Aiming at training the feed-forward threshold neural network consisting of nondifferentiable activation functions, the approach of noise injection forms a stochastic resonance based threshold network that can be optim...Aiming at training the feed-forward threshold neural network consisting of nondifferentiable activation functions, the approach of noise injection forms a stochastic resonance based threshold network that can be optimized by various gradientbased optimizers. The introduction of injected noise extends the noise level into the parameter space of the designed threshold network, but leads to a highly non-convex optimization landscape of the loss function. Thus, the hyperparameter on-line learning procedure with respective to network weights and noise levels becomes of challenge. It is shown that the Adam optimizer, as an adaptive variant of stochastic gradient descent, manifests its superior learning ability in training the stochastic resonance based threshold network effectively. Experimental results demonstrate the significant improvement of performance of the designed threshold network trained by the Adam optimizer for function approximation and image classification.展开更多
Due to the demand of data processing for polar ice radar in our laboratory, a Curvelet Thresholding Neural Network (TNN) noise reduction method is proposed, and a new threshold function with infinite-order continuous ...Due to the demand of data processing for polar ice radar in our laboratory, a Curvelet Thresholding Neural Network (TNN) noise reduction method is proposed, and a new threshold function with infinite-order continuous derivative is constructed. The method is based on TNN model. In the learning process of TNN, the gradient descent method is adopted to solve the adaptive optimal thresholds of different scales and directions in Curvelet domain, and to achieve an optimal mean square error performance. In this paper, the specific implementation steps are presented, and the superiority of this method is verified by simulation. Finally, the proposed method is used to process the ice radar data obtained during the 28th Chinese National Antarctic Research Expedition in the region of Zhongshan Station, Antarctica. Experimental results show that the proposed method can reduce the noise effectively, while preserving the edge of the ice layers.展开更多
Relay selection is an effective method to realize the cooperative diversity gain in wireless networks. In this paper, we study a threshold-based single relay selection algorithm. A reasonable threshold value is set at...Relay selection is an effective method to realize the cooperative diversity gain in wireless networks. In this paper, we study a threshold-based single relay selection algorithm. A reasonable threshold value is set at each relay node, and the first relay with the instantaneous channel gain larger than the threshold will be se-lected to cooperate with the source. The exact and closed form expression for its outage probability is de-rived over independent, non-identically distributed (i. n. i. d) Rayleigh channels. The complexity of the algo-rithm is also analyzed in detail. Simulation results are presented to verify our theoretical analysis.展开更多
We present a new approach to reduct the com--munication overhead caused bythreshold cryptography using modified multicast protocol and certificate proxy technology. Servernodes maintain a few multicast groups proactiv...We present a new approach to reduct the com--munication overhead caused bythreshold cryptography using modified multicast protocol and certificate proxy technology. Servernodes maintain a few multicast groups proactively. A client wanting to updateits certificatemulticasts its request to a server nocks group through its certificate proxy. At periodic intervals,server nodes refresh their shares of the private key of certificate authority using multicast.展开更多
In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-...In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks.展开更多
The electrical excitability of neural networks is influenced by different environmental factors. Effective and simple methods are required to objectively and quantitatively evaluate the influence of such factors, incl...The electrical excitability of neural networks is influenced by different environmental factors. Effective and simple methods are required to objectively and quantitatively evaluate the influence of such factors, including variations in temperature and pharmaceutical dosage. The aim of this paper was to introduce ‘the voltage threshold measurement method', which is a new method using microelectrode arrays that can quantitatively evaluate the influence of different factors on the electrical excitability of neural networks. We sought to verify the feasibility and efficacy of the method by studying the effects of acetylcholine, ethanol, and temperature on hippocampal neuronal networks and hippocampal brain slices. First, we determined the voltage of the stimulation pulse signal that elicited action potentials in the two types of neural networks under normal conditions. Second, we obtained the voltage thresholds for the two types of neural networks under different concentrations of acetylcholine, ethanol, and different temperatures. Finally, we obtained the relationship between voltage threshold and the three influential factors. Our results indicated that the normal voltage thresholds of the hippocampal neuronal network and hippocampal slice preparation were 56 and 31 m V, respectively. The voltage thresholds of the two types of neural networks were inversely proportional to acetylcholine concentration, and had an exponential dependency on ethanol concentration. The curves of the voltage threshold and the temperature of the medium for the two types of neural networks were U-shaped. The hippocampal neuronal network and hippocampal slice preparations lost their excitability when the temperature of the medium decreased below 34 and 33°C or increased above 42 and 43°C, respectively. These results demonstrate that the voltage threshold measurement method is effective and simple for examining the performance/excitability of neuronal networks.展开更多
