期刊文献+
共找到26篇文章
< 1 2 >
每页显示 20 50 100
Bursting and spiking due to additional direct and stochastic currents in neuron models 被引量:1
1
作者 杨卓琴 陆启韶 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第3期518-525,共8页
Neurons at rest can exhibit diverse firing activities patterns in response to various external deterministic and random stimuli, especially additional currents. In this paper, neuronal firing patterns from bursting to... Neurons at rest can exhibit diverse firing activities patterns in response to various external deterministic and random stimuli, especially additional currents. In this paper, neuronal firing patterns from bursting to spiking, induced by additional direct and stochastic currents, are explored in rest states corresponding to two values of the parameter VK in the Chay neuron system. Three cases are considered by numerical simulation and fast/slow dynamic analysis, in which only the direct current or the stochastic current exists, or the direct and stochastic currents coexist. Meanwhile, several important bursting patterns in neuronal experiments, such as the period-1 "circle/homoclinic" bursting and the integer multiple "fold/homoclinic" bursting with onc spike per burst, as well as the transition from integer multiple bursting to period-1 "circle/homoclinic" bursting and that from stochastic "Hopf/homoclinic" bursting to "Hopf/homoclinic" bursting, are investigated in detail. 展开更多
关键词 direct current stochastic current bursting and spiking fast/slow dynamic analysis
原文传递
A Quasi-Interpolation Satisfying Quadratic Polynomial Reproduction with Radial Basis Functions 被引量:1
2
作者 Li Zha Renzhong Feng 《Numerical Mathematics A Journal of Chinese Universities(English Series)》 SCIE 2007年第4期348-357,共10页
In this paper,a new quasi-interpolation with radial basis functions which satis- fies quadratic polynomial reproduction is constructed on the infinite set of equally spaced data.A new basis function is constructed by ... In this paper,a new quasi-interpolation with radial basis functions which satis- fies quadratic polynomial reproduction is constructed on the infinite set of equally spaced data.A new basis function is constructed by making convolution integral with a constructed spline and a given radial basis function.In particular,for twicely differ- entiable function the proposed method provides better approximation and also takes care of derivatives approximation. 展开更多
关键词 二次方程 多项式 等距处理 数据处理
在线阅读 下载PDF
Large Scattered Data Fitting Based on Radial Basis Functions 被引量:2
3
作者 FENG Ren-zhong XU Liang 《Computer Aided Drafting,Design and Manufacturing》 2007年第1期66-72,共7页
Solving large radial basis function (RBF) interpolation problem with non-customized methods is computationally expensive and the matrices that occur are typically badly conditioned. In order to avoid these difficult... Solving large radial basis function (RBF) interpolation problem with non-customized methods is computationally expensive and the matrices that occur are typically badly conditioned. In order to avoid these difficulties, we present a fitting based on radial basis functions satisfying side conditions by least squares, although compared with interpolation the method loses some accuracy, it reduces the computational cost largely. Since the fitting accuracy and the non-singularity of coefficient matrix in normal equation are relevant to the uniformity of chosen centers of the fitted RBE we present a choice method of uniform centers. Numerical results confirm the fitting efficiency. 展开更多
关键词 scattered data radial basis functions interpolation least squares fitting uniform centers
在线阅读 下载PDF
Continuous adjoint-based error estimation and its application to adaptive discontinuous Galerkin method
4
作者 Huiqiang YUE Tiegang LIU V.SHAYDUROV 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2016年第11期1419-1430,共12页
An adaptive mesh refinement algorithm based on a continuous adjoint ap- proach is developed. Both the primal equation and the adjoint equation are approximated with the discontinuous Galerkin (DG) method. The propos... An adaptive mesh refinement algorithm based on a continuous adjoint ap- proach is developed. Both the primal equation and the adjoint equation are approximated with the discontinuous Galerkin (DG) method. The proposed adaptive algorithm is used in compressible Euler equations. Numerical tests are made to show the superiority of the proposed adaptive algorithm. 展开更多
关键词 adaptivity discontinuous Galerkin (DG) ADJOINT
在线阅读 下载PDF
