This paper proposes an improved method to segment tree image based on color and texture feature and amends the segmented result by mathematical morphology. The crown and trunk of one tree have been successfully segmen...This paper proposes an improved method to segment tree image based on color and texture feature and amends the segmented result by mathematical morphology. The crown and trunk of one tree have been successfully segmented and the experimental result is deemed effective. The authors conclude that building a standard data base for a range of species, featuring color and texture is a necessary condition and constitutes the essential groundwork for tree image segmentation in order to insure its quality.展开更多
The ESeal Calculus is a secure mobile calculus based on Seal Calculus. By using open\|channels, ESeal Calculus makes it possible to communicate between any two arbitrary seals with some secure restrictions. It improve...The ESeal Calculus is a secure mobile calculus based on Seal Calculus. By using open\|channels, ESeal Calculus makes it possible to communicate between any two arbitrary seals with some secure restrictions. It improves the expression ability and efficiency of Seal calculus without losing security.展开更多
As a special subject in the research on information diffusion mechanism in knowledge discovery field, the author presents a new method on deciding to reserve or abandon and understanding the Exception Rule, which is t...As a special subject in the research on information diffusion mechanism in knowledge discovery field, the author presents a new method on deciding to reserve or abandon and understanding the Exception Rule, which is to analyze the changing trend of three parameters(the support, confidence and LS),combining with the analysis of the historical changing trend of the support of the former and latter part of the Rule, in order to receive the acceptable rule and help users to fully understand them, and use them appropriately. This research has a significant effect on the post-disposal of knowledge discovery and its realizability and practicability.展开更多
With the increasing complexity of industrial application, an embedded control system (ECS) requires processing a number of hard real-time tasks and needs fault-tolerance to assure high reliability. Considering the cha...With the increasing complexity of industrial application, an embedded control system (ECS) requires processing a number of hard real-time tasks and needs fault-tolerance to assure high reliability. Considering the characteristics of real-time tasks in ECS, an integrated algorithm is proposed to schedule real-time tasks and to guarantee that all real-time tasks are completed before their deadlines even in the presence of faults. Based on the nonpreemptive critical-section protocol (NCSP), this paper analyzes the blocking time introduced by resource conflicts of relevancy tasks in fault-tolerant multiprocessor systems. An extended schedulability condition is presented to check the assignment feasibility of a given task to a processor. A primary/backup approach and on-line replacement of failed processors are used to tolerate processor failures. The analysis reveals that the integrated algorithm bounds the blocking time, requires limited overhead on the number of processors, and still assures good processor utilization. This is also demonstrated by simulation results. Both analysis and simulation show the effectiveness of the proposed algorithm in ECS.展开更多
Changes and reconfiguration of information systems(ISs)are two kernel concepts of rapidil reconfigurable in-formation system(RRIS).It is the abilitise to evolve with changes that make RRIS superior to the traditional ...Changes and reconfiguration of information systems(ISs)are two kernel concepts of rapidil reconfigurable in-formation system(RRIS).It is the abilitise to evolve with changes that make RRIS superior to the traditional ISs.Hierarchical architecture of RRIS is put forward.And then a component-based framework of RRIS is discussed including its building and designing in detail.展开更多
Edge detection is a fundamental issue in image analysis. This paper proposes multirate algorithms for efficient implementation of edge detector, and a design example is illustrated.The multirate (decimation and/or int...Edge detection is a fundamental issue in image analysis. This paper proposes multirate algorithms for efficient implementation of edge detector, and a design example is illustrated.The multirate (decimation and/or interpolation) signal processing algorithms can achieve considerable savings in computation and storage. The proposed algorithms result in mapping relations of their z-transfer functions between non-multirate and multirate mathematical expressions in terms of time-varying coefficient instead of traditional polyphase decomposition counterparts.The mapping properties can be readily utilized to efficiently analyze and synthesize multirate edge detection filters. The Very high-speed Hardware Description Language (VHDL) simulation results verify efficiency of the algorithms for real-time Field Programmable Gate-Array (FPGA)implementation.展开更多
A fault diagnosis method of knowledge based fuzzy neural network is proposed for complex process, which is hard to develop practical mathematical model. Fault detection is performed through a knowledge based system, w...A fault diagnosis method of knowledge based fuzzy neural network is proposed for complex process, which is hard to develop practical mathematical model. Fault detection is performed through a knowledge based system, where fault detection heuristic rules have been generated from deep and shallow knowledge of the process. The fuzzy neural network performs the fault diagnosis task. This method does not need practical mathematical models of objects, so it is a strong implement for complex process.展开更多
A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parame...A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parameter of the transmitter, which is in chaotic state. In the receiver, a proportional integral feedback demodulator is used to demodulate the information signal, which only uses the available synchronizing error as well as stateness of receiver. The purpose of this demodulator is proposed to overcome the influence of differentiation operation, nonlinear part and singularities in chaotic system. Numerical simulation is proposed to show the effectiveness of this demodulator.展开更多
嵌入式系统应用于自动控制领域时,往往对实时性和可靠性要求严格,如飞行控制、汽车自动刹车等,如果响应不及时,可能产生灾难性后果。随着应用对象复杂性的增加,嵌入式控制系统ECS(Embedded Control System)通常由多处理机构成,包...嵌入式系统应用于自动控制领域时,往往对实时性和可靠性要求严格,如飞行控制、汽车自动刹车等,如果响应不及时,可能产生灾难性后果。随着应用对象复杂性的增加,嵌入式控制系统ECS(Embedded Control System)通常由多处理机构成,包含一组实时任务。展开更多
基金Supported by the National Natural Science Foundation of China (Grant No. 30271079) and Graduate Cultivation Foundation of Beijing Forestry University
文摘This paper proposes an improved method to segment tree image based on color and texture feature and amends the segmented result by mathematical morphology. The crown and trunk of one tree have been successfully segmented and the experimental result is deemed effective. The authors conclude that building a standard data base for a range of species, featuring color and texture is a necessary condition and constitutes the essential groundwork for tree image segmentation in order to insure its quality.
