Advanced geological prediction is a crucial means to ensure safety and efficiency in tunnel construction.However,diff erent advanced geological forecasting methods have their own limitations,resulting in poor detectio...Advanced geological prediction is a crucial means to ensure safety and efficiency in tunnel construction.However,diff erent advanced geological forecasting methods have their own limitations,resulting in poor detection accuracy.Using multiple methods to carry out a comprehensive evaluation can eff ectively improve the accuracy of advanced geological prediction results.In this study,geological information is combined with the detection results of geophysical methods,including transient electromagnetic,induced polarization,and tunnel seismic prediction,to establish a comprehensive analysis method of adverse geology.First,the possible main adverse geological problems are determined according to the geological information.Subsequently,various physical parameters of the rock mass in front of the tunnel face can then be derived on the basis of multisource geophysical data.Finally,based on the analysis results of geological information,the multisource data fusion algorithm is used to determine the type,location,and scale of adverse geology.The advanced geological prediction results that can provide eff ective guidance for tunnel construction can then be obtained.展开更多
Side-channel analysis(SCA)has emerged as a research hotspot in the field of cryptanalysis.Among various approaches,unsupervised deep learning-based methods demonstrate powerful information extraction capabilities with...Side-channel analysis(SCA)has emerged as a research hotspot in the field of cryptanalysis.Among various approaches,unsupervised deep learning-based methods demonstrate powerful information extraction capabilities without requiring labeled data.However,existing unsupervised methods,particularly those represented by differential deep learning analysis(DDLA)and its improved variants,while overcoming the dependency on labeled data inherent in template analysis,still suffer from high time complexity and training costs when handling key byte difference comparisons.To address this issue,this paper introduces invariant information clustering(IIC)into SCA for the first time,and thus proposes a novel unsupervised learning-based SCA method,named IIC-SCA.By leveraging mutual information maximization techniques for automatic feature extraction of power leakage data,our approach achieves key recovery through a single training session,eliminating the prohibitive computational overhead of traditional methods that require separate training for all possible key bytes.Experimental results on the ASCAD dataset demonstrate successful key extraction using only 50000 training traces and 2000 attack traces.Furthermore,compared with DDLA,the proposed method reduces training time by approximately 93.40%and memory consumption by about 6.15%,significantly decreasing the temporal and resource costs of unsupervised SCA.This breakthrough provides new insights for developing low-cost,high-efficiency cryptographic attack methodologies.展开更多
Aero engines are key power components that provide thrust for the aircraft.The cerme turbine disc allows the new-generation domestic fighter aircraft to increase the overall thrust of the aero engine.Quantifying coati...Aero engines are key power components that provide thrust for the aircraft.The cerme turbine disc allows the new-generation domestic fighter aircraft to increase the overall thrust of the aero engine.Quantifying coatings and analyzing the stress on the teeth play critical roles in improving the turbine disc’s performance,which are two issues must be solved urgently.First,this work pro poses a quantitative analysis algorithm to conduct the Three-Dimensional(3D)distribution informa tion mining of the extracted coatings.Then,it proposes an Industrial Computed Laminography(ICL)reconstruction algorithm for non-destructively reconstructing the turbine disc’s high-quality3D morphological actual feature.Finally,a Finite Element Analysis(FEA)under the ultimate thrus is conducted on ICL reconstruction to verify the working status of the new-generation aero-engine turbine disc.The results show that the proposed quantitative analysis algorithm digitizes the aggre gated conditions of the coating with a statistically normalized Z_(1)value of–2.15 and a confidence leve higher than 95%.Three image-quality quantitative indicators:Peak Signal-to-Noise Ratio(PSNR)Structural Similarity Index Measure(SSIM),and Normalized Mean Square Distance(NMSD)of the proposed ICL reconstruction algorithm on turbine disc laminographic image are 26.45,0.88,and 0.73respectively,which are better than other algorithms.The mechanical analysis of ICL more realisti cally reflects the stress and deformation than that of 3D modeling.This work provides new ideas for the iterative research of new-generation aero-engine turbine discs.展开更多
