While wormholes are just as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. To allow for the possibility of interstellar travel, a macroscopic...While wormholes are just as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. To allow for the possibility of interstellar travel, a macroscopic wormhole would need to maintain sufficiently low radial tidal forces. It is proposed in this paper that the assumption of zero tidal forces, i.e., the limiting case, is sufficient for overcoming the restrictions from quantum field theory. The feasibility of this approach is subsequently discussed by 1) introducing the additional conditions needed to ensure that the radial tidal forces can indeed be sufficiently low and 2) by viewing traversable wormholes as emergent phenomena, thereby increasing the likelihood of their existence.展开更多
The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To ...The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To begin with, the extra spatial dimension is assumed to be time dependent, while the redshift and shape functions, as well as the extra dimension, are functions of both r and l, the respective radial and extra coordinates;the last of these is therefore a function of r, l, and t. The main objective is to determine the conditions that allow the throat of the wormhole to be threaded with ordinary matter (by respecting the null energy condition) and that the same conditions lead to a violation of the null energy condition in the fifth dimension, which is therefore responsible for sustaining the wormhole. The dependence of the extra dimension on l and t is subject to additional conditions that are subsequently analyzed in this paper. Finally, the extra dimension may be extremely small or even curled up.展开更多
Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal ba...Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal based query execution (RDF-LTE) approach, this paper discusses how the execution order of the triple pattern affects the query results and cost based on concrete SPARQL queries, and analyzes two properties of the web of linked data, missing backward links and missing contingency solution. Then three heuristic principles for logic query plan optimization, namely, the filtered basic graph pattern (FBGP) principle, the triple pattern chain principle and the seed URIs principle, are proposed. The three principles contribute to decrease the intermediate solutions and increase the types of queries that can be answered. The effectiveness and feasibility of the proposed approach is evaluated. The experimental results show that more query results can be returned with less cost, thus enabling users to develop the full potential of the web of linked data.展开更多
This paper presents a novel technique for identifying soil parameters for a wheeled vehicle traversing unknown terrain. The identified soil parameters are required for predicting vehicle drawbar pull and wheel drive t...This paper presents a novel technique for identifying soil parameters for a wheeled vehicle traversing unknown terrain. The identified soil parameters are required for predicting vehicle drawbar pull and wheel drive torque, which in turn can be used for traversability prediction, traction control, and performance optimization of a wheeled vehicle on unknown terrain. The proposed technique is based on the Newton Raphson method. An approximated form of a wheel-soil interaction model based on Composite Simpson's Rule is employed for this purpose. The key soil parameters to be identified are internal friction angle, shear deformation modulus, and lumped pressure-sinkage coefficient. The fourth parameter, cohesion, is not too relevant to vehicle drawbar pull, and is assigned an average value during the identification process. Identified parameters are compared with known values, and shown to be in agreement. The identification method is relatively fast and robust. The identified soil parameters can effectively be used to predict drawbar pull and wheel drive torque with good accuracy. The use of identified soil parameters to design a traversability criterion for wheeled vehicles traversing unknown terrain is presented.展开更多
The multi-scale expression of enormously complicated laneway data requires differentiation of both contents and the way the contents are expressed. To accomplish multi-scale expression laneway data must support multi-...The multi-scale expression of enormously complicated laneway data requires differentiation of both contents and the way the contents are expressed. To accomplish multi-scale expression laneway data must support multi-scale transformation and have consistent topological relationships. Although the laneway data generated by traverse survey-ing is non-scale data it is still impossible to construct a multi-scale spatial database directly from it. In this paper an al-gorithm is presented to first calculate the laneway mid-line to support multi-scale transformation; then to express topo-logical relationships arising from the data structure; and,finally,a laneway spatial database is built and multi-scale ex-pression is achieved using components GIS-SuperMap Objects. The research result is of great significance for improv-ing the efficiency of laneway data storage and updating,for ensuring consistency of laneway data expression and for extending the potential value of a mine spatial database.展开更多
