Operation control of power systems has become challenging with an increase in the scale and complexity of power distribution systems and extensive access to renewable energy.Therefore,improvement of the ability of dat...Operation control of power systems has become challenging with an increase in the scale and complexity of power distribution systems and extensive access to renewable energy.Therefore,improvement of the ability of data-driven operation management,intelligent analysis,and mining is urgently required.To investigate and explore similar regularities of the historical operating section of the power distribution system and assist the power grid in obtaining high-value historical operation,maintenance experience,and knowledge by rule and line,a neural information retrieval model with an attention mechanism is proposed based on graph data computing technology.Based on the processing flow of the operating data of the power distribution system,a technical framework of neural information retrieval is established.Combined with the natural graph characteristics of the power distribution system,a unified graph data structure and a data fusion method of data access,data complement,and multi-source data are constructed.Further,a graph node feature-embedding representation learning algorithm and a neural information retrieval algorithm model are constructed.The neural information retrieval algorithm model is trained and tested using the generated graph node feature representation vector set.The model is verified on the operating section of the power distribution system of a provincial grid area.The results show that the proposed method demonstrates high accuracy in the similarity matching of historical operation characteristics and effectively supports intelligent fault diagnosis and elimination in power distribution systems.展开更多
In this paper, we have discussed a random censoring test with incomplete information, and proved that the maximum likelihood estimator(MLE) of the parameter based on the randomly censored data with incomplete informat...In this paper, we have discussed a random censoring test with incomplete information, and proved that the maximum likelihood estimator(MLE) of the parameter based on the randomly censored data with incomplete information in the case of the exponential distribution has the strong consistency.展开更多
Configurational information entropy(CIE)analysis has been shown to be applicable for determining the neutron skin thickness(δnp)of neutron-rich nuclei from fragment production in projectile fragmentation reactions.Th...Configurational information entropy(CIE)analysis has been shown to be applicable for determining the neutron skin thickness(δnp)of neutron-rich nuclei from fragment production in projectile fragmentation reactions.The BNN+FRACS machine learning model was adopted to predict the fragment mass cross-sections(σ_(A))of the projectile fragmentation reactions induced by calcium isotopes from ^(36)Ca to ^(56)Ca on a ^(9)Be target at 140MeV/u.The fast Fourier transform was adopted to decompose the possible information compositions inσA distributions and determine the quantity of CIE(S_(A)[f]).It was found that the range of fragments significantly influences the quantity of S_(A)[f],which results in different trends of S_(A)[f]~δnp correlation.The linear S_(A)[f]~δnp correlation in a previous study[Nucl.Sci.Tech.33,6(2022)]could be reproduced using fragments with relatively large mass fragments,which verifies that S_(A)[f]determined from fragmentσAis sensitive to the neutron skin thickness of neutron-rich isotopes.展开更多
Element contents of tree rings and soils near tree roots collected from Deodar cedar (Cedrus deodara (Roxb.) G. Don) and Masson pine (Picks massoniana lamb.) were determined to study the relationship between the angul...Element contents of tree rings and soils near tree roots collected from Deodar cedar (Cedrus deodara (Roxb.) G. Don) and Masson pine (Picks massoniana lamb.) were determined to study the relationship between the angular distribution of element contents in tree rings and the environmental information. The chemical composition and properties of soils are very much complicated, which leads to the non-uniform distribution of the element contents in tree rings. The statistical multi-variable regression method was used to got the information of the tree-centered distribution of element contents in the environment (soil) (C’), C’(z, θj ), from the distribution of element contents in tree rings (C), C(Z, θi), which depends on the plane azimuth angle (θi), i. e., C=C(Z,θi), where Z is the atomic number of the element, with a satisfactory result,though this study is only a primary one.展开更多
For a compact quantum key distribution (QKD) sender for the polarization encoding BB84 protocol, an eavesdropper could take a side-channel attack by measuring the spatial information of photons to infer their polariza...For a compact quantum key distribution (QKD) sender for the polarization encoding BB84 protocol, an eavesdropper could take a side-channel attack by measuring the spatial information of photons to infer their polarizations. The possibility of this attack can be reduced by introducing an aperture in the QKD sender, however, the effect of the aperture on the QKD security lacks of quantitative analysis. In this paper, we analyze the mutual information between the actual keys encoded at this QKD sender and the inferred keys at the eavesdropper (Eve), demonstrating the effect of the aperture to eliminate the spatial side-channel information quantitatively. It shows that Eve’s potential on eavesdropping spatial side-channel information is totally dependent on the optical design of the QKD sender, including the source arrangement and the aperture. The height of compact QKD senders with integrated light-emitting diode (LED) arrays could be controlled under several millimeters, showing great potential on applications in portable equipment.展开更多
