In our recent investigations of diatom diversity,we studied three species,namely,Skeletonema costatum,Skeletonema subsalsum,and Skeletonema potamos.Although they have been found frequently in Changjiang(Yangtze)River ...In our recent investigations of diatom diversity,we studied three species,namely,Skeletonema costatum,Skeletonema subsalsum,and Skeletonema potamos.Although they have been found frequently in Changjiang(Yangtze)River Basin,their morphological and molecular identification is difficult in taxonomy.Therefore,to integrate morphological and molecular biological approaches,we compared systematically their morphological characters and performed phylogenetic analysis.Twelve strains of Skeletonema were collected and isolated from Shanghai and Jiangsu,China,and their morphological characteristics were examined by light microscopy(LM)and the scanning electron microscopy(SEM).Based on morphological comparison,we determined that S.potamos is easy to distinguish from the other two species.The heavily silicified areolae,undulated or cleft distal ends of terminal fultoportula processes(TFPPs),absence of basal pores of fultoportula processes(FPPs),the rootlike protrusions of FPPs,and no interlocking connection are the stable characteristics that can be used to identify S.potamos.However,there are only two features that can distinguish S.costatum from S.subsalsum,namely the location of terminal rimoportulae(TRPs)and the distal shape of TFPPs.In addition,we amplified and sequenced nine common genetic markers from the strains,from which 101 sequences were obtained,constructed phylogenetic trees based on the nine genes and evaluated that seven genes can be used to identify S.potamos,and revealed that S.subsalsum is the closest known relative of S.costatum,and only ATP synthetase beta-subunit gene(atp B)is able to distinguish them from each other,which strongly support that it is an effective molecular marker for Skeletonema.This work provided a theoretical basis for the taxonomic study of Skeletonema.展开更多
There are three distinct genetic systems in higher plants,the dominant nuclear genome and the semi-autonomous organelle genomes(plastids and mitochondria).In contrast to the conserved plastid genome(plastome),the plan...There are three distinct genetic systems in higher plants,the dominant nuclear genome and the semi-autonomous organelle genomes(plastids and mitochondria).In contrast to the conserved plastid genome(plastome),the plant mitochondrial genome(mitogenome)is characterized by an intriguing“evolutionary paradox”distinguished by a remarkably low mutation rate but with a significantly high rearrangement rate(Palmer and Herbon,1988;Lai et al.,2022).展开更多
Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections...Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.展开更多
Currently,it is difficult to extract the depth feature of the frontal emergency stops dangerous activity signal,which leads to a decline in the accuracy and efficiency of the frontal emergency stops the dangerous acti...Currently,it is difficult to extract the depth feature of the frontal emergency stops dangerous activity signal,which leads to a decline in the accuracy and efficiency of the frontal emergency stops the dangerous activ-ity.Therefore,a recognition for frontal emergency stops dangerous activity algorithm based on Nano Internet of Things Sensor(NIoTS)and transfer learning is proposed.First,the NIoTS is installed in the athlete’s leg muscles to collect activity signals.Second,the noise component in the activity signal is removed using the de-noising method based on mathematical morphology.Finally,the depth feature of the activity signal is extracted through the deep transfer learning model,and the Euclidean distance between the extracted feature and the depth feature of the frontal emergency stops dangerous activity signal is compared.If the European distance is small,it can be judged as the frontal emergency stops dangerous activity,and the frontal emergency stops dangerous activity recognition is realized.The results show that the average time delay of activity signal acquisition of the algorithm is low,the signal-to-noise ratio of the action signal is high,and the activity signal mean square error is low.The variance of the frontal emergency stops dangerous activity recognition does not exceed 0.5.The difference between the appearance time of the dangerous activity and the recognition time of the algorithm is 0.15 s,it can accurately and quickly recognize the frontal emergency stops the dangerous activity.展开更多
The FMS (Flexible Manufacture System)Research Group in the Mechanical Engineering Department has recently developed an intelligent strategy based on artificial intelligence and practical experiences for the defection ...The FMS (Flexible Manufacture System)Research Group in the Mechanical Engineering Department has recently developed an intelligent strategy based on artificial intelligence and practical experiences for the defection of tool failure (wear or fracture or breakage).展开更多
