In recent years,the volumetric approach of 3D reconstruction has emerged as apowerful clinic method for biomedical applications.This approach is based on a voxelrepresented object which maintains many details of the s...In recent years,the volumetric approach of 3D reconstruction has emerged as apowerful clinic method for biomedical applications.This approach is based on a voxelrepresented object which maintains many details of the surface and the internal con-structures of the original body.Because of a huge amount of data,the volume dataset takes a large size of memory,and a high processing speed is required in order…展开更多
The exercise recommendation system is emerging as a promising application in online learning scenarios,providing personalized recommendations to assist students with explicit learning directions.Existing solutions gen...The exercise recommendation system is emerging as a promising application in online learning scenarios,providing personalized recommendations to assist students with explicit learning directions.Existing solutions generally follow a collaborative filtering paradigm,while the implicit connections between students(exercises)have been largely ignored.In this study,we aim to propose an exercise recommendation paradigm that can reveal the latent connections between student-student(exercise-exercise).Specifically,a new framework was proposed,namely personalized exercise recommendation with student and exercise portraits(PERP).It consists of three sequential and interdependent modules:Collaborative student exercise graph(CSEG)construction,joint random walk,and recommendation list optimization.Technically,CSEG is created as a unified heterogeneous graph with students’response behaviors and student(exercise)relationships.Then,a joint random walk to take full advantage of the spectral properties of nearly uncoupled Markov chains is performed on CSEG,which allows for full exploration of both similar exercises that students have finished and connections between students(exercises)with similar portraits.Finally,we propose to optimize the recommendation list to obtain different exercise suggestions.After analyses of two public datasets,the results demonstrated that PERP can satisfy novelty,accuracy,and diversity.展开更多
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic hazards.As IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection method...Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic hazards.As IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection methods.This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization(PSO)to address the risks associated with IoT botnets.Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically.Fuzzy component settings are optimized using PSO to improve accuracy.The methodology allows for more complex thinking by transitioning from binary to continuous assessment.Instead of expert inputs,PSO data-driven tunes rules and membership functions.This study presents a complete IoT botnet risk assessment system.The methodology helps security teams allocate resources by categorizing threats as high,medium,or low severity.This study shows how CICIoT2023 can assess cyber risks.Our research has implications beyond detection,as it provides a proactive approach to risk management and promotes the development of more secure IoT environments.展开更多
A type of specific fractured hydrocarbon reservoir, a shale fractured reservoir, exists in the Shengli oilfield. Due to very small porosity of this type, low sensitivity to the variation of petrochemical property para...A type of specific fractured hydrocarbon reservoir, a shale fractured reservoir, exists in the Shengli oilfield. Due to very small porosity of this type, low sensitivity to the variation of petrochemical property parameters, and strong anisotropy, it is very difficult to explore for them. So far, there is no set of mature methods for recognition of direction, distribution, and density of the fractures by an integrated analysis of geologic, geophysical, well log, drilling data, and etc. This paper presents a new method for acoustic impedance variation with azimuth (IPVA), based on existing fracture detection methods. Seismic acquisition, processing, and recognition techniques were developed for detecting directional vertical fractures using multi-azimuth P wave data in combination with the seismic and geological features of shale fractures in the Luojia area. The IPVA research is carried out for recognizing the distribution, strike, and density of fractures based on the study of velocity variation with azimuth (VVA) and amplitude variation with azimuth (AVA) for full azimuth P wave data at different CMP positions. Through practical application in the Luojia area, primary results have been obtained which verifies that the IPVA method provides good potential for quantitative detection of parallel, high angle, shale fractures.展开更多
Recently, unmanned aerial vehicles (UAVs) acting as relay platforms have attracted considerable attention due to the advantages of extending coverage and improving connectivity for long-range communications. Specifi...Recently, unmanned aerial vehicles (UAVs) acting as relay platforms have attracted considerable attention due to the advantages of extending coverage and improving connectivity for long-range communications. Specifically, in the scenario where the access point (AP) is mobile, a UAV needs to find an efficient path to guarantee the connectivity of the relay link. Motivated by this fact, this paper proposes an optimal design for beamforming (BF) and UAV path planning. First of all, we study a dual-hop amplify-and-forward (AF) wireless relay network, in which a UAV is used as relay between a mobile AP and a fixed base station (BS). In the network, both of the AP and the BS are equipped with multiple antennas, whereas the UAV has a single antenna. Then, we obtain the output signal^to-noise ratio (SNR) of the dual-hop relay network. Based on the criterion of maximizing the output SNR, we develop an optimal design to obtain the solution of the optimal BF weight vector and the UAV heading angle. Next, we derive the closed-form outage probability (OP) expression to investigate the performance of the dual-hop relay network conveniently. Finally, computer simulations show that the proposed approach can obtain nearly optimal flying path and OP performance, indicating the effectiveness of the proposed algorithm. Furthermore, we find that increasing the antenna number at the BS or the maximal heading angle can significantly improve the performance of the considered relay network.展开更多