[Objective] The research aimed to study a paraffin method without using the microtome,and also introduced an analysis method for optical information of the plant anatomical digital photographs.[Method] The plant mater...[Objective] The research aimed to study a paraffin method without using the microtome,and also introduced an analysis method for optical information of the plant anatomical digital photographs.[Method] The plant material softened or not was embedded in paraffin according to the paraffin method.Cut the thin paraffin sections from the paraffin block with a sharp two-sided blade under anatomical lens.The thin material sections rolled up when they were cut off.Took the section rolls to a slide,and then heated them to melt the paraffin section roll.When the paraffin melted,the sections of plant material were rolled out.After the common or simplified procedures of staining and mounting,the preparations were finished.When an anatomical digital photograph was processed,copy it into the word file and two copies of the original photograph were obtained.One copy was selected to make it to be a negative photograph,and then press the key "Press Screen" to copy the screen frame.After it was copied into the word file,cut of the unnecessary parts and other operations were carried out,then processed photograph was obtained.[Results] The anatomical preparation for research was gotten.The analyzed digital photograph of the leaf structure of Salix matsudana var.matsudana f.tortuosa has some a three-dimensional effect,and the different leaf structures and cells,e.g.cuticle,cell wall,protoplast,vein,etc.can be identified easily.[Conclusion]The paraffin method without using the microtome has advantages of low cost and higher efficiency,which could be applied by the beginner or in the time without a microtome to be used.The analysis of the plant anatomical digital photographs can acquire more structural information than the original digital photographs,which shows the potentiality and prospects of the optical information analysis of the microscopic imagery and its digital photograph.展开更多
How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form cou...How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form could be easily known in some certain way while the parameters are hard to determine. In this paper, based on the evidence theory, a new method is presented to fuse the information of multiple sources and determine the parameters of the prior distribution when the form is known. By taking the prior distributions which result from the information of multiple sources and converting them into corresponding mass functions which can be combined by Dempster-Shafer (D-S) method, we get the combined mass function and the representative points of the prior distribution. These points are used to fit with the given distribution form to determine the parameters of the prior distribution. And then the fused prior distribution is obtained and Bayesian analysis can be performed. How to convert the prior distributions into mass functions properly and get the representative points of the fused prior distribution is the central question we address in this paper. The simulation example shows that the proposed method is effective.展开更多
In the era of large-scale retirement of power batteries,there are information barriers and high recovery costs in their recycling.In view of this,in this study we constructed a tripartite evolutionary game model of th...In the era of large-scale retirement of power batteries,there are information barriers and high recovery costs in their recycling.In view of this,in this study we constructed a tripartite evolutionary game model of the cooperation between power battery production and recycling enterprises and government participation.We analyzed the strategic choice of the three parties in the process of power battery recycling and simulated the influence of participants'willingness and information barriers on the strategic choices of the parties.The results showed that power battery production and recycling enterprises,and the government are affected by each other's willingness to participate at different degrees.The willingness of power battery manufacturers and recycling enterprises to cooperate with each other decreased with increases in information barriers.By analyzing the impact of information barrier on power battery recycling,some suggestions are put forward to provide decision-making reference for promoting the sustainable development of power battery industry.展开更多
A new method creating depth information for 2D/3D conversion was proposed. The distance between objects is determined by the distances between objects and light source position which is estimated by the analysis of th...A new method creating depth information for 2D/3D conversion was proposed. The distance between objects is determined by the distances between objects and light source position which is estimated by the analysis of the image. The estimated lighting value is used to normalize the image. A threshold value is determined by some weighted operation between the original image and the normalized image. By applying the threshold value to the original image, background area is removed. Depth information of interested area is calculated from the lighting changes. The final 3D images converted with the proposed method are used to verify its effectiveness.展开更多
Traditional distributed denial of service(DDoS)detection methods need a lot of computing resource,and many of them which are based on single element have high missing rate and false alarm rate.In order to solve the pr...Traditional distributed denial of service(DDoS)detection methods need a lot of computing resource,and many of them which are based on single element have high missing rate and false alarm rate.In order to solve the problems,this paper proposes a DDoS attack information fusion method based on CNN for multi-element data.Firstly,according to the distribution,concentration and high traffic abruptness of DDoS attacks,this paper defines six features which are respectively obtained from the elements of source IP address,destination IP address,source port,destination port,packet size and the number of IP packets.Then,we propose feature weight calculation algorithm based on principal component analysis to measure the importance of different features in different network environment.The algorithm of weighted multi-element feature fusion proposed in this paper is used to fuse different features,and obtain multi-element fusion feature(MEFF)value.Finally,the DDoS attack information fusion classification model is established by using convolutional neural network and support vector machine respectively based on the MEFF time series.Experimental results show that the information fusion method proposed can effectively fuse multi-element data,reduce the missing rate and total error rate,memory resource consumption,running time,and improve the detection rate.展开更多
