Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi...Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.展开更多
Traditional modal parameter identifi cation methods have many disadvantages,especially when used for processing nonlinear and non-stationary signals.In addition,they are usually not able to accurately identify the dam...Traditional modal parameter identifi cation methods have many disadvantages,especially when used for processing nonlinear and non-stationary signals.In addition,they are usually not able to accurately identify the damping ratio and damage.In this study,methods based on the Hilbert-Huang transform(HHT) are investigated for structural modal parameter identifi cation and damage diagnosis.First,mirror extension and prediction via a radial basis function(RBF) neural network are used to restrain the troublesome end-effect issue in empirical mode decomposition(EMD),which is a crucial part of HHT.Then,the approaches based on HHT combined with other techniques,such as the random decrement technique(RDT),natural excitation technique(NExT) and stochastic subspace identifi cation(SSI),are proposed to identify modal parameters of structures.Furthermore,a damage diagnosis method based on the HHT is also proposed.Time-varying instantaneous frequency and instantaneous energy are used to identify the damage evolution of the structure.The relative amplitude of the Hilbert marginal spectrum is used to identify the damage location of the structure.Finally,acceleration records at gauge points from shaking table testing of a 12-story reinforced concrete frame model are taken to validate the proposed approaches.The results show that the proposed approaches based on HHT for modal parameter identifi cation and damage diagnosis are reliable and practical.展开更多
Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of t...Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.展开更多
The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many ...The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.展开更多
The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The ...The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The traditional industrial Internet identifier resolution technologies depend excessively on IP networks,and cannot meet the requirements of ubiquitous resource-restraint Internet of Things(IoT)devices.An industrial Internet identifier resolution management strategy based on multi-identifier network architecture is proposed in this paper,which supports content names,identities,locations,apart from the traditional IP address.The application of multiple types of identifiers not only solves the problem of IP addresses exhaustion,but also enhances the security,credibility,and availability of the industrial Internet identification resolution system.An inter-translation scheme between multiple identifiers is designed to support multiple identifiers and the standard ones.We present an addressing and routing algorithm for identifier resolution to make it convenient to put our strategy into practice.展开更多
Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to buil...Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to build a network access control mechanism based on the permanent identifier. With the support of “Locator/Identifier Split” routing and addressing concept, the Identifier-based Access Control (IBAC) makes net-work access control more accurate and efficient, and fits for mobile nodes’ access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender’s identity without the third part authentication, which greatly reduces the probability of “Identifier Spoofing”.展开更多
In this paper an original method based on the link between a piecewise identifiability analysis and a piecewise numerical estimation is presented for estimating parameters of a phenomenological diesel engine combustio...In this paper an original method based on the link between a piecewise identifiability analysis and a piecewise numerical estimation is presented for estimating parameters of a phenomenological diesel engine combustion model. This model is used for design, validation and pre-tuning of engine control laws. A cascade algebro-differential elimination method is used for studying identifiability. This investigation is done by using input-output-parameter relationship. Then these relations are transformed by using iterated integration. They are combined with an original numerical derivative estimation based on distribution theory which gives explicit point-wise derivative?estimation formulas for each given order. Then new approximate relations, linking block of parameters and outputs (without derivative) are obtained. These relations are linear relatively to the blocks of parameters and yield a first estimation of parameters which is used as initial guess for a local optimization method (least square method and a local search genetic algorithm).展开更多