Toward Optimal Periodic Crowd Tracking via Unmanned Aerial Vehicle
5
作者 Khalil Chebil Skander Htiouech Mahdi Khemakhem 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期233-263,共31页
Crowd management and analysis(CMA)systems have gained a lot of interest in the vulgarization of unmanned aerial vehicles(UAVs)use.Crowd tracking using UAVs is among the most important services provided by a CMA.In thi... Crowd management and analysis(CMA)systems have gained a lot of interest in the vulgarization of unmanned aerial vehicles(UAVs)use.Crowd tracking using UAVs is among the most important services provided by a CMA.In this paper,we studied the periodic crowd-tracking(PCT)problem.It consists in usingUAVs to follow-up crowds,during the life-cycle of an open crowded area(OCA).Two criteria were considered for this purpose.The first is related to the CMA initial investment,while the second is to guarantee the quality of service(QoS).The existing works focus on very specified assumptions that are highly committed to CMAs applications context.This study outlined a new binary linear programming(BLP)model to optimally solve the PCT motivated by a real-world application study taking into consideration the high level of abstraction.To closely approach different real-world contexts,we carefully defined and investigated a set of parameters related to the OCA characteristics,behaviors,and theCMAinitial infrastructure investment(e.g.,UAVs,charging stations(CSs)).In order to periodically update theUAVs/crowds andUAVs/CSs assignments,the proposed BLP was integrated into a linear algorithm called PCTs solver.Our main objective was to study the PCT problem fromboth theoretical and numerical viewpoints.To prove the PCTs solver effectiveness,we generated a diversified set of PCTs instances with different scenarios for simulation purposes.The empirical results analysis enabled us to validate the BLPmodel and the PCTs solver,and to point out a set of new challenges for future research directions. 展开更多
关键词 Unmanned aerial vehicles periodic crowd-tracking problem open crowded area optimization binary linear programming crowd management and analysis system
在线阅读 下载PDF
An Advanced Quantum-Resistant Signature Scheme for Cloud Based on Eisenstein Ring
6
作者 Faguo Wu Xiao Zhang +3 位作者 Wang Yao Zhiming Zheng Lipeng Xiang Wanpeng Li 《Computers, Materials & Continua》 SCIE EI 2018年第7期19-34,共16页
Signature,widely used in cloud environment,describes the work as readily identifying its creator.The existing signature schemes in the literature mostly rely on the Hardness assumption which can be easily solved by qu... Signature,widely used in cloud environment,describes the work as readily identifying its creator.The existing signature schemes in the literature mostly rely on the Hardness assumption which can be easily solved by quantum algorithm.In this paper,we proposed an advanced quantum-resistant signature scheme for Cloud based on Eisenstein Ring(ETRUS)which ensures our signature scheme proceed in a lattice with higher density.We proved that ETRUS highly improve the performance of traditional lattice signature schemes.Moreover,the Norm of polynomials decreases significantly in ETRUS which can effectively reduce the amount of polynomials convolution calculation.Furthermore,storage complexity of ETRUS is smaller than classical ones.Finally,according to all convolution of ETRUS enjoy lower degree polynomials,our scheme appropriately accelerate 56.37%speed without reducing its security level. 展开更多
关键词 SIGNATURE quantum-resistant Eisenstein Ring ETRUS
在线阅读 下载PDF
Post-Quantum Blockchain over Lattice
7
作者 Xiao Zhang Faguo Wu +2 位作者 Wang Yao Wenhua Wang Zhiming Zheng 《Computers, Materials & Continua》 SCIE EI 2020年第5期845-859,共15页
Blockchain is an emerging decentralized architecture and distributed computing paradigm underlying Bitcoin and other cryptocurrencies,and has recently attracted intensive attention from governments,financial instituti... Blockchain is an emerging decentralized architecture and distributed computing paradigm underlying Bitcoin and other cryptocurrencies,and has recently attracted intensive attention from governments,financial institutions,high-tech enterprises,and the capital markets.Its cryptographic security relies on asymmetric cryptography,such as ECC,RSA.However,with the surprising development of quantum technology,asymmetric cryptography schemes mentioned above would become vulnerable.Recently,lattice-based cryptography scheme was proposed to be secure against attacks in the quantum era.In 2018,with the aid of Bonsai Trees technology,Yin et al.