Interval-valued data and incomplete data are two key problems for failure analysis of thruster experimental data and have been basically solved by the proposed methods in this paper. Firstly, information data acquired...Interval-valued data and incomplete data are two key problems for failure analysis of thruster experimental data and have been basically solved by the proposed methods in this paper. Firstly, information data acquired from the simulation and evaluation system formed as intervalvalued information system (IIS) is classified by the interval similarity relation. Then, as an improvement of the classical rough set, a new kind of generalized information entropy called "H'-information entropy" is suggested for the measurement of uncertainty and the classification ability of IIS. There is an innovative information filling technique using the properties of H'-information entropy to replace missing data by some smaller estimation intervals. Finally, an improved method of failure analysis synthesized by the above achievements is presented to classify the thruster experimental data, complete the information, and extract the failure rules. The feasibility and advantage of this method is testified by an actual application of failure analysis, whose performance is evaluated by the quantification of E-condition entropy.展开更多
The structural feature shown on a remote sensing image is a synthetic result ofcombination of the deformations produced during the entire geological history of an area.Therefore, the respective tectonic stress field o...The structural feature shown on a remote sensing image is a synthetic result ofcombination of the deformations produced during the entire geological history of an area.Therefore, the respective tectonic stress field of each of the different stages in the complexdeformation of an area can be reconstructed in three steps: (1) geological structures formed atdifferent times are distinguished in remote sensing image interpretation; (2) structuraldeformation fields at different stages are determined by analyzing relationships betweenmicrostructures (joints and fractures) and the related structures (folds and faults); and (3)tectonic stress fields at different stages are respectively recovered through a study of the featuresof structural deformation fields in different periods. Circular structures and related circlular and radial joints are correlated in space to con-cealed structural rises. The authors propose a new method for establishing a natural model ofthe concealed structural rises and calculating the tectonic stress field by using quantitative dataof the remote sensing information of circular structures and related linear structures.展开更多
In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase ...In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase rate, and patent activity. These indicators were quantified into several indexes and then integrated into an evaluation score to provide promising technologies. As a result of the suggested patent analysis, four technologies out of twenty two in details classification were selected, which showed outstanding technology competitiveness, high patent share and increasing rates as well as high recent-patent-ratios and triad-patent-family-ratios. Each of the selected technologies scored more than 10 points in total, and the following four technologies were suggested as promising ones in the field of next generation mobile communication: 1) 3GPP based mobile communication, 2) beyond 4G mobile communication, 3) IEEE 802.16 based mobile communication, which are in medium classification of broadband mobile communication system, and 4) testing/certification system of mobile communication, which is in medium classification of mobile communication testing/certification system.展开更多
The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum...The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum policy in the corresponding security level. Through the random survey on the information assets of multiple departments, this paper proposes the relative deviation distance of security policy configuration as risk measure parameter based on the distance of information-state transition(DIT) theory. By quantitatively analyzing the information asset weight, deviation degree and DIT, we establish the evaluation model for information system. With example analysis, the results prove that this method conducts effective risk evaluation on the information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system.展开更多
This paper presents a brief review of distant biological communication phenomena, information fields explained as a transduction of information without energy displacement, experimental requirements for testing this h...This paper presents a brief review of distant biological communication phenomena, information fields explained as a transduction of information without energy displacement, experimental requirements for testing this hypothesis with human beings using electrophotonic analysis, oxymetry and electromagnetic shielding. Finally, authors present preliminary results and future work on this new field of interdisciplinary research.展开更多
Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods...Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment.展开更多
Purpose:This research proposes a patent portfolio analysis model based on the legal status information to chart out a competitive landscape in a particular field,enabling organizations to position themselves within th...Purpose:This research proposes a patent portfolio analysis model based on the legal status information to chart out a competitive landscape in a particular field,enabling organizations to position themselves within the overall technology landscape.Design/methodology/approach:Three indicators were selected for the proposed model:Patent grant rate,valid patents rate and patent maintenance period.The model uses legal status information to perform a qualitative evaluation of relative values of the individual patents,countries or regions’ technological capabilities and competitiveness of patent applicants.The results are visualized by a four-quadrant bubble chart To test the effectiveness of the model,it is used to present a competitive landscape in the lithium ion battery field.Findings:The model can be used to evaluate the values of the individual patents,highlight countries or regions’ positions in the field,and rank the competitiveness of patent applicants in the field.Research limitations:The model currently takes into consideration only three legal status indicators.It is actually feasible to introduce more indicators such as the reason for invalid patents and the distribution of patent maintenance time and associate them with those in the proposed model.Practical implications:Analysis of legal status information in combination of patent application information can help an organization to spot gaps in its patent claim coverage,as well as evaluate patent quality and maintenance situation of its granted patents.The study results can be used to support technology assessment,technology innovation and intellectual property management.Originality/value:Prior studies attempted to assess patent quality or competitiveness by using either single patent legal status indicator or comparative analysis of the impacts of each indicator.However,they are insufficient in presenting the combined effects of the evaluation indicators.Using our model,it appears possible to get a more complete and objective picture of the current competitive situation.展开更多
With the SPSS and the help of factor method and hierarchical clustered method,journal articles on digital information resources(DIR) from CNKI in the past ten years are analyzed with a co-word analytical method in thi...With the SPSS and the help of factor method and hierarchical clustered method,journal articles on digital information resources(DIR) from CNKI in the past ten years are analyzed with a co-word analytical method in this paper. The hot issues of studies on DIR and the relationship between those subjects are analyzed in this investigation as well.展开更多
Houses are key elements both in aerial photographs and maps.Their extraction has significance not only to military,but also to automatical rela-tive orientation,automatical absolute orientation,feature-based matching,...Houses are key elements both in aerial photographs and maps.Their extraction has significance not only to military,but also to automatical rela-tive orientation,automatical absolute orientation,feature-based matching,sys-tematic description,automatic data aquisition,structure analysis,image under-standing,digital mapping,and construction of urban geographic information sys-tem(UGIS).For this purpose,this paper mainly addresses:(1)a brief introduc-tion to the multiresolution analysis of wavelet theory and its difference formLaplacian pyramid,(2)how to generate the multiresolution images and edge fea-tures,and(3)how to employ these multiresolution images and edge features toextract the houses from aerial photographs by multiresolution structure and infor-mation fusion.展开更多
A factor analysis was applied to soil geochemical data to define anomalies related to buried Pb-Zn mineralization.A favorable main factor with a strong association of the elements Zn,Cu and Pb,related to mineralizatio...A factor analysis was applied to soil geochemical data to define anomalies related to buried Pb-Zn mineralization.A favorable main factor with a strong association of the elements Zn,Cu and Pb,related to mineralization,was selected for interpretation.The median+2 MAD(median absolute deviation)method of exploratory data analysis(EDA)and C-A(concentration-area)fractal modeling were then applied to the Mahalanobis distance,as defined by Zn,Cu and Pb from the factor analysis to set the thresholds for defining multi-element anomalies.As a result,the median+2 MAD method more successfully identified the Pb-Zn mineralization than the C-A fractal model.The soil anomaly identified by the median+2 MAD method on the Mahalanobis distances defined by three principal elements(Zn,Cu and Pb)rather than thirteen elements(Co,Zn,Cu,V,Mo,Ni,Cr,Mn,Pb,Ba,Sr,Zr and Ti)was the more favorable reflection of the ore body.The identified soil geochemical anomalies were compared with the in situ economic Pb-Zn ore bodies for validation.The results showed that the median+2 MAD approach is capable of mapping both strong and weak geochemical anomalies related to buried Pb-Zn mineralization,which is therefore useful at the reconnaissance drilling stage.展开更多
基金National Natural Science Foundation of China(grant numbers 42293351,41877239,51422904 and 51379112).