In real complex systems, the limited storage capacity of physical devices often results in the loss of data. We study the effect of buffer size on packet loss threshold in scale-free networks. A new order parameter is...In real complex systems, the limited storage capacity of physical devices often results in the loss of data. We study the effect of buffer size on packet loss threshold in scale-free networks. A new order parameter is proposed to characterize the packet loss threshold. Our results show that the packet loss threshold can be optimized with a relative small buffer size. Meanwhile, a large buffer size will increase the travel time. Furthermore, we propose a Buffered-Shortest-Path-First(BSPF) queuing strategy. Compared to the traditional First-In-First-Out(FIFO) strategy, BSPF can not only increase the packet loss threshold but can also significantly decrease the travel length and travel time in both identical and heterogeneous node capacity cases. Our study will help to improve the traffic performance in finite buffer networks.展开更多
A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key dis...A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol, the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient.展开更多
Among many epidemic models, one epidemic disease may transmit with the existence of other pathogens or other strains from the same pathogen. In this paper, we consider the case where all of the strains obey the suscep...Among many epidemic models, one epidemic disease may transmit with the existence of other pathogens or other strains from the same pathogen. In this paper, we consider the case where all of the strains obey the susceptible-infected- susceptible mechanism and compete with each other at the expense of common susceptible individuals. By using the heterogenous mean-field approach, we discuss the epidemic threshold for one of two strains. We confirm the existence of epidemic threshold in both finite and infinite populations subject to underlying epidemic transmission. Simulations in the Barabasi-Albert (BA) scale-free networks are in good agreement with the analytical results.展开更多
This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification aut...This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design.展开更多
In this paper, we study the dynamical behaviour of an epidemic on complex networks with population mobility. In our model, the number of people on each node is unrestricted as the nodes of the network are considered a...In this paper, we study the dynamical behaviour of an epidemic on complex networks with population mobility. In our model, the number of people on each node is unrestricted as the nodes of the network are considered as cities, communities, and so on. Because people can travel between different cities, we study the effect of a population's mobility on the epidemic spreading. In view of the population's mobility, we suppose that the susceptible individual can be infected by an infected individual in the same city or other connected cities. Simulations are presented to verify our analysis.展开更多
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor...In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well.展开更多
Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the ha...Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the hand in captured images or videos. A new three-stage pipeline approach for fast and accurate hand segmentation for the hand from a single depth image is proposed. Firstly, a depth frame is segmented into several regions by histogrambased threshold selection algorithm and by tracing the exterior boundaries of objects after thresholding. Secondly, each segmentation proposal is evaluated by a three-layers shallow convolutional neural network(CNN) to determine whether or not the boundary is associated with the hand. Finally, all hand components are merged as the hand segmentation result. Compared with algorithms based on random decision forest(RDF), the experimental results demonstrate that the approach achieves better performance with high-accuracy(88.34% mean intersection over union, mIoU) and a shorter processing time(≤8 ms).展开更多
This paper presents a modified susceptible-infected-recovered(SIR) model with the effects of awareness and vaccination to study the epidemic spreading on scale-free networks based on the mean-field theory.In this mo...This paper presents a modified susceptible-infected-recovered(SIR) model with the effects of awareness and vaccination to study the epidemic spreading on scale-free networks based on the mean-field theory.In this model,when susceptible individuals receive awareness from their infected neighbor nodes,they will take vaccination measures.The theoretical analysis and the numerical simulations show that the existence of awareness and vaccination can significantly improve the epidemic threshold and reduce the risk of virus outbreaks.In addition,regardless of the existence of vaccination,the awareness can increase the spreading threshold and slow the spreading speed effectively.For a given awareness and a certain spreading rate,the total number of infections reduces with the increasing vaccination rate.展开更多