By the nonlinear optimization theory, we predict the yield function of single BCC crystals in Hill's criterion form. Then we give a formula on the macroscopic yield function of a BCC polycrystal Ω under Sachs' mode...By the nonlinear optimization theory, we predict the yield function of single BCC crystals in Hill's criterion form. Then we give a formula on the macroscopic yield function of a BCC polycrystal Ω under Sachs' model, where the volume average of the yield functions of all BCC crystallites in Ω is taken as the macroscopic yield function of the BCC polycrystal. In constructing the formula, we try to find the relationship among the macroscopic yield function, the orientation distribution function (ODF), and the single BCC crystal's plasticity. An expression for the yield stress of a uniaxial tensile problem is derived under Taylor's model in order to compare the expression with that of the macroscopic yield function.展开更多
A visualization tool was developed through a web browser based on Java applets embedded into HTML pages, in order to provide a world access to the EAST experimental data. It can display data from various trees in diff...A visualization tool was developed through a web browser based on Java applets embedded into HTML pages, in order to provide a world access to the EAST experimental data. It can display data from various trees in different servers in a single panel. With WebScope, it is easier to make a comparison between different data sources and perform a simple calculation over different data sources.展开更多
This paper presents a serial synchronous scanning mode in fiat panel display (FPD) by adding a latch buffer between the serializer and the driving buffer. Comparing with conventional techniques, the proposed structu...This paper presents a serial synchronous scanning mode in fiat panel display (FPD) by adding a latch buffer between the serializer and the driving buffer. Comparing with conventional techniques, the proposed structure can efficiently reduce the brightness loss and improve the transmission performance. Theoretical analysis and experimental results show that the ratio between the lightest weight display time and the relative transmission time is a tradeoff between brightness loss and transmission efficiency.展开更多
A kind of single linked lists named aggregative chain is introduced to the algorithm, thus improving the architecture of FP tree. The new FP tree is a one-way tree and only the pointers that point its parent at each n...A kind of single linked lists named aggregative chain is introduced to the algorithm, thus improving the architecture of FP tree. The new FP tree is a one-way tree and only the pointers that point its parent at each node are kept. Route information of different nodes in a same item are compressed into aggregative chains so that the frequent patterns will be produced in aggregative chains without generating node links and conditional pattern bases. An example of Web key words retrieval is given to analyze and verify the frequent pattern algorithm in this paper.展开更多
Correspondence analysis and fuzzy C-means cluster methods were used to divide the stratigraphy of heavy mineral assemblages, and the sediment sources and depositional dynamics of the environment reconstructed. The ass...Correspondence analysis and fuzzy C-means cluster methods were used to divide the stratigraphy of heavy mineral assemblages, and the sediment sources and depositional dynamics of the environment reconstructed. The assemblages were taken from marine sediments from the late Pleistocene to the Holocene in Core Q43 situated on the outer shelf of the East China Sea. Based on the variable boundaries of the mineral assemblage at 63 and 228 cmbsf (cm below sea floor), the core might have previously been divided into three sediment strata marked with units Ⅰ, Ⅱ and Ⅲ, which would be consistent with the divided sediment stratum of the core using minor element geochemistry. The downcore distribution of heavy minerals divided the sedimentary sequence into three major units, which were further subdivided into four subunits. The interval between 0 and 63 cmbsf of the core (unit Ⅰ), which spans the Holocene and the uppermost late Pleistocene, is characterized by a hornblende-epidote-pyroxene assemblage, and contains relatively a smaller amount of schistic mineral and authigenic pyrite. In comparison, the interval between 63 and 228 cmbsf (unit Ⅱ), is representative of the Last Glacial Maximum (LGM), and features a hornblende-epidote-magnetite-ilmenite assemblage containing the highest concentrations of heavy minerals and opaque minerals. However, the interval between 228 and 309 cmbsf (unit Ⅲ), which spans the subinterglacial period, is characterized by a hornblende-authigenic-pyrite-mica assemblage. Relative ratios of some heavy minerals can be used as tracers of clastic sediment sources. The lower part of the sediment core shows the highest magnetite/ilmenite ratio and relatively high hornblende/augite and hornblende/epidote ratios. The middle core shows the highest hornblende/augite and hornblende/epidote ratios, and the lowest magnetite/ilmenite ratio. The upper part exhibits a slightly higher magnetite/ilmenite ratio, and also the lowest hornblende/augite and hornblende/epidote ratios. The distribution of the mineral ratio is consistent with stratigraphic division in heavy mineral data using correspondence analysis and fuzzy C-means clustering. Variations in heavy mineral association and mineral ratio in core Q43 revealed changes in provenance and depositional environment of the southern outer shelf of the East China Sea since the late Pleistocene, well corresponding to interglacial and glacial cycles.展开更多