Motivation: Accurate identification and delineation of promoters/TSSs (transcription start sites) is important for improving genome annotation and devising experiments to study and understand transcriptional regulatio...Motivation: Accurate identification and delineation of promoters/TSSs (transcription start sites) is important for improving genome annotation and devising experiments to study and understand transcriptional regulation. Many promoter identifiers are developed for promoter identification. However, each promoter identifier has its own focuses and limitations, and we introduce an integration scheme to combine some identifiers together to gain a better prediction performance. Result: In this contribution, 8 promoter identifiers (Proscan, TSSG, TSSW, FirstEF, eponine, ProSOM, EP3, FPROM) are chosen for the investigation of integration. A feature selection method, called mRMR (Minimum Redundancy Maximum Relevance), is novelly transferred to promoter identifier selection by choosing a group of robust and complementing promoter identifiers. For comparison, four integration methods (SMV, WMV, SMV_IS, WMV_IS), from simple to complex, are developed to process a training dataset with 1400 se- quences and a testing dataset with 378 sequences. As a result, 5 identifiers (FPROM, FirstEF, TSSG, epo- nine, TSSW) are chosen by mRMR, and the integration of them achieves 70.08% and 67.83% correct prediction rates for a training dataset and a testing dataset respectively, which is better than any single identifier in which the best single one only achieves 59.32% and 61.78% for the training dataset and testing dataset respectively.展开更多
The industrial Internet has germinated with the integration of the traditional industry and information technologies.An identifier is the identification of an object in the industrial Internet.The identifier technolog...The industrial Internet has germinated with the integration of the traditional industry and information technologies.An identifier is the identification of an object in the industrial Internet.The identifier technology is a method to validate the identification of an object and trace it.The identifier is a bridge to connect information islands in the industry,as well as the data basis for building a technology application ecosystem based on identifier resolution.We propose three practical applications and application scenarios of the industrial Internet identifier in this paper.Future applications of identifier resolution in the industrial Internet field are also presented.展开更多
The purpose of this review is to apply geometric frameworks in identification problems. In contrast to the qualitative theory of dynamical systems (DSQT), the chaos and catastrophes, researches on the application of g...The purpose of this review is to apply geometric frameworks in identification problems. In contrast to the qualitative theory of dynamical systems (DSQT), the chaos and catastrophes, researches on the application of geometric frameworks have not </span><span style="font-family:Verdana;">been </span><span style="font-family:Verdana;">performed in identification problems. The direct transfer of DSQT ideas is inefficient through the peculiarities of identification systems. In this paper, the attempt </span><span style="font-family:Verdana;">is </span><span style="font-family:Verdana;">made based on the latest researches in this field. A methodology for the synthesis of geometric frameworks (GF) </span><span style="font-family:Verdana;">is </span><span style="font-family:Verdana;">propose</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;">, which reflects features of nonlinear systems. Methods based on GF analysis </span><span style="font-family:Verdana;">are </span><span style="font-family:Verdana;">developed for the decision-making on properties and structure of nonlinear systems. The problem solution of structural identifiability </span><span style="font-family:Verdana;">is </span><span style="font-family:Verdana;">obtain</span><span style="font-family:Verdana;">ed</span><span style="font-family:Verdana;"> for nonlinear systems under uncertainty.展开更多
Considering the structural analysis problem of systems properties with Bouc-Wen hysteresis (BWH), various approaches are proposed for the identification of BWH parameters. The applied methods and algorithms are based ...Considering the structural analysis problem of systems properties with Bouc-Wen hysteresis (BWH), various approaches are proposed for the identification of BWH parameters. The applied methods and algorithms are based on the design of parametric models and consider a priori information and the results of data analysis. Structural changes in the BWH form a priori. Methods for the Bouc-Wen model (BWM) identification and its structure estimation are not considered under uncertainty. The study’s purpose is the analysis the structural problems of the Bouc-Wen hysteresis identification. The analysis base is the application of geometric frameworks (GF) under uncertainty. Methods for adaptive estimation parameters and structural of BWM were proposed. The adaptive system stability is proved based on vector Lyapunov functions. An approach is proposed to estimate the identifiability and structure of the system with BWH. The method for estimating the identifiability degree based on the analysis of GF is considered. BWM modifications are proposed to guarantee the system’s stability and simplify its description.展开更多
