaos O...A chaotic algorithm for providing a solution to the bi-level Discrete Equilibrium Network Design Problem (NDP) is discussed following an introduction of the Discrete Network Design Problem (DNDP) model and Chaos Optimization Algorithms (COA). A description of the chaotic approach for the DNDP model is described in details. Then a numerical example for the DNDP is carried out to investigate the chaotic approach. The results have been encouraging, indicating that the chaotic approach has great potential ability in finding the optimal solution of DNDP models.展开更多
基金Sponsored by the National High Technology Research and Development Program of China (Grant No. 2003AA1Z2610)
文摘This study introduced an automatic authentication technique for checking the genuineness of a vehicle. The rough set-based technique was used to handle the uncertainty arisen from artifacts in the acquired images imprinted on a vehicle. However, it has been proved to be NP-hard to find all reductions and the minimal reduction, and generally different heuristic algorithms were used to find a set of reductions and the Ganssian distribution was used to describe the uncertainty to achieve the minimal reduction. On the basis of inductive logic programming, the technique can distinguish between two similar images, as is superior to the conventional pattern-recognition technique being merely capable of classifier. Furthermore, it can avoid some failures of the technique based on the correlation coefficient to authenticate binary image. The experiments show an accuracy rate close to 93. 2%.
基金This work is supported by the following projects: National Natural Science Foundation of China grant 60772136, 111 Development Program of China NO.B08038, National Science & Technology Pillar Program of China NO.2008BAH22B03 and NO. 2007BAH08B01.
文摘In order to identify any traces of suspicious activities for the networks security, Network Traffic Analysis has been the basis of network security and network management. With the continued emergence of new applications and encrypted traffic, the currently available approaches can not perform well for all kinds of network data. In this paper, we propose a novel stream pattern matching technique which is not only easily deployed but also includes the advantages of different methods. The main idea is: first, defining a formal description specification, by which any series of data stream can be unambiguously descrbed by a special stream pattern; then a tree representation is constructed by parsing the stream pattern; at last, a stream pattern engine is constructed with the Non-t-mite automata (S-CG-NFA) and Bit-parallel searching algorithms. Our stream pattern analysis system has been fully prototyped on C programming language and Xilinx Vn-tex2 FPGA. The experimental results show the method could provides a high level of recognition efficiency and accuracy.
文摘This paper mainly discusses the multiscale computation from a chemical engineering perspective.From the application designer's perspective,we propose a new approach to investigate and develop both flexible and efficient computer architectures. Based on the requirements of applications within one category,we first induce and extract some inherent computing patterns or core computing kernels from the applications.Some computing models and innovative computing architectures will then be developed for these patterns or kernels,as well as the software mapping techniques. Finally those applications which can share and utilize those computing patterns or kernels can be executed very efficiently on those novel computing architectures. We think that the proposed approach may not be achievable within the existing technology. However,we believe that it will be available in the near future. Hence,we will describe this approach from the following four aspects:multiscale environment in the world,mesoscale as a key scale,energy minimization multiscale(EMMS)paradigm and our perspective.
基金This project is supported partly by National 0utstanding Young Investigation of National Natural Science Foundation of China(70225005,70471088,70501004 and 70501005), the Special Research Found for Doctoral Programs in State Education Ministry (20050004005), the 211 Project of Discipline Construction of Beijing Jiaotong University and Rencai Foundation of Beijing Jiaotong University (2003RC010)
文摘A chaotic algorithm for providing a solution to the bi-level Discrete Equilibrium Network Design Problem (NDP) is discussed following an introduction of the Discrete Network Design Problem (DNDP) model and Chaos Optimization Algorithms (COA). A description of the chaotic approach for the DNDP model is described in details. Then a numerical example for the DNDP is carried out to investigate the chaotic approach. The results have been encouraging, indicating that the chaotic approach has great potential ability in finding the optimal solution of DNDP models.