[Yin,Wen,Li et al.(2018)]proposed a lattice-based authentication method which can extend a lattice space to multiple lattice spaces accompanied by the corresponding key.Although their scheme has theoretical significance,it is unpractical in actual situation due to extremely large key size and signature size.In this paper,aiming at tackling the critical issue of transaction size,we propose a post quantum blockchain over lattice.By using SampleMat and signature without trapdoor,we can reduce the key size and signature size of our transaction authentication approach by a significant amount.Instead of using a whole set of vectors as a basis,we can use only one vector and rotate it enough times to form a basis.Based on the hardness assumption of Short Integer Solution(SIS),we demonstrate that the proposed anti-quantum transaction authentication scheme over lattice provides existential unforgeability against adaptive chosen-message attacks in the random oracle.As compared to the Yin et al.[Yin,Wen,Li et al.(2018)]scheme,our scheme has better performance in terms of energy consumption,signature size and signing key size.As the underlying lattice problem is intractable even for quantum computers,our scheme would work well in the quantum age. 展开更多
关键词 Blockchain post quantum LATTICE random oracle
在线阅读 下载PDF
Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm
8
作者 Faguo Wu Bo Zhou +2 位作者 Jie Jiang Tianyu Lei Jiale Song 《Computers, Materials & Continua》 SCIE EI 2023年第7期957-973,共17页
With the rapid increase in demand for data trustworthiness and data security,distributed data storage technology represented by blockchain has received unprecedented attention.These technologies have been suggested fo... With the rapid increase in demand for data trustworthiness and data security,distributed data storage technology represented by blockchain has received unprecedented attention.These technologies have been suggested for various uses because of their remarkable ability to offer decentralization,high autonomy,full process traceability,and tamper resistance.Blockchain enables the exchange of information and value in an untrusted environment.There has been a significant increase in attention to the confidentiality and privacy preservation of blockchain technology.Ensuring data privacy is a critical concern in cryptography,and one of the most important protocols used to achieve this is the secret-sharing method.By dividing the secret into shares and distributing them among multiple parties,no one can access the secret without the cooperation of the other parties.However,Attackers with quantum computers in the future can execute Grover’s and Shor’s algorithms on quantum computers that can break or reduce the currently widely used cryptosystems.Furthermore,centralized management of keys increases the risk of key leakage.This paper proposed a post-quantum threshold algo-rithm to reduce the risk of data privacy leakage in blockchain Systems.This algorithm uses distributed key management technology to reduce the risk of individual node private key leakage and provide post-quantum security.The proposed privacy-preserving cryptographic algorithm provides a post-quantum threshold architecture for managing data,which involves defining users and interaction processes within the system.This paper applies a linear secret-sharing solution to partition the private key of the Number Theory Research Unit(NTRU)algorithm into n parts.It constructs a t–n threshold that allows recovery of the plaintext only when more than t nodes participate in decryption.The characteristic of a threshold makes the scheme resistant to collusion attacks from members whose combined credibility is less than the threshold.This mitigates the risk of single-point private key leakage.During the threshold decryption process,the private key information of the nodes will not be leaked.In addition,the fact that the threshold algorithm is founded on the NTRU lattice enables it to withstand quantum attacks,thus enhancing its security.According to the analysis,the proposed scheme provides superior protection compared to currently availablemethods.This paper provides postquantum security solutions for data security protection of blockchain,which will enrich the use of blockchain in scenarios with strict requirements for data privacy protection. 展开更多
关键词 Blockchain post-quantum cryptography threshold cryptography privacy protection
在线阅读 下载PDF
Remote sensing image compression for deep space based on region of interest