Under different conditions, the highest detection probability should be acquired while receiving laser echo during laser pulse range finding. The threshold voltage of the signal detection can be set corresponding ...Under different conditions, the highest detection probability should be acquired while receiving laser echo during laser pulse range finding. The threshold voltage of the signal detection can be set corresponding to different conditions by using resistor network. As a feedback loop, automatic noise threshold circuit could change the threshold voltage following the noise level. The threshold can track the noise closely, rapidly and accurately by adopting this combination. Therefore, the receiving capability of laser echo receiving system will be maximized, and it can detect weaker laser pulse from noise.展开更多
An efcient hop count route fnding approach for mobile ad hoc network is presented in this paper.It is an adaptive routing protocol that has a tradeof between transmission power and hop count for wireless ad hoc networ...An efcient hop count route fnding approach for mobile ad hoc network is presented in this paper.It is an adaptive routing protocol that has a tradeof between transmission power and hop count for wireless ad hoc networks.During the route fnding process,the node can dynamically assign transmission power to nodes along the route.The node who has received route request message compares its power with the threshold power value,and then selects a reasonable route according to discriminating algorithms.This algorithm is an efective solution scheme to wireless ad hoc networks through reasonably selected path to reduce network consumption.Simulation results indicate that the proposed protocol can deliver better performances with respect to energy consumption and end-to-end delay.展开更多
Aiming at the problem of open set voiceprint recognition, this paper proposes an adaptive threshold algorithm based on OTSU and deep learning. The bottleneck technology of open set voiceprint recognition lies in the c...Aiming at the problem of open set voiceprint recognition, this paper proposes an adaptive threshold algorithm based on OTSU and deep learning. The bottleneck technology of open set voiceprint recognition lies in the calculation of similarity values and thresholds of speakers inside and outside the set. This paper combines deep learning and machine learning methods, and uses a Deep Belief Network stacked with three layers of Restricted Boltzmann Machines to extract deep voice features from basic acoustic features. And by training the Gaussian Mixture Model, this paper calculates the similarity value of the feature, and further determines the threshold of the similarity value of the feature through OTSU. After experimental testing, the algorithm in this paper has a false rejection rate of 3.00% for specific speakers, a false acceptance rate of 0.35% for internal speakers, and a false acceptance rate of 0 for external speakers. This improves the accuracy of traditional methods in open set voiceprint recognition. This proves that the method is feasible and good recognition effect.展开更多
The innovations actually diffuse among social network nowadays.Individual heterogeneity,interactions between individuals and network topology influence a lot.We established a "double threshold" modified mode...The innovations actually diffuse among social network nowadays.Individual heterogeneity,interactions between individuals and network topology influence a lot.We established a "double threshold" modified model and took the number of neighbors,neighbors' adoption and the cost-benefit parameters as crucial influencing factors.The diffusion of DaLingTong(CDMA450)products in MeiShan city of SiChuan province during 2004 to 2007 has been used to verity the model on Matlab.The validation results fit the actual diffusion pattern of DaLingTong(CDMA450) products very well.The results indicate that there exists a "tipping point(threshold)" in the process of innovation diffusion.If the initial adoption quantity is larger than the tipping point,then the product will spread to a large portion of people,otherwise is will collapse to zero.The model can effectively predict the diffusion of new products,and can influence the diffusion process by changing the value of the parameters.展开更多
In this paper, a dynamic epidemic control model on the uncorrelated complex networks is proposed. By means of theoretical analysis, we found that the new model has a similar epidemic threshold as that of the susceptib...In this paper, a dynamic epidemic control model on the uncorrelated complex networks is proposed. By means of theoretical analysis, we found that the new model has a similar epidemic threshold as that of the susceptible-infectedrecovered (SIR) model on the above networks, but it can reduce the prevalence of the infected individuals remarkably. This result may help us understand epidemic spreading phenomena on real networks and design appropriate strategies to control infections.展开更多
基金Project supported by the Natural Science Foundation of Shandong Province,China(Grant No.ZR2021MF051)。
文摘Aiming at training the feed-forward threshold neural network consisting of nondifferentiable activation functions, the approach of noise injection forms a stochastic resonance based threshold network that can be optimized by various gradientbased optimizers. The introduction of injected noise extends the noise level into the parameter space of the designed threshold network, but leads to a highly non-convex optimization landscape of the loss function. Thus, the hyperparameter on-line learning procedure with respective to network weights and noise levels becomes of challenge. It is shown that the Adam optimizer, as an adaptive variant of stochastic gradient descent, manifests its superior learning ability in training the stochastic resonance based threshold network effectively. Experimental results demonstrate the significant improvement of performance of the designed threshold network trained by the Adam optimizer for function approximation and image classification.