With deep mining of coal mines, prospecting multilayer water-filled goaf has become a new content that results from geophysical exploration in coalfields. The central loop transient electromagnetic (TEM) method is f...With deep mining of coal mines, prospecting multilayer water-filled goaf has become a new content that results from geophysical exploration in coalfields. The central loop transient electromagnetic (TEM) method is favorable for prospecting conductive layers because of the coupling relationship between its field structure and formation. However, the shielding effect of conductive overburden would not only require a longer observation time when prospecting the same depth but also weaken the anomalous response of underlying layers. Through direct time domain numerical simulation and horizontal layered earth forward modeling, this paper estimates the length of observation time required to prospect the target, and the distinguishable criterion of multilayer water-filled goal is presented with observation error according to the effect of noise on observation data. The observed emf curves from Dazigou Coal Mine, Shanxi Province can distinguish multilayer water-filled goaf. In quantitative inversion interpretation of observed curves, using electric logging data as initial parameters restrains the equivalence caused by coal formation thin layers. The deduced three-layer and two-layer water-filled goals are confirmed by the drilling hole. The result suggests that when observation time is long enough and with the anomalous situation of underlying layers being greater than the observation error, the use of the central loop TEM method to orosoect a multilaver water-filled goaf is feasible.展开更多
A high-precision pseudo-noise ranging system is often required in satellite-formation missions. But in an actual PN ranging system, digital signal processing limits the ranging accuracy, only level up with meter-scale...A high-precision pseudo-noise ranging system is often required in satellite-formation missions. But in an actual PN ranging system, digital signal processing limits the ranging accuracy, only level up with meter-scale. Using non-integer chip to sample time ratio, noncommensurate sampling was seen as an effective solution to cope with the drawback of digital effects. However, researchers only paid attention to selecting specific ratios or giving a simulation model to verify the effectiveness of the noncommensurate ratios. A qualitative analysis model is proposed to characterize the relationship between the range accuracy and the noncommensurate sampling parameters. Moreover, a method is also presented which can be used to choose the noncommensurate ratio and the correlation length to get higher phase delay distinguishability and lower range jitter. The simulation results indicate the correctness of our analyses and the optimal ranging accuracy can be up to centimeter-level with the proposed approach.展开更多
China Coal Society(CCS)and Springer have announced that they will launch a new authoritative journal with a total dedication on coal science and mining engineering.The new journal,International Journal of Coal Science...China Coal Society(CCS)and Springer have announced that they will launch a new authoritative journal with a total dedication on coal science and mining engineering.The new journal,International Journal of Coal Science and Mining Engineering(JCSME)will be launched in early 2014.JCSME aims to be a peer-reviewed academic OA journal focusing on key topics of coal scientific research and mining development.展开更多
Due to the emergence of a large number of counterfeit notes and incomplete coins in the slot machine of self-service bus, to improve the automization of intelligent slot machine, based on multi-sensor testing technolo...Due to the emergence of a large number of counterfeit notes and incomplete coins in the slot machine of self-service bus, to improve the automization of intelligent slot machine, based on multi-sensor testing technology, using programming log- ic controller (PLC) as the core of the whole system, the PLC hardware design and software design are accomplished for the first time to detect the counterfeit notes and coins. The system was tested by many groups of experiments. The results show that the system has reliable recognition rate, good flexibility and stability, reaching the accuracy of 97%.展开更多