9
作者 王振华 吴伟仁 +2 位作者 田玉龙 田金文 柳健 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2003年第3期300-303,共4页
A major limitation for deep space communication is the limited bandwidths available. The downlinkrate using X-band with an L2 halo orbit is estimated to be of only 5.35 GB/d. However, the Next GenerationSpace Telescop... A major limitation for deep space communication is the limited bandwidths available. The downlinkrate using X-band with an L2 halo orbit is estimated to be of only 5.35 GB/d. However, the Next GenerationSpace Telescope (NGST) will produce about 600 GB/d. Clearly the volume of data to downlink must be re-duced by at least a factor of 100. One of the resolutions is to encode the data using very low bit rate image com-pression techniques. An very low bit rate image compression method based on region of interest(ROI) has beenproposed for deep space image. The conventional image compression algorithms which encode the original datawithout any data analysis can maintain very good details and haven' t high compression rate while the modernimage compressions with semantic organization can have high compression rate even to be hundred and can' tmaintain too much details. The algorithms based on region of interest inheriting from the two previews algorithmshave good semantic features and high fidelity, and is therefore suitable for applications at a low bit rate. Theproposed method extracts the region of interest by texture analysis after wavelet transform and gains optimal localquality with bit rate control. The Result shows that our method can maintain more details in ROI than generalimage compression algorithm(SPIHT) under the condition of sacrificing the quality of other uninterested areas. 展开更多
关键词 WAVELET compression ROI deep space
在线阅读 下载PDF
Attention-aligned mean-teacher learning for unsupervised domain adaptive person re-ID
10
作者 You LV Zhen ZHANG +1 位作者 Guoliang KANG Wei WEI 《Science China(Technological Sciences)》 2025年第8期286-288,共3页
In recent years,artificial intelligence has fueled the development of numerous applications[1,2].Person re-identification(re-ID)is a typical artificial intelligence system designed to automatically retrieve images of ... In recent years,artificial intelligence has fueled the development of numerous applications[1,2].Person re-identification(re-ID)is a typical artificial intelligence system designed to automatically retrieve images of specific individuals from galleries captured by different cameras[3].While supervised(in-domain)person re-ID methods have achieved considerable success in recent years[4],they remain susceptible to domain shifts.This means a model trained on one domain may fail to identify the person in another distinct domain.Collecting annotating data for every possible domain variation(e.g.,resolutions,lighting,and cameras)is impractical. 展开更多
关键词 UNSUPERVISED domain shifts retrieve images specific individuals domain adaptive attention aligned mean teacher domain shiftsthis artificial intelligence
原文传递
Exploring a Large Language Model for Transforming Taxonomic Data into OWL:Lessons Learned and Implications for Ontology Development
11
作者 Filipi Miranda Soares Antonio Mauro Saraiva +6 位作者 Luís Ferreira Pires Luiz Olavo Bonino da Silva Santos Dilvan de Abreu Moreira Fernando Elias Corrêa Kelly Rosa Braghetto Debora Pignatari Drucker Alexandre Cláudio Botazzo Delbem 《Data Intelligence》 2025年第2期265-302,共38页
Managing scientific names in ontologies that represent species taxonomies is challenging due to the ever-evolving nature of these taxonomies.Manually maintaining these names becomes increasingly difficult when dealing... Managing scientific names in ontologies that represent species taxonomies is challenging due to the ever-evolving nature of these taxonomies.Manually maintaining these names becomes increasingly difficult when dealing with thousands of scientific names.To address this issue,this paper investigates the use of ChatGPT-4 to automate the development of the Organism module in the Agricultural Product Types Ontology(APTO)for species classification.Our methodology involved leveraging ChatGPT-4 to extract data from the GBIF Backbone API and generate OWL files for further integration in APTO.Two alternative approaches were explored:(1)issuing a series of prompts for ChatGPT-4 to execute tasks via the BrowserOP plugin and(2)directing ChatGPT-4 to design a Python algorithm to perform analogous tasks.Both approaches rely on a prompting method where we provide instructions,context,input data,and an output indicator.The first approach showed scalability limitations,while the second approach used the Python algorithm to overcome these challenges,but it struggled with typographical errors in data handling.This study highlights the potential of Large language models like ChatGPT-4 to streamline the management of species names in ontologies.Despite certain limitations,these tools offer promising advancements in automating taxonomy-related tasks and improving the efficiency of ontology development. 展开更多
