In order to effectively deal with the conflict temporal evidences without affecting the sequential and dynamic characteristics in the multi-sensor target recognition(MSTR) system at the decision making level, this pap...In order to effectively deal with the conflict temporal evidences without affecting the sequential and dynamic characteristics in the multi-sensor target recognition(MSTR) system at the decision making level, this paper proposes a Dempster-Shafer(DS) theory and intuitionistic fuzzy set(IFS) based temporal evidence combination method(DSIFS-TECM). To realize the method,the relationship between DS theory and IFS is firstly analyzed. And then the intuitionistic fuzzy possibility degree of intuitionistic fuzzy value(IFPD-IFV) is defined, and a novel ranking method with isotonicity for IFV is proposed. Finally, a calculation method for relative reliability factor(RRF) is designed based on the proposed ranking method. As a proof of the method, numerical analysis and experimental simulation are performed. The results indicate DSIFS-TECM is capable of dealing with the conflict temporal evidences and sensitive to the changing of time. Furthermore, compared with the existing methods, DSIFS-TECM has stronger ability of anti-interference.展开更多
The alternate combinational approach of genetic algorithm and neural network (AGANN) has been presented to correct the systematic error of the density functional theory (DFT) calculation. It treats the DFT as a bl...The alternate combinational approach of genetic algorithm and neural network (AGANN) has been presented to correct the systematic error of the density functional theory (DFT) calculation. It treats the DFT as a black box and models the error through external statistical information. As a demonstration, the ACANN method has been applied in the correction of the lattice energies from the DFT calculation for 72 metal halides and hydrides. Through the AGANN correction, the mean absolute value of the relative errors of the calculated lattice energies to the experimental values decreases from 4.93% to 1.20% in the testing set. For comparison, the neural network approach reduces the mean value to 2.56%. And for the common combinational approach of genetic algorithm and neural network, the value drops to 2.15%. The multiple linear regression method almost has no correction effect here.展开更多
This study focuses on the effectiveness of the project-based language learning(PBLL) in a college Secretarial Oral English(SOE) Module. Student reflections of the language project work have been analyzed through Activ...This study focuses on the effectiveness of the project-based language learning(PBLL) in a college Secretarial Oral English(SOE) Module. Student reflections of the language project work have been analyzed through Activity Theory. Moreover,Data has been collected and categorized based on the components of complex human activity: the subject, object, tools(signs,symbols, and language), the community in which the activity take place, division of labor, and rules. The findings theoretically support the outcome of project-based language learning which align with the object of the activity.展开更多
Evidence theory is widely used in the field of target recognition. The invalidation problem of this theory when dealing with highly conflict evidences is a research hotspot. Several alternatives of the combination rul...Evidence theory is widely used in the field of target recognition. The invalidation problem of this theory when dealing with highly conflict evidences is a research hotspot. Several alternatives of the combination rule are analyzed and compared. A new combination approach is proposed. Calculate the reliabilities of evidence sources using existing evidences. Construct reliabilities judge matrixes and get the weights of each evidence source. Weight average all inputted evidences. Combine processed evidences with D-S combination rule repeatedly to identify a target. The application in multi-sensor target reeognition as well as the comparison with typical alternatives all validated that this approach can dispose highly conflict evidences efficiently and get reasonable reeognition results rapidly.展开更多
The purpose of this study was to assess the susceptibility of landslides around the area of Guizhou province based on fuzzy theory.In first instance, slope, elevation, lithology, proximity to tectonic lines, proximity...The purpose of this study was to assess the susceptibility of landslides around the area of Guizhou province based on fuzzy theory.In first instance, slope, elevation, lithology, proximity to tectonic lines, proximity to drainage and annual precipitation were taken as independent, causal factors in this study.A landslide hazard evaluation factor system was established by classifying these factors into more subclasses according to some rules.Secondly, a trapezoidal fuzzy number weighting(TFNW) approach was used to assess the importance of six causal factors to landslides in an ArcGIS environment.Thirdly, a landslide susceptibility map was created based on a weighted linear combination model.According to this susceptibility map, the study area was classified into four categories of landslide susceptibility:low, moderate, high and very high.Finally, in order to verify the results obtained, the susceptibility map and the landslide inventory map were combined in the GIS.In addition, the weighting procedure showed that TFNW is an efficient method for weighting causal landslide factors.展开更多