Travel time through a ring road with a total length of 80 km has been predicted by a viscoelastic traffic model(VEM), which is developed in analogous to the non-Newtonian fluid flow. The VEM expresses a traffic pressu...Travel time through a ring road with a total length of 80 km has been predicted by a viscoelastic traffic model(VEM), which is developed in analogous to the non-Newtonian fluid flow. The VEM expresses a traffic pressure for the unfree flow case by space headway, ensuring that the pressure can be determined by the assumption that the relevant second critical sound speed is exactly equal to the disturbance propagation speed determined by the free flow speed and the braking distance measured by the average vehicular length. The VEM assumes that the sound speed for the free flow case depends on the traffic density in some specific aspects, which ensures that it is exactly identical to the free flow speed on an empty road. To make a comparison, the open Navier-Stokes type model developed by Zhang(ZHANG, H. M. Driver memory, traffic viscosity and a viscous vehicular traffic flow model. Transp. Res. Part B, 37, 27–41(2003)) is adopted to predict the travel time through the ring road for providing the counterpart results.When the traffic free flow speed is 80 km/h, the braking distance is supposed to be 45 m,with the jam density uniquely determined by the average length of vehicles l ≈ 5.8 m. To avoid possible singular points in travel time prediction, a distinguishing period for time averaging is pre-assigned to be 7.5 minutes. It is found that the travel time increases monotonically with the initial traffic density on the ring road. Without ramp effects, for the ring road with the initial density less than the second critical density, the travel time can be simply predicted by using the equilibrium speed. However, this simpler approach is unavailable for scenarios over the second critical.展开更多
By analyzing the NCEP 1°×1° reanalysis (2004–2008), a number of predictors (factors of variables) are established with the output from the GRAPES model and with reference to the sea fog data from obser...By analyzing the NCEP 1°×1° reanalysis (2004–2008), a number of predictors (factors of variables) are established with the output from the GRAPES model and with reference to the sea fog data from observational stations (2004–2008) and field observations (2006–2008). Based on the criteria and conditions for sea fog appearance at the stations of Zhanjiang, Zhuhai and Shantou, a Model Output Statistics (MOS) scheme for distinguishing and forecasting 24-h sea fog is established and put into use for three representative coastal areas of Guangdong. As shown in an assessment of the forecasts for Zhanjiang and Shantou (March of 2008) and Zhuhai (April of 2008), the scheme was quite capable of forecasting sea fog on the coast of the province, with the accuracy ranging from 84% to 90%, the threat score from 0.40 to 0.50 and the Heidke skill from 0.52 to 0.56.展开更多
In December of 2010 NIST selected five SHA-3 finalists - BLAKE, Grcstl, JH, Keccak, and Skein to advance to the third (and final) round of the SHA-3 competition. At present most specialists and scholars focus on the...In December of 2010 NIST selected five SHA-3 finalists - BLAKE, Grcstl, JH, Keccak, and Skein to advance to the third (and final) round of the SHA-3 competition. At present most specialists and scholars focus on the design and the attacks on these hash functions. However, it is very significant to study some properties of their primitives and underlying permutations. Because some properties reflect the pseudo-randomness of the structures. Moreover, they help us to find new cryptanalysis for some block cipher structures. In this paper, we analyze the resistance of JH and Grcstl-512 against structural properties built on integral distinguishers. And then 31.5 (out of 42) rounds integral distinguishers for JH compression function and 11.5 (out of 14) rounds for Grcstl-512 compression function are presented.展开更多
To solve the arrearage problem that puzzled most of the mobile corporations, we propose an approach to forecast and evaluate the credits for mobile clients, devising a method that is of the coalescence of genetic algo...To solve the arrearage problem that puzzled most of the mobile corporations, we propose an approach to forecast and evaluate the credits for mobile clients, devising a method that is of the coalescence of genetic algorithm and multidimensional distinguishing model. In the end of this paper, a result of a testing application in Zhuhai Branch, GMCC was provided. The precision of the forecasting and evaluation of the client’s credit is near 90%. This study is very significant to the mobile communication corporation at all levels. The popularization of the techniques and the result would produce great benefits of both society and economy.展开更多
To find out the origin of dolomite, the precipitation of primary dolomite, and the formation of pores in dolomite, petrologic and geochemical characteristics of typical samples from Sichuan and Tarim Basin were analyz...To find out the origin of dolomite, the precipitation of primary dolomite, and the formation of pores in dolomite, petrologic and geochemical characteristics of typical samples from Sichuan and Tarim Basin were analyzed based on the previous understandings, and three aspects of results were achieved.(1) A classification of dolomite origins based on petrologic features, forming environment, and time sequence was proposed, which shows clear boundaries of diagenetic and characteristic realms and evolved clues between different types of dolomite.(2) Petrographic and geochemical identification marks for different types of dolomite were presented, revealing that the orderly geochemical variation of different types of dolomite is the response to the change of forming environment of dolomite during continuous time sequence.(3) The contribution of dolomitization to the formation of porosity was re-evaluated, revealing that the porosity in dolomite was mostly attributed to the primary pores and supergene dissolution and burial dissolution, and early dolomitization was conducive to the preservation of primary pores. These understandings are of great theoretical significance for identifying the origins and types of dolomite, and can guide the prediction of dolomite reservoirs.展开更多