关键词 ChatGPT Artificial intelligence Knowledge graph Agriculture TAXONOMY
原文传递
Complexity of software trustworthiness and its dynamical statistical analysis methods 被引量:11
12
作者 ZHENG ZhiMing MA ShiLong +4 位作者 LI Wei JIANG Xin WEI Wei MA LiLi TANG ShaoTing 《Science in China(Series F)》 2009年第9期1651-1657,共7页
Developing trusted softwares has become an important trend and a natural choice in the development of software technology and applications. At present, the method of measurement and assessment of software trustworthin... Developing trusted softwares has become an important trend and a natural choice in the development of software technology and applications. At present, the method of measurement and assessment of software trustworthiness cannot guarantee safe and reliable operations of software systems completely and effectively. Based on the dynamical system study, this paper interprets the characteristics of be- haviors of software systems and the basic scientific problems of software trustworthiness complexity, analyzes the characteristics of complexity of software trustworthiness, and proposes to study the soft- ware trustworthiness measurement in terms of the complexity of software trustworthiness. Using the dynamical statistical analysis methods, the paper advances an invariant-measure based assessment method of software trustworthiness by statistical indices, and hereby provides a dynamical criterion for the untrustworthiness of software systems. By an example, the feasibility of the proposed dynamical statistical analysis method in software trustworthiness measurement is demonstrated using numerical simulations and theoretical analysis. 展开更多
关键词 software trustworthiness trustworthiness attributes dynamical system invariant-measure
原文传递
Finite-time disturbance attenuation of nonlinear systems 被引量:8
13
作者 MO LiPo JIA YingMin ZHENG ZhiMing 《Science in China(Series F)》 2009年第11期2163-2171,共9页
This paper is devoted to the finite-time disturbance attenuation problem of affine nonlinear systems. Based on the finite time Lyapunov stability theory, some finite-time H∞ performance criterions are derived. Then t... This paper is devoted to the finite-time disturbance attenuation problem of affine nonlinear systems. Based on the finite time Lyapunov stability theory, some finite-time H∞ performance criterions are derived. Then the state-feedback control law is designed and the structure of such a controller is investigated. Furthermore, it is shown that the H∞ controller can also make the closed-loop system satisfy finite-time H∞ performance for nonlinear homogeneous systems. An example is provided to demonstrate the effectiveness of the presented results. 展开更多
关键词 finite-time disturbance attenuation nonlinear systems H∞ performance finite-time stability
原文传递
A MULTIVARIATE MULTIQUADRIC QUASI-INTERPOLATION WITH QUADRIC REPRODUCTION 被引量:3
14
作者 Renzhong Feng Xun Zhou 《Journal of Computational Mathematics》 SCIE CSCD 2012年第3期311-323,共13页
In this paper, by using multivariate divided differences to approximate the partial derivative and superposition, we extend the multivariate quasi-interpolation scheme based on dimension-splitting technique which can ... In this paper, by using multivariate divided differences to approximate the partial derivative and superposition, we extend the multivariate quasi-interpolation scheme based on dimension-splitting technique which can reproduce linear polynomials to the scheme quadric polynomials. Furthermore, we give the approximation error of the modified scheme. Our multivariate multiquadric quasi-interpolation scheme only requires information of lo- cation points but not that of the derivatives of approximated function. Finally, numerical experiments demonstrate that the approximation rate of our scheme is significantly im- proved which is consistent with the theoretical results. 展开更多
关键词 QUASI-INTERPOLATION Multiquadric functions Polynomial reproduction :Pn-exact A-discretization of :Da Approximation error.