文摘Advanced geological prediction is a crucial means to ensure safety and efficiency in tunnel construction.However,diff erent advanced geological forecasting methods have their own limitations,resulting in poor detection accuracy.Using multiple methods to carry out a comprehensive evaluation can eff ectively improve the accuracy of advanced geological prediction results.In this study,geological information is combined with the detection results of geophysical methods,including transient electromagnetic,induced polarization,and tunnel seismic prediction,to establish a comprehensive analysis method of adverse geology.First,the possible main adverse geological problems are determined according to the geological information.Subsequently,various physical parameters of the rock mass in front of the tunnel face can then be derived on the basis of multisource geophysical data.Finally,based on the analysis results of geological information,the multisource data fusion algorithm is used to determine the type,location,and scale of adverse geology.The advanced geological prediction results that can provide eff ective guidance for tunnel construction can then be obtained.
文摘Side-channel analysis(SCA)has emerged as a research hotspot in the field of cryptanalysis.Among various approaches,unsupervised deep learning-based methods demonstrate powerful information extraction capabilities without requiring labeled data.However,existing unsupervised methods,particularly those represented by differential deep learning analysis(DDLA)and its improved variants,while overcoming the dependency on labeled data inherent in template analysis,still suffer from high time complexity and training costs when handling key byte difference comparisons.To address this issue,this paper introduces invariant information clustering(IIC)into SCA for the first time,and thus proposes a novel unsupervised learning-based SCA method,named IIC-SCA.By leveraging mutual information maximization techniques for automatic feature extraction of power leakage data,our approach achieves key recovery through a single training session,eliminating the prohibitive computational overhead of traditional methods that require separate training for all possible key bytes.Experimental results on the ASCAD dataset demonstrate successful key extraction using only 50000 training traces and 2000 attack traces.Furthermore,compared with DDLA,the proposed method reduces training time by approximately 93.40%and memory consumption by about 6.15%,significantly decreasing the temporal and resource costs of unsupervised SCA.This breakthrough provides new insights for developing low-cost,high-efficiency cryptographic attack methodologies.
基金supported by the National Natural Science Foundation of China(No.51975026)。
文摘Aero engines are key power components that provide thrust for the aircraft.The cerme turbine disc allows the new-generation domestic fighter aircraft to increase the overall thrust of the aero engine.Quantifying coatings and analyzing the stress on the teeth play critical roles in improving the turbine disc’s performance,which are two issues must be solved urgently.First,this work pro poses a quantitative analysis algorithm to conduct the Three-Dimensional(3D)distribution informa tion mining of the extracted coatings.Then,it proposes an Industrial Computed Laminography(ICL)reconstruction algorithm for non-destructively reconstructing the turbine disc’s high-quality3D morphological actual feature.Finally,a Finite Element Analysis(FEA)under the ultimate thrus is conducted on ICL reconstruction to verify the working status of the new-generation aero-engine turbine disc.The results show that the proposed quantitative analysis algorithm digitizes the aggre gated conditions of the coating with a statistically normalized Z_(1)value of–2.15 and a confidence leve higher than 95%.Three image-quality quantitative indicators:Peak Signal-to-Noise Ratio(PSNR)Structural Similarity Index Measure(SSIM),and Normalized Mean Square Distance(NMSD)of the proposed ICL reconstruction algorithm on turbine disc laminographic image are 26.45,0.88,and 0.73respectively,which are better than other algorithms.The mechanical analysis of ICL more realisti cally reflects the stress and deformation than that of 3D modeling.This work provides new ideas for the iterative research of new-generation aero-engine turbine discs.
