Search results for: Zhiyong Zheng
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 180

Search results for: Zhiyong Zheng

180 Optimization of Commercial Gray Space along the Street from the Perspective of Vitality Construction

Authors: Mengjiao Hu

Abstract:

Nowadays, China's consumption pattern is entering the "experience era"; people's consumption behavior is no longer simply "buy, buy, buy" but the transition from "consumption in space" to "consumption of space". The street is a basic public product and an important public space in the city, and commerce along the street is an important space for people to consume in the "experience era". Therefore, in this way, it is particularly important to create the vitality of the gray space along the street. From the perspective of vitality construction, this paper takes Sha Zheng Street in Chongqing as the empirical object, combined with the theoretical knowledge of behavioral architecture, and based on the current situation of the commercial gray space along Sha Zheng Street, this paper explores the influence factors and the constraints behind the spatial vitality and then puts forward a general strategy to improve the spatial vitality of the commercial gray space along the street. The author hopes that through the exploration of the vitality of commercial gray space along the street, environmental design can be introduced into the integrated design vision of the urban public environment, and the urban designers can be inspired to create a street environment with a living atmosphere with a small start.

Keywords: vitality creation, gray space, street commerce, sha zheng street

Procedia PDF Downloads 100
179 A Multi-Stage Learning Framework for Reliable and Cost-Effective Estimation of Vehicle Yaw Angle

Authors: Zhiyong Zheng, Xu Li, Liang Huang, Zhengliang Sun, Jianhua Xu

Abstract:

Yaw angle plays a significant role in many vehicle safety applications, such as collision avoidance and lane-keeping system. Although the estimation of the yaw angle has been extensively studied in existing literature, it is still the main challenge to simultaneously achieve a reliable and cost-effective solution in complex urban environments. This paper proposes a multi-stage learning framework to estimate the yaw angle with a monocular camera, which can deal with the challenge in a more reliable manner. In the first stage, an efficient road detection network is designed to extract the road region, providing a highly reliable reference for the estimation. In the second stage, a variational auto-encoder (VAE) is proposed to learn the distribution patterns of road regions, which is particularly suitable for modeling the changing patterns of yaw angle under different driving maneuvers, and it can inherently enhance the generalization ability. In the last stage, a gated recurrent unit (GRU) network is used to capture the temporal correlations of the learned patterns, which is capable to further improve the estimation accuracy due to the fact that the changes of deflection angle are relatively easier to recognize among continuous frames. Afterward, the yaw angle can be obtained by combining the estimated deflection angle and the road direction stored in a roadway map. Through effective multi-stage learning, the proposed framework presents high reliability while it maintains better accuracy. Road-test experiments with different driving maneuvers were performed in complex urban environments, and the results validate the effectiveness of the proposed framework.

Keywords: gated recurrent unit, multi-stage learning, reliable estimation, variational auto-encoder, yaw angle

Procedia PDF Downloads 142
178 A Sustainable Society and Its Order Principles: Implications of Common Grace and the Man as the Image of God

Authors: Wenfu Zheng, Guanghe Zheng

Abstract:

The discussion on the social sustainability in existing literature is limited to two-dimension epistemology space with only two elements: the human and nature. Using the revelation of the Bible God, the paper adds a moral component to the two-dimension space. With the new variable being introduced, the authors formulate a to three-dimension epistemology space and discuss its implications. Based on the space, the authors explore the hierarchical structure of order principles for a sustainable society. The social order principle system hierarchically consists of three principles: moral, relational, and rational. The justification of every principle is analyzed briefly. The paper concluded that all these order principles are necessary assurance of building a sustainable society.

Keywords: common grace, saving grace, sustainable society, the image of God

Procedia PDF Downloads 192
177 An Investigation of the Pharmacomechanisms of Shang-Han Lun Formulas as Elucidated in the Qing Dynasty Classic 'Ben-Jing Shu-Zheng'

Authors: William Ceurvels, Dong-Di Zhang

Abstract:

The true nature of the mechanism by which the pharmaceuticals of the Shang-Han Lun act has been a topic of debate since Wuji Cheng published the first commentary during the Northern Song. Subsequent commentaries employed a number of methodologies in their analysis of pharmaceutical mechanisms, but no commentator was able to garner universal acceptance. During the Qing Dynasty, the proliferation and development of Neo-Confucian scholarship produced a new generation of scholars possessed of rigorous and inventive research methods, one of whom was the famed materia medica scholar, Run-an Zou. Run-an Zou and his successor Zhou Yan advocated analyzing the mechanism of Treatise pharmaceuticals based upon the understanding of those pharmaceuticals during the time period in which the Treatise was written and thereby focused on the Han Dynasty materia medica tract Shen-nong Ben-cao Jing (The Divine Husbandman’s Herbal Foundation Canon). Zou Run-an’s commentary, Ben-jing Shu-zheng won nearly universal praise among materia medica scholars for its scholastic rigor and innovative research methods. However, because Ben-jing Shu-zheng only focuses on individual herbs, as opposed to formulas, its value in analyzing the Shang-Han Lun has limitations. The purpose of this study is to combine Zou Run-an’s single-pharmaceutical commentaries to generate theoretical full formula analyses to gain a fuller picture of Zou’s understanding of the healing mechanism of Shang-Han Lun formulas. Commentaries were gathered from Ben-jing Shu-zheng and Zhou Yan’s Ben-cao Si-bian Lun and combined to produce theoretical full formula model mechanisms of Treatise formulas. Through this study, a new picture of the mechanistic basis of Shang-han formulas emerges, which is based on qi-xue changes as opposed to organ or meridian theory. The author hopes that this modest research study will be of service to scholars of the Shang-han and clinical doctors alike in their pursuit of the true pharmacomechanisms of this great Han dynasty tome.

Keywords: Materia medica, Shang-han Lun, Shen-nong Ben-cao Jing, neo-Confucian scholarship

Procedia PDF Downloads 318
176 Awareness of 'Psychosocial Restraint': A Proper Caring Attitude and Truly Listening to People with Dementia in the Hong Kong’S Residential Care Homes

Authors: Kenny Chi Man Chui

Abstract:

Background: In Chinese culture, the traditional equivalent term for English dementia is chi dai zheng, which, whether translated as ‘insanity’ or ‘idiocy’ carries a sharply negative connotation. In fact, even though the traditional name for dementia has evolved, from chi dai zheng to shi zhi zheng, nao tui hua zheng or ren zhi zhang ai zheng, educating the population about more respectful terms for the condition and promoting a positive understanding about people with dementia in society have proven to be time-intensive endeavors. By extension, the use of such terms promotes the perception that people with dementia undergo a ‘total loss of self’ or experience a ‘living death’ or ‘social death’. Both in Asia and elsewhere, the appropriate nomenclature for dementia remains controversial, and different medical and healthcare professionals in Hong Kong have taken various stances on how to refer to the condition there. Indeed, how this negative perception affects the interaction between people with dementia and the surrounding others? Methodology: Qualitative research with the concept of postmodernism, interpretivism, and Foucauldian theory was adopted as frameworks in applying participatory observations, in-depth interviews, and other qualitative methods. First, ten people with dementia—one man and nine women—living in two residential care homes in Hong Kong were interviewed, as were ten members of the care staff, all of whom were women. Next, to coach the staff in understanding the feelings and self-perceptions of people with dementia, two reflective training sessions were provided. Afterward, to assess the impact of the training sessions on the staff, two focus groups were held. Findings: The findings revealed that residents with dementia did not perceive themselves as being ‘demented’ and were confused by not getting responses from the others. From the understanding of care staff, they perceived the residents as being ‘demented’, desolate troublemakers. They described people with dementia as ‘naughty children’ who should be controlled and be punished while treated them as ‘psychiatric patients’ who could be ignored and be mute. “Psychosocial restraint” happened regarding the discrepancy of perception between people with dementia and the care staff. People with dementia did not think that their confusion of memory was related to dementia or, frankly speaking, they did not know what dementia was. When others treated them as ‘demented patients, the residents with mild to moderate dementia fiercely rejected that designation and reported a host of negative feelings, hence the fluctuations of mood and emotion noted by the care staff. Conclusion: As the findings revealed, the people with dementia were also discontent with the care arrangements in the care homes, felt abandoned by others and worried about bothering others. Their shifting emotional states and moods were treated as the Behavioral and Psychological symptoms of Dementia (BPSD), which nothing can do reported by the care staff in the residential care homes. People with dementia become social withdrawal or isolated in daily living, which should be alert and be changed by the social work professionals about the occurrence of “psychosocial restraint” in dementia care.