Some GPS points were set up and occupied and reoccupied along the traverse route from Zhongshan Station to DomeA.The result analysis for the GPS data processed by GAMIT/GLOBK package was presented in this paper.It was...Some GPS points were set up and occupied and reoccupied along the traverse route from Zhongshan Station to DomeA.The result analysis for the GPS data processed by GAMIT/GLOBK package was presented in this paper.It was indicated that the ice along the traverse route flowed with an 825 m/a velocity to the northwest in the last three years,which was the direction of the edge of the ice sheet.The maximum horizontal flow velocity is about 100 m/a.Moreover,due to the ice flow,a 0.21 m/a sedimentation rate is achieved.Finally,a 15 m/a 2 horizontal acceleration is achieved from the GPS data of the three different stages.展开更多
This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plai...This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plaintext image is sorted according to the middle order traversal sequence on the permutation.Secondly,the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value.Finally,the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix.The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness.展开更多
The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent lav...The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent laves phase evolution in fusion zone.This paper reports the direct effect of magnetically constricted arc traverse speed(MCATS)on bead profile,tensile properties and microstructural evolution of Inconel 718 alloy sheets joined by Gas Tungsten Constricted Arc Welding(GTCAW)process.The mechanism amenable for the microstructural modification and corresponding influence on the tensile properties of joints is investigated both in qualitative and quantitative manner related to the mechanics of arc constriction and pulsing.It is correlated to the solidification conditions during welding.The relationship between MCATS and Arc Constriction Current(ACC)was derived.Its interaction effect on the magnetic arc constriction and joint performance was analysed.Results showed that the joints fabricated using CATS of 70 mm/min exhibited superior tensile properties(98.39% of base metal strength with 31.50% elongation).It is attributed to the grain refinement in fusion zone microstructure leading to the evolution of finer,discrete laves phase in interdendritic areas.展开更多
The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderate...The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderated problem to make the users behind NAT gateway to access to IPv6 networks. By studying the transition technology from IPv4 to IPv6 and introducing NAT technology in IPv6, a scenario is put forward through 6to4 tunnel The scenario is implemented and the gateway system's performance is analyzed.展开更多
The survey configuration, instrumentation and error propagation in the control survey technique known as “wall station traversing” were analyzed. Wall mounted survey points was utilized as an alternative to roof (ba...The survey configuration, instrumentation and error propagation in the control survey technique known as “wall station traversing” were analyzed. Wall mounted survey points was utilized as an alternative to roof (backs) mounted points. Recently, this technique has gained widespread acceptance in underground metalliferous mines in Western Australia. The error propagation of the “wall stations” technique in relation to classical traversing was analyzed and compared, and an optimal survey procedure and configuration for this technique was derived.展开更多
This paper includes a short historical review of Russian and Soviet scientific traverses to study the Antarctic inland. The first traverse left on April 2, 1956. It resulted in the opening of the first Russian inland ...This paper includes a short historical review of Russian and Soviet scientific traverses to study the Antarctic inland. The first traverse left on April 2, 1956. It resulted in the opening of the first Russian inland research station named Pionerskaya and provided the first geophysical and glaciological data on regions inland of the Antarctic coast. By 1965, a number of regional inland scientific traverses had been completed and. the first Atlas of Antarctica was published in 1966. The atlas presented the main achievements of that time. After the discovery of Lake Vostok, Russian scientists commenced remote sensing investigations to study this unique natural phenomenon. The propagation of acoustic and electromagnetic waves in the glacier near Vostok Station were measured to provide important geophysical data. Radio-echo sounding data showed that Lake Vostok is isolated and separated from the rest of the Antarctic subglacial hydrosphere. The total area of the lake is 15 790 km2, excluding 365 km^2 occupied by 11 islands. Reflection seismic soundings of Lake Vostok estimated a total volume of about 6 100 km^3, an average depth of about 400 m, and a maximum depth of 1 200 m. Since 2008, there have been a number of scientific traverses between Mirny and Vostok stations and between Progress and Vostok stations. The data collected during the traverses have provided new insights into sub-ice topography and ice sheet structure, and have led to the discovery of subglacial lakes near Komsomolskaya Station and under Pionerskaya Station.展开更多
This paper advances a new simplified formula for estimating variance components ,sums up the basic law to calculate the weights of observed values and a circulation method using the increaments of weights when estimat...This paper advances a new simplified formula for estimating variance components ,sums up the basic law to calculate the weights of observed values and a circulation method using the increaments of weights when estimating the variance components of traverse nets,advances the charicteristic roots method to estimate the variance components of traveres nets and presents a practical method to make two real and symmetric matrices two diagonal ones.展开更多