In this paper according to the process of cognitive of human being to speech is put forward a model of speech recognition and understanding in a noisy environment. For speech recognition, two level modular Extended As...In this paper according to the process of cognitive of human being to speech is put forward a model of speech recognition and understanding in a noisy environment. For speech recognition, two level modular Extended Associative Memory Neural Networks (EAMNN) are adopted. The learning speed is 9 times faster than that of the conventional BP net. It has high self-adaptability, robustness, fault toleration and associative memory ability to the noisy speech signals. To speech understanding, the structure of hierarchical analysis and examining faults which is a combination of statistic inference and syntactic rules is adopted, to pick up the candidates of the speech recognition and to predict the next word by the statistic inference base; and the syntactic rule base reduces effectively the recognition errors and candidates of acoustic level; then by comparing and rectifying errors through information feedback and guiding the succeeding speech process, the recognition of the sentence is realized.展开更多
Objective:To explore the spatial accumulation of diseases andtheir aggravating factors are essential in all public health.This study attempts to use geographic information system(GIS)to provide more information about ...Objective:To explore the spatial accumulation of diseases andtheir aggravating factors are essential in all public health.This study attempts to use geographic information system(GIS)to provide more information about the incidence and future of anthrax.Methods:Patients were diagnosed with anthrax in Kurdistan Province from 2009 to 2016.Data was then exported into ArcGIS software version 9 and the required layers for years and areas were added.Final map for each year was drawn up,pointing out the hot spots and predicting its future pattern.Results:Most cases were reported in females(57 cases,54.80%),and the lower body limbs were most affected(63 cases,60.57%).The highest numbers of incidences were related to the cities of Marivan,Saqez and Divandareh,with more concentration in the central parts of the province,rather than borderline areas.The highest percentage of the probable incidence of the disease was in Sanandaj(57.74%)with a potential susceptible area of 1729.12 km2 and then in Saqez(54.36%)with a potential area of 2422.4 km2.Conclusions:A vast area of Kurdistan Province is high risk for new cases of anthrax.Therefore,it is important to scale up the surveillance system in the province.展开更多
With the actuality and characteristic and requirement of rural power enterprise distribution network management, this article introduced the function of geographic information system on the framework of distribution n...With the actuality and characteristic and requirement of rural power enterprise distribution network management, this article introduced the function of geographic information system on the framework of distribution network, in order to develop rural distribution network.展开更多
This paper deals with a direct derivation of Fisher’s information matrix for bivariate Bessel distribution of type I. Some tools for the numerical computation and some tabulations of the Fisher’s information matrix ...This paper deals with a direct derivation of Fisher’s information matrix for bivariate Bessel distribution of type I. Some tools for the numerical computation and some tabulations of the Fisher’s information matrix are provided.展开更多
The proposed secure communication approach adopts the proposed algorithm of Analysis-By- Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminai Channel (SSSC) for speech secure communica...The proposed secure communication approach adopts the proposed algorithm of Analysis-By- Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminai Channel (SSSC) for speech secure communication over PSTN (Public Switched Telephone Network), and employs the algorithm of ABS speech information extracting to recovery the secret information, This approach is more reliable, covert and securable than traditional and chaotic secure communication.展开更多
The present study explores the effects of media and distributed information on the performance of remotely located pairs of people′s completing a concept-learning task. Sixty pairs performed a concept-learning task u...The present study explores the effects of media and distributed information on the performance of remotely located pairs of people′s completing a concept-learning task. Sixty pairs performed a concept-learning task using either audio-only or audio-plus-video for communication. The distribution of information includes three levels: with totally same information, with partly same information, and with totally different information. The subjects′ primary psychological functions were also considered in this study. The results showed a significant main effect of the amount of information shared by the subjects on the number of the negative instances selected by the subjects, and a significant main effect of media on the time taken by the subjects to complete the task.展开更多