Keywords: psychosocial restraint, qualitative research, social work with dementitude, voice of people with dementia

Procedia PDF Downloads 177
175 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 168
174 The Influence of Machine Tool Composite Stiffness to the Surface Waviness When Processing Posture Constantly Switching

Authors: Song Zhiyong, Zhao Bo, Du Li, Wang Wei

Abstract:

Aircraft structures generally have complex surface. Because of constantly switching postures of motion axis, five-axis CNC machine’s composite stiffness changes during CNC machining. It gives rise to different amplitude of vibration of processing system, which further leads to the different effects on surface waviness. In order to provide a solution for this problem, we take the “S” shape test specimen’s CNC machining for the object, through calculate the five axis CNC machine’s composite stiffness and establish vibration model, we analysis of the influence mechanism between vibration amplitude and surface waviness. Through carry out the surface quality measurement experiments, verify the validity and accuracy of the theoretical analysis. This paper’s research results provide a theoretical basis for surface waviness control.

Keywords: five axis CNC machine, “S” shape test specimen, composite stiffness, surface waviness

Procedia PDF Downloads 390
173 Study of the Behavior of Geogrid Mechanically Stabilized Earth Walls Under Cyclic Loading

Authors: Yongzhe Zhao, Ying Liu, Zhiyong Liu, Hui You

Abstract:

The soil behind retaining wall is normally subjected to cyclic loading, for example traffic loading. Geotextile has been widely used to reinforce the soil for the purpose of reducing the settlement of the soil. A series of physical model tests were performed to investigate the settlement of footing under cyclic loading. The settlement of the footing, ground deformation and the vertical earth pressure in subsoil were presented and discussed under different types of geotextiles. The results indicate that including geotextiles significantly decreases the footing settlement and the stiffer the geotextile, the less the settlement. Under cyclic loading, the soil below the footing shows dilation within certain depths and beyond that it experiences contraction. The location of footing relative to the retaining wall has important effects on the deformation behavior of the soil in the ground, and the closer the footing to the retaining wall, the greater the contraction soil shows. This is because the retaining wall experienced greater lateral displacement.

Keywords: physical model tests, reinforced retaining wall, cyclic loading, footing

Procedia PDF Downloads 155
172 An Experimental Investigation of Microscopic and Macroscopic Displacement Behaviors of Branched-Preformed Particle Gel in High Temperature Reservoirs

Authors: Weiyao Zhu, Bingbing Li, Yajing Liu, Zhiyong Song

Abstract:

Branched-preformed particle gel (B-PPG) is a newly developed profile control and oil displacement agent for enhanced oil recovery in major oilfields. To provide a better understanding of the performance of B-PPG in high temperature reservoirs, a comprehensive experimental investigation was conducted by utilizing glass micromodel and synthetic core. The microscopic experimental results show that the B-PPG can selectively flow and plug in large pores. In terms of enhanced oil recovery, the decrease of residual oil in the margin regions (24.6%) was higher than that in the main stream (13.7%), which indicates it enlarged the sweep area. In addition, the effects of B-PPG injection concentration and injection rate on enhanced oil recovery were implemented by core flooding. The macroscopic experimental results indicate that the enhanced oil recovery increased with the increasing of injection concentration. However, the injection rate had a peak value. It is significant to get insight into the behaviors of B-PPG in reservoirs.

Keywords: branched-preformed particle gel, enhanced oil recovery, micromodel, core flooding

Procedia PDF Downloads 198
171 Research and Development of Net-Centric Information Sharing Platform

Authors: Wang Xiaoqing, Fang Youyuan, Zheng Yanxing, Gu Tianyang, Zong Jianjian, Tong Jinrong

Abstract:

Compared with traditional distributed environment, the net-centric environment brings on more demanding challenges for information sharing with the characteristics of ultra-large scale and strong distribution, dynamic, autonomy, heterogeneity, redundancy. This paper realizes an information sharing model and a series of core services, through which provides an open, flexible and scalable information sharing platform.

