Under the Bargmann constrained condition, the spatial part of a new Lax pair of the higher order MkdV equation is nonlinearized to be a completely integrable system (R2N,dp^dq, H0=1/2F0)(F0= (^q,p) + (^p,p) + (p,q)2)....Under the Bargmann constrained condition, the spatial part of a new Lax pair of the higher order MkdV equation is nonlinearized to be a completely integrable system (R2N,dp^dq, H0=1/2F0)(F0= (^q,p) + (^p,p) + (p,q)2). While the nonlinearization of the time part leads to its N-involutive system (Fm).展开更多
In this paper we give out a sufficient and solution of quadratic function's maximum with theory of quadratic form and give out the definition of the positive definite property of the following homogeneous polynomi...In this paper we give out a sufficient and solution of quadratic function's maximum with theory of quadratic form and give out the definition of the positive definite property of the following homogeneous polynomials of degree 2n two variables function, based on the definite of local maximum of two variables function.展开更多
We propose a method to study the chaotic sys-tem for the detection of periodic signals in the presence ofstrong background noise. The numerical experiments indi-cate that the chaotic system constructed from the modifi...We propose a method to study the chaotic sys-tem for the detection of periodic signals in the presence ofstrong background noise. The numerical experiments indi-cate that the chaotic system constructed from the modified Duffing-Holmes equation is sensitive to the weak periodic signal mixed with noise, and it has certain immunity to noise. The signal to noise ratio for the system can reach to about 91 dB.展开更多
We study a class of discounted models of singular stochastic control. In thiskind of models, not only the structure of cost function has been extended to some general type, butalso the state can be represented as the ...We study a class of discounted models of singular stochastic control. In thiskind of models, not only the structure of cost function has been extended to some general type, butalso the state can be represented as the solution of a class of stochastic differential equationswith nonlinear drift and diffusion term. By the various methods of stochastic analysis, we derivethe sufficient and necessary conditions of the existence of optimal control.展开更多
The simulation of quantum cryptography on classical computers is discussed inthis paper. The methods to express the preparation and measurement of quantum states on currentcomputers are given and the basic algorithms ...The simulation of quantum cryptography on classical computers is discussed inthis paper. The methods to express the preparation and measurement of quantum states on currentcomputers are given and the basic algorithms for simulating the quantum key distribution protocolsare presented. All the simulating results of each protocol are given and compared with the theoreticone. It is shown that the simulation results are completely tallied with the theoretic one.展开更多
Multimedia document annotation is used in traditional multimedia databasesystems. However, without the help of human beings, it is very difficult to extract the semanticcontent of multimedia automatically. On the othe...Multimedia document annotation is used in traditional multimedia databasesystems. However, without the help of human beings, it is very difficult to extract the semanticcontent of multimedia automatically. On the other hand, it is a tedious job to annotate multimediadocuments in large databases one by one manually. This paper first introduces a method to constructa semantic net-work on top of a multimedia database. Second, a useful and efficient annotationstrategy is presented based on the framework to obtain an accurate and rapid annotation of anymultimedia databases. Third, two methods of joint similarity measures for semantic and low-levelfeatures are evaluated .展开更多
To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile ...To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile terminals and the Internet Web Server. Yield to thecapabilities of the current mobile terminals, the public key techniques cannot be used now. But inthe future, the memory space and the computation ability of the mobile terminals will no longer beany puzzles, so certificate and Public Key Infrastructure (PKI) can be used to make wirelesscommunication security. This paper also proposes PKI architecture in the future mobile network.Finally this paper makes an assumption of the network's development and its secure issues.展开更多
The video bit stream coded by H.263 recommendation is vulnerable to channel errors. For coded information, bit errors could result in error propagation, loss of synchronization and severe data loss. All of these will ...The video bit stream coded by H.263 recommendation is vulnerable to channel errors. For coded information, bit errors could result in error propagation, loss of synchronization and severe data loss. All of these will lead to the descent of image qualities in the end. In this paper, in order to solve this problem, we present a receiver based error concealment algorithm that uses information in pixel domain to detect errors and resynchronization, identify the location of the affected blocks and estimate erroneous data. The concealment algorithm is kept simple, no additional bit rate is required, and no modification is necessary to an existing encoder, so the real time decoding and concealment are possible. Computer emulation results show that the image quality after error concealment is significantly improved.展开更多
A new fault model, called the X-fault model, is proposed for fault diagnosisof physical defects with unknown behaviors by using X symbols. An efficient X-fault simulationmethod and an efficient X-fault diagnostic reas...A new fault model, called the X-fault model, is proposed for fault diagnosisof physical defects with unknown behaviors by using X symbols. An efficient X-fault simulationmethod and an efficient X-fault diagnostic reasoning method are presented. Fault diagnosis based onthe X-fault model can improve the accuracy of failure analysis for a wide range of physical defectsin complex and deep submicron integrated circuits.展开更多
Most of the neural network handwritten digits recognition systems adopt a network with single structure. In this paper,we implement a subgroup neural network structure based on feature description to recognize handwr...Most of the neural network handwritten digits recognition systems adopt a network with single structure. In this paper,we implement a subgroup neural network structure based on feature description to recognize handwritten digits. It is noticeable that this subgroup network is a hybrid system. The experiment result indicates that the subgroup network gets much better performance than usual single network Structure.展开更多
文摘Under the Bargmann constrained condition, the spatial part of a new Lax pair of the higher order MkdV equation is nonlinearized to be a completely integrable system (R2N,dp^dq, H0=1/2F0)(F0= (^q,p) + (^p,p) + (p,q)2). While the nonlinearization of the time part leads to its N-involutive system (Fm).
