The evaluation method and its accuracy for evaluating complex systems are considered. In order to evaluate accurately complex systems, the existed evaluating methods are simply analyzed, and a new comprehensive evalua...The evaluation method and its accuracy for evaluating complex systems are considered. In order to evaluate accurately complex systems, the existed evaluating methods are simply analyzed, and a new comprehensive evaluating method is developed. The new method is integration of Delphi approach, analytic hierarchy process, gray interconnect degree and fuzzy evaluation (DHGF). Its theory foundation is the meta-synthesis methodology from qualitative analysis to quantitative analysis. According to fuzzy set approach, using the methods of concordance of evaluation, redundant verify, double models redundant, and limitations of the method etc, the accuracy of evaluating method of DHGF is estimated, and a practical example is given. The result shows that using the method to evaluate complex system projects is feasible and credible.展开更多
This paper proposes a concept and design strategy for the humanoid intelligent management system (HIMS) based on artificial life. Various topics are discussed including the design method and implementation techniques ...This paper proposes a concept and design strategy for the humanoid intelligent management system (HIMS) based on artificial life. Various topics are discussed including the design method and implementation techniques for the dual management scheme (DMS), humanoid intelligent management model (HIMM), central-decentralized management pattern, and multi-grade coordination function.展开更多
A new method is proposed for synthesizing intermediate views from a pair of stereoscopic images. In order to synthesize high-quality intermediate views, the block matching method together with a simplified multi-windo...A new method is proposed for synthesizing intermediate views from a pair of stereoscopic images. In order to synthesize high-quality intermediate views, the block matching method together with a simplified multi-window technique and dynamic programming is used in the process of disparity estimation. Then occlusion detection is performed to locate occluded regions and their disparities are compensated. After the projecton of the left-to-right and right-to-left disparities onto the intermediate image, intermediate view is synthesized considering occluded regions. Experimental results show that our synthesis method can obtain intermediate views with higher quality.展开更多
This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method,...This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method, an agent can change its route dynamically without making any change to its specific behavior. By classifying mobile agents into two categories, the task agent can be reusable in different networks. In this way, a mobile agent system can easily carry out network management tasks.展开更多
The feedback stabilization problem of a nonuniform Timoshenko beam system with rotor inertia at the tip of the beam is studied. First, as a special kind of linear boundary force feedback and moment control is applied ...The feedback stabilization problem of a nonuniform Timoshenko beam system with rotor inertia at the tip of the beam is studied. First, as a special kind of linear boundary force feedback and moment control is applied to the beam' s tip, the strict mathematical treatment,a suitable state Hilbert space is chosen, and the well-poseness of the corresponding closed loop system is proved by using the semigroup theory of bounded linear operators. Then the energy corresponding to the closed loop system is shown to be exponentially stable. Finally, in the special case of uniform beam,some sufficient and necessary conditions for the corresponding closed loop system to be asymptotically stable are derived.展开更多
The geometric and physical analysis methods are conventional methods for the derivation of skeleton lines in the fields of cartography,digital photogrammetry,and related areas.This paper proposes a stepwise approach t...The geometric and physical analysis methods are conventional methods for the derivation of skeleton lines in the fields of cartography,digital photogrammetry,and related areas.This paper proposes a stepwise approach that uses the physical analysis method in the first stage and the geometric analysis method in the subsequent stage.The physical analysis method analyses the terrain globally to obtain a rough set of skeleton lines for a terrain surface.The rough skeleton lines help to structure the ordering of feature points by the geometric analysis method.展开更多
As a special subject in the research on information diffusion mechanism in knowledge discovery field, the author presents a new method on deciding to reserve or abandon and understanding the Exception Rule, which is t...As a special subject in the research on information diffusion mechanism in knowledge discovery field, the author presents a new method on deciding to reserve or abandon and understanding the Exception Rule, which is to analyze the changing trend of three parameters(the support, confidence and LS),combining with the analysis of the historical changing trend of the support of the former and latter part of the Rule, in order to receive the acceptable rule and help users to fully understand them, and use them appropriately. This research has a significant effect on the post-disposal of knowledge discovery and its realizability and practicability.展开更多