Keywords: net-centric environment, information sharing, metadata registry and catalog, cross-domain data access control

Procedia PDF Downloads 570
170 Automated Testing to Detect Instance Data Loss in Android Applications

Authors: Anusha Konduru, Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

Mobile applications are increasing in a significant amount, each to address the requirements of many users. However, the quick developments and enhancements are resulting in many underlying defects. Android apps create and handle a large variety of 'instance' data that has to persist across runs, such as the current navigation route, workout results, antivirus settings, or game state. Due to the nature of Android, an app can be paused, sent into the background, or killed at any time. If the instance data is not saved and restored between runs, in addition to data loss, partially-saved or corrupted data can crash the app upon resume or restart. However, it is difficult for the programmer to manually test this issue for all the activities. This results in the issue of data loss that the data entered by the user are not saved when there is any interruption. This issue can degrade user experience because the user needs to reenter the information each time there is an interruption. Automated testing to detect such data loss is important to improve the user experience. This research proposes a tool, DroidDL, a data loss detector for Android, which detects the instance data loss from a given android application. We have tested 395 applications and found 12 applications with the issue of data loss. This approach is proved highly accurate and reliable to find the apps with this defect, which can be used by android developers to avoid such errors.

Keywords: Android, automated testing, activity, data loss

Procedia PDF Downloads 237
169 Synthesis of Monocyclic, Bicyclic, and Benzocyclobutene Amino Endoperoxides through Visible Light Catalysis

Authors: Enoch Kudoahor, Nan Zheng

Abstract:

We describe the use of readily available self-doped TiO2 and visible light, under a mild condition to synthesize a class of monocyclic, bicyclic, and benzocyclobutene amino compounds containing the endoperoxide bridges; their derivatives and further test their effective clinical activities against malaria, cancer, and their resistances. Considering their stable under photooxidation conditions and recyclability, we use a self-doped TiO2 under a visible condition to synthesize these classes of amino endoperoxides. These amino endoperoxides are stable over a period compared to classes of endoperoxides.

Keywords: catalysis, endoperoxides, titanium dioxide, visible light

Procedia PDF Downloads 154
168 Intellectual Property Protection of CRISPR Related Technologies

Authors: Zheng Miao, Dennis Fernandez

Abstract:

CRISPR research has the potential to completely transform life science, agriculture, live-stock and the health care industry. The Intellectual Property derived from its research has raised significant attention in the academic as well as the biopharmaceutical industry culminating an urgent need for strategic IP protection. We review the rudimentary concepts and key competitors of CRISPR technologies as well as the paramount strategies for intellectual property protection. Further, we elaborate on prosecution issues related to CRISPR patents as well as possible solutions to various patent laws, interferences and litigation. Finally, we address how the bioinformatics of the CRISPR technology begs an inquiry into issues of privacy and a host of ethical concerns.

Keywords: bioinformatics, CRISPR, biotechnology, intellectual property

Procedia PDF Downloads 252
167 Damage Strain Analysis of Parallel Fiber Eutectic

Authors: Jian Zheng, Xinhua Ni, Xiequan Liu

Abstract:

According to isotropy of parallel fiber eutectic, the no- damage strain field in parallel fiber eutectic is obtained from the flexibility tensor of parallel fiber eutectic. Considering the damage behavior of parallel fiber eutectic, damage variables are introduced to determine the strain field of parallel fiber eutectic. The damage strains in the matrix, interphase, and fiber of parallel fiber eutectic are quantitatively analyzed. Results show that damage strains are not only associated with the fiber volume fraction of parallel fiber eutectic, but also with the damage degree.

Keywords: damage strain, initial strain, fiber volume fraction, parallel fiber eutectic

Procedia PDF Downloads 576
166 Design of Effective Decoupling Point in Build-To-Order Systems: Focusing on Trade-Off Relation between Order-To-Delivery Lead Time and Work in Progress

Authors: Zhiyong Li, Hiroshi Katayama

Abstract:

Since 1990s, e-commerce and internet business have been grown gradually over the word and customers tend to express their demand attributes in terms of specification requirement on parts, component, product structure etc. This paper deals with designing effective decoupling points for build to order systems under e-commerce environment, which can be realized through tradeoff relation analysis between two major criteria, customer order lead time and value of work in progress. These KPIs are critical for successful BTO business, namely time-based service effectiveness on coping with customer requirements for the first issue and cost effective ness with risk aversive operations for the second issue. Approach of this paper consists of investigation of successful business standing for BTO scheme, manufacturing model development of this scheme, quantitative evaluation of proposed models by calculation of two KPI values under various decoupling point distributions and discussion of the results brought by pattern of decoupling point distribution, where some cases provide the pareto optimum performances. To extract the relevant trade-off relation between considered KPIs among 2-dimensional resultant performance, useful logic developed by former research work, i.e. Katayama and Fonseca, is applied. Obtained characteristics are evaluated as effective information for managing BTO manufacturing businesses.