Implementation of a web-based logbook system on EAST is introduced, which can store the comments for the experiments into a database and access the documents via various web browsers. The three-tier software architect...Implementation of a web-based logbook system on EAST is introduced, which can store the comments for the experiments into a database and access the documents via various web browsers. The three-tier software architecture and asynchronous access technology are adopted to improve the system effectively. Authorized users can view the information of real-time discharge, comments from others and signal plots; add, delete, or revise their own comments; search signal data or comments under complicated search conditions; and collect relevant information and output it to an excel file. The web pages can be automatically updated after a new discharge is completed and without refreshment.展开更多
We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol...We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol in his DOC document after plagiarizing material from web and corresponding optimized algorithm which improves the speed of comparison. Our model is suitable for the anti-plagiarism and monitoring of large document collections, and it can also be used in digital library, E-learning and other fields.展开更多
Zika virus(ZIKV)is emerging as a significant pathogen worldwide and may cause severe neurological disorders such as fetal microcephaly and Guillain-Barre syndrome.No drug or listed vaccines are currently available for...Zika virus(ZIKV)is emerging as a significant pathogen worldwide and may cause severe neurological disorders such as fetal microcephaly and Guillain-Barre syndrome.No drug or listed vaccines are currently available for preventing ZIKV infection.As a major target of neutralizing,ZIKV envelop(E)protein usually used for vaccine development.Nevertheless,the immunogenicity of ZIKV envelop(E)protein expressed by baculovirus display system has never been assessed.In this study,we reported a new strategy for surface display of ZIKV E protein by a recombinant baculovirus vector derived from Autographa californica multiple nuclear polyhedrosis virus(AcMNPV)and assessed its immunogenicity in mice.We produced recombinant fusion ZIKV E protein linked with signal peptide(SP)and transmembrane domain(TM)of AcMNPV GP64.The results showed that the recombinant protein was easy to produce by baculovirus display system.BALB/c mice immunized with this recombinant E protein developed ZIKV specific serum antibodies.The anti-E protein sera from the mice were able to effectively neutralize ZIKV in vitro.More importantly,AG6(IFN-a/b and IFN-c receptor deficient)mice immunized with recombinant E protein were protected against lethal ZIKV challenge.Together,thesefindings demonstrated that the recombinant E protein displayed by baculovirus can be conveniently prepared and displayed good immunogenicity in immunized mice.It is a promising practical approach for prompting the development of vaccine and related immunology research.展开更多
Ontology mapping is a key interoperability enabler for the semantic web. In this paper,a new ontology mapping approach called ontology mapping based on Bayesian network( OM-BN) is proposed. OM-BN combines the models o...Ontology mapping is a key interoperability enabler for the semantic web. In this paper,a new ontology mapping approach called ontology mapping based on Bayesian network( OM-BN) is proposed. OM-BN combines the models of ontology and Bayesian Network,and applies the method of Multi-strategy to computing similarity. In OM-BN,the characteristics of ontology,such as tree structure and semantic inclusion relations among concepts,are used during the process of translation from ontology to ontology Bayesian network( OBN). Then the method of Multi-strategy is used to create similarity table( ST) for each concept-node in OBN. Finally,the iterative process of mapping reasoning is used to deduce new mappings from STs,repeatedly.展开更多
Lanmuchangite is a new thallium hydrous sulfate from the oxidation zone hosting rich thallium ore bodies in the Lanmuchang thallium(mercury) ore deposit, Xinren County, Guizhou Province, China. This new mineral is nam...Lanmuchangite is a new thallium hydrous sulfate from the oxidation zone hosting rich thallium ore bodies in the Lanmuchang thallium(mercury) ore deposit, Xinren County, Guizhou Province, China. This new mineral is named after the locality where it was discovered. The mineral is associated with melanterite, pickeringite, potassium alum, jarosite, gypsum, arsenic blane, sulphur and some unknown minerals. The aggregates of lanmuchangite range from 2 to 10 mm in size. In general, the aggregates are compact and massive in form and are composed of anhedral granular crystals measuring in size from 40 to 90μm, but the single crystal grains show distinct boundaries. Parallel columnar aggregates are occasionally seen, which are composed of subhedral to euhedral columnar crystals ranging in size from 15 to 65μm. White, light yellow to white in color, glassy in luster and transparent. Hv-{mess.}=94-124 kg/mm+2, Hm={3.1}-{3.4}, density={2.22} g/cm+3. Under the polarization microscope the mineral is colorless and homogeneous, with N-{meas.}={1.495}. It is easily water-soluble. The average chemical composition is: Tl-2O={33.25}, Al-2O-3={8.07}, SO-3={25.19}, SiO-2={0.10}, K-2O={0.35}, CaO={0.08}, MgO={0.06}, FeO={0.04} and H-2O={33.46} [the crystal water (H-2O) was measured by thermogravimetery (TG) while the other composition were determined by electron microprobe], totaling {100.60%}. The empirical formula is (Tl-{1.00}K-{0.05})-{1.05} (Al-{1.01}Si-{0.01}Ca-{0.01}Mg-{0.01})-{1.04}-{2.01}·{11.88} H-2O and the simplified formula is TlAl-2·12H-2O. The compatibility of lanmuchangite is {-0.03} and its value falls within the range of {±0.020}-{±0.039}, so the compatibility is excellent. Its TG curve demonstrated that the crystal water was lost (i.e., dewatering) in stages at 101, 130 and 230℃. At the temperature of 243℃ the process of dewatering came to the end and the sum of lost crystal water reaches {33.30} wt%. IR spectroscopic analysis showed that the absorption bands 3374-3147 cm+{-1} and 1655-1648 cm+{-1} are due to tensile and bending vibration of crystal water molecules (H-2O) whereas those at 1131 cm+{-1} and 605 cm+{-1} are attributed to tensile and bending vibration of group +{2-}. Lanmuchangite is of the isometric system, with space group=Pa3, a={12.212(5)}, v=1821(2)+3, and Z=4. The strongest diffraction lines from the X-ray power diffraction data are {4.314}(100, 220), {2.801}(70, 331), {7.03}(54, 111), {2.731}(35, 420), {6.11}(27, 200), {3.524}(24, 222), {3.676}(22, 311), {3.051}(22, 400), {2.350}(21, 511), {3.263}(20, 321), {2.494}(20, 422), {1.932}(19, 620).展开更多