AIM:To characterize the two components of theory of mind(ToM) in patients with esophageal cancer combined with depression.METHODS:Sixty-five patients with esophageal cancer combined with depression(depressed group) an...AIM:To characterize the two components of theory of mind(ToM) in patients with esophageal cancer combined with depression.METHODS:Sixty-five patients with esophageal cancer combined with depression(depressed group) and 62 normal controls(control group) were assessed using reading the mind in the eyes test,faux pas task,verbal fluency test,digit span test and WAIS IQ test.The depressed group was divided into two subgroups including psychotic depressed(PD) group(32 cases) and nonpsychotic depressed(NPD) group(33 cases).The clinical symptoms of patients were assessed using Beck depression inventory version Ⅱ and brief psychiatric reacting scale(BPRS).RESULTS:There was a significant difference between the depressed group and the control group on tasks involving ToM social perceptual components(mind reading:t = 7.39,P < 0.01) and tests involving ToM social cognitive components(faux pas questions:t = 13.75,P < 0.01),respectively.A significant difference was also found among the PD group,the NPD group and the control group on mind reading(F = 32.98,P < 0.01) and faux pas questions(χ 2 = 78.15,P < 0.01),respectively.The PD group and NPD group performed worse than normal group controls both on mind reading and faux pas questions(P < 0.05).The PD group performed significantly worse than the NPD group on tasks involving ToM(mind reading:F = 18.99,P < 0.01;faux pas questions:F = 36.01,P < 0.01).In the depressed group,there was a negative correlation between ToM performances and BPRS total score(mind reading:r =-0.35,P < 0.01;faux pas questions:r =-0.51,P < 0.01),and between ToM performances and hostile suspiciousness factor score(mind reading:r =-0.75,P < 0.01;faux pas questions:r =-0.73,P < 0.01),respectively.CONCLUSION:The two components of ToM are both impaired in patients with esophageal cancer combined with depression.This indicates that there may be an association between ToM deficits and psychotic symptoms in clinical depression.展开更多
Evidence theory has been widely used in the information fusion for its effectiveness of the uncertainty reasoning. However, the classical DS evidence theory involves counter-intuitive behaviors when the high conflict ...Evidence theory has been widely used in the information fusion for its effectiveness of the uncertainty reasoning. However, the classical DS evidence theory involves counter-intuitive behaviors when the high conflict information exists. Based on the analysis of some modified methods, Assigning the weighting factors according to the intrinsic characteristics of the existing evidence sources is proposed, which is determined on the evidence distance theory. From the numerical examples, the proposed method provides a reasonable result with good convergence efficiency. In addition, the new rule retrieves to the Yager's formula when all the evidence sources contradict to each other completely.展开更多
In order to achieve the information fusion in the time domain based on the evidence theory, an evidence combination method in the time domain based on reliability and importance is proposed according to the idea of ev...In order to achieve the information fusion in the time domain based on the evidence theory, an evidence combination method in the time domain based on reliability and importance is proposed according to the idea of evidence discount. Firstly, the distortion of the time-domain evidence is judged based on single exponential smoothing. The real-time reliability of the evidence at the adjacent time is obtained by the real-time reliability assessment method of the evidence based on the credibility decay model.Then, the relative importance of the evidence at the adjacent time is obtained by comprehensively considering improved conflict degree and uncertainty. Finally, based on the criterion of evidence discount and the Dempster’s rule of combination, the evidence combination is carried out to achieve the sequential combination of time-domain evidence. The numerical simulation and analysis show that this method has fully embodied the dynamic characteristics of time-domain evidence combination, and it has strong processing ability for conflict information and anti-disturbing ability.The proposed method has good applicability to information fusion in the time domain.展开更多
