General solution of normal equations in the general intra-block analysis of partially balanced incomplete block designs involving four associates is presented in this talk as they are quite useful in practice. Only in...General solution of normal equations in the general intra-block analysis of partially balanced incomplete block designs involving four associates is presented in this talk as they are quite useful in practice. Only intra-block estimates are given as the necessary formulae for inter-block estimates can be derived from them by changing the parameters as discussed in Rao[5]. We have obtained the general formulae for computation of four types of efficiencies, the average efficiency factor and the variance of the estimated elementary treatment contrast of the four types of comparisons irrespective of the type of association scheme a PBIB Design follows.展开更多
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o...There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement.展开更多
MicroRNA(miRNA) is a class of important regulating non-coding small molecular RNA. The gma-MIR166 gene family consists of 21 members and their expression patterns diversify widely. It is important to analyze the evo...MicroRNA(miRNA) is a class of important regulating non-coding small molecular RNA. The gma-MIR166 gene family consists of 21 members and their expression patterns diversify widely. It is important to analyze the evolution of gma-MIR166 gene family in order to understand the evolutionary mechanisms of miRNAs in soybean. In this study, we implemented soybean wide genome block analysis, the molecular phylogeny of gma-MIR166 and block analysis of gma-MIR166 family. The results showed that both chromosome big segmental duplications and tandem duplications were main reasons contributed to the expanding of gmaMIR166 gene family. These findings suggested that gma-MIR166 gene family might originate from one or two ancient miRNA genes. The results of research provided a support for evolutionary study of miRNAs in soybean and related species in Fabaceae.展开更多
A new collapse model of the trapdoors,three-dimensional rectangular trapdoor(3DRT),is presented for ground surface collapse.Undrained stability of 3DRT is examined with the upper bound method of plasticity limit analy...A new collapse model of the trapdoors,three-dimensional rectangular trapdoor(3DRT),is presented for ground surface collapse.Undrained stability of 3DRT is examined with the upper bound method of plasticity limit analysis theory.The soil where the trapdoors are located is assumed to be a perfectly plastic model with a Tresca yield criterion.Block analysis technique is employed to investigate the collapse of 3DRT.The model is divided into five different block types and added up to ten rigid blocks.According to the law of conservation of energy,the critical stability ratios of 3DRT are obtained through a search proceeding.The results of upper bound solution for 3DRT are given,and three trapdoor models with depth various are discussed during the application in the stability analysis of square trapdoors.The critical stability ratios can be used in the design of underground excavation and support force.展开更多
The Multiprocessor Priority Ceiling Protocol (MPCP) is a classic suspension-based real-time locking protocol for partitioned fixed-priority (P-FP) scheduling. However, existing blocking time analysis is pessimisti...The Multiprocessor Priority Ceiling Protocol (MPCP) is a classic suspension-based real-time locking protocol for partitioned fixed-priority (P-FP) scheduling. However, existing blocking time analysis is pessimistic under the P-FP + MPCP scheduling, which negatively impacts the schedulability for real-time tasks. In this paper, we model each task as an alternating sequence of normal and critical sections, and use both the best-case execution time (BCET) and the worst-case execution time (WCET) to describe the execution requirement for each section. Based on this model, a novel analysis is proposed to bound shared resource requests. This analysis uses BCET to derive the lower bound on the inter-arrival time for shared resource requests, and uses WCET to obtain the upper bound on the execution time of a task on critical sections during an arbitrary time interval of △t. Based on this analysis, improved blocking analysis and its associated worst-case response time (WCRT) analysis are proposed for P-FP + MPCP scheduling. Schedulability experiments indicate that the proposed method outperforms the existing methods and improves the schedulability significantly.展开更多
Block principle and pattern classification component analysis (BPCA) is a recently developed technique in computer vision In this paper, we propose a robust and sparse BPCA with Lp-norm, referred to as BPCALp-S, whi...Block principle and pattern classification component analysis (BPCA) is a recently developed technique in computer vision In this paper, we propose a robust and sparse BPCA with Lp-norm, referred to as BPCALp-S, which inherits the robustness of BPCA-L1 due to the employment of adjustable Lp-norm. In order to perform a sparse modelling, the elastic net is integrated into the objective function. An iterative algorithm which extracts feature vectors one by one greedily is elaborately designed. The monotonicity of the proposed iterative procedure is theoretically guaranteed. Experiments of image classification and reconstruction on several benchmark sets show the effectiveness of the proposed approach.展开更多
The particular switch concerned here is a Three-Stage Time-space-time (TST)interconnection network and performs the time-division circuit switching. The input and outputstages are Time Slot Interchangers (TSI) . The c...The particular switch concerned here is a Three-Stage Time-space-time (TST)interconnection network and performs the time-division circuit switching. The input and outputstages are Time Slot Interchangers (TSI) . The central stage is a time-multiplexed switch with twoports per address. By exploiting the channel grouping at the central stage as well as reducing theaverage loading at each internal frame, the three-stage multicast switch has potential to removealmost all slot contention blockings.展开更多
文摘General solution of normal equations in the general intra-block analysis of partially balanced incomplete block designs involving four associates is presented in this talk as they are quite useful in practice. Only intra-block estimates are given as the necessary formulae for inter-block estimates can be derived from them by changing the parameters as discussed in Rao[5]. We have obtained the general formulae for computation of four types of efficiencies, the average efficiency factor and the variance of the estimated elementary treatment contrast of the four types of comparisons irrespective of the type of association scheme a PBIB Design follows.