Pipeline plays an indispensable role in process industries,because the progressing crack-like defects of in it may result in serious accidents and significant economic losses.Therefore,it is essential to detect the cr...Pipeline plays an indispensable role in process industries,because the progressing crack-like defects of in it may result in serious accidents and significant economic losses.Therefore,it is essential to detect the cracks occurred in pipelines.The axial crack-like defects in elbows with different angle are inspected by using the T(0,1)mode guided waves,in which different configurations including 45°,90°,135°and 180°(straight pipe)are considered respectively.Firstly,the detection sensitivity for different defect location is experimentally investigated.After that,finite element simulation is used to explore the propagation behaviors of T(0,1)mode in different bend structures.Simulation and experiment results show that the crack in different areas of the elbow can affect the detection sensitivity.It can be found that the detection sensitivity of crack in the middle area of the elbow is higher compared to the extrados and intrados of the elbow.Finally,the mode conversion is also investigated when the T(0,1)crosses the bend,and the results show that bend is a key factor to the mode conversion phenomenon which presents between the T(0,1)mode and F(1,2)mode.展开更多
For data of atmospheric composition missing, fog and haze days were distinguished based on the standard of meteorological industry Observation and Forecasting Levels of Haze (QX/T113-2010) and four user-defined stan...For data of atmospheric composition missing, fog and haze days were distinguished based on the standard of meteorological industry Observation and Forecasting Levels of Haze (QX/T113-2010) and four user-defined standards, and using data of surface meteorological factors in Fuzhou City, China from 2005 to 2011, temporal distributions of fog and haze days were analyzed respectively to provide methods for fog and haze forecast. The results showed that there were 28.9 fog days and 89.7 haze days per year in Fuzhou. Both fog and haze days were variable, and there might be a day difference of twice to thrice among the years. They were the most in 2007, and then decreased in recent years. Both fog and haze days were more in winter and spring, accounted for 94.1% and 70.1% respectively, while in summer and autumn, they only accounted for 5.9% and 29.9% respectively. In a day, fog mainly occurred from night to early morning, while haze occurred mainly at about noon, which demonstrated that fog and haze are different synoptic phenomena. The mass concentration of PM2.5 in fog days was 34 μg/m^3, while it was 61 μg/m^3 in haze days, and in 22% of haze days it was larger than 75 μg/m3, which was above the national second-grade ambient air quality standard.展开更多
Glaucoma is one of the leading causes of blindness in the developed world.It is a progressive optic neuropathy where structural loss of retinal ganglion cell(RGC)axons corresponds with functional visual field defect...Glaucoma is one of the leading causes of blindness in the developed world.It is a progressive optic neuropathy where structural loss of retinal ganglion cell(RGC)axons corresponds with functional visual field defect.Glaucoma is distinguished from other optic neuropathies by its selective loss of RGC axons.Superior and inferior peripheral nerve sectors are found to be most vulnerable to pressure induced injury whereas the inner temporal sector is most resilient(Quigley et al.,1988).展开更多
A new species of rhacophorid of the genus Rhacophorus is described from the Shiwandashan National Nature Reserve, Guangxi, Southern China. Rhacophorus pinglongensis sp. nov. is compared with congeners from China and o...A new species of rhacophorid of the genus Rhacophorus is described from the Shiwandashan National Nature Reserve, Guangxi, Southern China. Rhacophorus pinglongensis sp. nov. is compared with congeners from China and other parts of Southeast Asia. The new species is distinguished from its congeners by combination of following characters:(1) small size(adult male, SVL 32.0-38.5 mm);(2) smooth and green dorsum;(3) flanks, axilla, ventral surface of forearms, inguinal, anterior and posterior surfaces of thighs, ventral surface of shank, and dorsal surface of feet covered with black blotches with white spots or white spots with a faint orange tint;(4) ventral surface of feet and webbing tangerine;(5) supratympanic fold weak;(6) outer margin of forearms and feet with low dermal ridges;(7) calcars absent on heels;(8) iris silver, diffusing to ecru laterally with light khaki ring along margin. The new species is closely related to R. dorsoviridis, R. moltrechti, and R. nigropunctatus based on adult morphology. Currently, this species is known only from mid-elevation montane evergreen forest in the Shiwandashan National Nature Reserve, Guangxi, China.展开更多