Many performance indices for parallel mechanism are put forward in the phase of dimensional synthesis,except for identifiability index,which determines the difficulty of kinematical calibration.If the dimensional para...Many performance indices for parallel mechanism are put forward in the phase of dimensional synthesis,except for identifiability index,which determines the difficulty of kinematical calibration.If the dimensional parameters are inappropriately selected,the existing methods for optimizing identifiability will not effectively work.Thus,with the aim of studying identifiability optimization in dimensional synthesis for 3-PRS mechanism,kinematics with structural errors is analyzed to provide theoretical bases for kinematical model.Then through a comparison of two 3-PRS mechanisms with different dimensional parameters,identifiability performance is proved to be necessary and feasible for optimization in the phase of dimensional design.Finally,an index δ is proposed to scale the identifiability performance.With the index,identifiability analysis and dimensional synthesis simulation in the whole workspace is completed.The index is verified to be correct and feasible,and based on the index,a procedure of dimensional synthesis,as well as an example set of non-dimensional parameters of 3-PRS mechanism,is proposed.The proposed identifiability index and design method can effectively introduce identifiability optimization into dimensional synthesis,and will obviously benefit later kinematical calibration.展开更多
Screening gene function in vivo is a powerful approach to discover novel drug targets. We present high-throughput screening (HTS) data for 3 762 distinct global gene knockout (KO) mouse lines with viable adult hom...Screening gene function in vivo is a powerful approach to discover novel drug targets. We present high-throughput screening (HTS) data for 3 762 distinct global gene knockout (KO) mouse lines with viable adult homozygous mice generated using either gene-trap or homologous recombination technologies. Bone mass was determined from DEXA scans of male and female mice at 14 weeks of age and by microCT analyses of bones from male mice at 16 weeks of age. Wild-type (WT) cagemates/littermates were examined for each gene KO. Lethality was observed in an additional 850 KO lines. Since primary HTS are susceptible to false positive findings, additional cohorts of mice from KO lines with intriguing HTS bone data were examined. Aging, ovariectomy, histomorphometry and bone strength studies were performed and possible non-skeletal phenotypes were explored. Together, these screens identified multiple genes affecting bone mass: 23 previously reported genes (Calcr, Cebpb, Crtap, Dcstamp, Dkkl, Duoxa2, Enppl, Fgf23, Kissl/Kisslr, Kl (Klotho), Lrp5, Mstn, Neol, Npr2, Ostml, Postn, Sfrp4, S1c30a5, Sic39a13, Sost, Sumf1, Src, Wnt10b), five novel genes extensively characterized (Cldn18, Fam20c, Lrrkl, Sgpll, Wnt16), five novel genes with preliminary characterization (Agpat2, RassfS, Slc10a7, Stc26a7, Slc30a10) and three novel undisclosed genes coding for potential osteoporosis drug targets.展开更多
AIM To clone novel gastric cancer-associated genes and investigate their roles in gastric cancer occurrence.METHODS A method called differential display was used which allows the identification of differentially expre...AIM To clone novel gastric cancer-associated genes and investigate their roles in gastric cancer occurrence.METHODS A method called differential display was used which allows the identification of differentially expressed genes by using PAGE to display PCR-amplified cDNA fragments between gastric cancer cells and normal gastric mucosa cells. These fragments were cloned into plasmid vector pUC18. Homology analysis was made after sequencing these fragments.RESULTS Two novel genes were identified compared with sequences from GenBank. One was registered with the AD number AF 051783. In situ hybridization showed that these two novel genes expressed specifically in gastric cancer tissues.CONCLUSION The two novel genes obtained by differential display were confirmed to be gastric cancer-associated genes using in situ hybridization.展开更多
We consider the identification problem of coefficients for vibrating systems described by a Euler-Bernoulli beam eq~. ation Or a string equation, with one end clamped and with an input exerted on the other end. For th...We consider the identification problem of coefficients for vibrating systems described by a Euler-Bernoulli beam eq~. ation Or a string equation, with one end clamped and with an input exerted on the other end. For the beam equation, the observations are the velocity and the angle velocity at the free end, while for the string equation, the observation is the velocity at the free end. In the framework of well-posed linear system theory, we show that both the density and the flexural rigidity of the beam, and the tension of the string, can be uniquely determined by the observations for all positive times. Moreover, a general constructive method is developed to show that the mass density and the elastic modulus of the string are not determined by the observation.展开更多
Heading date in rice is a typical quantitative trait controlled by multiple quantitative trait loci (QTLs). It is mainly regulated by environmental factors such as photoperiod and temperature (Izawa, 2007). Many Q...Heading date in rice is a typical quantitative trait controlled by multiple quantitative trait loci (QTLs). It is mainly regulated by environmental factors such as photoperiod and temperature (Izawa, 2007). Many QTLs for heading date have been identified using different mapping populations and methods (http:// www.gramene.org/qtl). Up to date, several major heading date QTLs have been cloned by map-based cloning strategy (Yano et al., 2000; Takahashi et al., 2001; Kojima et al., 2002; Doi et al., 2004; Xue et al., 2008; Wei et al., 2010; Yan et al.,展开更多
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individua...In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others.展开更多
文摘Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability.