Configurational information entropy(CIE)theory was employed to determine the neutron-skin thickness of neutron-rich calcium isotopes.The nuclear density distributions and fragment cross sections in 350 MeV/u ^(40-60)C...Configurational information entropy(CIE)theory was employed to determine the neutron-skin thickness of neutron-rich calcium isotopes.The nuclear density distributions and fragment cross sections in 350 MeV/u ^(40-60)Ca+^(9)Be projectile fragmentation reactions were calculated using a modified statistical abrasion-ablation model.CIE quantities were determined from the nuclear density,isotopic,mass,and charge distributions.The linear correlations between the CIE determined using the isotopic,mass,and charge distributions and the neutron-skin thickness of the projectile nucleus show that CIE provides new methods to extract the neutron-skin thickness of neutron-rich nuclei.展开更多
In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices...In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices. The proposed encoding scheme has the advantages of simplicity for encoding and decoding, ease for GA operations, and better equilibrium between exploration and exploitation. It is also adaptive in that, with few restrictions on the length of code, it can be freely lengthened or shortened according to the characteristics of the problem space. Furthermore, the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node. The simulation results demonstrate the higher performance of our algorithm, with fast convergence to the optima or sub-optima on various problem sizes. Comparing with the binary string encoding of vertices, when the problem size is large, our algorithm runs remarkably faster with comparable search capability. Key words distributed information retrieval - mobile agents - migration problem - genetic algorithms CLC number TP 301. 6 Foundation item: Supported by the National Natural Science Foundation of China (90104005), the Natural Science Foundation of Hubei Province and the Hong Kong Polytechnic University under the grant G-YD63Biography: He Yan-xiang (1952-), male, Professor, research direction: distributed and parallel processing, multi-agent systems, data mining and e-business.展开更多
To assist the researches of toxic and harmful algae and provide government workers with judgment basis for decision-making related events,we established a biological information management system for toxic and harmful...To assist the researches of toxic and harmful algae and provide government workers with judgment basis for decision-making related events,we established a biological information management system for toxic and harmful algae in China’s of fshore to assist relevant research.In this study,Karenia mikimotoi was studied as a typical toxic and harmful algae species,and the basic biological information and biogeographic distribution information of K.mikimotoi were systematically studied and collected.In the part of basic biological information,the name,toxin,and molecular characteristic sequence of K.mikimotoi were sorted out by literature searching and website browsing.Through experimental means,the relevant information of morphological identifi cation,pigment composition,and lipid composition were obtained.In the part of biogeographic distribution information,this study sorted out the information of K.mikimotoi,analyzed the characteristics of its occurrence,and completed the standardized construction of biogeographic distribution information.Through the collation of basic biological information and biogeographic distribution information of K.mikimotoi,the standardization of related information was completed,which provided template and method reference for information collection of other toxic and harmful algae species,which was benefi cial to the database analysis and design.展开更多
A modified Bayesian reliability assessment method of binomial components was proposed by fusing prior information of similar products.The traditional Bayesian method usually directly used all the prior data,ignoring t...A modified Bayesian reliability assessment method of binomial components was proposed by fusing prior information of similar products.The traditional Bayesian method usually directly used all the prior data,ignoring the differences between them,which might decrease the credibility level of reliability evaluation and result in data submergence.To solve the problem,a revised approach was derived to calculate groups of prior data's quantitative credibility,used for weighted data fusion.Then inheritance factor was introduced to build a mixed beta distribution to illustrate the innovation of new products.However,in many cases,inheritance factor was determined by Chi-square test that could not give out exact result with respect to rare failures.To make the model more precise,Barnard's exact test was suggested being used to calculate the inheritance factor.A numerical example is given to demonstrate that the modified method is successful and rational,while the classical method is too conservative and the traditional Bayesian method is too risky.展开更多
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ...Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.展开更多
Exploiting the source-to-relay channel phase information at the relays can increase the rate upper-bound of distributed orthogonal space-time block codes(STBC)from 2/K to 1/2,where Kis the number of relays.This techni...Exploiting the source-to-relay channel phase information at the relays can increase the rate upper-bound of distributed orthogonal space-time block codes(STBC)from 2/K to 1/2,where Kis the number of relays.This technique is known as distributed orthogonal space-time block codes with channel phase information(DOSTBC-CPI).However,the decoding delay of existing DOSTBC-CPIs is not optimal.Therefore,based on the rate of 1/2 balanced complex orthogonal design(COD),an algorithm is provided to construct a maximal rate DOSTBC-CPI with only half the decoding delay of existing DOSTBC-CPI.Simulation results show that the proposed method exhibits lower symbol error rate than the existing DOSTBC-CPIs.展开更多