基金Supported by the National Natural Science Foundation of China(No.32170205)the Natural Science Foundation of Shanghai(No.21ZR144730)。
文摘In our recent investigations of diatom diversity,we studied three species,namely,Skeletonema costatum,Skeletonema subsalsum,and Skeletonema potamos.Although they have been found frequently in Changjiang(Yangtze)River Basin,their morphological and molecular identification is difficult in taxonomy.Therefore,to integrate morphological and molecular biological approaches,we compared systematically their morphological characters and performed phylogenetic analysis.Twelve strains of Skeletonema were collected and isolated from Shanghai and Jiangsu,China,and their morphological characteristics were examined by light microscopy(LM)and the scanning electron microscopy(SEM).Based on morphological comparison,we determined that S.potamos is easy to distinguish from the other two species.The heavily silicified areolae,undulated or cleft distal ends of terminal fultoportula processes(TFPPs),absence of basal pores of fultoportula processes(FPPs),the rootlike protrusions of FPPs,and no interlocking connection are the stable characteristics that can be used to identify S.potamos.However,there are only two features that can distinguish S.costatum from S.subsalsum,namely the location of terminal rimoportulae(TRPs)and the distal shape of TFPPs.In addition,we amplified and sequenced nine common genetic markers from the strains,from which 101 sequences were obtained,constructed phylogenetic trees based on the nine genes and evaluated that seven genes can be used to identify S.potamos,and revealed that S.subsalsum is the closest known relative of S.costatum,and only ATP synthetase beta-subunit gene(atp B)is able to distinguish them from each other,which strongly support that it is an effective molecular marker for Skeletonema.This work provided a theoretical basis for the taxonomic study of Skeletonema.
基金The work is supported by the Natural Science Foundation of Jiangsu Province(BK20220414)the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province(22KJB220003).
文摘There are three distinct genetic systems in higher plants,the dominant nuclear genome and the semi-autonomous organelle genomes(plastids and mitochondria).In contrast to the conserved plastid genome(plastome),the plant mitochondrial genome(mitogenome)is characterized by an intriguing“evolutionary paradox”distinguished by a remarkably low mutation rate but with a significantly high rearrangement rate(Palmer and Herbon,1988;Lai et al.,2022).
基金the National Key Research and Development Program of China(Grant No.2020YFA0309702)NSAF(Grant No.U2130205)+3 种基金the National Natural Science Foundation of China(Grant Nos.62101597,61605248,and 61505261)the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies。
文摘Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.
文摘Currently,it is difficult to extract the depth feature of the frontal emergency stops dangerous activity signal,which leads to a decline in the accuracy and efficiency of the frontal emergency stops the dangerous activ-ity.Therefore,a recognition for frontal emergency stops dangerous activity algorithm based on Nano Internet of Things Sensor(NIoTS)and transfer learning is proposed.First,the NIoTS is installed in the athlete’s leg muscles to collect activity signals.Second,the noise component in the activity signal is removed using the de-noising method based on mathematical morphology.Finally,the depth feature of the activity signal is extracted through the deep transfer learning model,and the Euclidean distance between the extracted feature and the depth feature of the frontal emergency stops dangerous activity signal is compared.If the European distance is small,it can be judged as the frontal emergency stops dangerous activity,and the frontal emergency stops dangerous activity recognition is realized.The results show that the average time delay of activity signal acquisition of the algorithm is low,the signal-to-noise ratio of the action signal is high,and the activity signal mean square error is low.The variance of the frontal emergency stops dangerous activity recognition does not exceed 0.5.The difference between the appearance time of the dangerous activity and the recognition time of the algorithm is 0.15 s,it can accurately and quickly recognize the frontal emergency stops the dangerous activity.