BACKGROUND The prognosis of acute mesenteric ischemia(AMI)caused by superior mesenteric venous thrombosis(SMVT)remains undetermined and early detection of transmural bowel infarction(TBI)is crucial.The predisposition ...BACKGROUND The prognosis of acute mesenteric ischemia(AMI)caused by superior mesenteric venous thrombosis(SMVT)remains undetermined and early detection of transmural bowel infarction(TBI)is crucial.The predisposition to develop TBI is of clinical concern,which can lead to fatal sepsis with hemodynamic instability and multi-organ failure.Early resection of necrotic bowel could improve the prognosis of AMI,however,accurate prediction of TBI remains a challenge for clinicians.When determining the eligibility for explorative laparotomy,the underlying risk factors for bowel infarction should be fully evaluated.AIM To develop and externally validate a nomogram for prediction of TBI in patients with acute SMVT.METHODS Consecutive data from 207 acute SMVT patients at the Wuhan Tongji Hospital and 89 patients at the Guangzhou Nanfang Hospital between July 2005 and December 2018 were included in this study.They were grouped as training and external validation cohort.The 207 cases(training cohort)from Tongji Hospital were divided into TBI and reversible intestinal ischemia groups based on the final therapeutic outcomes.Univariate and multivariate logistic regression analyses were conducted to identify independent risk factors for TBI using the training data,and a nomogram was subsequently developed.The performance of the nomogram was evaluated with respect to discrimination,calibration,and clinical usefulness in the training and external validation cohort.RESULTS Univariate and multivariate logistic regression analyses identified the following independent prognostic factors associated with TBI in the training cohort:The decreased bowel wall enhancement(OR=6.37,P<0.001),rebound tenderness(OR=7.14,P<0.001),serum lactate levels>2 mmol/L(OR=3.14,P=0.009)and previous history of deep venous thrombosis(OR=6.37,P<0.001).Incorporating these four factors,the nomogram achieved good calibration in the training set[area under the receiver operator characteristic curve(AUC)0.860;95%CI:0.771-0.925]and the external validation set(AUC 0.851;95%CI:0.796-0.897).The positive and negative predictive values(95%CIs)of the nomogram were calculated,resulting in positive predictive values of 54.55%(40.07%-68.29%)and 53.85%(43.66%-63.72%)and negative predictive values of 93.33%(82.14%-97.71%)and 92.24%(85.91%-95.86%)for the training and validation cohorts,respectively.Based on the nomogram,patients who had a Nomo-score of more than 90 were considered to have high risk for TBI.Decision curve analysis indicated that the nomogram was clinically useful.CONCLUSION The nomogram achieved an optimal prediction of TBI in patients with AMI.Using the model,the risk for an individual patient inclined to TBI can be assessed,thus providing a rational therapeutic choice.展开更多
Because of limited resource of embedded platforms, the computational complexity of advanced control algorithms raises significant challenges for the use of embedded systems in complex control field. A Scilab/Scicos ba...Because of limited resource of embedded platforms, the computational complexity of advanced control algorithms raises significant challenges for the use of embedded systems in complex control field. A Scilab/Scicos based embedded controller is developed on which various control software can be easily modeled, simulated, implemented, and evaluated to meet the ever-expanding requirements of industrial control applications. Built on the Cirrus Logic EP9315 ARM systems-on-chip board, this embedded controller is possible to develop complex embedded control systems that employ advanced control strategies in a rapid and cost-efficient fashion. Due to the free and open source nature of the software packages used, the cost of the embedded controller is minimized.展开更多
The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agen...The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agent. Forward integrity in mobile agents guarantees that offers contained in a mobile agent from previously visited host can not be modified by a malicious host. Itinerary secrecy can prevent mobile agent from being passively attack. This paper proposes a new forward integrity and itinerary secrecy protocol for mobile agent. The protocol can also resist collusion truncation attack.展开更多
An algorithm for numerical solution of discrete Hamilton-Jacobi-Bellman equations is proposed. The method begins with a suitable initial guess value of the solution,then finds a suitable matrix to linearize the system...An algorithm for numerical solution of discrete Hamilton-Jacobi-Bellman equations is proposed. The method begins with a suitable initial guess value of the solution,then finds a suitable matrix to linearize the system and constructs an iteration algorithm to generate the monotone sequence. The convergence of the algorithm for nonlinear discrete Hamilton-Jacobi-Bellman equations is proved. Some numerical examples are presented to confirm the effciency of this algorithm.展开更多
基金This work was supported by the National Medical Research Foundation of Public Health Ministery of P.R.China,and partly supported by China Medical Board of New York.