Expound the existing modulation mode of the present wireless local area network.Directing at the problem that when single modulation method conveys data with high speed in the frequency selective fading channel,the sy...Expound the existing modulation mode of the present wireless local area network.Directing at the problem that when single modulation method conveys data with high speed in the frequency selective fading channel,the system throughput will be declined and the efficiency of the spectrum will be lowered.Put forward the scheme that the OFDM sub-carrier will use differ ent modulation modes after dynamic groups by amplitude frequency response.Simulation results show that the scheme will lower the complexity of the system achievement,and can get a higher spectrum efficiency.展开更多
A new algorithm for inequality constrained optimization is presented, which solves a linear programming subproblem and a quadratic subproblem at each iteration. The algorithm can circumvent the difficulties associated...A new algorithm for inequality constrained optimization is presented, which solves a linear programming subproblem and a quadratic subproblem at each iteration. The algorithm can circumvent the difficulties associated with the possible inconsistency of QP subproblem of the original SQP method. Moreover, the algorithm can converge to a point which satisfies a certain first-order necessary condition even if the original problem is itself infeasible. Under certain condition, some global convergence results are proved and local superlinear convergence results are also obtained. Preliminary numerical results are reported.展开更多
The Constant Modulus Algorithm (CMA) enjoys widespread popularity as methodsfor blind beamform-ing and equalization of communication signals, CMA is straightforward toimplement, robust, and computationally of moderate...The Constant Modulus Algorithm (CMA) enjoys widespread popularity as methodsfor blind beamform-ing and equalization of communication signals, CMA is straightforward toimplement, robust, and computationally of moderate complexity. Furthermore, it is insensitive toarray imperfection. In an environment containing multiple constant modulus signals, the signalextracted by CMA depends on the relative power of the incident signals. According previous works,the CMA is prone to capture the strongest Constant Modulus (CM) signal at the output of the array.In this paper, we show that the weak CM signal could be recovered by CMA_(1-2) and CMA_(2-1) whensetting special step-size. Simulation examples confirm our remarks.展开更多
A virtual lab system is the simulation of real devices and experiments usingcomputer and network technology. It can make users do experiments easily, observe experimentphenomena and results through the remote terminal...A virtual lab system is the simulation of real devices and experiments usingcomputer and network technology. It can make users do experiments easily, observe experimentphenomena and results through the remote terminal. Consequently, users can get final results toverify relative theory. The article analyses the features of virtual lab systems. A real virtual labsystem named 'Multimedia Virtual Lab for Digital Circuit Logic Design (MVLDCLD)' which has beendeveloped by the authors and their group is also presented.展开更多
Double Data Rate Synchronously Dynamic RAM(DDR-SDRAM)is a kind ofnew high-capacity and high-speed ram chip. The article describes itsworking features. Implementation of the DDR SDRAM controller isanalyzed and some det...Double Data Rate Synchronously Dynamic RAM(DDR-SDRAM)is a kind ofnew high-capacity and high-speed ram chip. The article describes itsworking features. Implementation of the DDR SDRAM controller isanalyzed and some details are also given.展开更多
In this paper,we investigate the capacity degradation due to the coexistence of WCDMA and CDMA2000 net-works by system-level Monte Carlo simulation.Both systems are simulated according to the deployment of macro cells...In this paper,we investigate the capacity degradation due to the coexistence of WCDMA and CDMA2000 net-works by system-level Monte Carlo simulation.Both systems are simulated according to the deployment of macro cells,andspeech service is considered.The capacity losses under different carrier spacing and different geographical offset are evalu-ated.Simulation results show that considerable capacity loss is seen when WCDMA is the victim system,while the influ-ence of WCDMA to CDMA2000 is slight.Increasing carrier-to-carrier spacing and decreasing geographical offset lead toless capacity loss and co-locating the base stations of both systems is a preferred solution.展开更多
In this paper, a trust region method for equality constrained optimizationbased on nondifferentiable exact penalty is proposed. In this algorithm, the trail step ischaracterized by computation of its normal component ...In this paper, a trust region method for equality constrained optimizationbased on nondifferentiable exact penalty is proposed. In this algorithm, the trail step ischaracterized by computation of its normal component being separated from computation of itstangential component, i.e., only the tangential component of the trail step is constrained by trustradius while the normal component and trail step itself have no constraints. The other maincharacteristic of the algorithm is the decision of trust region radius. Here, the decision of trustregion radius uses the information of the gradient of objective function and reduced Hessian.However, Maratos effect will occur when we use the nondifferentiable exact penalty function as themerit function. In order to obtain the superlinear convergence of the algorithm, we use the twiceorder correction technique. Because of the speciality of the adaptive trust region method, we usetwice order correction when p = 0 (the definition is as in Section 2) and this is different from thetraditional trust region methods for equality constrained optimization. So the computation of thealgorithm in this paper is reduced. What is more, we can prove that the algorithm is globally andsuperlinearly convergent.展开更多