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertain...Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertainty causing issues to licensed users,business models for licensed service providers.Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum,offer improved coverage and capacity of networks,enhance network security and reduce energy consumption.With wireless virtualization,wireless networks'physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations(MVNOs).Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers(WIPs),virtualized wireless networks are vulnerable to a multitude of attacks,including jamming attacks and eavesdropping attacks.This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users,and eavesdroppers aim to reduce secrecy rates.Specifically,we consider a virtual wireless network where MVNO users'job is to improve their Signal to Interference plus Noise Ratio(SINR)while the jammers target to collectively enhance their Jammer Received Signal Strength(JRSS),and an eavesdropper's goal is to reduce the overall secrecy rate.Numerical results have demonstrated that the proposed game strategies are effective(in terms of data rate,secrecy rate and latency)against such attackers compared to the traditional approaches.展开更多
We present wavelet bases made of piecewise (low degree) polynomial functions with an (arbitrary) assigned number of vanishing moments. We study some of the properties of these wavelet bases;in particular we consider t...We present wavelet bases made of piecewise (low degree) polynomial functions with an (arbitrary) assigned number of vanishing moments. We study some of the properties of these wavelet bases;in particular we consider their use in the approximation of functions and in numerical quadrature. We focus on two applications: integral kernel sparsification and digital image compression and reconstruction. In these application areas the use of these wavelet bases gives very satisfactory results.展开更多
We investigate the thermal characteristics of standard organic light-emitting diodes (OLEDs) using a simple and clear 1D thermal model based on the basic heat transfer theory. The thermal model can accurately estima...We investigate the thermal characteristics of standard organic light-emitting diodes (OLEDs) using a simple and clear 1D thermal model based on the basic heat transfer theory. The thermal model can accurately estimate the device temperature, which is linearly with electrical input power. The simulation results show that there is almost no temperature gradient within the OLED device working under steady state conditions. Furthermore, thermal analysis simulation results show that the surface properties (convective heat transfer coetficient and surface emissivity) of the substrate or cathode can significantly affect the temperature distribution of the OLED.展开更多
Quantum density functional theory (DFT) results are reported for the building block [LaL^1(NO3)] of La complex [LaL^1(NO3)]NO3·5H2O (L^1 = (CH3)2CHCH2CH(NCHC4H3O)COO^-). The structure was optimized an...Quantum density functional theory (DFT) results are reported for the building block [LaL^1(NO3)] of La complex [LaL^1(NO3)]NO3·5H2O (L^1 = (CH3)2CHCH2CH(NCHC4H3O)COO^-). The structure was optimized and the calculation results show that the lanthanum ion is coordinated by one nitrogen atom and three oxygen atoms of L^1 and two oxygen atoms of nitrate ion. The bond length of La-N is 0.2637 nm and the average length of La-O is 0.2526 nm, which are consistent with the literatures. In addition, the stabilities, electronic structural characteristics and IR spectra of the complex have been analyzed, which describe the coordination of lanthanum ion with other atoms in detail.展开更多
Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security an...Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security analysis method. The periodic orbits theory indicates that the fundamental frequency of the spiraling orbits is the natural frequency of associated linearized system, which is decided by the parameters of the chaotic system. Thus, it is possible to recover the plaintext of secure communication systems based on chaotic shift keying by getting the average time on the spiraling orbits. Analysis and simulation results show that the security analysis method can break chaos shift keying secure communication systems, which use the parameters as keys.展开更多
Objective Any natural system is constantly exchanging material, energy and information with the environment, and all tkese processes follow the basic law of thermodynamics, with no exception of groundwater recharge a...Objective Any natural system is constantly exchanging material, energy and information with the environment, and all tkese processes follow the basic law of thermodynamics, with no exception of groundwater recharge and discharge process. On the basis of the principle of the first law of thermodynamics, the reverse geochemical simulation method is widely used in the study of groundwater recharge, runoff and drainage process. However, some studies only consider the material conservation in theprocess, but ignore the probability of the transformation.展开更多