文摘In recent years,the volumetric approach of 3D reconstruction has emerged as apowerful clinic method for biomedical applications.This approach is based on a voxelrepresented object which maintains many details of the surface and the internal con-structures of the original body.Because of a huge amount of data,the volume dataset takes a large size of memory,and a high processing speed is required in order…
基金supported by the Industrial Support Project of Gansu Colleges under Grant No.2022CYZC-11Gansu Natural Science Foundation Project under Grant No.21JR7RA114+1 种基金National Natural Science Foundation of China under Grants No.622760736,No.1762078,and No.61363058Northwest Normal University Teachers Research Capacity Promotion Plan under Grant No.NWNU-LKQN2019-2.
文摘The exercise recommendation system is emerging as a promising application in online learning scenarios,providing personalized recommendations to assist students with explicit learning directions.Existing solutions generally follow a collaborative filtering paradigm,while the implicit connections between students(exercises)have been largely ignored.In this study,we aim to propose an exercise recommendation paradigm that can reveal the latent connections between student-student(exercise-exercise).Specifically,a new framework was proposed,namely personalized exercise recommendation with student and exercise portraits(PERP).It consists of three sequential and interdependent modules:Collaborative student exercise graph(CSEG)construction,joint random walk,and recommendation list optimization.Technically,CSEG is created as a unified heterogeneous graph with students’response behaviors and student(exercise)relationships.Then,a joint random walk to take full advantage of the spectral properties of nearly uncoupled Markov chains is performed on CSEG,which allows for full exploration of both similar exercises that students have finished and connections between students(exercises)with similar portraits.Finally,we propose to optimize the recommendation list to obtain different exercise suggestions.After analyses of two public datasets,the results demonstrated that PERP can satisfy novelty,accuracy,and diversity.
文摘Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic hazards.As IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection methods.This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization(PSO)to address the risks associated with IoT botnets.Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically.Fuzzy component settings are optimized using PSO to improve accuracy.The methodology allows for more complex thinking by transitioning from binary to continuous assessment.Instead of expert inputs,PSO data-driven tunes rules and membership functions.This study presents a complete IoT botnet risk assessment system.The methodology helps security teams allocate resources by categorizing threats as high,medium,or low severity.This study shows how CICIoT2023 can assess cyber risks.Our research has implications beyond detection,as it provides a proactive approach to risk management and promotes the development of more secure IoT environments.
文摘A type of specific fractured hydrocarbon reservoir, a shale fractured reservoir, exists in the Shengli oilfield. Due to very small porosity of this type, low sensitivity to the variation of petrochemical property parameters, and strong anisotropy, it is very difficult to explore for them. So far, there is no set of mature methods for recognition of direction, distribution, and density of the fractures by an integrated analysis of geologic, geophysical, well log, drilling data, and etc. This paper presents a new method for acoustic impedance variation with azimuth (IPVA), based on existing fracture detection methods. Seismic acquisition, processing, and recognition techniques were developed for detecting directional vertical fractures using multi-azimuth P wave data in combination with the seismic and geological features of shale fractures in the Luojia area. The IPVA research is carried out for recognizing the distribution, strike, and density of fractures based on the study of velocity variation with azimuth (VVA) and amplitude variation with azimuth (AVA) for full azimuth P wave data at different CMP positions. Through practical application in the Luojia area, primary results have been obtained which verifies that the IPVA method provides good potential for quantitative detection of parallel, high angle, shale fractures.
基金supported by the National Natural Science Foundation of China (Nos. 61202351, 61271255)the Natural Science Foundation of Jiangsu Province (No. BK20131068)+2 种基金the Open Research Fund of National Mobile Communications Research Laboratory in Southeast University (No. 2012D15)the Funding of Jiangsu Innovation Program for Graduate Education (No. CXLX11_0202)the Fundamental Research Funds for the Central Universities
文摘Recently, unmanned aerial vehicles (UAVs) acting as relay platforms have attracted considerable attention due to the advantages of extending coverage and improving connectivity for long-range communications. Specifically, in the scenario where the access point (AP) is mobile, a UAV needs to find an efficient path to guarantee the connectivity of the relay link. Motivated by this fact, this paper proposes an optimal design for beamforming (BF) and UAV path planning. First of all, we study a dual-hop amplify-and-forward (AF) wireless relay network, in which a UAV is used as relay between a mobile AP and a fixed base station (BS). In the network, both of the AP and the BS are equipped with multiple antennas, whereas the UAV has a single antenna. Then, we obtain the output signal^to-noise ratio (SNR) of the dual-hop relay network. Based on the criterion of maximizing the output SNR, we develop an optimal design to obtain the solution of the optimal BF weight vector and the UAV heading angle. Next, we derive the closed-form outage probability (OP) expression to investigate the performance of the dual-hop relay network conveniently. Finally, computer simulations show that the proposed approach can obtain nearly optimal flying path and OP performance, indicating the effectiveness of the proposed algorithm. Furthermore, we find that increasing the antenna number at the BS or the maximal heading angle can significantly improve the performance of the considered relay network.