文摘In this paper we give out a sufficient and solution of quadratic function's maximum with theory of quadratic form and give out the definition of the positive definite property of the following homogeneous polynomials of degree 2n two variables function, based on the definite of local maximum of two variables function.
基金the Science and Tech-nology Development Program of Jilin Province (Grant No.20020626)
文摘We propose a method to study the chaotic sys-tem for the detection of periodic signals in the presence ofstrong background noise. The numerical experiments indi-cate that the chaotic system constructed from the modified Duffing-Holmes equation is sensitive to the weak periodic signal mixed with noise, and it has certain immunity to noise. The signal to noise ratio for the system can reach to about 91 dB.
基金This research is supported by the National Natural Science Foundation of China
文摘We study a class of discounted models of singular stochastic control. In thiskind of models, not only the structure of cost function has been extended to some general type, butalso the state can be represented as the solution of a class of stochastic differential equationswith nonlinear drift and diffusion term. By the various methods of stochastic analysis, we derivethe sufficient and necessary conditions of the existence of optimal control.
文摘The simulation of quantum cryptography on classical computers is discussed inthis paper. The methods to express the preparation and measurement of quantum states on currentcomputers are given and the basic algorithms for simulating the quantum key distribution protocolsare presented. All the simulating results of each protocol are given and compared with the theoreticone. It is shown that the simulation results are completely tallied with the theoretic one.
文摘Multimedia document annotation is used in traditional multimedia databasesystems. However, without the help of human beings, it is very difficult to extract the semanticcontent of multimedia automatically. On the other hand, it is a tedious job to annotate multimediadocuments in large databases one by one manually. This paper first introduces a method to constructa semantic net-work on top of a multimedia database. Second, a useful and efficient annotationstrategy is presented based on the framework to obtain an accurate and rapid annotation of anymultimedia databases. Third, two methods of joint similarity measures for semantic and low-levelfeatures are evaluated .
基金This work is supported by National Science Foundation of China (No.60372094).
文摘To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile terminals and the Internet Web Server. Yield to thecapabilities of the current mobile terminals, the public key techniques cannot be used now. But inthe future, the memory space and the computation ability of the mobile terminals will no longer beany puzzles, so certificate and Public Key Infrastructure (PKI) can be used to make wirelesscommunication security. This paper also proposes PKI architecture in the future mobile network.Finally this paper makes an assumption of the network's development and its secure issues.
文摘The video bit stream coded by H.263 recommendation is vulnerable to channel errors. For coded information, bit errors could result in error propagation, loss of synchronization and severe data loss. All of these will lead to the descent of image qualities in the end. In this paper, in order to solve this problem, we present a receiver based error concealment algorithm that uses information in pixel domain to detect errors and resynchronization, identify the location of the affected blocks and estimate erroneous data. The concealment algorithm is kept simple, no additional bit rate is required, and no modification is necessary to an existing encoder, so the real time decoding and concealment are possible. Computer emulation results show that the image quality after error concealment is significantly improved.
文摘A new fault model, called the X-fault model, is proposed for fault diagnosisof physical defects with unknown behaviors by using X symbols. An efficient X-fault simulationmethod and an efficient X-fault diagnostic reasoning method are presented. Fault diagnosis based onthe X-fault model can improve the accuracy of failure analysis for a wide range of physical defectsin complex and deep submicron integrated circuits.
文摘Most of the neural network handwritten digits recognition systems adopt a network with single structure. In this paper,we implement a subgroup neural network structure based on feature description to recognize handwritten digits. It is noticeable that this subgroup network is a hybrid system. The experiment result indicates that the subgroup network gets much better performance than usual single network Structure.