基金supported in part by National Natural Science Fundation of China under Grant No.61202458,61403109
文摘There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement.
基金Supported by Heilongjiang Postdoctoral Fund(LBH-Z12045)Northeast Agricultural University Innovation Foundation For Postgraduate(yjscx14053)
文摘MicroRNA(miRNA) is a class of important regulating non-coding small molecular RNA. The gma-MIR166 gene family consists of 21 members and their expression patterns diversify widely. It is important to analyze the evolution of gma-MIR166 gene family in order to understand the evolutionary mechanisms of miRNAs in soybean. In this study, we implemented soybean wide genome block analysis, the molecular phylogeny of gma-MIR166 and block analysis of gma-MIR166 family. The results showed that both chromosome big segmental duplications and tandem duplications were main reasons contributed to the expanding of gmaMIR166 gene family. These findings suggested that gma-MIR166 gene family might originate from one or two ancient miRNA genes. The results of research provided a support for evolutionary study of miRNAs in soybean and related species in Fabaceae.
基金the Fundamental Research Funds for the Provincial Universities,China(No.702/000007020303)。
文摘A new collapse model of the trapdoors,three-dimensional rectangular trapdoor(3DRT),is presented for ground surface collapse.Undrained stability of 3DRT is examined with the upper bound method of plasticity limit analysis theory.The soil where the trapdoors are located is assumed to be a perfectly plastic model with a Tresca yield criterion.Block analysis technique is employed to investigate the collapse of 3DRT.The model is divided into five different block types and added up to ten rigid blocks.According to the law of conservation of energy,the critical stability ratios of 3DRT are obtained through a search proceeding.The results of upper bound solution for 3DRT are given,and three trapdoor models with depth various are discussed during the application in the stability analysis of square trapdoors.The critical stability ratios can be used in the design of underground excavation and support force.
基金supported by the National Natural Science Foundation of China under Grant No.61103041the National High Technology Research and Development 863 Program of China under Grant No.2012AA010904+2 种基金the Fundamental Research Funds for the Central Universities of China under Grant No.ZYGX2012J070the Huawei Technology Foundation under Grant No.IRP-2012-02-07the Excellent Ph.D.Student Academic Support Program of UESTC under Grant No.YBXSZC20131028
文摘The Multiprocessor Priority Ceiling Protocol (MPCP) is a classic suspension-based real-time locking protocol for partitioned fixed-priority (P-FP) scheduling. However, existing blocking time analysis is pessimistic under the P-FP + MPCP scheduling, which negatively impacts the schedulability for real-time tasks. In this paper, we model each task as an alternating sequence of normal and critical sections, and use both the best-case execution time (BCET) and the worst-case execution time (WCET) to describe the execution requirement for each section. Based on this model, a novel analysis is proposed to bound shared resource requests. This analysis uses BCET to derive the lower bound on the inter-arrival time for shared resource requests, and uses WCET to obtain the upper bound on the execution time of a task on critical sections during an arbitrary time interval of △t. Based on this analysis, improved blocking analysis and its associated worst-case response time (WCRT) analysis are proposed for P-FP + MPCP scheduling. Schedulability experiments indicate that the proposed method outperforms the existing methods and improves the schedulability significantly.
基金the National Natural Science Foundation of China(No.61572033)the Natural Science Foundation of Education Department of Anhui Province of China(No.KJ2015ZD08)the Higher Education Promotion Plan of Anhui Province of China(No.TSKJ2015B14)
文摘Block principle and pattern classification component analysis (BPCA) is a recently developed technique in computer vision In this paper, we propose a robust and sparse BPCA with Lp-norm, referred to as BPCALp-S, which inherits the robustness of BPCA-L1 due to the employment of adjustable Lp-norm. In order to perform a sparse modelling, the elastic net is integrated into the objective function. An iterative algorithm which extracts feature vectors one by one greedily is elaborately designed. The monotonicity of the proposed iterative procedure is theoretically guaranteed. Experiments of image classification and reconstruction on several benchmark sets show the effectiveness of the proposed approach.
文摘The particular switch concerned here is a Three-Stage Time-space-time (TST)interconnection network and performs the time-division circuit switching. The input and outputstages are Time Slot Interchangers (TSI) . The central stage is a time-multiplexed switch with twoports per address. By exploiting the channel grouping at the central stage as well as reducing theaverage loading at each internal frame, the three-stage multicast switch has potential to removealmost all slot contention blockings.