基金Supported by the National High Technology Research and Development Program of China (No. 2011AA040202)the National Natural Science Foundation of China (No. 40976114)
文摘Due to the demand of data processing for polar ice radar in our laboratory, a Curvelet Thresholding Neural Network (TNN) noise reduction method is proposed, and a new threshold function with infinite-order continuous derivative is constructed. The method is based on TNN model. In the learning process of TNN, the gradient descent method is adopted to solve the adaptive optimal thresholds of different scales and directions in Curvelet domain, and to achieve an optimal mean square error performance. In this paper, the specific implementation steps are presented, and the superiority of this method is verified by simulation. Finally, the proposed method is used to process the ice radar data obtained during the 28th Chinese National Antarctic Research Expedition in the region of Zhongshan Station, Antarctica. Experimental results show that the proposed method can reduce the noise effectively, while preserving the edge of the ice layers.
文摘Relay selection is an effective method to realize the cooperative diversity gain in wireless networks. In this paper, we study a threshold-based single relay selection algorithm. A reasonable threshold value is set at each relay node, and the first relay with the instantaneous channel gain larger than the threshold will be se-lected to cooperate with the source. The exact and closed form expression for its outage probability is de-rived over independent, non-identically distributed (i. n. i. d) Rayleigh channels. The complexity of the algo-rithm is also analyzed in detail. Simulation results are presented to verify our theoretical analysis.
文摘We present a new approach to reduct the com--munication overhead caused bythreshold cryptography using modified multicast protocol and certificate proxy technology. Servernodes maintain a few multicast groups proactively. A client wanting to updateits certificatemulticasts its request to a server nocks group through its certificate proxy. At periodic intervals,server nodes refresh their shares of the private key of certificate authority using multicast.
基金the Major national S&T program under Grant No. 2011ZX03005-002National Natural Science Foundation of China under Grant No. 60872041,61072066the Fundamental Research Funds for the Central Universities under Grant No. JY10000903001,JY10000901034
文摘In opportunistic Networks,compromised nodes can attack social context-based routing protocols by publishing false social attributes information.To solve this problem,we propose a security scheme based on the identity-based threshold signature which allows mobile nodes to jointly generate and distribute the secrets for social attributes in a totally self-organized way without the need of any centralized authority.New joining nodes can reconstruct their own social attribute signatures by getting enough partial signature services from encounter opportunities with the initial nodes.Mobile nodes need to testify whether the neighbors can provide valid attribute signatures for their routing advertisements in order to resist potential routing attacks.Simulation results show that:by implementing our security scheme,the network delivery probability of the social context-based routing protocol can be effectively improved when there are large numbers of compromised nodes in opportunistic networks.
基金supported by the National Natural Sciences Foundation of China,No.61534003,61076118the Innovation Foundation for State Key Laboratory of the Ministry of Science and Technology,China,No.2016-2018a grant from the Open Projects of Key Laboratory of Child Development and Learning of the Ministry of Education of China,No.CDLS201205
文摘The electrical excitability of neural networks is influenced by different environmental factors. Effective and simple methods are required to objectively and quantitatively evaluate the influence of such factors, including variations in temperature and pharmaceutical dosage. The aim of this paper was to introduce ‘the voltage threshold measurement method', which is a new method using microelectrode arrays that can quantitatively evaluate the influence of different factors on the electrical excitability of neural networks. We sought to verify the feasibility and efficacy of the method by studying the effects of acetylcholine, ethanol, and temperature on hippocampal neuronal networks and hippocampal brain slices. First, we determined the voltage of the stimulation pulse signal that elicited action potentials in the two types of neural networks under normal conditions. Second, we obtained the voltage thresholds for the two types of neural networks under different concentrations of acetylcholine, ethanol, and different temperatures. Finally, we obtained the relationship between voltage threshold and the three influential factors. Our results indicated that the normal voltage thresholds of the hippocampal neuronal network and hippocampal slice preparation were 56 and 31 m V, respectively. The voltage thresholds of the two types of neural networks were inversely proportional to acetylcholine concentration, and had an exponential dependency on ethanol concentration. The curves of the voltage threshold and the temperature of the medium for the two types of neural networks were U-shaped. The hippocampal neuronal network and hippocampal slice preparations lost their excitability when the temperature of the medium decreased below 34 and 33°C or increased above 42 and 43°C, respectively. These results demonstrate that the voltage threshold measurement method is effective and simple for examining the performance/excitability of neuronal networks.