基金Project supported by the National Natural Science Foundation of China (No. 10562004) the Natural Science Foundation of Jiangxi (Nos.0450035 and 0512021) the Science Foundation of Jiangxi Educational Department (No.[2006]3) the Oversea Returned Scholars Grant of China.
文摘By the nonlinear optimization theory, we predict the yield function of single BCC crystals in Hill's criterion form. Then we give a formula on the macroscopic yield function of a BCC polycrystal Ω under Sachs' model, where the volume average of the yield functions of all BCC crystallites in Ω is taken as the macroscopic yield function of the BCC polycrystal. In constructing the formula, we try to find the relationship among the macroscopic yield function, the orientation distribution function (ODF), and the single BCC crystal's plasticity. An expression for the yield stress of a uniaxial tensile problem is derived under Taylor's model in order to compare the expression with that of the macroscopic yield function.
基金supported by National Natural Science Foundation of China (No.10835009)Chinese Academy of Sciences for the Key Project of Knowledge Innovation Program (No.KJCX3.SYW.N4)Chinese Ministry of Sciences for the 973 project (No.2009GB103000)
文摘A visualization tool was developed through a web browser based on Java applets embedded into HTML pages, in order to provide a world access to the EAST experimental data. It can display data from various trees in different servers in a single panel. With WebScope, it is easier to make a comparison between different data sources and perform a simple calculation over different data sources.
基金Project supported by the Science Foundation of Shanghai Municipal Commission of Science and Technology (Grant Nos.055207041, 047062012)
文摘This paper presents a serial synchronous scanning mode in fiat panel display (FPD) by adding a latch buffer between the serializer and the driving buffer. Comparing with conventional techniques, the proposed structure can efficiently reduce the brightness loss and improve the transmission performance. Theoretical analysis and experimental results show that the ratio between the lightest weight display time and the relative transmission time is a tradeoff between brightness loss and transmission efficiency.
基金Supported by the Natural Science Foundation ofLiaoning Province (20042020)
文摘A kind of single linked lists named aggregative chain is introduced to the algorithm, thus improving the architecture of FP tree. The new FP tree is a one-way tree and only the pointers that point its parent at each node are kept. Route information of different nodes in a same item are compressed into aggregative chains so that the frequent patterns will be produced in aggregative chains without generating node links and conditional pattern bases. An example of Web key words retrieval is given to analyze and verify the frequent pattern algorithm in this paper.
基金Supported by the National Natural Science Foundation of China (Nos. 40176014,40067013)
文摘Correspondence analysis and fuzzy C-means cluster methods were used to divide the stratigraphy of heavy mineral assemblages, and the sediment sources and depositional dynamics of the environment reconstructed. The assemblages were taken from marine sediments from the late Pleistocene to the Holocene in Core Q43 situated on the outer shelf of the East China Sea. Based on the variable boundaries of the mineral assemblage at 63 and 228 cmbsf (cm below sea floor), the core might have previously been divided into three sediment strata marked with units Ⅰ, Ⅱ and Ⅲ, which would be consistent with the divided sediment stratum of the core using minor element geochemistry. The downcore distribution of heavy minerals divided the sedimentary sequence into three major units, which were further subdivided into four subunits. The interval between 0 and 63 cmbsf of the core (unit Ⅰ), which spans the Holocene and the uppermost late Pleistocene, is characterized by a hornblende-epidote-pyroxene assemblage, and contains relatively a smaller amount of schistic mineral and authigenic pyrite. In comparison, the interval between 63 and 228 cmbsf (unit Ⅱ), is representative of the Last Glacial Maximum (LGM), and features a hornblende-epidote-magnetite-ilmenite assemblage containing the highest concentrations of heavy minerals and opaque minerals. However, the interval between 228 and 309 cmbsf (unit Ⅲ), which spans the subinterglacial period, is characterized by a hornblende-authigenic-pyrite-mica assemblage. Relative ratios of some heavy minerals can be used as tracers of clastic sediment sources. The lower part of the sediment core shows the highest magnetite/ilmenite ratio and relatively high hornblende/augite and hornblende/epidote ratios. The middle core shows the highest hornblende/augite and hornblende/epidote ratios, and the lowest magnetite/ilmenite ratio. The upper part exhibits a slightly higher magnetite/ilmenite ratio, and also the lowest hornblende/augite and hornblende/epidote ratios. The distribution of the mineral ratio is consistent with stratigraphic division in heavy mineral data using correspondence analysis and fuzzy C-means clustering. Variations in heavy mineral association and mineral ratio in core Q43 revealed changes in provenance and depositional environment of the southern outer shelf of the East China Sea since the late Pleistocene, well corresponding to interglacial and glacial cycles.
基金supported by National Natural Science Foundation of China (No.10835009)the 973 project from the Chinese Ministry of Sciences and Technology (No.2009GB103000)
文摘Implementation of a web-based logbook system on EAST is introduced, which can store the comments for the experiments into a database and access the documents via various web browsers. The three-tier software architecture and asynchronous access technology are adopted to improve the system effectively. Authorized users can view the information of real-time discharge, comments from others and signal plots; add, delete, or revise their own comments; search signal data or comments under complicated search conditions; and collect relevant information and output it to an excel file. The web pages can be automatically updated after a new discharge is completed and without refreshment.