This paper exploits Boolean satisfiability problem in equivalence checking and model checking respectively. A combinational equivalence checking method based on incremental satisfiability is presented. This method cho...This paper exploits Boolean satisfiability problem in equivalence checking and model checking respectively. A combinational equivalence checking method based on incremental satisfiability is presented. This method chooses the can didate equivalent pairs with some new techniques, and uses incremental satisfiability algorithm to improve its performance. By substituting the internal equivalent pairs and converting the equivalence relations into conjunctive normal form (CNF) formulas, this approach can avoid the false negatives, and reduce the search space of SAT procedure. Experimental results on ISCAS'85 benchmark circuits show that, the presented approach is faster and more robust than those existed in literature.This paper also presents an algorithm for extracting of unsatisfiable core, which has an important application in abstraction and refinement for model checking to alleviate the state space explosion bottleneck. The error of approximate extraction is analyzed by means of simulation. An analysis reveals that an interesting phenomenon occurs, with the increasing density of the formula, the average error of the extraction is decreasing. An exact extraction approach for MU subformula, referred to as pre-assignment algorithm, is proposed. Both theoretical analysis and experimental results show that it is more efficient.展开更多
There exists a strong connection between numerical methods for the integration of ordinary differential equations and optimization problems. In this paper, we try to discover further their links. And we transform unco...There exists a strong connection between numerical methods for the integration of ordinary differential equations and optimization problems. In this paper, we try to discover further their links. And we transform unconstrained problems to the equivalent ordinary differential equations and construct the LRKOPT method to solve them by combining the second order singly diagonally implicit Runge-Kutta formulas and line search techniques.Moreover we analyze the global convergence and the local convergence of the LRKOPT method. Promising numerical results are also reported.展开更多
In this paper, LCP is converted to an equivalent nonsmooth nonlinear equation system H(x,y) = 0 by using the famous NCP function-Fischer-Burmeister function. Note that some equations in H(x, y) = 0 are nonsmooth and n...In this paper, LCP is converted to an equivalent nonsmooth nonlinear equation system H(x,y) = 0 by using the famous NCP function-Fischer-Burmeister function. Note that some equations in H(x, y) = 0 are nonsmooth and nonlinear hence difficult to solve while the others are linear hence easy to solve. Then we further convert the nonlinear equation system H(x, y) = 0 to an optimization problem with linear equality constraints. After that we study the conditions under which the K-T points of the optimization problem are the solutions of the original LCP and propose a method to solve the optimization problem. In this algorithm, the search direction is obtained by solving a strict convex programming at each iterative point, However, our algorithm is essentially different from traditional SQP method. The global convergence of the method is proved under mild conditions. In addition, we can prove that the algorithm is convergent superlinearly under the conditions: M is P0 matrix and the limit point is a strict complementarity solution of LCP. Preliminary numerical experiments are reported with this method.展开更多
文摘The evaluation method and its accuracy for evaluating complex systems are considered. In order to evaluate accurately complex systems, the existed evaluating methods are simply analyzed, and a new comprehensive evaluating method is developed. The new method is integration of Delphi approach, analytic hierarchy process, gray interconnect degree and fuzzy evaluation (DHGF). Its theory foundation is the meta-synthesis methodology from qualitative analysis to quantitative analysis. According to fuzzy set approach, using the methods of concordance of evaluation, redundant verify, double models redundant, and limitations of the method etc, the accuracy of evaluating method of DHGF is estimated, and a practical example is given. The result shows that using the method to evaluate complex system projects is feasible and credible.
文摘This paper proposes a concept and design strategy for the humanoid intelligent management system (HIMS) based on artificial life. Various topics are discussed including the design method and implementation techniques for the dual management scheme (DMS), humanoid intelligent management model (HIMM), central-decentralized management pattern, and multi-grade coordination function.