基金Project supported by the National Key Research and Development Program of China(Grant No.2016YFC0802508)the National Natural Science Foundation of China(Grant Nos.11672289 and 61503355)the support from the Chinese Scholarship Council
文摘In real complex systems, the limited storage capacity of physical devices often results in the loss of data. We study the effect of buffer size on packet loss threshold in scale-free networks. A new order parameter is proposed to characterize the packet loss threshold. Our results show that the packet loss threshold can be optimized with a relative small buffer size. Meanwhile, a large buffer size will increase the travel time. Furthermore, we propose a Buffered-Shortest-Path-First(BSPF) queuing strategy. Compared to the traditional First-In-First-Out(FIFO) strategy, BSPF can not only increase the packet loss threshold but can also significantly decrease the travel length and travel time in both identical and heterogeneous node capacity cases. Our study will help to improve the traffic performance in finite buffer networks.
基金Project supported by the National Natural Science Foundation of China(Grant No.60273049)
文摘A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol, the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient.
基金supported by the National Natural Science Foundation of China (Grant No. 11072136)the Shanghai Leading Academic Discipline Project,China (Grant No. S30104)
文摘Among many epidemic models, one epidemic disease may transmit with the existence of other pathogens or other strains from the same pathogen. In this paper, we consider the case where all of the strains obey the susceptible-infected- susceptible mechanism and compete with each other at the expense of common susceptible individuals. By using the heterogenous mean-field approach, we discuss the epidemic threshold for one of two strains. We confirm the existence of epidemic threshold in both finite and infinite populations subject to underlying epidemic transmission. Simulations in the Barabasi-Albert (BA) scale-free networks are in good agreement with the analytical results.
文摘This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design.
基金supported by National Natural Science Foundation of China (Grant Nos 60744003,10635040,10532060 and 10672146)the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No 20060358065)+2 种基金National Science Fund for Fostering Talents in Basic Science (Grant No J0630319)A grant from the Health,Welfare and Food Bureau of the Hong Kong SAR GovernmentShanghai Leading Academic Discipline Project (Project Number:J50101)
文摘In this paper, we study the dynamical behaviour of an epidemic on complex networks with population mobility. In our model, the number of people on each node is unrestricted as the nodes of the network are considered as cities, communities, and so on. Because people can travel between different cities, we study the effect of a population's mobility on the epidemic spreading. In view of the population's mobility, we suppose that the susceptible individual can be infected by an infected individual in the same city or other connected cities. Simulations are presented to verify our analysis.
文摘In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well.
文摘Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the hand in captured images or videos. A new three-stage pipeline approach for fast and accurate hand segmentation for the hand from a single depth image is proposed. Firstly, a depth frame is segmented into several regions by histogrambased threshold selection algorithm and by tracing the exterior boundaries of objects after thresholding. Secondly, each segmentation proposal is evaluated by a three-layers shallow convolutional neural network(CNN) to determine whether or not the boundary is associated with the hand. Finally, all hand components are merged as the hand segmentation result. Compared with algorithms based on random decision forest(RDF), the experimental results demonstrate that the approach achieves better performance with high-accuracy(88.34% mean intersection over union, mIoU) and a shorter processing time(≤8 ms).
