A new channel estimation and data detection joint algorithm is proposed for multi-input multi-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system using linear minimum mean square error (LMMSE...A new channel estimation and data detection joint algorithm is proposed for multi-input multi-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system using linear minimum mean square error (LMMSE)- based space-alternating generalized expectation-maximization (SAGE) algorithm. In the proposed algorithm, every sub-frame of the MIMO-OFDM system is divided into some OFDM sub-blocks and the LMMSE-based SAGE algorithm in each sub-block is used. At the head of each sub-flame, we insert training symbols which are used in the initial estimation at the beginning. Channel estimation of the previous sub-block is applied to the initial estimation in the current sub-block by the maximum-likelihood (ML) detection to update channel estimatjon and data detection by iteration until converge. Then all the sub-blocks can be finished in turn. Simulation results show that the proposed algorithm can improve the bit error rate (BER) performance.展开更多
Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process o...Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process of image compression are modified by keys in order to achieve image joint compression encryption. Combined with the bit-plane coding technique, the discrete wavelet transform coefficients in different resolutions can be encrypted respectively with different keys, so that the resolution selective encryption is realized to meet different application needs. Zero-tree coding is improved, and adaptive arithmetic coding is introduced. Then, the proposed joint compression-encryption algorithm is simulated. The simulation results show that as long as the parameters are selected appropriately, the compression efficiency of proposed image joint compression-encryption algorithm is basically identical to that of the original image compression algorithm, and the security of the proposed algorithm is better than the joint encryption algorithm based on interval splitting.展开更多
Failure is a systemic error that affects overall system performance and may eventually crash across the entire configuration.In Real-Time Systems(RTS),deadline is the key to successful completion of the program.If tas...Failure is a systemic error that affects overall system performance and may eventually crash across the entire configuration.In Real-Time Systems(RTS),deadline is the key to successful completion of the program.If tasks effectively meet the deadline,it means the system is working in pristine order.However,missing the deadline means a systemic fault due to which the system can crash(hard RTS)or degrade inclusive performance(soft RTS).To fine-tune the RTS,tolerance is the critical issue and must be handled with extreme care.This article explains the context of fault tolerance with improvised Joint EDF-RMS algorithm in RTS.The backup method has been derived to prevent the system from being recursively migrating the same task.If any task migrates three times,this migrated task will get shifted to the backup queue.This backup queue assigns the task to a backup processor and is destined for final execution.For performance evaluation purposes,a relative graph between fault and failure rates,failure and total processor utilization along with other averages have been evaluated.Furthermore,these archived results are compared with fault-tolerant Earliest Deadline First(EDF)and Rate Monotonic Scheduling(RMS)algorithms independently in relatively similar conditions.These comparisons show better performance against overloading conditions.展开更多
Impact dynamics of multi-rigid-body systems with joint friction is considered. Based on the traditional approximate assumption dealing with impact problem, a general numerical method called the sliding state stepping ...Impact dynamics of multi-rigid-body systems with joint friction is considered. Based on the traditional approximate assumption dealing with impact problem, a general numerical method called the sliding state stepping algorithm is introduced. This method can avoid difficulties in solving differential equations with variable scale and its result can avoid energy inconsistency before and after impact from considering complexily of tangential sliding mode. An example is given to describe details using this algorithm.展开更多
To achieve much efficient multimedia transmission over an error-prone wireless network, there are still some problem must to be solved, especially in energy limited wireless sensor network. In this paper, we propose a...To achieve much efficient multimedia transmission over an error-prone wireless network, there are still some problem must to be solved, especially in energy limited wireless sensor network. In this paper, we propose a joint detection based on Schur Algorithm for image wireless transmission over wireless sensor network. To eliminate error transmissions and save transmission energy, we combine Schur algorithm with joint dynamic detection for wireless transmission of JPEG 2000 encoded image which we proposed in [1]. Schur algorithm is used to computing the decomposition of system matrix to decrease the computational complexity. We de-scribe our transmission protocol, and report on its performance evaluation using a simulation testbed we have designed for this purpose. Our results clearly indicate that our method could approach efficient images transmission in wireless sensor network and the transmission errors are significantly reduced when compared to regular transmissions.展开更多
Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the c...Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the confidentiality and privacy of sensitive information and prevent information leaks and malicious attacks.This paper presents a novel approach to semantic secure communication through the utilization of joint source-channel coding,which is based on the design of an automated joint source-channel coding algorithm and an encryption and decryption algorithm based on semantic security.The traditional and state-of-the-art joint source-channel coding algorithms are selected as two baselines for different comparison purposes.Experimental results demonstrate that our proposed algorithm outperforms the first baseline algorithm,the traditional source-channel coding,by 61.21%in efficiency under identical channel conditions(SNR=15 dB).In security,our proposed method can resist 2 more types of attacks compared to the two baselines,exhibiting nearly no increases in time consumption and error rate compared to the state-of-the-art joint source-channel coding algorithm while the secure semantic communication is supported.展开更多
In core logging, each joint set intersects borehole into some segments. In this research, it has been shown that length of the borehole segments created by each joint set could be computed by trigonometrical relations...In core logging, each joint set intersects borehole into some segments. In this research, it has been shown that length of the borehole segments created by each joint set could be computed by trigonometrical relations. By realizing the lengths associated with joint sets, an algorithm has been designed to compute the length of borehole pieces (created by all joint sets) and to calculate RQD. Effect of some factors have been analyzed and applied to the abstract model of the rock mass to have the most similarity to a real rock mass. The program proposed in this study, is a robust platform to calculate the RQD in all directions inside a rock mass without having to deal with the labor of core logging and wrestling with difficulties and inaccuracies of the traditional processes. This is the first algorithmic method for estimating the rock quality which could be employed to develop a new and far more reliable measurement for the degree of jointing inside a rock mass.展开更多
Aiming at three-passive-sensor location system, a generalized 3-dimension (3-D) assignment model is constructed based on property information, and a multi-target programming model is proposed based on direction-find...Aiming at three-passive-sensor location system, a generalized 3-dimension (3-D) assignment model is constructed based on property information, and a multi-target programming model is proposed based on direction-finding and property fusion information. The multi-target programming model is transformed into a single target programming problem to resolve, and its data association result is compared with the results which are solved by using one kind of information only. Simulation experiments show the effectiveness of the multi-target programming algorithm with higher data association accuracy and less calculation.展开更多
This paper presented a joint resource allocation(RA) and admission control(AC) mechanism in software defined mobile networks(SDMNs). In this mechanism, the joint RA and AC problem can be formulated as an optimization ...This paper presented a joint resource allocation(RA) and admission control(AC) mechanism in software defined mobile networks(SDMNs). In this mechanism, the joint RA and AC problem can be formulated as an optimization problem with the aim of maximizing the number of admitted users while simultaneously minimizing the number of allocated channels. Since the primal problem is modeled to be a mixed integer nonlinear problem(MINLP), we attain the suboptimal solutions to the primal MINLP by convex relaxation. Additionally, with the global information collected by the SDMNs controller, a centralized joint RA and AC(CJRA)algorithm is proposed by the Lagrange dual decomposition technique to obtain the global optimum. Meanwhile, we propose an OpenFlow rules placement strategy to realize CJRA in an efficient way. Moreover, a distributed algorithm is also developed to find the local optimum, showing a performance benchmark for the centralized one. Finally, simulation results show that the proposed centralized algorithm admits more users compared with the distributed.展开更多
Based on the major gene and polygene mixed inheritance model for multiple correlated quantitative traits, the authors proposed a new joint segregation analysis method of major gene controlling multiple correlated quan...Based on the major gene and polygene mixed inheritance model for multiple correlated quantitative traits, the authors proposed a new joint segregation analysis method of major gene controlling multiple correlated quantitative traits, which include major gene detection and its effect and variation estimation. The effect and variation of major gene are estimated by the maximum likelihood method implemented via expectation-maximization (EM) algorithm. Major gene is tested with the likelihood ratio (LR) test statistic. Extensive simulation studies showed that joint analysis not only increases the statistical power of major gene detection but also improves the precision and accuracy of major gene effect estimates. An example of the plant height and the number of tiller of F2 population in rice cross Duonieai x Zhonghua 11 was used in the illustration. The results indicated that the genetic difference of these two traits in this cross refers to only one pleiotropic major gene. The additive effect and dominance effect of the major gene are estimated as -21.3 and 40.6 cm on plant height, and 22.7 and -25.3 on number of tiller, respectively. The major gene shows overdominance for plant height and close to complete dominance for number of tillers.展开更多