基金Supported by the National Natural Science Foundation of China(70373047)
文摘We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol in his DOC document after plagiarizing material from web and corresponding optimized algorithm which improves the speed of comparison. Our model is suitable for the anti-plagiarism and monitoring of large document collections, and it can also be used in digital library, E-learning and other fields.
基金supported by grants from the National Key R&D Program of China(2016YFD0500406)the National Natural Science Foundation of China(NSFC)(no.81672036)the Youth Innovation Promotion Association of CAS(2016302)
文摘Zika virus(ZIKV)is emerging as a significant pathogen worldwide and may cause severe neurological disorders such as fetal microcephaly and Guillain-Barre syndrome.No drug or listed vaccines are currently available for preventing ZIKV infection.As a major target of neutralizing,ZIKV envelop(E)protein usually used for vaccine development.Nevertheless,the immunogenicity of ZIKV envelop(E)protein expressed by baculovirus display system has never been assessed.In this study,we reported a new strategy for surface display of ZIKV E protein by a recombinant baculovirus vector derived from Autographa californica multiple nuclear polyhedrosis virus(AcMNPV)and assessed its immunogenicity in mice.We produced recombinant fusion ZIKV E protein linked with signal peptide(SP)and transmembrane domain(TM)of AcMNPV GP64.The results showed that the recombinant protein was easy to produce by baculovirus display system.BALB/c mice immunized with this recombinant E protein developed ZIKV specific serum antibodies.The anti-E protein sera from the mice were able to effectively neutralize ZIKV in vitro.More importantly,AG6(IFN-a/b and IFN-c receptor deficient)mice immunized with recombinant E protein were protected against lethal ZIKV challenge.Together,thesefindings demonstrated that the recombinant E protein displayed by baculovirus can be conveniently prepared and displayed good immunogenicity in immunized mice.It is a promising practical approach for prompting the development of vaccine and related immunology research.
基金National Natural Science Foundation of China(No.61204127)Natural Science Foundations of Heilongjiang Province,China(Nos.F2015024,F201334)Young Foundation of Qiqihar University,China(No.2014k-M08)
文摘Ontology mapping is a key interoperability enabler for the semantic web. In this paper,a new ontology mapping approach called ontology mapping based on Bayesian network( OM-BN) is proposed. OM-BN combines the models of ontology and Bayesian Network,and applies the method of Multi-strategy to computing similarity. In OM-BN,the characteristics of ontology,such as tree structure and semantic inclusion relations among concepts,are used during the process of translation from ontology to ontology Bayesian network( OBN). Then the method of Multi-strategy is used to create similarity table( ST) for each concept-node in OBN. Finally,the iterative process of mapping reasoning is used to deduce new mappings from STs,repeatedly.
文摘Lanmuchangite is a new thallium hydrous sulfate from the oxidation zone hosting rich thallium ore bodies in the Lanmuchang thallium(mercury) ore deposit, Xinren County, Guizhou Province, China. This new mineral is named after the locality where it was discovered. The mineral is associated with melanterite, pickeringite, potassium alum, jarosite, gypsum, arsenic blane, sulphur and some unknown minerals. The aggregates of lanmuchangite range from 2 to 10 mm in size. In general, the aggregates are compact and massive in form and are composed of anhedral granular crystals measuring in size from 40 to 90μm, but the single crystal grains show distinct boundaries. Parallel columnar aggregates are occasionally seen, which are composed of subhedral to euhedral columnar crystals ranging in size from 15 to 65μm. White, light yellow to white in color, glassy in luster and transparent. Hv-{mess.}=94-124 kg/mm+2, Hm={3.1}-{3.4}, density={2.22} g/cm+3. Under the polarization microscope the mineral is colorless and homogeneous, with N-{meas.}={1.495}. It is easily water-soluble. The average chemical composition is: Tl-2O={33.25}, Al-2O-3={8.07}, SO-3={25.19}, SiO-2={0.10}, K-2O={0.35}, CaO={0.08}, MgO={0.06}, FeO={0.04} and H-2O={33.46} [the crystal water (H-2O) was measured by thermogravimetery (TG) while the other composition were determined by electron microprobe], totaling {100.60%}. The empirical formula is (Tl-{1.00}K-{0.05})-{1.05} (Al-{1.01}Si-{0.01}Ca-{0.01}Mg-{0.01})-{1.04}-{2.01}·{11.88} H-2O and the simplified formula is TlAl-2·12H-2O. The compatibility of lanmuchangite is {-0.03} and its value falls within the range of {±0.020}-{±0.039}, so the compatibility is excellent. Its TG curve demonstrated that the crystal water was lost (i.e., dewatering) in stages at 101, 130 and 230℃. At the temperature of 243℃ the process of dewatering came to the end and the sum of lost crystal water reaches {33.30} wt%. IR spectroscopic analysis showed that the absorption bands 3374-3147 cm+{-1} and 1655-1648 cm+{-1} are due to tensile and bending vibration of crystal water molecules (H-2O) whereas those at 1131 cm+{-1} and 605 cm+{-1} are attributed to tensile and bending vibration of group +{2-}. Lanmuchangite is of the isometric system, with space group=Pa3, a={12.212(5)}, v=1821(2)+3, and Z=4. The strongest diffraction lines from the X-ray power diffraction data are {4.314}(100, 220), {2.801}(70, 331), {7.03}(54, 111), {2.731}(35, 420), {6.11}(27, 200), {3.524}(24, 222), {3.676}(22, 311), {3.051}(22, 400), {2.350}(21, 511), {3.263}(20, 321), {2.494}(20, 422), {1.932}(19, 620).