基金Supported by National Natural Science Foundation of China(30770124)~~
文摘[Objective] The research aimed to study a paraffin method without using the microtome,and also introduced an analysis method for optical information of the plant anatomical digital photographs.[Method] The plant material softened or not was embedded in paraffin according to the paraffin method.Cut the thin paraffin sections from the paraffin block with a sharp two-sided blade under anatomical lens.The thin material sections rolled up when they were cut off.Took the section rolls to a slide,and then heated them to melt the paraffin section roll.When the paraffin melted,the sections of plant material were rolled out.After the common or simplified procedures of staining and mounting,the preparations were finished.When an anatomical digital photograph was processed,copy it into the word file and two copies of the original photograph were obtained.One copy was selected to make it to be a negative photograph,and then press the key "Press Screen" to copy the screen frame.After it was copied into the word file,cut of the unnecessary parts and other operations were carried out,then processed photograph was obtained.[Results] The anatomical preparation for research was gotten.The analyzed digital photograph of the leaf structure of Salix matsudana var.matsudana f.tortuosa has some a three-dimensional effect,and the different leaf structures and cells,e.g.cuticle,cell wall,protoplast,vein,etc.can be identified easily.[Conclusion]The paraffin method without using the microtome has advantages of low cost and higher efficiency,which could be applied by the beginner or in the time without a microtome to be used.The analysis of the plant anatomical digital photographs can acquire more structural information than the original digital photographs,which shows the potentiality and prospects of the optical information analysis of the microscopic imagery and its digital photograph.
文摘How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form could be easily known in some certain way while the parameters are hard to determine. In this paper, based on the evidence theory, a new method is presented to fuse the information of multiple sources and determine the parameters of the prior distribution when the form is known. By taking the prior distributions which result from the information of multiple sources and converting them into corresponding mass functions which can be combined by Dempster-Shafer (D-S) method, we get the combined mass function and the representative points of the prior distribution. These points are used to fit with the given distribution form to determine the parameters of the prior distribution. And then the fused prior distribution is obtained and Bayesian analysis can be performed. How to convert the prior distributions into mass functions properly and get the representative points of the fused prior distribution is the central question we address in this paper. The simulation example shows that the proposed method is effective.
基金supported by the science and technology research project of Chongqing Education Commission“Research on the renewable effect of China's renewable resources industry in the relationship between economic growth and environmental pollution”[Grant No.KJQN202000532]the humanities and Social Sciences Planning Project of Chongqing Education Commission“Research on supporting policies of power battery producer responsibility extension system un‐der the new development pattern of double cycle”[Grant No.21SKGH039].
文摘In the era of large-scale retirement of power batteries,there are information barriers and high recovery costs in their recycling.In view of this,in this study we constructed a tripartite evolutionary game model of the cooperation between power battery production and recycling enterprises and government participation.We analyzed the strategic choice of the three parties in the process of power battery recycling and simulated the influence of participants'willingness and information barriers on the strategic choices of the parties.The results showed that power battery production and recycling enterprises,and the government are affected by each other's willingness to participate at different degrees.The willingness of power battery manufacturers and recycling enterprises to cooperate with each other decreased with increases in information barriers.By analyzing the impact of information barrier on power battery recycling,some suggestions are put forward to provide decision-making reference for promoting the sustainable development of power battery industry.
文摘A new method creating depth information for 2D/3D conversion was proposed. The distance between objects is determined by the distances between objects and light source position which is estimated by the analysis of the image. The estimated lighting value is used to normalize the image. A threshold value is determined by some weighted operation between the original image and the normalized image. By applying the threshold value to the original image, background area is removed. Depth information of interested area is calculated from the lighting changes. The final 3D images converted with the proposed method are used to verify its effectiveness.
基金This work was supported by the Hainan Provincial Natural Science Foundation of China[2018CXTD333,617048]National Natural Science Foundation of China[61762033,61702539]+1 种基金Hainan University Doctor Start Fund Project[kyqd1328]Hainan University Youth Fund Project[qnjj1444].