The compressive sensing (CS) theory allows people to obtain signal in the frequency much lower than the requested one of sampling theorem. Because the theory is based on the assumption of that the location of sparse...The compressive sensing (CS) theory allows people to obtain signal in the frequency much lower than the requested one of sampling theorem. Because the theory is based on the assumption of that the location of sparse values is unknown, it has many constraints in practical applications. In fact, in many cases such as image processing, the location of sparse values is knowable, and CS can degrade to a linear process. In order to take full advantage of the visual information of images, this paper proposes the concept of dimensionality reduction transform matrix and then se- lects sparse values by constructing an accuracy control matrix, so on this basis, a degradation algorithm is designed that the signal can be obtained by the measurements as many as sparse values and reconstructed through a linear process. In comparison with similar methods, the degradation algorithm is effective in reducing the number of sensors and improving operational efficiency. The algorithm is also used to achieve the CS process with the same amount of data as joint photographic exports group (JPEG) compression and acquires the same display effect.展开更多
Most current prestack AVA joint inversion methods are based on the exact Zoeppritz equation and its various approximations. However, these equations only reflect the relation between reflection coefficients, incidence...Most current prestack AVA joint inversion methods are based on the exact Zoeppritz equation and its various approximations. However, these equations only reflect the relation between reflection coefficients, incidence angles, and elastic parameters on either side of the interface, which means that wave-propagation effects, such as spherical spreading, attenuation, transmission loss, multiples, and event mismatching of P-and S-waves, are not considered and cannot accurately describe the true propagation characteristics of seismic waves. Conventional AVA inversion methods require that these wave-propagation effects have been fully corrected or attenuated before inversion but these requirements can hardly be satisfied in practice. Using a one-dimensional(1 D) earth model, the reflectivity method can simulate the full wavefield response of seismic waves. Therefore, we propose a nonlinear multicomponent prestack AVA joint inversion method based on the vectorized reflectivity method, which uses a fast nondominated sorting genetic algorithm(NSGA II) to optimize the nonlinear multiobjective function to estimate multiple parameters, such as P-wave velocity, S-wave velocity, and density. This approach is robust because it can simultaneously cope with more than one objective function without introducing weight coefficients. Model tests prove the effectiveness of the proposed inversion method. Based on the inversion results, we find that the nonlinear prestack AVA joint inversion using the reflectivity method yields more accurate inversion results than the inversion by using the exact Zoeppritz equation when the wave-propagation effects of transmission loss and internal multiples are not completely corrected.展开更多
Disassembly sequence planning is an important step of mechanical maintenance. This article presents an integrated study about the generation and optimizing algorithm of the disassembly sequence. Mechanical products ar...Disassembly sequence planning is an important step of mechanical maintenance. This article presents an integrated study about the generation and optimizing algorithm of the disassembly sequence. Mechanical products are divided into two categories of components and connectors. The article uses component-joint graph to represent assembly constraints, including the incidence constraints are represented by incidence matrix and the interference constraints are represented by interference constraints. The inspiring factor and pheromone matrix are calculated according to assembly constraints. Then the ant generates its own disassembly sequences one by one and updates the inspiring factor and pheromone matrix. After all iterations, the best disassembly sequence planning of components and connectors are given. Finally, an application instance of the disassembly sequence of the jack is presented to illustrate the validity of this method.展开更多
Normal mixture regression models are one of the most important statistical data analysis tools in a heterogeneous population. When the data set under consideration involves asymmetric outcomes, in the last two decades...Normal mixture regression models are one of the most important statistical data analysis tools in a heterogeneous population. When the data set under consideration involves asymmetric outcomes, in the last two decades, the skew normal distribution has been shown beneficial in dealing with asymmetric data in various theoretic and applied problems. In this paper, we propose and study a novel class of models: a skew-normal mixture of joint location, scale and skewness models to analyze the heteroscedastic skew-normal data coming from a heterogeneous population. The issues of maximum likelihood estimation are addressed. In particular, an Expectation-Maximization (EM) algorithm for estimating the model parameters is developed. Properties of the estimators of the regression coefficients are evaluated through Monte Carlo experiments. Results from the analysis of a real data set from the Body Mass Index (BMI) data are presented.展开更多
基金Supported by the National Natural Science Foundation of China (No. 61001105), the National Science and Technology Major Projects (No. 2011ZX03001- 007- 03) and Beijing Natural Science Foundation (No. 4102043).