Dempster-Shafer(D-S)evidence theory is a key technology for integrating uncertain information from multiple sources.However,the combination rules can be paradoxical when the evidence seriously conflict with each other...Dempster-Shafer(D-S)evidence theory is a key technology for integrating uncertain information from multiple sources.However,the combination rules can be paradoxical when the evidence seriously conflict with each other.In the paper,we propose a novel combination algorithm based on unsupervised Density-Based Spatial Clustering of Applications with Noise(DBSCAN)density clustering.In the proposed mechanism,firstly,the original evidence sets are preprocessed by DBSCAN density clustering,and a successfully focal element similarity criteria is used to mine the potential information between the evidence,and make a correct measure of the conflict evidence.Then,two different discount factors are adopted to revise the original evidence sets,based on the result of DBSCAN density clustering.Finally,we conduct the information fusion for the revised evidence sets by D-S combination rules.Simulation results show that the proposed method can effectively solve the synthesis problem of high-conflict evidence,with better accuracy,stability and convergence speed.展开更多
Although evidence theory has been widely used in information fusion due to its effectiveness of uncertainty reasoning, the classical DS evidence theory involves counter-intuitive behaviors when high conflict informati...Although evidence theory has been widely used in information fusion due to its effectiveness of uncertainty reasoning, the classical DS evidence theory involves counter-intuitive behaviors when high conflict information exists. Many modification methods have been developed which can be classified into the following two kinds of ideas, either modifying the combination rules or modifying the evidence sources. In order to make the modification more reasonable and more effective, this paper gives a thorough analysis of some typical existing modification methods firstly, and then extracts the intrinsic feature of the evidence sources by using evidence distance theory. Based on the extracted features, two modified plans of evidence theory according to the corresponding modification ideas have been proposed. The results of numerical examples prove the good performance of the plans when combining evidence sources with high conflict information.展开更多
In this paper, we study about a method to optimize the fused track quality in intelligence network of radar target fusion system, considering the role of people in the fusion system;we start to find ways to optimize t...In this paper, we study about a method to optimize the fused track quality in intelligence network of radar target fusion system, considering the role of people in the fusion system;we start to find ways to optimize the quality of the fused track, and adaptive smoothing method is proposed based on fuzzy theory. Tests show that this method can greatly improve the quality of the fused track system for battlefield reconnaissance provides high-quality, high-reliability battlefield.展开更多
From the comparison of correlation tensor in the theory of quantum network, the Alexander relation matrix in the theory of knot crystals and the identical inversion relations under the action of Pauli matrices, we sho...From the comparison of correlation tensor in the theory of quantum network, the Alexander relation matrix in the theory of knot crystals and the identical inversion relations under the action of Pauli matrices, we show that there is a one to one correspondence between four Bell bases and four oriented links of the linkage in knot theory.展开更多
The closure of a turbulence field is a longstanding fundamental problem, while most closure models are introduced in spectral space. Inspired by Chou's quasi-normal closure method in spectral space, we propose an ana...The closure of a turbulence field is a longstanding fundamental problem, while most closure models are introduced in spectral space. Inspired by Chou's quasi-normal closure method in spectral space, we propose an analytical closure model for isotropic turbulence based on the extended scale similarity theory of the velocity structure function in physical space. The assumptions and certain approximations are justified with direct numerical simulation. The asymptotic scaling properties are reproduced by this new closure method, in comparison to the classical Batchelor model.展开更多
基金supported by the National Natural Science Foundation of China(61272011)
文摘In order to effectively deal with the conflict temporal evidences without affecting the sequential and dynamic characteristics in the multi-sensor target recognition(MSTR) system at the decision making level, this paper proposes a Dempster-Shafer(DS) theory and intuitionistic fuzzy set(IFS) based temporal evidence combination method(DSIFS-TECM). To realize the method,the relationship between DS theory and IFS is firstly analyzed. And then the intuitionistic fuzzy possibility degree of intuitionistic fuzzy value(IFPD-IFV) is defined, and a novel ranking method with isotonicity for IFV is proposed. Finally, a calculation method for relative reliability factor(RRF) is designed based on the proposed ranking method. As a proof of the method, numerical analysis and experimental simulation are performed. The results indicate DSIFS-TECM is capable of dealing with the conflict temporal evidences and sensitive to the changing of time. Furthermore, compared with the existing methods, DSIFS-TECM has stronger ability of anti-interference.