原文传递
Dynamical characteristics of software trustworthiness and their evolutionary complexity 被引量:8
15
作者 ZHENG ZhiMing MA ShiLong +4 位作者 LI Wei WEI Wei JIANG Xin ZHANG ZhanLi GUO BingHui 《Science in China(Series F)》 2009年第8期1328-1334,共7页
Developing trusted softwares has become an important trend and a natural choice in the development of software technology and applications, and software trustworthiness modeling has become a prerequisite and necessary... Developing trusted softwares has become an important trend and a natural choice in the development of software technology and applications, and software trustworthiness modeling has become a prerequisite and necessary means. To discuss and explain the basic scientific problems in software trustworthiness and to establish theoretical foundations for software trustworthiness measurement, combining the ideas of dynamical system study, this paper studies evolutionary laws of software trustworthiness and the dynamical mechanism under the effect of various internal and external factors, and proposes dynamical models for software trustworthiness, thus, software trustworthiness can be considered as the statistical characteristics of behaviors of software systems in the dynamical and open environment. By analyzing two simple examples, the paper explains the relationship between the limit evolutionary behaviors of software trustworthiness attributes and dynamical system characteristics, and interprets the dynamical characteristics of software trustworthiness and their evolutionary complexity. 展开更多
关键词 software trustworthiness trustworthiness attributes evolutionary complexity dynamical system
原文传递
A survey on federated learning:a perspective from multi-party computation 被引量:4
16
作者 Fengxia LIU Zhiming ZHENG +2 位作者 Yexuan SHI Yongxin TONG Yi ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第1期93-103,共11页
Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw datasets.To enhance privacy in federated learning,multi-party comp... Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw datasets.To enhance privacy in federated learning,multi-party computation can be leveraged for secure communication and computation during model training.This survey provides a comprehensive review on how to integrate mainstream multi-party computation techniques into diverse federated learning setups for guaranteed privacy,as well as the corresponding optimization techniques to improve model accuracy and training efficiency.We also pinpoint future directions to deploy federated learning to a wider range of applications. 展开更多
关键词 sfederated learning multi-party ycomputation privacy-preserving data mining distributed learning
原文传递
Lie Subalgebras in a Certain Operator Lie Algebra with Involution 被引量:1
17
作者 Shan Li SUN Xue Feng MA 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2011年第8期1521-1534,共14页
We show in a certain Lie-algebra, the connections between the Lie subalgebra G+ := G-t-G* 4- [G, G*], generated by a Lie subalgebra G, and the properties of G. This allows us to investigate some useful information... We show in a certain Lie-algebra, the connections between the Lie subalgebra G+ := G-t-G* 4- [G, G*], generated by a Lie subalgebra G, and the properties of G. This allows us to investigate some useful information about the structure of such two Lie subalgehras. Some results on the relations between the two Lie subalgebras are obtained. As an application, we get the following conclusion: Let ,4 C /3(2d) be a space of self-adjoint operators and L: := A ~ i^4 the corresponding complex Lie*-algebra. G+ = G 4- G* 4- [G, G*] and G are two LM-decomposable Lie subalgebras of L: with the decomposition 6+ = 7^(6+) 4- S, G -- T~~ 4- 86, and T^6 C T^(6+). Then 6+ is ideally finite iff T~ := 7~6 4- ~ 4- [T^6,7~] is a quasisolvable Lie subalgebra, S^- := 86 4- S~ 4- [$6, $~] is an ideally finite semisimple Lie subalgebra, and [7~6,86] = [R.~, 86] = {0}. 展开更多
关键词 Skew operator generalized scalar operator E-solvable Lie algebra ideally finite
原文传递