文摘A new method is proposed for synthesizing intermediate views from a pair of stereoscopic images. In order to synthesize high-quality intermediate views, the block matching method together with a simplified multi-window technique and dynamic programming is used in the process of disparity estimation. Then occlusion detection is performed to locate occluded regions and their disparities are compensated. After the projecton of the left-to-right and right-to-left disparities onto the intermediate image, intermediate view is synthesized considering occluded regions. Experimental results show that our synthesis method can obtain intermediate views with higher quality.
文摘This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method, an agent can change its route dynamically without making any change to its specific behavior. By classifying mobile agents into two categories, the task agent can be reusable in different networks. In this way, a mobile agent system can easily carry out network management tasks.
基金This work was supported by the Science Foundation of China Geosciences University (Beijing) the National Natural Science Foundation of China ( No. 60174008).
文摘The feedback stabilization problem of a nonuniform Timoshenko beam system with rotor inertia at the tip of the beam is studied. First, as a special kind of linear boundary force feedback and moment control is applied to the beam' s tip, the strict mathematical treatment,a suitable state Hilbert space is chosen, and the well-poseness of the corresponding closed loop system is proved by using the semigroup theory of bounded linear operators. Then the energy corresponding to the closed loop system is shown to be exponentially stable. Finally, in the special case of uniform beam,some sufficient and necessary conditions for the corresponding closed loop system to be asymptotically stable are derived.
文摘The geometric and physical analysis methods are conventional methods for the derivation of skeleton lines in the fields of cartography,digital photogrammetry,and related areas.This paper proposes a stepwise approach that uses the physical analysis method in the first stage and the geometric analysis method in the subsequent stage.The physical analysis method analyses the terrain globally to obtain a rough set of skeleton lines for a terrain surface.The rough skeleton lines help to structure the ordering of feature points by the geometric analysis method.
文摘As a special subject in the research on information diffusion mechanism in knowledge discovery field, the author presents a new method on deciding to reserve or abandon and understanding the Exception Rule, which is to analyze the changing trend of three parameters(the support, confidence and LS),combining with the analysis of the historical changing trend of the support of the former and latter part of the Rule, in order to receive the acceptable rule and help users to fully understand them, and use them appropriately. This research has a significant effect on the post-disposal of knowledge discovery and its realizability and practicability.
文摘Expound the existing modulation mode of the present wireless local area network.Directing at the problem that when single modulation method conveys data with high speed in the frequency selective fading channel,the system throughput will be declined and the efficiency of the spectrum will be lowered.Put forward the scheme that the OFDM sub-carrier will use differ ent modulation modes after dynamic groups by amplitude frequency response.Simulation results show that the scheme will lower the complexity of the system achievement,and can get a higher spectrum efficiency.
基金This work is supported in part by the National Natural Science Foundation of China (Grant No. 10171055).
文摘A new algorithm for inequality constrained optimization is presented, which solves a linear programming subproblem and a quadratic subproblem at each iteration. The algorithm can circumvent the difficulties associated with the possible inconsistency of QP subproblem of the original SQP method. Moreover, the algorithm can converge to a point which satisfies a certain first-order necessary condition even if the original problem is itself infeasible. Under certain condition, some global convergence results are proved and local superlinear convergence results are also obtained. Preliminary numerical results are reported.
文摘The Constant Modulus Algorithm (CMA) enjoys widespread popularity as methodsfor blind beamform-ing and equalization of communication signals, CMA is straightforward toimplement, robust, and computationally of moderate complexity. Furthermore, it is insensitive toarray imperfection. In an environment containing multiple constant modulus signals, the signalextracted by CMA depends on the relative power of the incident signals. According previous works,the CMA is prone to capture the strongest Constant Modulus (CM) signal at the output of the array.In this paper, we show that the weak CM signal could be recovered by CMA_(1-2) and CMA_(2-1) whensetting special step-size. Simulation examples confirm our remarks.
文摘A virtual lab system is the simulation of real devices and experiments usingcomputer and network technology. It can make users do experiments easily, observe experimentphenomena and results through the remote terminal. Consequently, users can get final results toverify relative theory. The article analyses the features of virtual lab systems. A real virtual labsystem named 'Multimedia Virtual Lab for Digital Circuit Logic Design (MVLDCLD)' which has beendeveloped by the authors and their group is also presented.
