The aim of this paper is to propose a threat assessment method based on intuitionistic fuzzy measurement reasoning with orientaion to deal with the shortcomings of the method proposed in [Ying-Jie Lei et al., Journal ...The aim of this paper is to propose a threat assessment method based on intuitionistic fuzzy measurement reasoning with orientaion to deal with the shortcomings of the method proposed in [Ying-Jie Lei et al., Journal of Electronics and Information Technology 29(9)(2007)2077-2081] and [Dong-Feng Chen et al., Procedia Engineering 29(5)(2012)3302-3306] the ignorance of the influence of the intuitionistic index's orientation on the membership functions in the reasoning, which caused partial information loss in reasoning process. Therefore, we present a 3D expression of intuitionistic fuzzy similarity measurement, make an analysis of the constraints for intuitionistic fuzzy similarity measurement, and redefine the intuitionistic fuzzy similarity measurement. Moreover, in view of the threat assessment problem, we give the system variables of attribute function and assessment index, set up the reasoning system based on intuitionistic fuzzy similarity measurement with orientation, and design the reasoning rules, reasoning algorithms and fuzzy-resolving algorithms. Finally, through the threat assessment, some typical examples are cited to verify the validity and superiority of the method.展开更多
The phase difference method (PDM) is presented for the direction of arrival (DOA) estimation of the narrowband source. It estimates the DOA by measuring the reciprocal of the phase range of the sensor output spectra a...The phase difference method (PDM) is presented for the direction of arrival (DOA) estimation of the narrowband source. It estimates the DOA by measuring the reciprocal of the phase range of the sensor output spectra at the interest frequency bin. The peak width and variance of the PDM are presented. The PDM can distinguish closely spaced sources with different and unknown center frequencies as long as they are separated with at least one frequency bin. The simulation results show that the PDM has a better resolution than that of the conventional beamforming.展开更多
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel...Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity.展开更多
Particle size distribution of coarse aggregates through mechanical sieving gives results in terms of cumu- lative mass percent. But digital image processing generated size distribution of particles, while being fast a...Particle size distribution of coarse aggregates through mechanical sieving gives results in terms of cumu- lative mass percent. But digital image processing generated size distribution of particles, while being fast and accurate, is often expressed in terms of area function or number of particles. In this paper, a mass model is developed which converts the image obtained size distribution to mass-wise distribution, mak- ing it readily comparable to mechanical sieving data. The concept of weight/particle ratio is introduced for mass reconstruction from 2D images of particle aggregates. Using this mass model, the effects of several particle shape parameters (such as major axis, minor axis, and equivalent diameter) on sieve-size of the particles is studied. It is shown that the sieve-size of a particle strongly depend upon the shape param- eters, 91% of its variation being explained by major axis, minor axis, bounding box length and equivalent diameter. Furthermore, minor axis gives an overall accurate estimate of particle sieve-size, error in mean size (D-50) being just 0.4%. However, sieve-size of smaller particles (〈20 ram) strongly depends upon the length of the smaller arm of the bounding box enclosing them and sieve-sizes of larger particles (〉20 mm) are highly correlated to their equivalent diameters. Multiple linear regression analysis has been used to generate overall mass-wise particle size distribution, considering the influences of all these shape parameters on particle sieve-size. Multiple linear regression generated overall mass-wise particle size distribution shows a strong correlation with sieve generated data. The adjusted R-square value of the regression analysis is found to be 99 percent (w.r,t cumulative frequency). The method proposed in this paper provides a time-efficient way of producing accurate (up to 99%) mass-wise PSD using digital image processing and it can be used effectively to renlace the mechanical sieving.展开更多
Both right and left ventricles are developed from two adjacent segments of the primary heart tube. Though they are different with regard to shape and power, they mirror each other in terms of behavior. This is the fir...Both right and left ventricles are developed from two adjacent segments of the primary heart tube. Though they are different with regard to shape and power, they mirror each other in terms of behavior. This is the first level of symmetry in cardiac function assessment. Both cardiac muscle contraction and relaxation are active. This constructs the second level of symmetry in cardiac function assessment. Combination of the two levels will help to find some hidden indexes or approaches to evaluate cardiac function. In this article, four major indexes from echocardiography were analyzed under this principal, another seventeen indexes or measurement approaches came out of the shadow, which is very helpful in the assessment of cardiac function, especially for the right cardiac function and diastolic cardiac function.展开更多
基金supported by The Foundation of State Key Laboratory of Astronautic Dynamics of China under Grant No.2012ADL-DW0301The National Natural Science Foundation of China under Grant Nos.61272011,61179010 and 60773209+1 种基金The Natural Science Foundation of Shaanxi Province of China under Grant Nos.2013JQ8035 and 2006F18The Postdoctoral Science Foundation of China under Grant No.2013M542331
文摘The aim of this paper is to propose a threat assessment method based on intuitionistic fuzzy measurement reasoning with orientaion to deal with the shortcomings of the method proposed in [Ying-Jie Lei et al., Journal of Electronics and Information Technology 29(9)(2007)2077-2081] and [Dong-Feng Chen et al., Procedia Engineering 29(5)(2012)3302-3306] the ignorance of the influence of the intuitionistic index's orientation on the membership functions in the reasoning, which caused partial information loss in reasoning process. Therefore, we present a 3D expression of intuitionistic fuzzy similarity measurement, make an analysis of the constraints for intuitionistic fuzzy similarity measurement, and redefine the intuitionistic fuzzy similarity measurement. Moreover, in view of the threat assessment problem, we give the system variables of attribute function and assessment index, set up the reasoning system based on intuitionistic fuzzy similarity measurement with orientation, and design the reasoning rules, reasoning algorithms and fuzzy-resolving algorithms. Finally, through the threat assessment, some typical examples are cited to verify the validity and superiority of the method.