The W3C Data Catalog Vocabulary,Version 2:Rationale,Design Principles,and Uptake 被引量:2
18
作者 Riccardo Albertoni David Browning +3 位作者 Simon Cox Alejandra N.Gonzalez-Beltran Andrea Perego Peter Winstanley 《Data Intelligence》 EI 2024年第2期457-487,共31页
DCAT is an RDF vocabulary designed to facilitate interoperability between data catalogs published on the Web.Since its first release in 2014 as a W3C Recommendation,DCAT has seen a wide adoption across communities and... DCAT is an RDF vocabulary designed to facilitate interoperability between data catalogs published on the Web.Since its first release in 2014 as a W3C Recommendation,DCAT has seen a wide adoption across communities and domains,particularly in conjunction with implementing the FAIR data principles(forfindable,accessible,interoperable and reusable data).These implementation experiences,besides demonstrating the fitness of DCAT to meet its intended purpose,helped identify existing issues and gaps.Moreover,over the last few years,additional requirements emerged in data catalogs,given the increasing practice of documenting not only datasets but also data services and APls.This paper illustrates the new version of DCAT,explaining the rationale behind its main revisions and extensions,based on the collected use cases and requirements,and outlines the issues yet to be addressed in future versions of DCAT. 展开更多
关键词 Data Catalogs INTEROPERABILITY Discoverability FAIR data
原文传递
Learning to detect subway arrivals for passengers on a train 被引量:1
19
作者 Kuifei YU Hengshu ZHU +4 位作者 Huanhuan CAO Baoxian ZHANG Enhong CHEN Jilei TIAN Jinghai RAO 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第2期316-329,共14页
The use of traditional positioning technologies, such as GPS and wireless local positioning, rely on un- derlying infrastructure. However, in a subway environment, such positioning systems are not available for the po... The use of traditional positioning technologies, such as GPS and wireless local positioning, rely on un- derlying infrastructure. However, in a subway environment, such positioning systems are not available for the position- ing tasks, such as the detection of the train arrivals for the passengers in the train. An alternative approach is to exploit the contextual information available in the mobile devices of subway riders to detect train arrivals. To this end, we pro- pose to exploit multiple contextual features extracted from the mobile devices of subway riders to precisely detecting train arrivals. Following this line, we first investigate poten- tial contextual features which may be effective to detect train arrivals according to the observations from 3D accelerome- ters and GSM radio. Furthermore, we propose to explore the maximum entropy (MaxEnt) model for training a train ar- rival detector by learning the correlation between contextual features and train arrivals. Finally, we perform extensive ex- periments on several real-world data sets collected from two major subway lines in the Beijing subway system. Experi- mental results validate both the effectiveness and efficiency of the proposed approach. 展开更多
关键词 subway arrival detection mobile users smartcities information storage and retrieval EXPERIMENTATION
原文传递
A Survey of Hidden Convex Optimization
20
作者 Yong Xia 《Journal of the Operations Research Society of China》 EI CSCD 2020年第1期1-28,共28页
Motivated by the fact that not all nonconvex optimization problems are difficult to solve,we survey in this paper three widely used ways to reveal the hidden convex structure for different classes of nonconvex optimiz... Motivated by the fact that not all nonconvex optimization problems are difficult to solve,we survey in this paper three widely used ways to reveal the hidden convex structure for different classes of nonconvex optimization problems.Finally,ten open problems are raised. 展开更多
关键词 Convex programming Quadratic programming Quadratic matrix programming Fractional programming Lagrangian dual Semidefinite programming
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部