基金supported by the National Basic Research Program of China (973 Program) (Grant No. G2009CB929300)the National Natural Science Foundation of China (Grant No. 60521001 and 60925016)
文摘The alternate combinational approach of genetic algorithm and neural network (AGANN) has been presented to correct the systematic error of the density functional theory (DFT) calculation. It treats the DFT as a black box and models the error through external statistical information. As a demonstration, the ACANN method has been applied in the correction of the lattice energies from the DFT calculation for 72 metal halides and hydrides. Through the AGANN correction, the mean absolute value of the relative errors of the calculated lattice energies to the experimental values decreases from 4.93% to 1.20% in the testing set. For comparison, the neural network approach reduces the mean value to 2.56%. And for the common combinational approach of genetic algorithm and neural network, the value drops to 2.15%. The multiple linear regression method almost has no correction effect here.
文摘This study focuses on the effectiveness of the project-based language learning(PBLL) in a college Secretarial Oral English(SOE) Module. Student reflections of the language project work have been analyzed through Activity Theory. Moreover,Data has been collected and categorized based on the components of complex human activity: the subject, object, tools(signs,symbols, and language), the community in which the activity take place, division of labor, and rules. The findings theoretically support the outcome of project-based language learning which align with the object of the activity.
基金This project was supported by the National "863" High Technology Research and Development Program of China(2001AA602021)
文摘Evidence theory is widely used in the field of target recognition. The invalidation problem of this theory when dealing with highly conflict evidences is a research hotspot. Several alternatives of the combination rule are analyzed and compared. A new combination approach is proposed. Calculate the reliabilities of evidence sources using existing evidences. Construct reliabilities judge matrixes and get the weights of each evidence source. Weight average all inputted evidences. Combine processed evidences with D-S combination rule repeatedly to identify a target. The application in multi-sensor target reeognition as well as the comparison with typical alternatives all validated that this approach can dispose highly conflict evidences efficiently and get reasonable reeognition results rapidly.
基金Project 200331880201 supported by the West Project of the Ministry of Communication of China
文摘The purpose of this study was to assess the susceptibility of landslides around the area of Guizhou province based on fuzzy theory.In first instance, slope, elevation, lithology, proximity to tectonic lines, proximity to drainage and annual precipitation were taken as independent, causal factors in this study.A landslide hazard evaluation factor system was established by classifying these factors into more subclasses according to some rules.Secondly, a trapezoidal fuzzy number weighting(TFNW) approach was used to assess the importance of six causal factors to landslides in an ArcGIS environment.Thirdly, a landslide susceptibility map was created based on a weighted linear combination model.According to this susceptibility map, the study area was classified into four categories of landslide susceptibility:low, moderate, high and very high.Finally, in order to verify the results obtained, the susceptibility map and the landslide inventory map were combined in the GIS.In addition, the weighting procedure showed that TFNW is an efficient method for weighting causal landslide factors.
文摘AIM:To characterize the two components of theory of mind(ToM) in patients with esophageal cancer combined with depression.METHODS:Sixty-five patients with esophageal cancer combined with depression(depressed group) and 62 normal controls(control group) were assessed using reading the mind in the eyes test,faux pas task,verbal fluency test,digit span test and WAIS IQ test.The depressed group was divided into two subgroups including psychotic depressed(PD) group(32 cases) and nonpsychotic depressed(NPD) group(33 cases).The clinical symptoms of patients were assessed using Beck depression inventory version Ⅱ and brief psychiatric reacting scale(BPRS).RESULTS:There was a significant difference between the depressed group and the control group on tasks involving ToM social perceptual components(mind reading:t = 7.39,P < 0.01) and tests involving ToM social cognitive components(faux pas questions:t = 13.75,P < 0.01),respectively.A significant difference was also found among the PD group,the NPD group and the control group on mind reading(F = 32.98,P < 0.01) and faux pas questions(χ 2 = 78.15,P < 0.01),respectively.The PD group and NPD group performed worse than normal group controls both on mind reading and faux pas questions(P < 0.05).The PD group performed significantly worse than the NPD group on tasks involving ToM(mind reading:F = 18.99,P < 0.01;faux pas questions:F = 36.01,P < 0.01).In the depressed group,there was a negative correlation between ToM performances and BPRS total score(mind reading:r =-0.35,P < 0.01;faux pas questions:r =-0.51,P < 0.01),and between ToM performances and hostile suspiciousness factor score(mind reading:r =-0.75,P < 0.01;faux pas questions:r =-0.73,P < 0.01),respectively.CONCLUSION:The two components of ToM are both impaired in patients with esophageal cancer combined with depression.This indicates that there may be an association between ToM deficits and psychotic symptoms in clinical depression.