基金the National Science Foundation under Grant No. 60672136the the Doctorate Foundation of Northwestern Polytechnical University under Grant No.CX200803
文摘The phase difference method (PDM) is presented for the direction of arrival (DOA) estimation of the narrowband source. It estimates the DOA by measuring the reciprocal of the phase range of the sensor output spectra at the interest frequency bin. The peak width and variance of the PDM are presented. The PDM can distinguish closely spaced sources with different and unknown center frequencies as long as they are separated with at least one frequency bin. The simulation results show that the PDM has a better resolution than that of the conventional beamforming.
基金partly supported by National Natural Science Foundation of China (NSFC grant numbers: 61202110 and 61502205)the project of Jiangsu provincial Six Talent Peaks (Grant numbers: XYDXXJS-016)
文摘Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid development of information technology and software industry, most of the software has not been rigorously tested before being put in use, so that the hidden vulnerabilities in software will be exploited by the attackers. Therefore, it is of great significance for us to actively de- tect the software vulnerabilities in the security maintenance of information systems. In this paper, we firstly studied some of the common- ly used vulnerability detection methods and detection tools, and analyzed the advantages and disadvantages of each method in different scenarios. Secondly, we designed a set of eval- uation criteria for different mining methods in the loopholes evaluation. Thirdly, we also proposed and designed an integration testing framework, on which we can test the typical static analysis methods and dynamic mining methods as well as make the comparison, so that we can obtain an intuitive comparative analysis for the experimental results. Final- ly, we reported the experimental analysis to verify the feasibility and effectiveness of the proposed evaluation method and the testingframework, with the results showing that the final test results will serve as a form of guid- ance to aid the selection of the most appropri- ate and effective method or tools in vulnera- bility detection activity.
基金Indian Institute of Technology,Kharagpur in India for supporting this work
文摘Particle size distribution of coarse aggregates through mechanical sieving gives results in terms of cumu- lative mass percent. But digital image processing generated size distribution of particles, while being fast and accurate, is often expressed in terms of area function or number of particles. In this paper, a mass model is developed which converts the image obtained size distribution to mass-wise distribution, mak- ing it readily comparable to mechanical sieving data. The concept of weight/particle ratio is introduced for mass reconstruction from 2D images of particle aggregates. Using this mass model, the effects of several particle shape parameters (such as major axis, minor axis, and equivalent diameter) on sieve-size of the particles is studied. It is shown that the sieve-size of a particle strongly depend upon the shape param- eters, 91% of its variation being explained by major axis, minor axis, bounding box length and equivalent diameter. Furthermore, minor axis gives an overall accurate estimate of particle sieve-size, error in mean size (D-50) being just 0.4%. However, sieve-size of smaller particles (〈20 ram) strongly depends upon the length of the smaller arm of the bounding box enclosing them and sieve-sizes of larger particles (〉20 mm) are highly correlated to their equivalent diameters. Multiple linear regression analysis has been used to generate overall mass-wise particle size distribution, considering the influences of all these shape parameters on particle sieve-size. Multiple linear regression generated overall mass-wise particle size distribution shows a strong correlation with sieve generated data. The adjusted R-square value of the regression analysis is found to be 99 percent (w.r,t cumulative frequency). The method proposed in this paper provides a time-efficient way of producing accurate (up to 99%) mass-wise PSD using digital image processing and it can be used effectively to renlace the mechanical sieving.
文摘Both right and left ventricles are developed from two adjacent segments of the primary heart tube. Though they are different with regard to shape and power, they mirror each other in terms of behavior. This is the first level of symmetry in cardiac function assessment. Both cardiac muscle contraction and relaxation are active. This constructs the second level of symmetry in cardiac function assessment. Combination of the two levels will help to find some hidden indexes or approaches to evaluate cardiac function. In this article, four major indexes from echocardiography were analyzed under this principal, another seventeen indexes or measurement approaches came out of the shadow, which is very helpful in the assessment of cardiac function, especially for the right cardiac function and diastolic cardiac function.