基金Gansu Science and Technology Key Project under Grant No.2GS057-A52-008
文摘Traditional modal parameter identifi cation methods have many disadvantages,especially when used for processing nonlinear and non-stationary signals.In addition,they are usually not able to accurately identify the damping ratio and damage.In this study,methods based on the Hilbert-Huang transform(HHT) are investigated for structural modal parameter identifi cation and damage diagnosis.First,mirror extension and prediction via a radial basis function(RBF) neural network are used to restrain the troublesome end-effect issue in empirical mode decomposition(EMD),which is a crucial part of HHT.Then,the approaches based on HHT combined with other techniques,such as the random decrement technique(RDT),natural excitation technique(NExT) and stochastic subspace identifi cation(SSI),are proposed to identify modal parameters of structures.Furthermore,a damage diagnosis method based on the HHT is also proposed.Time-varying instantaneous frequency and instantaneous energy are used to identify the damage evolution of the structure.The relative amplitude of the Hilbert marginal spectrum is used to identify the damage location of the structure.Finally,acceleration records at gauge points from shaking table testing of a 12-story reinforced concrete frame model are taken to validate the proposed approaches.The results show that the proposed approaches based on HHT for modal parameter identifi cation and damage diagnosis are reliable and practical.
文摘Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation.
基金This work is supported by the Institute for Information&communications Technology Promotion(IITP)grant funded by the Korean government Ministry of Science and ICT(MSIT)(No.B0184-15-1001,Federated Interoperable Semantic IoT Testbeds and Applications).
文摘The Internet of Things(IoT)provides new opportunities for different IoT platforms connecting various devices together.The need to identify those devices is the foremost important to perform any kind of operation.Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms.Some existing industrial identification mechanisms can also be used in the IoT.There is no common Identification Scheme(IS)for the IoT as yet,because of the political and commercial differences amongst the standard bodies.The unavailability of a unified IS method makes the inter-working among IoT platforms challenging.This paper analyses and compares ISs used by several selected IoT platforms.This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.
基金supported in part by PCL Future Regional Network Facilities for Large-scale Experiments and Applications under Grant NO.PCL2018KP001by Guangdong R&D Key Program under Grant No.GD2016B030305005+3 种基金by National Natural Science Foundation of China(NSFC)under Grant No.61671001by National Key R&D Program of China under Grant No.2017YFB0803204by Shenzhen Research Programs under Grant Nos.JSGG20170824095858416,JCYJ20190808155607340,and JCYJ20170306092030521This work is also supported by the Shenzhen Municipal Development and Reform Commission(Disciplinary Development Program for Data Sci⁃ence and Intelligent Computing).
文摘The industrial Internet realizes intelligent control and optimized operation of the industrial system through network interconnection.The industrial Internet identifier is the core element to accomplish this task.The traditional industrial Internet identifier resolution technologies depend excessively on IP networks,and cannot meet the requirements of ubiquitous resource-restraint Internet of Things(IoT)devices.An industrial Internet identifier resolution management strategy based on multi-identifier network architecture is proposed in this paper,which supports content names,identities,locations,apart from the traditional IP address.The application of multiple types of identifiers not only solves the problem of IP addresses exhaustion,but also enhances the security,credibility,and availability of the industrial Internet identification resolution system.An inter-translation scheme between multiple identifiers is designed to support multiple identifiers and the standard ones.We present an addressing and routing algorithm for identifier resolution to make it convenient to put our strategy into practice.
文摘Legacy IP address-based access control has met many challenges, because the network nodes cannot be identified accurately based on their variable IP addresses. “Locator/Identifier Split” has made it possible to build a network access control mechanism based on the permanent identifier. With the support of “Locator/Identifier Split” routing and addressing concept, the Identifier-based Access Control (IBAC) makes net-work access control more accurate and efficient, and fits for mobile nodes’ access control quite well. Moreover, Self-verifying Identifier makes it possible for the receiver to verify the packet sender’s identity without the third part authentication, which greatly reduces the probability of “Identifier Spoofing”.
文摘In this paper an original method based on the link between a piecewise identifiability analysis and a piecewise numerical estimation is presented for estimating parameters of a phenomenological diesel engine combustion model. This model is used for design, validation and pre-tuning of engine control laws. A cascade algebro-differential elimination method is used for studying identifiability. This investigation is done by using input-output-parameter relationship. Then these relations are transformed by using iterated integration. They are combined with an original numerical derivative estimation based on distribution theory which gives explicit point-wise derivative?estimation formulas for each given order. Then new approximate relations, linking block of parameters and outputs (without derivative) are obtained. These relations are linear relatively to the blocks of parameters and yield a first estimation of parameters which is used as initial guess for a local optimization method (least square method and a local search genetic algorithm).