基金Project supported by the National Natural Science Foundation of China (Grant No. 60874091)the Six Projects Sponsoring Talent Summits of Jiangsu Province,China (Grant No. SJ209006)+1 种基金the Natural Science Foundation of Jiangsu Province,China (Grant No. BK2010526)the Graduate Student Innovation Research Program of Jiangsu Province,China (Grant No. CXLX11 0414)
文摘This paper presents a modified susceptible-infected-recovered(SIR) model with the effects of awareness and vaccination to study the epidemic spreading on scale-free networks based on the mean-field theory.In this model,when susceptible individuals receive awareness from their infected neighbor nodes,they will take vaccination measures.The theoretical analysis and the numerical simulations show that the existence of awareness and vaccination can significantly improve the epidemic threshold and reduce the risk of virus outbreaks.In addition,regardless of the existence of vaccination,the awareness can increase the spreading threshold and slow the spreading speed effectively.For a given awareness and a certain spreading rate,the total number of infections reduces with the increasing vaccination rate.
文摘Under different conditions, the highest detection probability should be acquired while receiving laser echo during laser pulse range finding. The threshold voltage of the signal detection can be set corresponding to different conditions by using resistor network. As a feedback loop, automatic noise threshold circuit could change the threshold voltage following the noise level. The threshold can track the noise closely, rapidly and accurately by adopting this combination. Therefore, the receiving capability of laser echo receiving system will be maximized, and it can detect weaker laser pulse from noise.
基金supported by National Natural Science Foundation of China(Nos.60940010 and 61071073)Doctoral Fund of Ministry of Education of China(No.20090061110043)
文摘An efcient hop count route fnding approach for mobile ad hoc network is presented in this paper.It is an adaptive routing protocol that has a tradeof between transmission power and hop count for wireless ad hoc networks.During the route fnding process,the node can dynamically assign transmission power to nodes along the route.The node who has received route request message compares its power with the threshold power value,and then selects a reasonable route according to discriminating algorithms.This algorithm is an efective solution scheme to wireless ad hoc networks through reasonably selected path to reduce network consumption.Simulation results indicate that the proposed protocol can deliver better performances with respect to energy consumption and end-to-end delay.
文摘Aiming at the problem of open set voiceprint recognition, this paper proposes an adaptive threshold algorithm based on OTSU and deep learning. The bottleneck technology of open set voiceprint recognition lies in the calculation of similarity values and thresholds of speakers inside and outside the set. This paper combines deep learning and machine learning methods, and uses a Deep Belief Network stacked with three layers of Restricted Boltzmann Machines to extract deep voice features from basic acoustic features. And by training the Gaussian Mixture Model, this paper calculates the similarity value of the feature, and further determines the threshold of the similarity value of the feature through OTSU. After experimental testing, the algorithm in this paper has a false rejection rate of 3.00% for specific speakers, a false acceptance rate of 0.35% for internal speakers, and a false acceptance rate of 0 for external speakers. This improves the accuracy of traditional methods in open set voiceprint recognition. This proves that the method is feasible and good recognition effect.
基金ACKNOWLEDGEMENTS Project supported by the National Social Science Foundation of China (Grant No. 11BGL041), Ministry of Education Humanities and Social Sciences General Project (12YJA630166).
文摘The innovations actually diffuse among social network nowadays.Individual heterogeneity,interactions between individuals and network topology influence a lot.We established a "double threshold" modified model and took the number of neighbors,neighbors' adoption and the cost-benefit parameters as crucial influencing factors.The diffusion of DaLingTong(CDMA450)products in MeiShan city of SiChuan province during 2004 to 2007 has been used to verity the model on Matlab.The validation results fit the actual diffusion pattern of DaLingTong(CDMA450) products very well.The results indicate that there exists a "tipping point(threshold)" in the process of innovation diffusion.If the initial adoption quantity is larger than the tipping point,then the product will spread to a large portion of people,otherwise is will collapse to zero.The model can effectively predict the diffusion of new products,and can influence the diffusion process by changing the value of the parameters.
基金Project supported by the National Natural Science Foundation of China (Grant No.60774088)the Program for New Century Excellent Talents of Higher Education of China (Grant No NCET 2005-290)the Special Research Fund for the Doctoral Program of Higher Education of China (Grant No 20050055013)
文摘In this paper, a dynamic epidemic control model on the uncorrelated complex networks is proposed. By means of theoretical analysis, we found that the new model has a similar epidemic threshold as that of the susceptible-infectedrecovered (SIR) model on the above networks, but it can reduce the prevalence of the infected individuals remarkably. This result may help us understand epidemic spreading phenomena on real networks and design appropriate strategies to control infections.