文摘Traditional distributed denial of service(DDoS)detection methods need a lot of computing resource,and many of them which are based on single element have high missing rate and false alarm rate.In order to solve the problems,this paper proposes a DDoS attack information fusion method based on CNN for multi-element data.Firstly,according to the distribution,concentration and high traffic abruptness of DDoS attacks,this paper defines six features which are respectively obtained from the elements of source IP address,destination IP address,source port,destination port,packet size and the number of IP packets.Then,we propose feature weight calculation algorithm based on principal component analysis to measure the importance of different features in different network environment.The algorithm of weighted multi-element feature fusion proposed in this paper is used to fuse different features,and obtain multi-element fusion feature(MEFF)value.Finally,the DDoS attack information fusion classification model is established by using convolutional neural network and support vector machine respectively based on the MEFF time series.Experimental results show that the information fusion method proposed can effectively fuse multi-element data,reduce the missing rate and total error rate,memory resource consumption,running time,and improve the detection rate.
基金jointly supported by the National Natural Science Foundation (Nos.61175008,60935001)National Basic Research Program of China (No.2009CB824900)+1 种基金the Space Foundation of Supporting-Technology (No.2011-HTSHJD002)the Aeronautical Science Foundation of China (No.20105557007)
文摘Interval-valued data and incomplete data are two key problems for failure analysis of thruster experimental data and have been basically solved by the proposed methods in this paper. Firstly, information data acquired from the simulation and evaluation system formed as intervalvalued information system (IIS) is classified by the interval similarity relation. Then, as an improvement of the classical rough set, a new kind of generalized information entropy called "H'-information entropy" is suggested for the measurement of uncertainty and the classification ability of IIS. There is an innovative information filling technique using the properties of H'-information entropy to replace missing data by some smaller estimation intervals. Finally, an improved method of failure analysis synthesized by the above achievements is presented to classify the thruster experimental data, complete the information, and extract the failure rules. The feasibility and advantage of this method is testified by an actual application of failure analysis, whose performance is evaluated by the quantification of E-condition entropy.
基金This study was sponsored by The Open Research Laboratory of Quantitative Prediction,Exploration and Assessment of Mineral Resources,MGMR,China.
文摘The structural feature shown on a remote sensing image is a synthetic result ofcombination of the deformations produced during the entire geological history of an area.Therefore, the respective tectonic stress field of each of the different stages in the complexdeformation of an area can be reconstructed in three steps: (1) geological structures formed atdifferent times are distinguished in remote sensing image interpretation; (2) structuraldeformation fields at different stages are determined by analyzing relationships betweenmicrostructures (joints and fractures) and the related structures (folds and faults); and (3)tectonic stress fields at different stages are respectively recovered through a study of the featuresof structural deformation fields in different periods. Circular structures and related circlular and radial joints are correlated in space to con-cealed structural rises. The authors propose a new method for establishing a natural model ofthe concealed structural rises and calculating the tectonic stress field by using quantitative dataof the remote sensing information of circular structures and related linear structures.
文摘In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase rate, and patent activity. These indicators were quantified into several indexes and then integrated into an evaluation score to provide promising technologies. As a result of the suggested patent analysis, four technologies out of twenty two in details classification were selected, which showed outstanding technology competitiveness, high patent share and increasing rates as well as high recent-patent-ratios and triad-patent-family-ratios. Each of the selected technologies scored more than 10 points in total, and the following four technologies were suggested as promising ones in the field of next generation mobile communication: 1) 3GPP based mobile communication, 2) beyond 4G mobile communication, 3) IEEE 802.16 based mobile communication, which are in medium classification of broadband mobile communication system, and 4) testing/certification system of mobile communication, which is in medium classification of mobile communication testing/certification system.
基金Supported by the National Natural Science Foundation of China(61662009)the Education Reform Project in Guizhou Province(SJJG201404)the Natural Science Foundation of Guizhou Province Education Department(KY(2015)367)
文摘The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum policy in the corresponding security level. Through the random survey on the information assets of multiple departments, this paper proposes the relative deviation distance of security policy configuration as risk measure parameter based on the distance of information-state transition(DIT) theory. By quantitatively analyzing the information asset weight, deviation degree and DIT, we establish the evaluation model for information system. With example analysis, the results prove that this method conducts effective risk evaluation on the information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system.