文摘Motivation: Accurate identification and delineation of promoters/TSSs (transcription start sites) is important for improving genome annotation and devising experiments to study and understand transcriptional regulation. Many promoter identifiers are developed for promoter identification. However, each promoter identifier has its own focuses and limitations, and we introduce an integration scheme to combine some identifiers together to gain a better prediction performance. Result: In this contribution, 8 promoter identifiers (Proscan, TSSG, TSSW, FirstEF, eponine, ProSOM, EP3, FPROM) are chosen for the investigation of integration. A feature selection method, called mRMR (Minimum Redundancy Maximum Relevance), is novelly transferred to promoter identifier selection by choosing a group of robust and complementing promoter identifiers. For comparison, four integration methods (SMV, WMV, SMV_IS, WMV_IS), from simple to complex, are developed to process a training dataset with 1400 se- quences and a testing dataset with 378 sequences. As a result, 5 identifiers (FPROM, FirstEF, TSSG, epo- nine, TSSW) are chosen by mRMR, and the integration of them achieves 70.08% and 67.83% correct prediction rates for a training dataset and a testing dataset respectively, which is better than any single identifier in which the best single one only achieves 59.32% and 61.78% for the training dataset and testing dataset respectively.
文摘The industrial Internet has germinated with the integration of the traditional industry and information technologies.An identifier is the identification of an object in the industrial Internet.The identifier technology is a method to validate the identification of an object and trace it.The identifier is a bridge to connect information islands in the industry,as well as the data basis for building a technology application ecosystem based on identifier resolution.We propose three practical applications and application scenarios of the industrial Internet identifier in this paper.Future applications of identifier resolution in the industrial Internet field are also presented.
文摘The purpose of this review is to apply geometric frameworks in identification problems. In contrast to the qualitative theory of dynamical systems (DSQT), the chaos and catastrophes, researches on the application of geometric frameworks have not </span><span style="font-family:Verdana;">been </span><span style="font-family:Verdana;">performed in identification problems. The direct transfer of DSQT ideas is inefficient through the peculiarities of identification systems. In this paper, the attempt </span><span style="font-family:Verdana;">is </span><span style="font-family:Verdana;">made based on the latest researches in this field. A methodology for the synthesis of geometric frameworks (GF) </span><span style="font-family:Verdana;">is </span><span style="font-family:Verdana;">propose</span><span style="font-family:Verdana;">d</span><span style="font-family:Verdana;">, which reflects features of nonlinear systems. Methods based on GF analysis </span><span style="font-family:Verdana;">are </span><span style="font-family:Verdana;">developed for the decision-making on properties and structure of nonlinear systems. The problem solution of structural identifiability </span><span style="font-family:Verdana;">is </span><span style="font-family:Verdana;">obtain</span><span style="font-family:Verdana;">ed</span><span style="font-family:Verdana;"> for nonlinear systems under uncertainty.
文摘Considering the structural analysis problem of systems properties with Bouc-Wen hysteresis (BWH), various approaches are proposed for the identification of BWH parameters. The applied methods and algorithms are based on the design of parametric models and consider a priori information and the results of data analysis. Structural changes in the BWH form a priori. Methods for the Bouc-Wen model (BWM) identification and its structure estimation are not considered under uncertainty. The study’s purpose is the analysis the structural problems of the Bouc-Wen hysteresis identification. The analysis base is the application of geometric frameworks (GF) under uncertainty. Methods for adaptive estimation parameters and structural of BWM were proposed. The adaptive system stability is proved based on vector Lyapunov functions. An approach is proposed to estimate the identifiability and structure of the system with BWH. The method for estimating the identifiability degree based on the analysis of GF is considered. BWM modifications are proposed to guarantee the system’s stability and simplify its description.