A gravity survey was conducted along the Mizuho traverse routes in austral summer of 1999-2000 by the 41st Japanese Antarctic Research Expedition (JARE-41). The main purpose of the survey was to obtain detail gravity ...A gravity survey was conducted along the Mizuho traverse routes in austral summer of 1999-2000 by the 41st Japanese Antarctic Research Expedition (JARE-41). The main purpose of the survey was to obtain detail gravity anomaly along the traverse routes, where deep seismic exploration was simultaneously conducted in order to obtain a fine crustal structure of the Mizuho Plateau. By using SCINTREX (CG-3M) gravity meter, the survey was carried out at 160 sites with about 1 km interval in a distance of 190 km from S16 to Z20 on the traverse routes. Free-air and Bouguer anomalies were calculated using precise locations by GPS measurements, by taking into account an effect of the thick icesheet. The furrowed negative Free-air anomalies are identified around H192, where middle points of the whole traverse routes. Two bedrock elevation models derived both by seismic refraction analyses and radio-echo sounding might correspond to the bottom and the top of a mixture layer composed from ice-moraine rocks over the bedrock surface. Thickness of the crust estimated by Bouguer anomalies is 0.5 - 1 km larger toward inland at the terminal point of Z20 along the profile.展开更多
The forthcoming Next Generation Network (NGN) is an all IP network. Multimedia communications over IP networks are a type of bundled session communications, which cannot directly traverse Network Address Translations ...The forthcoming Next Generation Network (NGN) is an all IP network. Multimedia communications over IP networks are a type of bundled session communications, which cannot directly traverse Network Address Translations (NATs) and firewalls even in NGN. To solve the problem that the existing traversal methods are not suitable for service providers to set up a real system in NGN, a Distributed Broker-agent Architecture (DBA) is addressed. DBA is secure and realizable for service providers and enterprises because it is easy to set up and does not need to upgrade the existing devices like Firewalls, NATs or endpoint devices of subscribers. DBA is composed of two-layer distributed agents, the server proxies and the client agents, in which all multimedia communications use shared tunnels to carry signaling messages and media data between broker-agents, and the call signaling is encrypted over Security Socket Layer (SSL) to guarantee the security of calling. Moreover, the function model and multiplexed connection messages format of DBA are designed, which lays a basis for the protocol in the future NGN. In addition, a simple implementation based on H.323 verifyies the main function of traversing firewalls and NATs.展开更多
The effects of S86019, an active component from Puralia lobata, on the induction of cell differentiation and cell cycle traverse of HL-60 cells were described. It was shown that cell proliferation of HL-60 cells was i...The effects of S86019, an active component from Puralia lobata, on the induction of cell differentiation and cell cycle traverse of HL-60 cells were described. It was shown that cell proliferation of HL-60 cells was inhibited by S86019 in vitro. Under the action of S86019 the HL-60 cells were induced to differentiate into metamyelocytes, myelocytes and much matured cells with banded or segmented nucleus. Flow cytometry demonstrated that the cell population of HL-60 cells was blocked at G1 phase which resulted in the elevation of percentage of G1 cells and decrease of percentage of cells in S phase. Experimental results demonstrated that S86019 is an active inducer of cell differentiation in HL-60 cells.展开更多
P2P streaming application must realize network address translation (NAT) traversal. To handle low success ratio of the existing NAT traversal algorithm, UPnP-STUN (UPUN) and port-mapping sample estimation (PMSE)...P2P streaming application must realize network address translation (NAT) traversal. To handle low success ratio of the existing NAT traversal algorithm, UPnP-STUN (UPUN) and port-mapping sample estimation (PMSE) algorithm are recommended in this paper. UPUN is the combination of UPnP and STUN, and PMSE utilizes port mapping samples added by symmetric NAT for different sessions to estimate regularity of port mapping of symmetric NAT, which takes advantage of the Bernoulli law of large numbers. Besides, for the situation that both peers are behind NAT, and to handle heavy relay server load when many inner peers want to communicate with each other, a peer auxiliary-relay (PAR) algorithm is presented. PAR lets outer peers with sufficient bandwidth act as relay servers to alleviate pressure of real server, which could avoid NAT traversal failure caused by single point failure of relay server. Finally, experiments show that the proposed algorithms could improve the success ratio significantly for NAT traversal in P2P streaming application as well as improve P2P streaming application applicability.展开更多