In this study, by starting from Maximum entropy (MaxEnt) distribution of time series, we introduce a measure that quantifies information worth of a set of autocovariances. The information worth of autocovariences is m...In this study, by starting from Maximum entropy (MaxEnt) distribution of time series, we introduce a measure that quantifies information worth of a set of autocovariances. The information worth of autocovariences is measured in terms of entropy difference of MaxEnt distributions subject to different autocovariance sets due to the fact that the information discrepancy between two distributions is measured in terms of their entropy difference in MaxEnt modeling. However, MinMaxEnt distributions (models) are obtained on the basis of MaxEnt distributions dependent on parameters according to autocovariances for time series. This distribution is the one which has minimum entropy and maximum information out of all MaxEnt distributions for family of time series constructed by considering one or several values as parameters. Furthermore, it is shown that as the number of autocovariances increases, the entropy of approximating distribution goes on decreasing. In addition, it is proved that information worth of each model defined on the basis of MinMaxEnt modeling about stationary time series is equal to sum of all possible information increments corresponding to each model with respect to preceding model starting with first model in the sequence of models. The fulfillment of obtained results is demonstrated on an example by using a program written in Matlab.展开更多
The photon polarization law p(theta) = sin(2)theta is derived from a simple informational consideration by two methods: The first is via an intuitive principle of minimum Fisher information, the second is via a symmet...The photon polarization law p(theta) = sin(2)theta is derived from a simple informational consideration by two methods: The first is via an intuitive principle of minimum Fisher information, the second is via a symmetry and invariance argument. The results demonstrate that in photon polarization, Nature has a tendency to hide herself as deep as possible while obeying some regular conditions.展开更多
In order to analyze the function demand of the distributed manufacturing information system as well as its control demand, and eliminate information ambiguity among system units to integrate semantics, the abstract Ag...In order to analyze the function demand of the distributed manufacturing information system as well as its control demand, and eliminate information ambiguity among system units to integrate semantics, the abstract Agent model and computational structure of each unit was presented based on flexible coupling automata. The autonomy of each unit was investigated in this foundation. The system unit was described using the Web Ontology Language (OWL) ontology. And the system semantics was also integrated. On these basics the communication among the system units was analyzed with an example of interaction between a machine and a warehouse. The control performances of information system units were investigated using Boolean matrix as a substitute for traditional process in RW theory, which reduced the computational complexity. This work established the foundation for the demand analysis, design and development of the distributed manufacture information system.展开更多
基金supported by the National Key R&D Program of China(2020YFB0905900).
文摘Operation control of power systems has become challenging with an increase in the scale and complexity of power distribution systems and extensive access to renewable energy.Therefore,improvement of the ability of data-driven operation management,intelligent analysis,and mining is urgently required.To investigate and explore similar regularities of the historical operating section of the power distribution system and assist the power grid in obtaining high-value historical operation,maintenance experience,and knowledge by rule and line,a neural information retrieval model with an attention mechanism is proposed based on graph data computing technology.Based on the processing flow of the operating data of the power distribution system,a technical framework of neural information retrieval is established.Combined with the natural graph characteristics of the power distribution system,a unified graph data structure and a data fusion method of data access,data complement,and multi-source data are constructed.Further,a graph node feature-embedding representation learning algorithm and a neural information retrieval algorithm model are constructed.The neural information retrieval algorithm model is trained and tested using the generated graph node feature representation vector set.The model is verified on the operating section of the power distribution system of a provincial grid area.The results show that the proposed method demonstrates high accuracy in the similarity matching of historical operation characteristics and effectively supports intelligent fault diagnosis and elimination in power distribution systems.
文摘In this paper, we have discussed a random censoring test with incomplete information, and proved that the maximum likelihood estimator(MLE) of the parameter based on the randomly censored data with incomplete information in the case of the exponential distribution has the strong consistency.
基金the National Natural Science Foundation of China(No.11975091)the Program for Innovative Research Team(in Science and Technology)in the University of Henan Province,China(No.21IRTSTHN011).