基金supported by National Natural Science Foundation of China (Grant No. 50775125)National Hi-tech Research and Development Program of China (863 Program,Grant No. 2007AA042003,No. 2007AA041901)
文摘Many performance indices for parallel mechanism are put forward in the phase of dimensional synthesis,except for identifiability index,which determines the difficulty of kinematical calibration.If the dimensional parameters are inappropriately selected,the existing methods for optimizing identifiability will not effectively work.Thus,with the aim of studying identifiability optimization in dimensional synthesis for 3-PRS mechanism,kinematics with structural errors is analyzed to provide theoretical bases for kinematical model.Then through a comparison of two 3-PRS mechanisms with different dimensional parameters,identifiability performance is proved to be necessary and feasible for optimization in the phase of dimensional design.Finally,an index δ is proposed to scale the identifiability performance.With the index,identifiability analysis and dimensional synthesis simulation in the whole workspace is completed.The index is verified to be correct and feasible,and based on the index,a procedure of dimensional synthesis,as well as an example set of non-dimensional parameters of 3-PRS mechanism,is proposed.The proposed identifiability index and design method can effectively introduce identifiability optimization into dimensional synthesis,and will obviously benefit later kinematical calibration.
文摘Screening gene function in vivo is a powerful approach to discover novel drug targets. We present high-throughput screening (HTS) data for 3 762 distinct global gene knockout (KO) mouse lines with viable adult homozygous mice generated using either gene-trap or homologous recombination technologies. Bone mass was determined from DEXA scans of male and female mice at 14 weeks of age and by microCT analyses of bones from male mice at 16 weeks of age. Wild-type (WT) cagemates/littermates were examined for each gene KO. Lethality was observed in an additional 850 KO lines. Since primary HTS are susceptible to false positive findings, additional cohorts of mice from KO lines with intriguing HTS bone data were examined. Aging, ovariectomy, histomorphometry and bone strength studies were performed and possible non-skeletal phenotypes were explored. Together, these screens identified multiple genes affecting bone mass: 23 previously reported genes (Calcr, Cebpb, Crtap, Dcstamp, Dkkl, Duoxa2, Enppl, Fgf23, Kissl/Kisslr, Kl (Klotho), Lrp5, Mstn, Neol, Npr2, Ostml, Postn, Sfrp4, S1c30a5, Sic39a13, Sost, Sumf1, Src, Wnt10b), five novel genes extensively characterized (Cldn18, Fam20c, Lrrkl, Sgpll, Wnt16), five novel genes with preliminary characterization (Agpat2, RassfS, Slc10a7, Stc26a7, Slc30a10) and three novel undisclosed genes coding for potential osteoporosis drug targets.
文摘AIM To clone novel gastric cancer-associated genes and investigate their roles in gastric cancer occurrence.METHODS A method called differential display was used which allows the identification of differentially expressed genes by using PAGE to display PCR-amplified cDNA fragments between gastric cancer cells and normal gastric mucosa cells. These fragments were cloned into plasmid vector pUC18. Homology analysis was made after sequencing these fragments.RESULTS Two novel genes were identified compared with sequences from GenBank. One was registered with the AD number AF 051783. In situ hybridization showed that these two novel genes expressed specifically in gastric cancer tissues.CONCLUSION The two novel genes obtained by differential display were confirmed to be gastric cancer-associated genes using in situ hybridization.
基金the National Natural Science Foundation of China (No.K411331528)
文摘We consider the identification problem of coefficients for vibrating systems described by a Euler-Bernoulli beam eq~. ation Or a string equation, with one end clamped and with an input exerted on the other end. For the beam equation, the observations are the velocity and the angle velocity at the free end, while for the string equation, the observation is the velocity at the free end. In the framework of well-posed linear system theory, we show that both the density and the flexural rigidity of the beam, and the tension of the string, can be uniquely determined by the observations for all positive times. Moreover, a general constructive method is developed to show that the mass density and the elastic modulus of the string are not determined by the observation.
基金supported by grants from the Ministry of Science and Technology of China(No. 2010CB125901)the National Natural Science Foundation of China(No.31271315)the Bill & Melinda Gates Foundation
文摘Heading date in rice is a typical quantitative trait controlled by multiple quantitative trait loci (QTLs). It is mainly regulated by environmental factors such as photoperiod and temperature (Izawa, 2007). Many QTLs for heading date have been identified using different mapping populations and methods (http:// www.gramene.org/qtl). Up to date, several major heading date QTLs have been cloned by map-based cloning strategy (Yano et al., 2000; Takahashi et al., 2001; Kojima et al., 2002; Doi et al., 2004; Xue et al., 2008; Wei et al., 2010; Yan et al.,
文摘In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others.