基金Wuhan Tongji Hospital,No.2017A002Wuhan Science and Technology Bureau,No.2017060201010181.
文摘BACKGROUND The prognosis of acute mesenteric ischemia(AMI)caused by superior mesenteric venous thrombosis(SMVT)remains undetermined and early detection of transmural bowel infarction(TBI)is crucial.The predisposition to develop TBI is of clinical concern,which can lead to fatal sepsis with hemodynamic instability and multi-organ failure.Early resection of necrotic bowel could improve the prognosis of AMI,however,accurate prediction of TBI remains a challenge for clinicians.When determining the eligibility for explorative laparotomy,the underlying risk factors for bowel infarction should be fully evaluated.AIM To develop and externally validate a nomogram for prediction of TBI in patients with acute SMVT.METHODS Consecutive data from 207 acute SMVT patients at the Wuhan Tongji Hospital and 89 patients at the Guangzhou Nanfang Hospital between July 2005 and December 2018 were included in this study.They were grouped as training and external validation cohort.The 207 cases(training cohort)from Tongji Hospital were divided into TBI and reversible intestinal ischemia groups based on the final therapeutic outcomes.Univariate and multivariate logistic regression analyses were conducted to identify independent risk factors for TBI using the training data,and a nomogram was subsequently developed.The performance of the nomogram was evaluated with respect to discrimination,calibration,and clinical usefulness in the training and external validation cohort.RESULTS Univariate and multivariate logistic regression analyses identified the following independent prognostic factors associated with TBI in the training cohort:The decreased bowel wall enhancement(OR=6.37,P<0.001),rebound tenderness(OR=7.14,P<0.001),serum lactate levels>2 mmol/L(OR=3.14,P=0.009)and previous history of deep venous thrombosis(OR=6.37,P<0.001).Incorporating these four factors,the nomogram achieved good calibration in the training set[area under the receiver operator characteristic curve(AUC)0.860;95%CI:0.771-0.925]and the external validation set(AUC 0.851;95%CI:0.796-0.897).The positive and negative predictive values(95%CIs)of the nomogram were calculated,resulting in positive predictive values of 54.55%(40.07%-68.29%)and 53.85%(43.66%-63.72%)and negative predictive values of 93.33%(82.14%-97.71%)and 92.24%(85.91%-95.86%)for the training and validation cohorts,respectively.Based on the nomogram,patients who had a Nomo-score of more than 90 were considered to have high risk for TBI.Decision curve analysis indicated that the nomogram was clinically useful.CONCLUSION The nomogram achieved an optimal prediction of TBI in patients with AMI.Using the model,the risk for an individual patient inclined to TBI can be assessed,thus providing a rational therapeutic choice.
基金supported in part by the National Natural Science Foundation under Grant No.61070003,No.61272020,and No.61071128Zhejiang Provincial Natural Science Foundation under Grant No.R1090052 and No.Y1101184
文摘Because of limited resource of embedded platforms, the computational complexity of advanced control algorithms raises significant challenges for the use of embedded systems in complex control field. A Scilab/Scicos based embedded controller is developed on which various control software can be easily modeled, simulated, implemented, and evaluated to meet the ever-expanding requirements of industrial control applications. Built on the Cirrus Logic EP9315 ARM systems-on-chip board, this embedded controller is possible to develop complex embedded control systems that employ advanced control strategies in a rapid and cost-efficient fashion. Due to the free and open source nature of the software packages used, the cost of the embedded controller is minimized.
基金Supported by the National Natural Science Foun-dation of China (60373087 ,60473023 ,90104005)
文摘The security problem of mobile agents is widely being discussed. The problem which protects mobile agents from malicious hosts is difficult to solve, because a host has access to the complete internal state of an agent. Forward integrity in mobile agents guarantees that offers contained in a mobile agent from previously visited host can not be modified by a malicious host. Itinerary secrecy can prevent mobile agent from being passively attack. This paper proposes a new forward integrity and itinerary secrecy protocol for mobile agent. The protocol can also resist collusion truncation attack.
文摘An algorithm for numerical solution of discrete Hamilton-Jacobi-Bellman equations is proposed. The method begins with a suitable initial guess value of the solution,then finds a suitable matrix to linearize the system and constructs an iteration algorithm to generate the monotone sequence. The convergence of the algorithm for nonlinear discrete Hamilton-Jacobi-Bellman equations is proved. Some numerical examples are presented to confirm the effciency of this algorithm.