文摘A new channel estimation and data detection joint algorithm is proposed for multi-input multi-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system using linear minimum mean square error (LMMSE)- based space-alternating generalized expectation-maximization (SAGE) algorithm. In the proposed algorithm, every sub-frame of the MIMO-OFDM system is divided into some OFDM sub-blocks and the LMMSE-based SAGE algorithm in each sub-block is used. At the head of each sub-flame, we insert training symbols which are used in the initial estimation at the beginning. Channel estimation of the previous sub-block is applied to the initial estimation in the current sub-block by the maximum-likelihood (ML) detection to update channel estimatjon and data detection by iteration until converge. Then all the sub-blocks can be finished in turn. Simulation results show that the proposed algorithm can improve the bit error rate (BER) performance.
基金supported by the Natural Science Foundation of Hainan Province, China (Grant No. 613155)
文摘Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process of image compression are modified by keys in order to achieve image joint compression encryption. Combined with the bit-plane coding technique, the discrete wavelet transform coefficients in different resolutions can be encrypted respectively with different keys, so that the resolution selective encryption is realized to meet different application needs. Zero-tree coding is improved, and adaptive arithmetic coding is introduced. Then, the proposed joint compression-encryption algorithm is simulated. The simulation results show that as long as the parameters are selected appropriately, the compression efficiency of proposed image joint compression-encryption algorithm is basically identical to that of the original image compression algorithm, and the security of the proposed algorithm is better than the joint encryption algorithm based on interval splitting.
基金Deepak Dahiya would like to thank Deanship of Scientific Research at Majmaah University for supporting this work under Project No.R-2022-56.
文摘Failure is a systemic error that affects overall system performance and may eventually crash across the entire configuration.In Real-Time Systems(RTS),deadline is the key to successful completion of the program.If tasks effectively meet the deadline,it means the system is working in pristine order.However,missing the deadline means a systemic fault due to which the system can crash(hard RTS)or degrade inclusive performance(soft RTS).To fine-tune the RTS,tolerance is the critical issue and must be handled with extreme care.This article explains the context of fault tolerance with improvised Joint EDF-RMS algorithm in RTS.The backup method has been derived to prevent the system from being recursively migrating the same task.If any task migrates three times,this migrated task will get shifted to the backup queue.This backup queue assigns the task to a backup processor and is destined for final execution.For performance evaluation purposes,a relative graph between fault and failure rates,failure and total processor utilization along with other averages have been evaluated.Furthermore,these archived results are compared with fault-tolerant Earliest Deadline First(EDF)and Rate Monotonic Scheduling(RMS)algorithms independently in relatively similar conditions.These comparisons show better performance against overloading conditions.
基金the National Natural Science Foundation of China(No.10532050)the Na-tional Science Fund for Distinguished Young Scholars(No.10625211)the Science Development Foundation of Shandong University of Science and Techonogy(No.05g017)
文摘Impact dynamics of multi-rigid-body systems with joint friction is considered. Based on the traditional approximate assumption dealing with impact problem, a general numerical method called the sliding state stepping algorithm is introduced. This method can avoid difficulties in solving differential equations with variable scale and its result can avoid energy inconsistency before and after impact from considering complexily of tangential sliding mode. An example is given to describe details using this algorithm.
文摘To achieve much efficient multimedia transmission over an error-prone wireless network, there are still some problem must to be solved, especially in energy limited wireless sensor network. In this paper, we propose a joint detection based on Schur Algorithm for image wireless transmission over wireless sensor network. To eliminate error transmissions and save transmission energy, we combine Schur algorithm with joint dynamic detection for wireless transmission of JPEG 2000 encoded image which we proposed in [1]. Schur algorithm is used to computing the decomposition of system matrix to decrease the computational complexity. We de-scribe our transmission protocol, and report on its performance evaluation using a simulation testbed we have designed for this purpose. Our results clearly indicate that our method could approach efficient images transmission in wireless sensor network and the transmission errors are significantly reduced when compared to regular transmissions.
基金supported in part by the National Key R&D Program of China under Grant 2022YFB3103500in part by the National Natural Science Foundation of China under Grant 62302195.