Keywords: build-to-order (BTO), decoupling point, e-commerce, order-to-delivery lead time (ODLT), work in progress (WIP)

Procedia PDF Downloads 325
165 Visual Search Based Indoor Localization in Low Light via RGB-D Camera

Authors: Yali Zheng, Peipei Luo, Shinan Chen, Jiasheng Hao, Hong Cheng

Abstract:

Most of traditional visual indoor navigation algorithms and methods only consider the localization in ordinary daytime, while we focus on the indoor re-localization in low light in the paper. As RGB images are degraded in low light, less discriminative infrared and depth image pairs are taken, as the input, by RGB-D cameras, the most similar candidates, as the output, are searched from databases which is built in the bag-of-word framework. Epipolar constraints can be used to relocalize the query infrared and depth image sequence. We evaluate our method in two datasets captured by Kinect2. The results demonstrate very promising re-localization results for indoor navigation system in low light environments.

Keywords: indoor navigation, low light, RGB-D camera, vision based

Procedia PDF Downloads 460
164 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps

Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li

Abstract:

With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.

Keywords: mobile computing, deep learning apps, sensitive information, static analysis

Procedia PDF Downloads 178
163 Optimal Decisions for Personalized Products with Demand Information Updating and Limited Capacity

Authors: Meimei Zheng

Abstract:

Product personalization could not only bring new profits to companies but also provide the direction of long-term development for companies. However, the characteristics of personalized product cause some new problems. This paper investigates how companies make decisions on the supply of personalized products when facing different customer attitudes to personalized product and service, constraints due to limited capacity and updates of personalized demand information. This study will provide optimal decisions for companies to develop personalized markets, resulting in promoting business transformation and improving business competitiveness.

Keywords: demand forecast updating, limited capacity, personalized products, optimization

Procedia PDF Downloads 262
162 A Quinary Coding and Matrix Structure Based Channel Hopping Algorithm for Blind Rendezvous in Cognitive Radio Networks

Authors: Qinglin Liu, Zhiyong Lin, Zongheng Wei, Jianfeng Wen, Congming Yi, Hai Liu

Abstract:

The multi-channel blind rendezvous problem in distributed cognitive radio networks (DCRNs) refers to how users in the network can hop to the same channel at the same time slot without any prior knowledge (i.e., each user is unaware of other users' information). The channel hopping (CH) technique is a typical solution to this blind rendezvous problem. In this paper, we propose a quinary coding and matrix structure-based CH algorithm called QCMS-CH. The QCMS-CH algorithm can guarantee the rendezvous of users using only one cognitive radio in the scenario of the asynchronous clock (i.e., arbitrary time drift between the users), heterogeneous channels (i.e., the available channel sets of users are distinct), and symmetric role (i.e., all users play a same role). The QCMS-CH algorithm first represents a randomly selected channel (denoted by R) as a fixed-length quaternary number. Then it encodes the quaternary number into a quinary bootstrapping sequence according to a carefully designed quaternary-quinary coding table with the prefix "R00". Finally, it builds a CH matrix column by column according to the bootstrapping sequence and six different types of elaborately generated subsequences. The user can access the CH matrix row by row and accordingly perform its channel, hoping to attempt rendezvous with other users. We prove the correctness of QCMS-CH and derive an upper bound on its Maximum Time-to-Rendezvous (MTTR). Simulation results show that the QCMS-CH algorithm outperforms the state-of-the-art in terms of the MTTR and the Expected Time-to-Rendezvous (ETTR).

Keywords: channel hopping, blind rendezvous, cognitive radio networks, quaternary-quinary coding

Procedia PDF Downloads 91
161 Towards Developing a Self-Explanatory Scheduling System Based on a Hybrid Approach

Authors: Jian Zheng, Yoshiyasu Takahashi, Yuichi Kobayashi, Tatsuhiro Sato

Abstract:

In the study, we present a conceptual framework for developing a scheduling system that can generate self-explanatory and easy-understanding schedules. To this end, a user interface is conceived to help planners record factors that are considered crucial in scheduling, as well as internal and external sources relating to such factors. A hybrid approach combining machine learning and constraint programming is developed to generate schedules and the corresponding factors, and accordingly display them on the user interface. Effects of the proposed system on scheduling are discussed, and it is expected that scheduling efficiency and system understandability will be improved, compared with previous scheduling systems.