文摘Configurational information entropy(CIE)analysis has been shown to be applicable for determining the neutron skin thickness(δnp)of neutron-rich nuclei from fragment production in projectile fragmentation reactions.The BNN+FRACS machine learning model was adopted to predict the fragment mass cross-sections(σ_(A))of the projectile fragmentation reactions induced by calcium isotopes from ^(36)Ca to ^(56)Ca on a ^(9)Be target at 140MeV/u.The fast Fourier transform was adopted to decompose the possible information compositions inσA distributions and determine the quantity of CIE(S_(A)[f]).It was found that the range of fragments significantly influences the quantity of S_(A)[f],which results in different trends of S_(A)[f]~δnp correlation.The linear S_(A)[f]~δnp correlation in a previous study[Nucl.Sci.Tech.33,6(2022)]could be reproduced using fragments with relatively large mass fragments,which verifies that S_(A)[f]determined from fragmentσAis sensitive to the neutron skin thickness of neutron-rich isotopes.
文摘Element contents of tree rings and soils near tree roots collected from Deodar cedar (Cedrus deodara (Roxb.) G. Don) and Masson pine (Picks massoniana lamb.) were determined to study the relationship between the angular distribution of element contents in tree rings and the environmental information. The chemical composition and properties of soils are very much complicated, which leads to the non-uniform distribution of the element contents in tree rings. The statistical multi-variable regression method was used to got the information of the tree-centered distribution of element contents in the environment (soil) (C’), C’(z, θj ), from the distribution of element contents in tree rings (C), C(Z, θi), which depends on the plane azimuth angle (θi), i. e., C=C(Z,θi), where Z is the atomic number of the element, with a satisfactory result,though this study is only a primary one.
基金supported by the National Key Research and Development Program of China under Grant No.2017YFA0303704National Natural Science Foundation of China under Grants No.61575102,No.61671438,No.61875101,and No.61621064+1 种基金Beijing Natural Science Foundation under Grant No.Z180012Beijing Academy of Quantum Information Sciences under Grant No.Y18G26
文摘For a compact quantum key distribution (QKD) sender for the polarization encoding BB84 protocol, an eavesdropper could take a side-channel attack by measuring the spatial information of photons to infer their polarizations. The possibility of this attack can be reduced by introducing an aperture in the QKD sender, however, the effect of the aperture on the QKD security lacks of quantitative analysis. In this paper, we analyze the mutual information between the actual keys encoded at this QKD sender and the inferred keys at the eavesdropper (Eve), demonstrating the effect of the aperture to eliminate the spatial side-channel information quantitatively. It shows that Eve’s potential on eavesdropping spatial side-channel information is totally dependent on the optical design of the QKD sender, including the source arrangement and the aperture. The height of compact QKD senders with integrated light-emitting diode (LED) arrays could be controlled under several millimeters, showing great potential on applications in portable equipment.
基金Supported by the National Natural Science Foundation of China under the grant 69672002
文摘In this paper according to the process of cognitive of human being to speech is put forward a model of speech recognition and understanding in a noisy environment. For speech recognition, two level modular Extended Associative Memory Neural Networks (EAMNN) are adopted. The learning speed is 9 times faster than that of the conventional BP net. It has high self-adaptability, robustness, fault toleration and associative memory ability to the noisy speech signals. To speech understanding, the structure of hierarchical analysis and examining faults which is a combination of statistic inference and syntactic rules is adopted, to pick up the candidates of the speech recognition and to predict the next word by the statistic inference base; and the syntactic rule base reduces effectively the recognition errors and candidates of acoustic level; then by comparing and rectifying errors through information feedback and guiding the succeeding speech process, the recognition of the sentence is realized.
基金This is part of Ms.Fatemeh Najafi dissertation approved by the deputy of research of Kurdistan University of Medical Sciences,and it was conducted under their grant No IR.MUK.REC.94.338.
文摘Objective:To explore the spatial accumulation of diseases andtheir aggravating factors are essential in all public health.This study attempts to use geographic information system(GIS)to provide more information about the incidence and future of anthrax.Methods:Patients were diagnosed with anthrax in Kurdistan Province from 2009 to 2016.Data was then exported into ArcGIS software version 9 and the required layers for years and areas were added.Final map for each year was drawn up,pointing out the hot spots and predicting its future pattern.Results:Most cases were reported in females(57 cases,54.80%),and the lower body limbs were most affected(63 cases,60.57%).The highest numbers of incidences were related to the cities of Marivan,Saqez and Divandareh,with more concentration in the central parts of the province,rather than borderline areas.The highest percentage of the probable incidence of the disease was in Sanandaj(57.74%)with a potential susceptible area of 1729.12 km2 and then in Saqez(54.36%)with a potential area of 2422.4 km2.Conclusions:A vast area of Kurdistan Province is high risk for new cases of anthrax.Therefore,it is important to scale up the surveillance system in the province.