文摘Evidence theory has been widely used in the information fusion for its effectiveness of the uncertainty reasoning. However, the classical DS evidence theory involves counter-intuitive behaviors when the high conflict information exists. Based on the analysis of some modified methods, Assigning the weighting factors according to the intrinsic characteristics of the existing evidence sources is proposed, which is determined on the evidence distance theory. From the numerical examples, the proposed method provides a reasonable result with good convergence efficiency. In addition, the new rule retrieves to the Yager's formula when all the evidence sources contradict to each other completely.
基金supported by the National Natural Science Foundation of China(71571190 71601183+1 种基金 L1534031)the Shanxi Province Natural Science Foundation of China(2014JQ2-7045)
文摘In order to achieve the information fusion in the time domain based on the evidence theory, an evidence combination method in the time domain based on reliability and importance is proposed according to the idea of evidence discount. Firstly, the distortion of the time-domain evidence is judged based on single exponential smoothing. The real-time reliability of the evidence at the adjacent time is obtained by the real-time reliability assessment method of the evidence based on the credibility decay model.Then, the relative importance of the evidence at the adjacent time is obtained by comprehensively considering improved conflict degree and uncertainty. Finally, based on the criterion of evidence discount and the Dempster’s rule of combination, the evidence combination is carried out to achieve the sequential combination of time-domain evidence. The numerical simulation and analysis show that this method has fully embodied the dynamic characteristics of time-domain evidence combination, and it has strong processing ability for conflict information and anti-disturbing ability.The proposed method has good applicability to information fusion in the time domain.
基金This work was supported in part by the US NSF under grants CNS 1650831 and HRD 1828811by the U.S.Department of Homeland Security under grant DHS 2017-ST-062-000003by the DoE's National Nuclear Security Administration(NNSA)Award#DE-NA0003946.
文摘Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertainty causing issues to licensed users,business models for licensed service providers.Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum,offer improved coverage and capacity of networks,enhance network security and reduce energy consumption.With wireless virtualization,wireless networks'physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations(MVNOs).Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers(WIPs),virtualized wireless networks are vulnerable to a multitude of attacks,including jamming attacks and eavesdropping attacks.This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users,and eavesdroppers aim to reduce secrecy rates.Specifically,we consider a virtual wireless network where MVNO users'job is to improve their Signal to Interference plus Noise Ratio(SINR)while the jammers target to collectively enhance their Jammer Received Signal Strength(JRSS),and an eavesdropper's goal is to reduce the overall secrecy rate.Numerical results have demonstrated that the proposed game strategies are effective(in terms of data rate,secrecy rate and latency)against such attackers compared to the traditional approaches.
文摘We present wavelet bases made of piecewise (low degree) polynomial functions with an (arbitrary) assigned number of vanishing moments. We study some of the properties of these wavelet bases;in particular we consider their use in the approximation of functions and in numerical quadrature. We focus on two applications: integral kernel sparsification and digital image compression and reconstruction. In these application areas the use of these wavelet bases gives very satisfactory results.
基金Supported by the National Natural Science Foundation of China under Grant No 11304247the Shaanxi Provincial Research Plan for Young Scientific and Technological New Stars(No 2015KJXX-40)the Youth Foundation of Xi’an University of Post&Telecommunication under Grant Nos 1011215 and 1010473
文摘We investigate the thermal characteristics of standard organic light-emitting diodes (OLEDs) using a simple and clear 1D thermal model based on the basic heat transfer theory. The thermal model can accurately estimate the device temperature, which is linearly with electrical input power. The simulation results show that there is almost no temperature gradient within the OLED device working under steady state conditions. Furthermore, thermal analysis simulation results show that the surface properties (convective heat transfer coetficient and surface emissivity) of the substrate or cathode can significantly affect the temperature distribution of the OLED.