文摘The FMS (Flexible Manufacture System)Research Group in the Mechanical Engineering Department has recently developed an intelligent strategy based on artificial intelligence and practical experiences for the defection of tool failure (wear or fracture or breakage).
基金supported by the National Science Foundation of China(No.41374129)Science and Technology Project of Shanxi Province(No.20100321066)Research and Development Project of National Major Scientifi c Research Equipment(No.ZDYZ2012-1-05-04)
文摘With deep mining of coal mines, prospecting multilayer water-filled goaf has become a new content that results from geophysical exploration in coalfields. The central loop transient electromagnetic (TEM) method is favorable for prospecting conductive layers because of the coupling relationship between its field structure and formation. However, the shielding effect of conductive overburden would not only require a longer observation time when prospecting the same depth but also weaken the anomalous response of underlying layers. Through direct time domain numerical simulation and horizontal layered earth forward modeling, this paper estimates the length of observation time required to prospect the target, and the distinguishable criterion of multilayer water-filled goal is presented with observation error according to the effect of noise on observation data. The observed emf curves from Dazigou Coal Mine, Shanxi Province can distinguish multilayer water-filled goaf. In quantitative inversion interpretation of observed curves, using electric logging data as initial parameters restrains the equivalence caused by coal formation thin layers. The deduced three-layer and two-layer water-filled goals are confirmed by the drilling hole. The result suggests that when observation time is long enough and with the anomalous situation of underlying layers being greater than the observation error, the use of the central loop TEM method to orosoect a multilaver water-filled goaf is feasible.
基金Project(60904090) supported by the National Natural Science Foundation of China
文摘A high-precision pseudo-noise ranging system is often required in satellite-formation missions. But in an actual PN ranging system, digital signal processing limits the ranging accuracy, only level up with meter-scale. Using non-integer chip to sample time ratio, noncommensurate sampling was seen as an effective solution to cope with the drawback of digital effects. However, researchers only paid attention to selecting specific ratios or giving a simulation model to verify the effectiveness of the noncommensurate ratios. A qualitative analysis model is proposed to characterize the relationship between the range accuracy and the noncommensurate sampling parameters. Moreover, a method is also presented which can be used to choose the noncommensurate ratio and the correlation length to get higher phase delay distinguishability and lower range jitter. The simulation results indicate the correctness of our analyses and the optimal ranging accuracy can be up to centimeter-level with the proposed approach.
文摘China Coal Society(CCS)and Springer have announced that they will launch a new authoritative journal with a total dedication on coal science and mining engineering.The new journal,International Journal of Coal Science and Mining Engineering(JCSME)will be launched in early 2014.JCSME aims to be a peer-reviewed academic OA journal focusing on key topics of coal scientific research and mining development.
文摘Due to the emergence of a large number of counterfeit notes and incomplete coins in the slot machine of self-service bus, to improve the automization of intelligent slot machine, based on multi-sensor testing technology, using programming log- ic controller (PLC) as the core of the whole system, the PLC hardware design and software design are accomplished for the first time to detect the counterfeit notes and coins. The system was tested by many groups of experiments. The results show that the system has reliable recognition rate, good flexibility and stability, reaching the accuracy of 97%.
基金Project supported by the Russian Foundation for Basic Research(No.18-07-00518)the National Natural Science Foundation of China(No.10972212)
文摘Travel time through a ring road with a total length of 80 km has been predicted by a viscoelastic traffic model(VEM), which is developed in analogous to the non-Newtonian fluid flow. The VEM expresses a traffic pressure for the unfree flow case by space headway, ensuring that the pressure can be determined by the assumption that the relevant second critical sound speed is exactly equal to the disturbance propagation speed determined by the free flow speed and the braking distance measured by the average vehicular length. The VEM assumes that the sound speed for the free flow case depends on the traffic density in some specific aspects, which ensures that it is exactly identical to the free flow speed on an empty road. To make a comparison, the open Navier-Stokes type model developed by Zhang(ZHANG, H. M. Driver memory, traffic viscosity and a viscous vehicular traffic flow model. Transp. Res. Part B, 37, 27–41(2003)) is adopted to predict the travel time through the ring road for providing the counterpart results.When the traffic free flow speed is 80 km/h, the braking distance is supposed to be 45 m,with the jam density uniquely determined by the average length of vehicles l ≈ 5.8 m. To avoid possible singular points in travel time prediction, a distinguishing period for time averaging is pre-assigned to be 7.5 minutes. It is found that the travel time increases monotonically with the initial traffic density on the ring road. Without ramp effects, for the ring road with the initial density less than the second critical density, the travel time can be simply predicted by using the equilibrium speed. However, this simpler approach is unavailable for scenarios over the second critical.