文摘Semantic secure communication is an emerging field that combines the principles of source-channel coding with the need for secure data transmission.It is of great significance in modern communications to protect the confidentiality and privacy of sensitive information and prevent information leaks and malicious attacks.This paper presents a novel approach to semantic secure communication through the utilization of joint source-channel coding,which is based on the design of an automated joint source-channel coding algorithm and an encryption and decryption algorithm based on semantic security.The traditional and state-of-the-art joint source-channel coding algorithms are selected as two baselines for different comparison purposes.Experimental results demonstrate that our proposed algorithm outperforms the first baseline algorithm,the traditional source-channel coding,by 61.21%in efficiency under identical channel conditions(SNR=15 dB).In security,our proposed method can resist 2 more types of attacks compared to the two baselines,exhibiting nearly no increases in time consumption and error rate compared to the state-of-the-art joint source-channel coding algorithm while the secure semantic communication is supported.
文摘In core logging, each joint set intersects borehole into some segments. In this research, it has been shown that length of the borehole segments created by each joint set could be computed by trigonometrical relations. By realizing the lengths associated with joint sets, an algorithm has been designed to compute the length of borehole pieces (created by all joint sets) and to calculate RQD. Effect of some factors have been analyzed and applied to the abstract model of the rock mass to have the most similarity to a real rock mass. The program proposed in this study, is a robust platform to calculate the RQD in all directions inside a rock mass without having to deal with the labor of core logging and wrestling with difficulties and inaccuracies of the traditional processes. This is the first algorithmic method for estimating the rock quality which could be employed to develop a new and far more reliable measurement for the degree of jointing inside a rock mass.
基金This project was supported by the National Natural Science Foundation of China (60172033) the Excellent Ph.D.PaperAuthor Foundation of China (200036 ,200237) .
文摘Aiming at three-passive-sensor location system, a generalized 3-dimension (3-D) assignment model is constructed based on property information, and a multi-target programming model is proposed based on direction-finding and property fusion information. The multi-target programming model is transformed into a single target programming problem to resolve, and its data association result is compared with the results which are solved by using one kind of information only. Simulation experiments show the effectiveness of the multi-target programming algorithm with higher data association accuracy and less calculation.
基金supported by the National Natural Science Foundation of China under Grant No.61701284,61472229,31671588 and 61801270the China Postdoctoral Science Foundation Funded Project under Grant No2017M622233+2 种基金the Application Research Project for Postdoctoral Researchers of Qingdao,the Scientific Research Foundation of Shandong University of Science and Technology for Recruited Talents under Grant No.2016RCJJ010the Sci.&Tech.DevelopmentFund of Shandong Province of China underGrant No.2016ZDJS02A11,ZR2017BF015and ZR2017MF027the Taishan Scholar Climbing Program of Shandong Province,and SDUST Research Fund under Grant No.2015TDJH102
文摘This paper presented a joint resource allocation(RA) and admission control(AC) mechanism in software defined mobile networks(SDMNs). In this mechanism, the joint RA and AC problem can be formulated as an optimization problem with the aim of maximizing the number of admitted users while simultaneously minimizing the number of allocated channels. Since the primal problem is modeled to be a mixed integer nonlinear problem(MINLP), we attain the suboptimal solutions to the primal MINLP by convex relaxation. Additionally, with the global information collected by the SDMNs controller, a centralized joint RA and AC(CJRA)algorithm is proposed by the Lagrange dual decomposition technique to obtain the global optimum. Meanwhile, we propose an OpenFlow rules placement strategy to realize CJRA in an efficient way. Moreover, a distributed algorithm is also developed to find the local optimum, showing a performance benchmark for the centralized one. Finally, simulation results show that the proposed centralized algorithm admits more users compared with the distributed.
基金This research was supported by the National Natural Science Foundation of China to Xu Chenwu (39900080, 30270724 and 30370758).
文摘Based on the major gene and polygene mixed inheritance model for multiple correlated quantitative traits, the authors proposed a new joint segregation analysis method of major gene controlling multiple correlated quantitative traits, which include major gene detection and its effect and variation estimation. The effect and variation of major gene are estimated by the maximum likelihood method implemented via expectation-maximization (EM) algorithm. Major gene is tested with the likelihood ratio (LR) test statistic. Extensive simulation studies showed that joint analysis not only increases the statistical power of major gene detection but also improves the precision and accuracy of major gene effect estimates. An example of the plant height and the number of tiller of F2 population in rice cross Duonieai x Zhonghua 11 was used in the illustration. The results indicated that the genetic difference of these two traits in this cross refers to only one pleiotropic major gene. The additive effect and dominance effect of the major gene are estimated as -21.3 and 40.6 cm on plant height, and 22.7 and -25.3 on number of tiller, respectively. The major gene shows overdominance for plant height and close to complete dominance for number of tillers.