基金Science and Technology Research Instruction Project of Heilongjiang Province Education Department (9553032)
文摘With the actuality and characteristic and requirement of rural power enterprise distribution network management, this article introduced the function of geographic information system on the framework of distribution network, in order to develop rural distribution network.
文摘This paper deals with a direct derivation of Fisher’s information matrix for bivariate Bessel distribution of type I. Some tools for the numerical computation and some tabulations of the Fisher’s information matrix are provided.
基金Supported by the National High Technology Research and Development Program of China (863 Program) (No.2003AA142080, 2004AA775060)the National Natural Sicence Foundation of China (No.60203004)+1 种基金with additional support from the China Post-doctorial Research Foundation (2005-03)the Foundation of Tianjin Key Lab for Advanced Signal Processing(2005).
文摘The proposed secure communication approach adopts the proposed algorithm of Analysis-By- Synthesis (ABS) speech information hiding to establish a Secret Speech Subliminai Channel (SSSC) for speech secure communication over PSTN (Public Switched Telephone Network), and employs the algorithm of ABS speech information extracting to recovery the secret information, This approach is more reliable, covert and securable than traditional and chaotic secure communication.
文摘The present study explores the effects of media and distributed information on the performance of remotely located pairs of people′s completing a concept-learning task. Sixty pairs performed a concept-learning task using either audio-only or audio-plus-video for communication. The distribution of information includes three levels: with totally same information, with partly same information, and with totally different information. The subjects′ primary psychological functions were also considered in this study. The results showed a significant main effect of the amount of information shared by the subjects on the number of the negative instances selected by the subjects, and a significant main effect of media on the time taken by the subjects to complete the task.
基金supported by the National Natural Science Foundation of China(Nos.11975091 and U1732135)the Program for Innovative Research Team(in Science and Technology)in University of Henan Province,China(No.21IRTSTHN011)。
文摘Configurational information entropy(CIE)theory was employed to determine the neutron-skin thickness of neutron-rich calcium isotopes.The nuclear density distributions and fragment cross sections in 350 MeV/u ^(40-60)Ca+^(9)Be projectile fragmentation reactions were calculated using a modified statistical abrasion-ablation model.CIE quantities were determined from the nuclear density,isotopic,mass,and charge distributions.The linear correlations between the CIE determined using the isotopic,mass,and charge distributions and the neutron-skin thickness of the projectile nucleus show that CIE provides new methods to extract the neutron-skin thickness of neutron-rich nuclei.
文摘In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices. The proposed encoding scheme has the advantages of simplicity for encoding and decoding, ease for GA operations, and better equilibrium between exploration and exploitation. It is also adaptive in that, with few restrictions on the length of code, it can be freely lengthened or shortened according to the characteristics of the problem space. Furthermore, the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node. The simulation results demonstrate the higher performance of our algorithm, with fast convergence to the optima or sub-optima on various problem sizes. Comparing with the binary string encoding of vertices, when the problem size is large, our algorithm runs remarkably faster with comparable search capability. Key words distributed information retrieval - mobile agents - migration problem - genetic algorithms CLC number TP 301. 6 Foundation item: Supported by the National Natural Science Foundation of China (90104005), the Natural Science Foundation of Hubei Province and the Hong Kong Polytechnic University under the grant G-YD63Biography: He Yan-xiang (1952-), male, Professor, research direction: distributed and parallel processing, multi-agent systems, data mining and e-business.
基金Supported by the Special Foundation for National Science and Technology Basic Research Program of China(No.2018FY100207)the National Natural Science Foundation of China(No.U20A20104)the Strategic Priority Research Program of the Chinese Academy of Sciences(No.XDA23050302)。
文摘To assist the researches of toxic and harmful algae and provide government workers with judgment basis for decision-making related events,we established a biological information management system for toxic and harmful algae in China’s of fshore to assist relevant research.In this study,Karenia mikimotoi was studied as a typical toxic and harmful algae species,and the basic biological information and biogeographic distribution information of K.mikimotoi were systematically studied and collected.In the part of basic biological information,the name,toxin,and molecular characteristic sequence of K.mikimotoi were sorted out by literature searching and website browsing.Through experimental means,the relevant information of morphological identifi cation,pigment composition,and lipid composition were obtained.In the part of biogeographic distribution information,this study sorted out the information of K.mikimotoi,analyzed the characteristics of its occurrence,and completed the standardized construction of biogeographic distribution information.Through the collation of basic biological information and biogeographic distribution information of K.mikimotoi,the standardization of related information was completed,which provided template and method reference for information collection of other toxic and harmful algae species,which was benefi cial to the database analysis and design.
