Unmanned Aerial Vehicles(UAVs)are widely used and meet many demands in military and civilian fields.With the continuous enrichment and extensive expansion of application scenarios,the safety of UAVs is constantly bein...Unmanned Aerial Vehicles(UAVs)are widely used and meet many demands in military and civilian fields.With the continuous enrichment and extensive expansion of application scenarios,the safety of UAVs is constantly being challenged.To address this challenge,we propose algorithms to detect anomalous data collected from drones to improve drone safety.We deployed a one-class kernel extreme learning machine(OCKELM)to detect anomalies in drone data.By default,OCKELM uses the radial basis(RBF)kernel function as the kernel function of themodel.To improve the performance ofOCKELM,we choose a TriangularGlobalAlignmentKernel(TGAK)instead of anRBF Kernel and introduce the Fast Independent Component Analysis(FastICA)algorithm to reconstruct UAV data.Based on the above improvements,we create a novel anomaly detection strategy FastICA-TGAK-OCELM.The method is finally validated on the UCI dataset and detected on the Aeronautical Laboratory Failures and Anomalies(ALFA)dataset.The experimental results show that compared with other methods,the accuracy of this method is improved by more than 30%,and point anomalies are effectively detected.展开更多
Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate n multicast code can be modified to another secure network code with transmitting rate n- r by...Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate n multicast code can be modified to another secure network code with transmitting rate n- r by a properly chosen matrix Q^(-1). They also gave the construction for searching such an n × n nonsingular matrix Q. In this paper, we find that their method implies an efficient construction of Q. That is to say, Q can be taken as a special block lower triangular matrix with diagonal subblocks being the(n- r) ×(n- r)and r × r identity matrices, respectively. Moreover, complexity analysis is made to show the efficiency of the specific construction.展开更多
We survey the recent development of the DeGiorgi-Nash-Moser-Aronson type theory for a class of symmetric jump processes(or equivalently,a class of symmetric integro-differential operators).We focus on the sharp two-si...We survey the recent development of the DeGiorgi-Nash-Moser-Aronson type theory for a class of symmetric jump processes(or equivalently,a class of symmetric integro-differential operators).We focus on the sharp two-sided estimates for the transition density functions(or heat kernels) of the processes,a priori Hlder estimate and parabolic Harnack inequalities for their parabolic functions.In contrast to the second order elliptic differential operator case,the methods to establish these properties for symmetric integro-differential operators are mainly probabilistic.展开更多
基金supported by the Natural Science Foundation of The Jiangsu Higher Education Institutions of China(Grant No.19JKB520031).
文摘Unmanned Aerial Vehicles(UAVs)are widely used and meet many demands in military and civilian fields.With the continuous enrichment and extensive expansion of application scenarios,the safety of UAVs is constantly being challenged.To address this challenge,we propose algorithms to detect anomalous data collected from drones to improve drone safety.We deployed a one-class kernel extreme learning machine(OCKELM)to detect anomalies in drone data.By default,OCKELM uses the radial basis(RBF)kernel function as the kernel function of themodel.To improve the performance ofOCKELM,we choose a TriangularGlobalAlignmentKernel(TGAK)instead of anRBF Kernel and introduce the Fast Independent Component Analysis(FastICA)algorithm to reconstruct UAV data.Based on the above improvements,we create a novel anomaly detection strategy FastICA-TGAK-OCELM.The method is finally validated on the UCI dataset and detected on the Aeronautical Laboratory Failures and Anomalies(ALFA)dataset.The experimental results show that compared with other methods,the accuracy of this method is improved by more than 30%,and point anomalies are effectively detected.
基金Supported by the National Natural Science Foundation of China(61201253)
文摘Under the assumption that the wiretapper can get at most r(r < n) independent messages, Cai et al. showed that any rate n multicast code can be modified to another secure network code with transmitting rate n- r by a properly chosen matrix Q^(-1). They also gave the construction for searching such an n × n nonsingular matrix Q. In this paper, we find that their method implies an efficient construction of Q. That is to say, Q can be taken as a special block lower triangular matrix with diagonal subblocks being the(n- r) ×(n- r)and r × r identity matrices, respectively. Moreover, complexity analysis is made to show the efficiency of the specific construction.
基金supported by National Science Foundation of USA(Grant No.DMS-0600206)
文摘We survey the recent development of the DeGiorgi-Nash-Moser-Aronson type theory for a class of symmetric jump processes(or equivalently,a class of symmetric integro-differential operators).We focus on the sharp two-sided estimates for the transition density functions(or heat kernels) of the processes,a priori Hlder estimate and parabolic Harnack inequalities for their parabolic functions.In contrast to the second order elliptic differential operator case,the methods to establish these properties for symmetric integro-differential operators are mainly probabilistic.