文摘This paper presents a brief review of distant biological communication phenomena, information fields explained as a transduction of information without energy displacement, experimental requirements for testing this hypothesis with human beings using electrophotonic analysis, oxymetry and electromagnetic shielding. Finally, authors present preliminary results and future work on this new field of interdisciplinary research.
基金supported by Sun Yat-sen University Cultivation Fund for Young Teachers(Grant No.:20000-3161102)the National Social Science Fundation of China(Grant No.:08CTQ015)
文摘Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment.
基金supported by the Chinese Academy of Sciences(Grant No.:Y110071001)
文摘Purpose:This research proposes a patent portfolio analysis model based on the legal status information to chart out a competitive landscape in a particular field,enabling organizations to position themselves within the overall technology landscape.Design/methodology/approach:Three indicators were selected for the proposed model:Patent grant rate,valid patents rate and patent maintenance period.The model uses legal status information to perform a qualitative evaluation of relative values of the individual patents,countries or regions’ technological capabilities and competitiveness of patent applicants.The results are visualized by a four-quadrant bubble chart To test the effectiveness of the model,it is used to present a competitive landscape in the lithium ion battery field.Findings:The model can be used to evaluate the values of the individual patents,highlight countries or regions’ positions in the field,and rank the competitiveness of patent applicants in the field.Research limitations:The model currently takes into consideration only three legal status indicators.It is actually feasible to introduce more indicators such as the reason for invalid patents and the distribution of patent maintenance time and associate them with those in the proposed model.Practical implications:Analysis of legal status information in combination of patent application information can help an organization to spot gaps in its patent claim coverage,as well as evaluate patent quality and maintenance situation of its granted patents.The study results can be used to support technology assessment,technology innovation and intellectual property management.Originality/value:Prior studies attempted to assess patent quality or competitiveness by using either single patent legal status indicator or comparative analysis of the impacts of each indicator.However,they are insufficient in presenting the combined effects of the evaluation indicators.Using our model,it appears possible to get a more complete and objective picture of the current competitive situation.
基金supported by the Fund for Philosophy and Social Sciences,Ministry of Education of China(Grant No.05JZD00024)
文摘With the SPSS and the help of factor method and hierarchical clustered method,journal articles on digital information resources(DIR) from CNKI in the past ten years are analyzed with a co-word analytical method in this paper. The hot issues of studies on DIR and the relationship between those subjects are analyzed in this investigation as well.
文摘Houses are key elements both in aerial photographs and maps.Their extraction has significance not only to military,but also to automatical rela-tive orientation,automatical absolute orientation,feature-based matching,sys-tematic description,automatic data aquisition,structure analysis,image under-standing,digital mapping,and construction of urban geographic information sys-tem(UGIS).For this purpose,this paper mainly addresses:(1)a brief introduc-tion to the multiresolution analysis of wavelet theory and its difference formLaplacian pyramid,(2)how to generate the multiresolution images and edge fea-tures,and(3)how to employ these multiresolution images and edge features toextract the houses from aerial photographs by multiresolution structure and infor-mation fusion.
文摘A factor analysis was applied to soil geochemical data to define anomalies related to buried Pb-Zn mineralization.A favorable main factor with a strong association of the elements Zn,Cu and Pb,related to mineralization,was selected for interpretation.The median+2 MAD(median absolute deviation)method of exploratory data analysis(EDA)and C-A(concentration-area)fractal modeling were then applied to the Mahalanobis distance,as defined by Zn,Cu and Pb from the factor analysis to set the thresholds for defining multi-element anomalies.As a result,the median+2 MAD method more successfully identified the Pb-Zn mineralization than the C-A fractal model.The soil anomaly identified by the median+2 MAD method on the Mahalanobis distances defined by three principal elements(Zn,Cu and Pb)rather than thirteen elements(Co,Zn,Cu,V,Mo,Ni,Cr,Mn,Pb,Ba,Sr,Zr and Ti)was the more favorable reflection of the ore body.The identified soil geochemical anomalies were compared with the in situ economic Pb-Zn ore bodies for validation.The results showed that the median+2 MAD approach is capable of mapping both strong and weak geochemical anomalies related to buried Pb-Zn mineralization,which is therefore useful at the reconnaissance drilling stage.