The modeling of dynamical systems from a time series implemented by our DSA program introduces binary trees of height D with all leaves on the same level, and the related subtrees of height L 〈 D. These are called e-...The modeling of dynamical systems from a time series implemented by our DSA program introduces binary trees of height D with all leaves on the same level, and the related subtrees of height L 〈 D. These are called e-trees and e-subtrees. The recursive and nonrecursive versions of the traversal algorithms for the trees with dynamically created nodes are discussed. The original nonrecursive algorithms that return the pointer to the next node in preorder, inorder and postorder traversals are presented. The space-time complexity analysis shows and the execution time measurements confirm that for these O(2D) algorithms, the recursive versions have approximately 10-25% better time constants. Still, the use of nonrecursive algorithms may be more appropriate in several occasions.展开更多
<p align="left"> <span style="font-family:Verdana;">During the model-based software testing process, test cases are generated from modeled requirements to conduct acceptance testing. Ho...<p align="left"> <span style="font-family:Verdana;">During the model-based software testing process, test cases are generated from modeled requirements to conduct acceptance testing. However, existing approaches generate erroneous test cases, lack full coverage criteria and prototype tools. Therefore, the aim of this research is to develop an approach capable of reducing erroneous test case generation based on full coverage criteria and a prototype tool. The method employed was to develop a parser to extract information from the XMI file of a modeling diagram where a tree is constructed and a traversal operation executed on the nodes and edges to generate test cases. The results obtained from the proposed approach showed that 97.35% of the generated test cases were precise and comprehensive enough to conduct testing because 99.01% of all the nodes and edges were fully covered during the traversal operations.</span> </p>展开更多
The Brouwer fixed-point theorem in topology states that for any continuous mapping <em>f</em> on a compact convex set into itself admits a fixed point, <em>i.e.</em>, a point <em>x</em...The Brouwer fixed-point theorem in topology states that for any continuous mapping <em>f</em> on a compact convex set into itself admits a fixed point, <em>i.e.</em>, a point <em>x</em><sub>0</sub> such that<em> f</em>(<em>x</em><sub>0</sub>) = <em>x</em><sub>0</sub>. Under suitable conditions, this fixed point corresponds to the throat of a traversable wormhole, <em>i.e.</em>, <em>b</em>(<em>r</em><sub>0</sub>) = <em>r</em><sub>0</sub> for the shape function <em>b</em> = <em>b</em>(<em>r</em>). The possible existence of wormholes can therefore be deduced from purely mathematical considerations without going beyond the existing physical requirements.展开更多
Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvement...Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvements in programming are proposed.展开更多
文摘While wormholes are just as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. To allow for the possibility of interstellar travel, a macroscopic wormhole would need to maintain sufficiently low radial tidal forces. It is proposed in this paper that the assumption of zero tidal forces, i.e., the limiting case, is sufficient for overcoming the restrictions from quantum field theory. The feasibility of this approach is subsequently discussed by 1) introducing the additional conditions needed to ensure that the radial tidal forces can indeed be sufficiently low and 2) by viewing traversable wormholes as emergent phenomena, thereby increasing the likelihood of their existence.
文摘The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To begin with, the extra spatial dimension is assumed to be time dependent, while the redshift and shape functions, as well as the extra dimension, are functions of both r and l, the respective radial and extra coordinates;the last of these is therefore a function of r, l, and t. The main objective is to determine the conditions that allow the throat of the wormhole to be threaded with ordinary matter (by respecting the null energy condition) and that the same conditions lead to a violation of the null energy condition in the fifth dimension, which is therefore responsible for sustaining the wormhole. The dependence of the extra dimension on l and t is subject to additional conditions that are subsequently analyzed in this paper. Finally, the extra dimension may be extremely small or even curled up.
基金The National Natural Science Foundation of China(No.61070170)the Natural Science Foundation of Higher Education Institutions of Jiangsu Province(No.11KJB520017)Suzhou Application Foundation Research Project(No.SYG201238)
文摘Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal based query execution (RDF-LTE) approach, this paper discusses how the execution order of the triple pattern affects the query results and cost based on concrete SPARQL queries, and analyzes two properties of the web of linked data, missing backward links and missing contingency solution. Then three heuristic principles for logic query plan optimization, namely, the filtered basic graph pattern (FBGP) principle, the triple pattern chain principle and the seed URIs principle, are proposed. The three principles contribute to decrease the intermediate solutions and increase the types of queries that can be answered. The effectiveness and feasibility of the proposed approach is evaluated. The experimental results show that more query results can be returned with less cost, thus enabling users to develop the full potential of the web of linked data.