文摘Double Data Rate Synchronously Dynamic RAM(DDR-SDRAM)is a kind ofnew high-capacity and high-speed ram chip. The article describes itsworking features. Implementation of the DDR SDRAM controller isanalyzed and some details are also given.
文摘In this paper,we investigate the capacity degradation due to the coexistence of WCDMA and CDMA2000 net-works by system-level Monte Carlo simulation.Both systems are simulated according to the deployment of macro cells,andspeech service is considered.The capacity losses under different carrier spacing and different geographical offset are evalu-ated.Simulation results show that considerable capacity loss is seen when WCDMA is the victim system,while the influ-ence of WCDMA to CDMA2000 is slight.Increasing carrier-to-carrier spacing and decreasing geographical offset lead toless capacity loss and co-locating the base stations of both systems is a preferred solution.
基金This research is supported in part by the National Natural Science Foundation of China(Grant No. 39830070,10171055)and China Postdoctoral Science Foundation
文摘In this paper, a trust region method for equality constrained optimizationbased on nondifferentiable exact penalty is proposed. In this algorithm, the trail step ischaracterized by computation of its normal component being separated from computation of itstangential component, i.e., only the tangential component of the trail step is constrained by trustradius while the normal component and trail step itself have no constraints. The other maincharacteristic of the algorithm is the decision of trust region radius. Here, the decision of trustregion radius uses the information of the gradient of objective function and reduced Hessian.However, Maratos effect will occur when we use the nondifferentiable exact penalty function as themerit function. In order to obtain the superlinear convergence of the algorithm, we use the twiceorder correction technique. Because of the speciality of the adaptive trust region method, we usetwice order correction when p = 0 (the definition is as in Section 2) and this is different from thetraditional trust region methods for equality constrained optimization. So the computation of thealgorithm in this paper is reduced. What is more, we can prove that the algorithm is globally andsuperlinearly convergent.
文摘This paper exploits Boolean satisfiability problem in equivalence checking and model checking respectively. A combinational equivalence checking method based on incremental satisfiability is presented. This method chooses the can didate equivalent pairs with some new techniques, and uses incremental satisfiability algorithm to improve its performance. By substituting the internal equivalent pairs and converting the equivalence relations into conjunctive normal form (CNF) formulas, this approach can avoid the false negatives, and reduce the search space of SAT procedure. Experimental results on ISCAS'85 benchmark circuits show that, the presented approach is faster and more robust than those existed in literature.This paper also presents an algorithm for extracting of unsatisfiable core, which has an important application in abstraction and refinement for model checking to alleviate the state space explosion bottleneck. The error of approximate extraction is analyzed by means of simulation. An analysis reveals that an interesting phenomenon occurs, with the increasing density of the formula, the average error of the extraction is decreasing. An exact extraction approach for MU subformula, referred to as pre-assignment algorithm, is proposed. Both theoretical analysis and experimental results show that it is more efficient.
文摘There exists a strong connection between numerical methods for the integration of ordinary differential equations and optimization problems. In this paper, we try to discover further their links. And we transform unconstrained problems to the equivalent ordinary differential equations and construct the LRKOPT method to solve them by combining the second order singly diagonally implicit Runge-Kutta formulas and line search techniques.Moreover we analyze the global convergence and the local convergence of the LRKOPT method. Promising numerical results are also reported.
文摘In this paper, LCP is converted to an equivalent nonsmooth nonlinear equation system H(x,y) = 0 by using the famous NCP function-Fischer-Burmeister function. Note that some equations in H(x, y) = 0 are nonsmooth and nonlinear hence difficult to solve while the others are linear hence easy to solve. Then we further convert the nonlinear equation system H(x, y) = 0 to an optimization problem with linear equality constraints. After that we study the conditions under which the K-T points of the optimization problem are the solutions of the original LCP and propose a method to solve the optimization problem. In this algorithm, the search direction is obtained by solving a strict convex programming at each iterative point, However, our algorithm is essentially different from traditional SQP method. The global convergence of the method is proved under mild conditions. In addition, we can prove that the algorithm is convergent superlinearly under the conditions: M is P0 matrix and the limit point is a strict complementarity solution of LCP. Preliminary numerical experiments are reported with this method.