-
Chapter and Conference Paper
Modeling Dynamic System by Recurrent Neural Network with State Variables
A study is performed to investigate the state evolution of a kind of recurrent neural network. The state variable in the neural system summarize the information of external excitation and initial state, and de...
-
Chapter and Conference Paper
A Novel Individual Blood Glucose Control Model Based on Mixture of Experts Neural Networks
An individual blood glucose control model (IBGCM) based on the Mixture of Experts (MOE) neural networks algorithm was designed to improve the diabetic care. MOE was first time used to integrate multiple indivi...
-
Chapter and Conference Paper
A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security
Intrusion detection is an important technique in the defense-in-depth network security framework and a hot topic in computer security in recent years. In this paper, a new intrusion detection method based on P...
-
Chapter and Conference Paper
Localized Recursive Estimation in Wireless Sensor Networks
This paper proposes a localized recursive estimation scheme for parameter estimation in wireless sensor networks. Given any parameter occurred at some location and time, a number of sensors recursively estimat...
-
Chapter and Conference Paper
Multisensors Information Fusion with Neural Networks for Noninvasive Blood Glucose Detection
A multisensors information fusion model (MIFM) based on the Mixture of Experts (ME) neural networks was designed to fuse the multi-sensors signals for infrared noninvasive blood glucose detection. ME algorithm...
-
Chapter and Conference Paper
Worst and Best Information Exposure Paths in Wireless Sensor Networks
This paper proposes the concept of information exposure for a point and for a path based on estimation theory. The information exposure of a point is defined as the probability that the absolute value of estim...
-
Chapter and Conference Paper
Efficient Group Key Management for Dynamic Peer Networks
In dynamic peer networks, how to promote the performance of group key management without sacrificing the desired security is a critical and difficult problem. In this paper, a secure, efficient and distributed...
-
Chapter and Conference Paper
Adaptive Neural Network Control for Nonlinear Systems Based on Approximation Errors
A stable adaptive neural network control approach is proposed in this paper for uncertain nonlinear strict-feedback systems based on backstep**. The key assumptions are that the neural network approximation ...
-
Chapter and Conference Paper
Nonlinear System Adaptive Control by Using Multiple Neural Network Models
Multiple radial based function (RBF)neural network models are used to cover the uncertainty of time variant nonlinear system, and multiple element controllers are set up based on the multiple RBF models. At ev...
-
Chapter and Conference Paper
Estimation of the Future Earthquake Situation by Using Neural Networks Ensemble
Earthquakes will do great harms to the people, to estimate the future earthquake situation in Chinese mainland is still an open issue. There have been previous attempts to solve this problem by using artificia...
-
Chapter and Conference Paper
Sensor Density for Complete Information Coverage in Wireless Sensor Networks
Coverage is a very important issue in wireless sensor networks. Current literature defines a point to be covered if it is within the sensing radius of at least one sensor. This is a conservative definition of ...
-
Chapter and Conference Paper
Traffic Volume Forecasting Based on Wavelet Transform and Neural Networks
This paper focuses on traffic volume forecasting that is an essential component of any responsive traffic control or route guidance system. A new approach for traffic volume prediction is proposed based on wav...
-
Chapter and Conference Paper
Stochastically Consistent Caching and Dynamic Duty Cycling for Erratic Sensor Sources
We present a novel dynamic duty cycling scheme to maintain stochastic consistency for caches in sensor networks. To reduce transmissions, base stations often maintain caches for erratically changing sensor sou...
-
Chapter and Conference Paper
Cooperative Grid Jobs Scheduling with Multi-objective Genetic Algorithm
Job scheduling on computational grids is a key problem in large scale grid-based applications for solving complex problems. The aim is to obtain an efficient scheduler able to allocate dependable jobs originat...
-
Chapter and Conference Paper
Appearance-Based Map Learning for Mobile Robot by Using Generalized Regression Neural Network
Regression analysis between features of high-dimension is receiving attention in environmental learning of mobile robot. In this paper, we propose a novel framework, namely General regression neural network (G...
-
Chapter and Conference Paper
Soft-Sensor Method Based on Least Square Support Vector Machines Within Bayesian Evidence Framework
Based on the character and requirement of the dynamic weighing of loader, the soft sensor technique was adapted as the weighing method, and the least square support vector machine (LS-SVM) as its modelling met...
-
Chapter and Conference Paper
Loss Tomography in Wireless Sensor Network Using Gibbs Sampling
The internal link performance inference has become an increasingly important issue in operating and evaluating a sensor network. Since it is usually impractical to directly monitor each node or link in the wir...
-
Chapter and Conference Paper
Analog Circuit Fault Fusion Diagnosis Method Based on Support Vector Machine
Lack of fault samples and statistic characteristic of artificial neural network, which restrict its more development and application in fault diagnosis. Support Vector Machine (SVM) is a machine – learning alg...
-
Chapter and Conference Paper
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes the HMAC/NMAC-MD5 from HMAC/NMAC with a random function. The attack needs 297 quer...
-
Chapter and Conference Paper
Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1
In this paper, we present a new distinguishing attack which works for secret prefix MAC based on 65-step (12-76) SHA-1. By birthday paradox, we first guarantee the existence of an internal collision at the out...