基金This work was supported in part by the EPSRC (No.GR/S31402/01).
文摘This paper presents a novel technique for identifying soil parameters for a wheeled vehicle traversing unknown terrain. The identified soil parameters are required for predicting vehicle drawbar pull and wheel drive torque, which in turn can be used for traversability prediction, traction control, and performance optimization of a wheeled vehicle on unknown terrain. The proposed technique is based on the Newton Raphson method. An approximated form of a wheel-soil interaction model based on Composite Simpson's Rule is employed for this purpose. The key soil parameters to be identified are internal friction angle, shear deformation modulus, and lumped pressure-sinkage coefficient. The fourth parameter, cohesion, is not too relevant to vehicle drawbar pull, and is assigned an average value during the identification process. Identified parameters are compared with known values, and shown to be in agreement. The identification method is relatively fast and robust. The identified soil parameters can effectively be used to predict drawbar pull and wheel drive torque with good accuracy. The use of identified soil parameters to design a traversability criterion for wheeled vehicles traversing unknown terrain is presented.
基金Project 2005B018 supported by the Science Foundation of China University of Mining and Technology
文摘The multi-scale expression of enormously complicated laneway data requires differentiation of both contents and the way the contents are expressed. To accomplish multi-scale expression laneway data must support multi-scale transformation and have consistent topological relationships. Although the laneway data generated by traverse survey-ing is non-scale data it is still impossible to construct a multi-scale spatial database directly from it. In this paper an al-gorithm is presented to first calculate the laneway mid-line to support multi-scale transformation; then to express topo-logical relationships arising from the data structure; and,finally,a laneway spatial database is built and multi-scale ex-pression is achieved using components GIS-SuperMap Objects. The research result is of great significance for improv-ing the efficiency of laneway data storage and updating,for ensuring consistency of laneway data expression and for extending the potential value of a mine spatial database.
文摘Some GPS points were set up and occupied and reoccupied along the traverse route from Zhongshan Station to DomeA.The result analysis for the GPS data processed by GAMIT/GLOBK package was presented in this paper.It was indicated that the ice along the traverse route flowed with an 825 m/a velocity to the northwest in the last three years,which was the direction of the edge of the ice sheet.The maximum horizontal flow velocity is about 100 m/a.Moreover,due to the ice flow,a 0.21 m/a sedimentation rate is achieved.Finally,a 15 m/a 2 horizontal acceleration is achieved from the GPS data of the three different stages.
基金Project supported by the National Natural Science Foundation of China(Grant No.61672124)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund(Grant No.MMJJ20170203)+2 种基金Liaoning Province Science and Technology Innovation Leading Talents Program Project(Grant No.XLYC1802013)Key Research and Development Projects of Liaoning Province,China(Grant No.2019020105-JH2/103)Jinan City‘20 universities’Funding Projects Introducing Innovation Team Program(Grant No.2019GXRC031).
文摘This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plaintext image is sorted according to the middle order traversal sequence on the permutation.Secondly,the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value.Finally,the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix.The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness.
基金funded by Indian Space Research Organization (ISRO) India. Project No. ISRO/RES/3/728/16e17
文摘The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent laves phase evolution in fusion zone.This paper reports the direct effect of magnetically constricted arc traverse speed(MCATS)on bead profile,tensile properties and microstructural evolution of Inconel 718 alloy sheets joined by Gas Tungsten Constricted Arc Welding(GTCAW)process.The mechanism amenable for the microstructural modification and corresponding influence on the tensile properties of joints is investigated both in qualitative and quantitative manner related to the mechanics of arc constriction and pulsing.It is correlated to the solidification conditions during welding.The relationship between MCATS and Arc Constriction Current(ACC)was derived.Its interaction effect on the magnetic arc constriction and joint performance was analysed.Results showed that the joints fabricated using CATS of 70 mm/min exhibited superior tensile properties(98.39% of base metal strength with 31.50% elongation).It is attributed to the grain refinement in fusion zone microstructure leading to the evolution of finer,discrete laves phase in interdendritic areas.