基金This work was supported by the National Natural Science Foundation of China (20203011)
文摘Quantum density functional theory (DFT) results are reported for the building block [LaL^1(NO3)] of La complex [LaL^1(NO3)]NO3·5H2O (L^1 = (CH3)2CHCH2CH(NCHC4H3O)COO^-). The structure was optimized and the calculation results show that the lanthanum ion is coordinated by one nitrogen atom and three oxygen atoms of L^1 and two oxygen atoms of nitrate ion. The bond length of La-N is 0.2637 nm and the average length of La-O is 0.2526 nm, which are consistent with the literatures. In addition, the stabilities, electronic structural characteristics and IR spectra of the complex have been analyzed, which describe the coordination of lanthanum ion with other atoms in detail.
文摘Chaos-based encryption schemes have been studied extensively, while the security analysis methods for them are still problems to be resolved. Based on the periodic orbit theory, this paper proposes a novel security analysis method. The periodic orbits theory indicates that the fundamental frequency of the spiraling orbits is the natural frequency of associated linearized system, which is decided by the parameters of the chaotic system. Thus, it is possible to recover the plaintext of secure communication systems based on chaotic shift keying by getting the average time on the spiraling orbits. Analysis and simulation results show that the security analysis method can break chaos shift keying secure communication systems, which use the parameters as keys.
基金granted by the National Natural Science Fund of China(Grant no.51578212)
文摘Objective Any natural system is constantly exchanging material, energy and information with the environment, and all tkese processes follow the basic law of thermodynamics, with no exception of groundwater recharge and discharge process. On the basis of the principle of the first law of thermodynamics, the reverse geochemical simulation method is widely used in the study of groundwater recharge, runoff and drainage process. However, some studies only consider the material conservation in theprocess, but ignore the probability of the transformation.
文摘Dempster-Shafer(D-S)evidence theory is a key technology for integrating uncertain information from multiple sources.However,the combination rules can be paradoxical when the evidence seriously conflict with each other.In the paper,we propose a novel combination algorithm based on unsupervised Density-Based Spatial Clustering of Applications with Noise(DBSCAN)density clustering.In the proposed mechanism,firstly,the original evidence sets are preprocessed by DBSCAN density clustering,and a successfully focal element similarity criteria is used to mine the potential information between the evidence,and make a correct measure of the conflict evidence.Then,two different discount factors are adopted to revise the original evidence sets,based on the result of DBSCAN density clustering.Finally,we conduct the information fusion for the revised evidence sets by D-S combination rules.Simulation results show that the proposed method can effectively solve the synthesis problem of high-conflict evidence,with better accuracy,stability and convergence speed.
文摘Although evidence theory has been widely used in information fusion due to its effectiveness of uncertainty reasoning, the classical DS evidence theory involves counter-intuitive behaviors when high conflict information exists. Many modification methods have been developed which can be classified into the following two kinds of ideas, either modifying the combination rules or modifying the evidence sources. In order to make the modification more reasonable and more effective, this paper gives a thorough analysis of some typical existing modification methods firstly, and then extracts the intrinsic feature of the evidence sources by using evidence distance theory. Based on the extracted features, two modified plans of evidence theory according to the corresponding modification ideas have been proposed. The results of numerical examples prove the good performance of the plans when combining evidence sources with high conflict information.
文摘In this paper, we study about a method to optimize the fused track quality in intelligence network of radar target fusion system, considering the role of people in the fusion system;we start to find ways to optimize the quality of the fused track, and adaptive smoothing method is proposed based on fuzzy theory. Tests show that this method can greatly improve the quality of the fused track system for battlefield reconnaissance provides high-quality, high-reliability battlefield.
文摘From the comparison of correlation tensor in the theory of quantum network, the Alexander relation matrix in the theory of knot crystals and the identical inversion relations under the action of Pauli matrices, we show that there is a one to one correspondence between four Bell bases and four oriented links of the linkage in knot theory.
文摘The closure of a turbulence field is a longstanding fundamental problem, while most closure models are introduced in spectral space. Inspired by Chou's quasi-normal closure method in spectral space, we propose an analytical closure model for isotropic turbulence based on the extended scale similarity theory of the velocity structure function in physical space. The assumptions and certain approximations are justified with direct numerical simulation. The asymptotic scaling properties are reproduced by this new closure method, in comparison to the classical Batchelor model.