文摘The ESeal Calculus is a secure mobile calculus based on Seal Calculus. By using open\|channels, ESeal Calculus makes it possible to communicate between any two arbitrary seals with some secure restrictions. It improves the expression ability and efficiency of Seal calculus without losing security.
文摘As a special subject in the research on information diffusion mechanism in knowledge discovery field, the author presents a new method on deciding to reserve or abandon and understanding the Exception Rule, which is to analyze the changing trend of three parameters(the support, confidence and LS),combining with the analysis of the historical changing trend of the support of the former and latter part of the Rule, in order to receive the acceptable rule and help users to fully understand them, and use them appropriately. This research has a significant effect on the post-disposal of knowledge discovery and its realizability and practicability.
文摘With the increasing complexity of industrial application, an embedded control system (ECS) requires processing a number of hard real-time tasks and needs fault-tolerance to assure high reliability. Considering the characteristics of real-time tasks in ECS, an integrated algorithm is proposed to schedule real-time tasks and to guarantee that all real-time tasks are completed before their deadlines even in the presence of faults. Based on the nonpreemptive critical-section protocol (NCSP), this paper analyzes the blocking time introduced by resource conflicts of relevancy tasks in fault-tolerant multiprocessor systems. An extended schedulability condition is presented to check the assignment feasibility of a given task to a processor. A primary/backup approach and on-line replacement of failed processors are used to tolerate processor failures. The analysis reveals that the integrated algorithm bounds the blocking time, requires limited overhead on the number of processors, and still assures good processor utilization. This is also demonstrated by simulation results. Both analysis and simulation show the effectiveness of the proposed algorithm in ECS.
文摘Changes and reconfiguration of information systems(ISs)are two kernel concepts of rapidil reconfigurable in-formation system(RRIS).It is the abilitise to evolve with changes that make RRIS superior to the traditional ISs.Hierarchical architecture of RRIS is put forward.And then a component-based framework of RRIS is discussed including its building and designing in detail.
文摘Edge detection is a fundamental issue in image analysis. This paper proposes multirate algorithms for efficient implementation of edge detector, and a design example is illustrated.The multirate (decimation and/or interpolation) signal processing algorithms can achieve considerable savings in computation and storage. The proposed algorithms result in mapping relations of their z-transfer functions between non-multirate and multirate mathematical expressions in terms of time-varying coefficient instead of traditional polyphase decomposition counterparts.The mapping properties can be readily utilized to efficiently analyze and synthesize multirate edge detection filters. The Very high-speed Hardware Description Language (VHDL) simulation results verify efficiency of the algorithms for real-time Field Programmable Gate-Array (FPGA)implementation.
文摘A fault diagnosis method of knowledge based fuzzy neural network is proposed for complex process, which is hard to develop practical mathematical model. Fault detection is performed through a knowledge based system, where fault detection heuristic rules have been generated from deep and shallow knowledge of the process. The fuzzy neural network performs the fault diagnosis task. This method does not need practical mathematical models of objects, so it is a strong implement for complex process.
文摘A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parameter of the transmitter, which is in chaotic state. In the receiver, a proportional integral feedback demodulator is used to demodulate the information signal, which only uses the available synchronizing error as well as stateness of receiver. The purpose of this demodulator is proposed to overcome the influence of differentiation operation, nonlinear part and singularities in chaotic system. Numerical simulation is proposed to show the effectiveness of this demodulator.