文摘The transition from IPv4 to IPv6 is doomed to be a long process. The network Address translation (NAT) technology is used very popularly in IPv4 network to make up the shortage of network address. It is a desiderated problem to make the users behind NAT gateway to access to IPv6 networks. By studying the transition technology from IPv4 to IPv6 and introducing NAT technology in IPv6, a scenario is put forward through 6to4 tunnel The scenario is implemented and the gateway system's performance is analyzed.
文摘The survey configuration, instrumentation and error propagation in the control survey technique known as “wall station traversing” were analyzed. Wall mounted survey points was utilized as an alternative to roof (backs) mounted points. Recently, this technique has gained widespread acceptance in underground metalliferous mines in Western Australia. The error propagation of the “wall stations” technique in relation to classical traversing was analyzed and compared, and an optimal survey procedure and configuration for this technique was derived.
基金supported by the Russian Foundation for Basic Research (RFBR), research project No. 14-05-00234-а
文摘This paper includes a short historical review of Russian and Soviet scientific traverses to study the Antarctic inland. The first traverse left on April 2, 1956. It resulted in the opening of the first Russian inland research station named Pionerskaya and provided the first geophysical and glaciological data on regions inland of the Antarctic coast. By 1965, a number of regional inland scientific traverses had been completed and. the first Atlas of Antarctica was published in 1966. The atlas presented the main achievements of that time. After the discovery of Lake Vostok, Russian scientists commenced remote sensing investigations to study this unique natural phenomenon. The propagation of acoustic and electromagnetic waves in the glacier near Vostok Station were measured to provide important geophysical data. Radio-echo sounding data showed that Lake Vostok is isolated and separated from the rest of the Antarctic subglacial hydrosphere. The total area of the lake is 15 790 km2, excluding 365 km^2 occupied by 11 islands. Reflection seismic soundings of Lake Vostok estimated a total volume of about 6 100 km^3, an average depth of about 400 m, and a maximum depth of 1 200 m. Since 2008, there have been a number of scientific traverses between Mirny and Vostok stations and between Progress and Vostok stations. The data collected during the traverses have provided new insights into sub-ice topography and ice sheet structure, and have led to the discovery of subglacial lakes near Komsomolskaya Station and under Pionerskaya Station.
文摘This paper advances a new simplified formula for estimating variance components ,sums up the basic law to calculate the weights of observed values and a circulation method using the increaments of weights when estimating the variance components of traverse nets,advances the charicteristic roots method to estimate the variance components of traveres nets and presents a practical method to make two real and symmetric matrices two diagonal ones.
文摘A gravity survey was conducted along the Mizuho traverse routes in austral summer of 1999-2000 by the 41st Japanese Antarctic Research Expedition (JARE-41). The main purpose of the survey was to obtain detail gravity anomaly along the traverse routes, where deep seismic exploration was simultaneously conducted in order to obtain a fine crustal structure of the Mizuho Plateau. By using SCINTREX (CG-3M) gravity meter, the survey was carried out at 160 sites with about 1 km interval in a distance of 190 km from S16 to Z20 on the traverse routes. Free-air and Bouguer anomalies were calculated using precise locations by GPS measurements, by taking into account an effect of the thick icesheet. The furrowed negative Free-air anomalies are identified around H192, where middle points of the whole traverse routes. Two bedrock elevation models derived both by seismic refraction analyses and radio-echo sounding might correspond to the bottom and the top of a mixture layer composed from ice-moraine rocks over the bedrock surface. Thickness of the crust estimated by Bouguer anomalies is 0.5 - 1 km larger toward inland at the terminal point of Z20 along the profile.
基金TraversingNAT/firewallTeachingandResearchAwardProgramforOutstandingYoungTeachersinHighEducationInstitutionsofMOE ,China (No .2 0 0 0 6 5 )
文摘The forthcoming Next Generation Network (NGN) is an all IP network. Multimedia communications over IP networks are a type of bundled session communications, which cannot directly traverse Network Address Translations (NATs) and firewalls even in NGN. To solve the problem that the existing traversal methods are not suitable for service providers to set up a real system in NGN, a Distributed Broker-agent Architecture (DBA) is addressed. DBA is secure and realizable for service providers and enterprises because it is easy to set up and does not need to upgrade the existing devices like Firewalls, NATs or endpoint devices of subscribers. DBA is composed of two-layer distributed agents, the server proxies and the client agents, in which all multimedia communications use shared tunnels to carry signaling messages and media data between broker-agents, and the call signaling is encrypted over Security Socket Layer (SSL) to guarantee the security of calling. Moreover, the function model and multiplexed connection messages format of DBA are designed, which lays a basis for the protocol in the future NGN. In addition, a simple implementation based on H.323 verifyies the main function of traversing firewalls and NATs.