Keywords: constraint programming, factors considered in scheduling, machine learning, scheduling system

Procedia PDF Downloads 324
160 Failure Localization of Bipolar Integrated Circuits by Implementing Active Voltage Contrast

Authors: Yiqiang Ni, Xuanlong Chen, Enliang Li, Linting Zheng, Shizheng Yang

Abstract:

Bipolar ICs are playing an important role in military applications, mainly used in logic gates, such as inverter and NAND gate. The defect of metal break located on the step is one of the main failure mechanisms of bipolar ICs, resulting in open-circuit or functional failure. In this situation, general failure localization methods like optical beam-induced resistance change (OBIRCH) and photon emission microscopy (PEM) might not be fully effective. However, active voltage contrast (AVC) can be used as a voltage probe, which may pinpoint the incorrect potential and thus locate the failure position. Two case studies will be present in this paper on how to implement AVC for failure localization, and the detailed failure mechanism will be discussed.

Keywords: bipolar IC, failure localization, metal break, open failure, voltage contrast

Procedia PDF Downloads 291
159 Tourist’s Perception and Identification of Landscape Elements of Traditional Village

Authors: Mengxin Feng, Feng Xu, Zhiyong Lai

Abstract:

As a typical representative of the countryside, traditional Chinese villages are rich in cultural landscape resources and historical information, but they are still in continuous decline. The problems of people's weak protection awareness and low cultural recognition are still serious, and the protection of cultural heritage is imminent. At the same time, with the rapid development of rural tourism, its cultural value has been explored and paid attention to again. From the perspective of tourists, this study aimed to explore people's perception and identity of cultural landscape resources under the current cultural tourism development background. We selected eleven typical landscape elements of Lingshui Village, a traditional village in Beijing, as research objects and conducted a questionnaire survey with two scales of perception and identity to explore the characteristics of people's perception and identification of landscape elements. We found that there was a strong positive correlation between the perception and identity of each element and that geographical location influenced visitors' overall perception. The perception dimensions scored the highest in location, and the lowest in history and culture, and the identity dimensions scored the highest in meaning and lowest in emotion. We analyzed the impact of visitors' backgrounds on people's perception and identity characteristics and found that age and education were two important factors. The elderly had a higher degree of perceived identity, as the familiarity effect increased their attention. Highly educated tourists had more stringent criteria for perception and identification. The above findings suggest strategies for conserving and optimizing landscape elements in the traditional village to improve the acceptance and recognition of cultural information in traditional villages, which will inject new vitality into the development of traditional villages.

Keywords: traditional village, tourist perception, landscape elements, perception and identity

Procedia PDF Downloads 146
158 Formal Verification for Ethereum Smart Contract Using Coq

Authors: Xia Yang, Zheng Yang, Haiyong Sun, Yan Fang, Jingyu Liu, Jia Song

Abstract:

The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts.

Keywords: smart contract, formal verification, Ethereum, Coq

Procedia PDF Downloads 691
157 An Efficient Digital Baseband ASIC for Wireless Biomedical Signals Monitoring

Authors: Kah-Hyong Chang, Xin Liu, Jia Hao Cheong, Saisundar Sankaranarayanan, Dexing Pang, Hongzhao Zheng

Abstract:

A digital baseband Application-Specific Integrated Circuit (ASIC) is developed for a microchip transponder to transmit signals and temperature levels from biomedical monitoring devices. The transmission protocol is adapted from the ISO/IEC 11784/85 standard. The module has a decimation filter that employs only a single adder-subtractor in its datapath. The filtered output is coded with cyclic redundancy check and transmitted through backscattering Load Shift Keying (LSK) modulation to a reader. Fabricated using the 0.18-μm CMOS technology, the module occupies 0.116 mm² in chip area (digital baseband: 0.060 mm², decimation filter: 0.056 mm²), and consumes a total of less than 0.9 μW of power (digital baseband: 0.75 μW, decimation filter: 0.14 μW).