基金Natural Science Foundation of China (40675013)Research on Techniques of Specialized Forecast of Sea Fog and Visibility at the Pearl River Mouth+2 种基金project of Science and Technology Program of Guangdong Province (2006B37202005)Research on System of Monitoring Sea Fog for the Pearl River Mouthproject of Meteorological Science of Guangdong Meteorological Bureau
文摘By analyzing the NCEP 1°×1° reanalysis (2004–2008), a number of predictors (factors of variables) are established with the output from the GRAPES model and with reference to the sea fog data from observational stations (2004–2008) and field observations (2006–2008). Based on the criteria and conditions for sea fog appearance at the stations of Zhanjiang, Zhuhai and Shantou, a Model Output Statistics (MOS) scheme for distinguishing and forecasting 24-h sea fog is established and put into use for three representative coastal areas of Guangdong. As shown in an assessment of the forecasts for Zhanjiang and Shantou (March of 2008) and Zhuhai (April of 2008), the scheme was quite capable of forecasting sea fog on the coast of the province, with the accuracy ranging from 84% to 90%, the threat score from 0.40 to 0.50 and the Heidke skill from 0.52 to 0.56.
基金Supported by the National Natural Science Foundation of China (No. 60873259 and No. 60903212)Knowledge Innovation Project of the Chinese Academy of Sciences
文摘In December of 2010 NIST selected five SHA-3 finalists - BLAKE, Grcstl, JH, Keccak, and Skein to advance to the third (and final) round of the SHA-3 competition. At present most specialists and scholars focus on the design and the attacks on these hash functions. However, it is very significant to study some properties of their primitives and underlying permutations. Because some properties reflect the pseudo-randomness of the structures. Moreover, they help us to find new cryptanalysis for some block cipher structures. In this paper, we analyze the resistance of JH and Grcstl-512 against structural properties built on integral distinguishers. And then 31.5 (out of 42) rounds integral distinguishers for JH compression function and 11.5 (out of 14) rounds for Grcstl-512 compression function are presented.
基金Guangdong Mobile Communication Company Limited Key Item(2001 and 2002)
文摘To solve the arrearage problem that puzzled most of the mobile corporations, we propose an approach to forecast and evaluate the credits for mobile clients, devising a method that is of the coalescence of genetic algorithm and multidimensional distinguishing model. In the end of this paper, a result of a testing application in Zhuhai Branch, GMCC was provided. The precision of the forecasting and evaluation of the client’s credit is near 90%. This study is very significant to the mobile communication corporation at all levels. The popularization of the techniques and the result would produce great benefits of both society and economy.
基金Supported by the China National Science and Technology Major Project(2016ZX05004-002)
文摘To find out the origin of dolomite, the precipitation of primary dolomite, and the formation of pores in dolomite, petrologic and geochemical characteristics of typical samples from Sichuan and Tarim Basin were analyzed based on the previous understandings, and three aspects of results were achieved.(1) A classification of dolomite origins based on petrologic features, forming environment, and time sequence was proposed, which shows clear boundaries of diagenetic and characteristic realms and evolved clues between different types of dolomite.(2) Petrographic and geochemical identification marks for different types of dolomite were presented, revealing that the orderly geochemical variation of different types of dolomite is the response to the change of forming environment of dolomite during continuous time sequence.(3) The contribution of dolomitization to the formation of porosity was re-evaluated, revealing that the porosity in dolomite was mostly attributed to the primary pores and supergene dissolution and burial dissolution, and early dolomitization was conducive to the preservation of primary pores. These understandings are of great theoretical significance for identifying the origins and types of dolomite, and can guide the prediction of dolomite reservoirs.