基金supported by the National Natural Science Foundation of China (61077079)the Specialized Research Fund for the Doctoral Program of Higher Education (20102304110013)the Program Ex-cellent Academic Leaders of Harbin (2009RFXXG034)
文摘The compressive sensing (CS) theory allows people to obtain signal in the frequency much lower than the requested one of sampling theorem. Because the theory is based on the assumption of that the location of sparse values is unknown, it has many constraints in practical applications. In fact, in many cases such as image processing, the location of sparse values is knowable, and CS can degrade to a linear process. In order to take full advantage of the visual information of images, this paper proposes the concept of dimensionality reduction transform matrix and then se- lects sparse values by constructing an accuracy control matrix, so on this basis, a degradation algorithm is designed that the signal can be obtained by the measurements as many as sparse values and reconstructed through a linear process. In comparison with similar methods, the degradation algorithm is effective in reducing the number of sensors and improving operational efficiency. The algorithm is also used to achieve the CS process with the same amount of data as joint photographic exports group (JPEG) compression and acquires the same display effect.
基金supported by the National Science and Technology Major Project(No.2016ZX05003-003)
文摘Most current prestack AVA joint inversion methods are based on the exact Zoeppritz equation and its various approximations. However, these equations only reflect the relation between reflection coefficients, incidence angles, and elastic parameters on either side of the interface, which means that wave-propagation effects, such as spherical spreading, attenuation, transmission loss, multiples, and event mismatching of P-and S-waves, are not considered and cannot accurately describe the true propagation characteristics of seismic waves. Conventional AVA inversion methods require that these wave-propagation effects have been fully corrected or attenuated before inversion but these requirements can hardly be satisfied in practice. Using a one-dimensional(1 D) earth model, the reflectivity method can simulate the full wavefield response of seismic waves. Therefore, we propose a nonlinear multicomponent prestack AVA joint inversion method based on the vectorized reflectivity method, which uses a fast nondominated sorting genetic algorithm(NSGA II) to optimize the nonlinear multiobjective function to estimate multiple parameters, such as P-wave velocity, S-wave velocity, and density. This approach is robust because it can simultaneously cope with more than one objective function without introducing weight coefficients. Model tests prove the effectiveness of the proposed inversion method. Based on the inversion results, we find that the nonlinear prestack AVA joint inversion using the reflectivity method yields more accurate inversion results than the inversion by using the exact Zoeppritz equation when the wave-propagation effects of transmission loss and internal multiples are not completely corrected.
文摘Disassembly sequence planning is an important step of mechanical maintenance. This article presents an integrated study about the generation and optimizing algorithm of the disassembly sequence. Mechanical products are divided into two categories of components and connectors. The article uses component-joint graph to represent assembly constraints, including the incidence constraints are represented by incidence matrix and the interference constraints are represented by interference constraints. The inspiring factor and pheromone matrix are calculated according to assembly constraints. Then the ant generates its own disassembly sequences one by one and updates the inspiring factor and pheromone matrix. After all iterations, the best disassembly sequence planning of components and connectors are given. Finally, an application instance of the disassembly sequence of the jack is presented to illustrate the validity of this method.
基金Supported by the National Natural Science Foundation of China(11261025,11561075)the Natural Science Foundation of Yunnan Province(2016FB005)the Program for Middle-aged Backbone Teacher,Yunnan University
文摘Normal mixture regression models are one of the most important statistical data analysis tools in a heterogeneous population. When the data set under consideration involves asymmetric outcomes, in the last two decades, the skew normal distribution has been shown beneficial in dealing with asymmetric data in various theoretic and applied problems. In this paper, we propose and study a novel class of models: a skew-normal mixture of joint location, scale and skewness models to analyze the heteroscedastic skew-normal data coming from a heterogeneous population. The issues of maximum likelihood estimation are addressed. In particular, an Expectation-Maximization (EM) algorithm for estimating the model parameters is developed. Properties of the estimators of the regression coefficients are evaluated through Monte Carlo experiments. Results from the analysis of a real data set from the Body Mass Index (BMI) data are presented.