Keywords: biomedical sensor, decimation filter, radio frequency integrated circuit (RFIC) baseband, temperature sensor

Procedia PDF Downloads 397
156 Frequency-Dependent and Full Range Tunable Phase Shifter

Authors: Yufu Yin, Tao Lin, Shanghong Zhao, Zihang Zhu, Xuan Li, Wei Jiang, Qiurong Zheng, Hui Wang

Abstract:

In this paper, a frequency-dependent and tunable phase shifter is proposed and numerically analyzed. The key devices are the dual-polarization binary phase shift keying modulator (DP-BPSK) and the fiber Bragg grating (FBG). The phase-frequency response of the FBG is employed to determine the frequency-dependent phase shift. The simulation results show that a linear phase shift of the recovered output microwave signal which depends on the frequency of the input RF signal is achieved. In addition, by adjusting the power of the RF signal, the full range phase shift from 0° to 360° can be realized. This structure shows the spurious free dynamic range (SFDR) of 70.90 dB·Hz2/3 and 72.11 dB·Hz2/3 under different RF powers.

Keywords: microwave photonics, phase shifter, spurious free dynamic range, frequency-dependent

Procedia PDF Downloads 296
155 A Comparison of YOLO Family for Apple Detection and Counting in Orchards

Authors: Yuanqing Li, Changyi Lei, Zhaopeng Xue, Zhuo Zheng, Yanbo Long

Abstract:

In agricultural production and breeding, implementing automatic picking robot in orchard farming to reduce human labour and error is challenging. The core function of it is automatic identification based on machine vision. This paper focuses on apple detection and counting in orchards and implements several deep learning methods. Extensive datasets are used and a semi-automatic annotation method is proposed. The proposed deep learning models are in state-of-the-art YOLO family. In view of the essence of the models with various backbones, a multi-dimensional comparison in details is made in terms of counting accuracy, mAP and model memory, laying the foundation for realising automatic precision agriculture.

Keywords: agricultural object detection, deep learning, machine vision, YOLO family

Procedia PDF Downloads 197
154 Surface to the Deeper: A Universal Entity Alignment Approach Focusing on Surface Information

Authors: Zheng Baichuan, Li Shenghui, Li Bingqian, Zhang Ning, Chen Kai

Abstract:

Entity alignment (EA) tasks in knowledge graphs often play a pivotal role in the integration of knowledge graphs, where structural differences often exist between the source and target graphs, such as the presence or absence of attribute information and the types of attribute information (text, timestamps, images, etc.). However, most current research efforts are focused on improving alignment accuracy, often along with an increased reliance on specific structures -a dependency that inevitably diminishes their practical value and causes difficulties when facing knowledge graph alignment tasks with varying structures. Therefore, we propose a universal knowledge graph alignment approach that only utilizes the common basic structures shared by knowledge graphs. We have demonstrated through experiments that our method achieves state-of-the-art performance in fair comparisons.

Keywords: knowledge graph, entity alignment, transformer, deep learning

Procedia PDF Downloads 45
153 Cells Detection and Recognition in Bone Marrow Examination with Deep Learning Method

Authors: Shiyin He, Zheng Huang

Abstract:

In this paper, deep learning methods are applied in bio-medical field to detect and count different types of cells in an automatic way instead of manual work in medical practice, specifically in bone marrow examination. The process is mainly composed of two steps, detection and recognition. Mask-Region-Convolutional Neural Networks (Mask-RCNN) was used for detection and image segmentation to extract cells and then Convolutional Neural Networks (CNN), as well as Deep Residual Network (ResNet) was used to classify. Result of cell detection network shows high efficiency to meet application requirements. For the cell recognition network, two networks are compared and the final system is fully applicable.

Keywords: cell detection, cell recognition, deep learning, Mask-RCNN, ResNet

Procedia PDF Downloads 189
152 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 450
151 An Improved Circulating Tumor Cells Analysis Method for Identifying Tumorous Blood Cells

Authors: Salvador Garcia Bernal, Chi Zheng, Keqi Zhang, Lei Mao

Abstract:

Circulating Tumor Cells (CTC) is used to detect tumoral cell metastases using blood samples of patients with cancer (lung, breast, etc.). Using an immunofluorescent method a three channel image (Red, Green, and Blue) are obtained. These set of images usually overpass the 11 x 30 M pixels in size. An aided tool is designed for imaging cell analysis to segmented and identify the tumorous cell based on the three markers signals. Our Method, it is cell-based (area and cell shape) considering each channel information and extracting and making decisions if it is a valid CTC. The system also gives information about number and size of tumor cells found in the sample. We present results in real-life samples achieving acceptable performance in identifying CTCs in short time.

Keywords: Circulating Tumor Cells (CTC), cell analysis, immunofluorescent, medical image analysis

Procedia PDF Downloads 214