基金National Natural Science Foundation of China(No.71371182)
文摘A modified Bayesian reliability assessment method of binomial components was proposed by fusing prior information of similar products.The traditional Bayesian method usually directly used all the prior data,ignoring the differences between them,which might decrease the credibility level of reliability evaluation and result in data submergence.To solve the problem,a revised approach was derived to calculate groups of prior data's quantitative credibility,used for weighted data fusion.Then inheritance factor was introduced to build a mixed beta distribution to illustrate the innovation of new products.However,in many cases,inheritance factor was determined by Chi-square test that could not give out exact result with respect to rare failures.To make the model more precise,Barnard's exact test was suggested being used to calculate the inheritance factor.A numerical example is given to demonstrate that the modified method is successful and rational,while the classical method is too conservative and the traditional Bayesian method is too risky.
基金National Natural Science Foundation of China(No.61271152)Natural Science Foundation of Hebei Province,China(No.F2012506008)the Original Innovation Foundation of Ordnance Engineering College,China(No.YSCX0903)
文摘Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA.
基金supported in part by the National Natural Science Foundation of China(Nos.61271230,61472190)the National Mobile Communications Research Laboratory,Southeast University(No.2013D02)
文摘Exploiting the source-to-relay channel phase information at the relays can increase the rate upper-bound of distributed orthogonal space-time block codes(STBC)from 2/K to 1/2,where Kis the number of relays.This technique is known as distributed orthogonal space-time block codes with channel phase information(DOSTBC-CPI).However,the decoding delay of existing DOSTBC-CPIs is not optimal.Therefore,based on the rate of 1/2 balanced complex orthogonal design(COD),an algorithm is provided to construct a maximal rate DOSTBC-CPI with only half the decoding delay of existing DOSTBC-CPI.Simulation results show that the proposed method exhibits lower symbol error rate than the existing DOSTBC-CPIs.
文摘In this study, by starting from Maximum entropy (MaxEnt) distribution of time series, we introduce a measure that quantifies information worth of a set of autocovariances. The information worth of autocovariences is measured in terms of entropy difference of MaxEnt distributions subject to different autocovariance sets due to the fact that the information discrepancy between two distributions is measured in terms of their entropy difference in MaxEnt modeling. However, MinMaxEnt distributions (models) are obtained on the basis of MaxEnt distributions dependent on parameters according to autocovariances for time series. This distribution is the one which has minimum entropy and maximum information out of all MaxEnt distributions for family of time series constructed by considering one or several values as parameters. Furthermore, it is shown that as the number of autocovariances increases, the entropy of approximating distribution goes on decreasing. In addition, it is proved that information worth of each model defined on the basis of MinMaxEnt modeling about stationary time series is equal to sum of all possible information increments corresponding to each model with respect to preceding model starting with first model in the sequence of models. The fulfillment of obtained results is demonstrated on an example by using a program written in Matlab.
文摘The photon polarization law p(theta) = sin(2)theta is derived from a simple informational consideration by two methods: The first is via an intuitive principle of minimum Fisher information, the second is via a symmetry and invariance argument. The results demonstrate that in photon polarization, Nature has a tendency to hide herself as deep as possible while obeying some regular conditions.
基金National Natural Science Foundation of P.R. China (No.50675069)
文摘In order to analyze the function demand of the distributed manufacturing information system as well as its control demand, and eliminate information ambiguity among system units to integrate semantics, the abstract Agent model and computational structure of each unit was presented based on flexible coupling automata. The autonomy of each unit was investigated in this foundation. The system unit was described using the Web Ontology Language (OWL) ontology. And the system semantics was also integrated. On these basics the communication among the system units was analyzed with an example of interaction between a machine and a warehouse. The control performances of information system units were investigated using Boolean matrix as a substitute for traditional process in RW theory, which reduced the computational complexity. This work established the foundation for the demand analysis, design and development of the distributed manufacture information system.