基金supported by the National Natural Science Foundation of China(Nos.51575185,51175178)
文摘Pipeline plays an indispensable role in process industries,because the progressing crack-like defects of in it may result in serious accidents and significant economic losses.Therefore,it is essential to detect the cracks occurred in pipelines.The axial crack-like defects in elbows with different angle are inspected by using the T(0,1)mode guided waves,in which different configurations including 45°,90°,135°and 180°(straight pipe)are considered respectively.Firstly,the detection sensitivity for different defect location is experimentally investigated.After that,finite element simulation is used to explore the propagation behaviors of T(0,1)mode in different bend structures.Simulation and experiment results show that the crack in different areas of the elbow can affect the detection sensitivity.It can be found that the detection sensitivity of crack in the middle area of the elbow is higher compared to the extrados and intrados of the elbow.Finally,the mode conversion is also investigated when the T(0,1)crosses the bend,and the results show that bend is a key factor to the mode conversion phenomenon which presents between the T(0,1)mode and F(1,2)mode.
基金Supported by the Key Project of Science and Technology Department of Fujian Province,China in 2012(2012Y0009)
文摘For data of atmospheric composition missing, fog and haze days were distinguished based on the standard of meteorological industry Observation and Forecasting Levels of Haze (QX/T113-2010) and four user-defined standards, and using data of surface meteorological factors in Fuzhou City, China from 2005 to 2011, temporal distributions of fog and haze days were analyzed respectively to provide methods for fog and haze forecast. The results showed that there were 28.9 fog days and 89.7 haze days per year in Fuzhou. Both fog and haze days were variable, and there might be a day difference of twice to thrice among the years. They were the most in 2007, and then decreased in recent years. Both fog and haze days were more in winter and spring, accounted for 94.1% and 70.1% respectively, while in summer and autumn, they only accounted for 5.9% and 29.9% respectively. In a day, fog mainly occurred from night to early morning, while haze occurred mainly at about noon, which demonstrated that fog and haze are different synoptic phenomena. The mass concentration of PM2.5 in fog days was 34 μg/m^3, while it was 61 μg/m^3 in haze days, and in 22% of haze days it was larger than 75 μg/m3, which was above the national second-grade ambient air quality standard.
基金provided by the National Health and Medical Research Council of Australia
文摘Glaucoma is one of the leading causes of blindness in the developed world.It is a progressive optic neuropathy where structural loss of retinal ganglion cell(RGC)axons corresponds with functional visual field defect.Glaucoma is distinguished from other optic neuropathies by its selective loss of RGC axons.Superior and inferior peripheral nerve sectors are found to be most vulnerable to pressure induced injury whereas the inner temporal sector is most resilient(Quigley et al.,1988).
基金supported by Natural Science Foundation of Guangxi Province,China (Grant No:2012GXNSFAA053057 and 2016GXNSFAA380007)
文摘A new species of rhacophorid of the genus Rhacophorus is described from the Shiwandashan National Nature Reserve, Guangxi, Southern China. Rhacophorus pinglongensis sp. nov. is compared with congeners from China and other parts of Southeast Asia. The new species is distinguished from its congeners by combination of following characters:(1) small size(adult male, SVL 32.0-38.5 mm);(2) smooth and green dorsum;(3) flanks, axilla, ventral surface of forearms, inguinal, anterior and posterior surfaces of thighs, ventral surface of shank, and dorsal surface of feet covered with black blotches with white spots or white spots with a faint orange tint;(4) ventral surface of feet and webbing tangerine;(5) supratympanic fold weak;(6) outer margin of forearms and feet with low dermal ridges;(7) calcars absent on heels;(8) iris silver, diffusing to ecru laterally with light khaki ring along margin. The new species is closely related to R. dorsoviridis, R. moltrechti, and R. nigropunctatus based on adult morphology. Currently, this species is known only from mid-elevation montane evergreen forest in the Shiwandashan National Nature Reserve, Guangxi, China.