文摘The effects of S86019, an active component from Puralia lobata, on the induction of cell differentiation and cell cycle traverse of HL-60 cells were described. It was shown that cell proliferation of HL-60 cells was inhibited by S86019 in vitro. Under the action of S86019 the HL-60 cells were induced to differentiate into metamyelocytes, myelocytes and much matured cells with banded or segmented nucleus. Flow cytometry demonstrated that the cell population of HL-60 cells was blocked at G1 phase which resulted in the elevation of percentage of G1 cells and decrease of percentage of cells in S phase. Experimental results demonstrated that S86019 is an active inducer of cell differentiation in HL-60 cells.
基金Supported by the Nat/onal Science and Technology Support Projects of China(No. 2008BAH28B04) and the National Natural Science Foundation of China _(No..60903218F0208) andthe National High Technology Research and Development Programme of China (No. 2008AA01A317)
文摘P2P streaming application must realize network address translation (NAT) traversal. To handle low success ratio of the existing NAT traversal algorithm, UPnP-STUN (UPUN) and port-mapping sample estimation (PMSE) algorithm are recommended in this paper. UPUN is the combination of UPnP and STUN, and PMSE utilizes port mapping samples added by symmetric NAT for different sessions to estimate regularity of port mapping of symmetric NAT, which takes advantage of the Bernoulli law of large numbers. Besides, for the situation that both peers are behind NAT, and to handle heavy relay server load when many inner peers want to communicate with each other, a peer auxiliary-relay (PAR) algorithm is presented. PAR lets outer peers with sufficient bandwidth act as relay servers to alleviate pressure of real server, which could avoid NAT traversal failure caused by single point failure of relay server. Finally, experiments show that the proposed algorithms could improve the success ratio significantly for NAT traversal in P2P streaming application as well as improve P2P streaming application applicability.
文摘The modeling of dynamical systems from a time series implemented by our DSA program introduces binary trees of height D with all leaves on the same level, and the related subtrees of height L 〈 D. These are called e-trees and e-subtrees. The recursive and nonrecursive versions of the traversal algorithms for the trees with dynamically created nodes are discussed. The original nonrecursive algorithms that return the pointer to the next node in preorder, inorder and postorder traversals are presented. The space-time complexity analysis shows and the execution time measurements confirm that for these O(2D) algorithms, the recursive versions have approximately 10-25% better time constants. Still, the use of nonrecursive algorithms may be more appropriate in several occasions.
文摘<p align="left"> <span style="font-family:Verdana;">During the model-based software testing process, test cases are generated from modeled requirements to conduct acceptance testing. However, existing approaches generate erroneous test cases, lack full coverage criteria and prototype tools. Therefore, the aim of this research is to develop an approach capable of reducing erroneous test case generation based on full coverage criteria and a prototype tool. The method employed was to develop a parser to extract information from the XMI file of a modeling diagram where a tree is constructed and a traversal operation executed on the nodes and edges to generate test cases. The results obtained from the proposed approach showed that 97.35% of the generated test cases were precise and comprehensive enough to conduct testing because 99.01% of all the nodes and edges were fully covered during the traversal operations.</span> </p>
文摘The Brouwer fixed-point theorem in topology states that for any continuous mapping <em>f</em> on a compact convex set into itself admits a fixed point, <em>i.e.</em>, a point <em>x</em><sub>0</sub> such that<em> f</em>(<em>x</em><sub>0</sub>) = <em>x</em><sub>0</sub>. Under suitable conditions, this fixed point corresponds to the throat of a traversable wormhole, <em>i.e.</em>, <em>b</em>(<em>r</em><sub>0</sub>) = <em>r</em><sub>0</sub> for the shape function <em>b</em> = <em>b</em>(<em>r</em>). The possible existence of wormholes can therefore be deduced from purely mathematical considerations without going beyond the existing physical requirements.
文摘Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvements in programming are proposed.