Mitigating increasing cyberattack incidents may require strategies such as reinforcing organizations’ networks with Honeypots and effectively analyzing attack traffic for detection of zero-day attacks and vulnerabili...Mitigating increasing cyberattack incidents may require strategies such as reinforcing organizations’ networks with Honeypots and effectively analyzing attack traffic for detection of zero-day attacks and vulnerabilities. To effectively detect and mitigate cyberattacks, both computerized and visual analyses are typically required. However, most security analysts are not adequately trained in visualization principles and/or methods, which is required for effective visual perception of useful attack information hidden in attack data. Additionally, Honeypot has proven useful in cyberattack research, but no studies have comprehensively investigated visualization practices in the field. In this paper, we reviewed visualization practices and methods commonly used in the discovery and communication of attack patterns based on Honeypot network traffic data. Using the PRISMA methodology, we identified and screened 218 papers and evaluated only 37 papers having a high impact. Most Honeypot papers conducted summary statistics of Honeypot data based on static data metrics such as IP address, port, and packet size. They visually analyzed Honeypot attack data using simple graphical methods (such as line, bar, and pie charts) that tend to hide useful attack information. Furthermore, only a few papers conducted extended attack analysis, and commonly visualized attack data using scatter and linear plots. Papers rarely included simple yet sophisticated graphical methods, such as box plots and histograms, which allow for critical evaluation of analysis results. While a significant number of automated visualization tools have incorporated visualization standards by default, the construction of effective and expressive graphical methods for easy pattern discovery and explainable insights still requires applied knowledge and skill of visualization principles and tools, and occasionally, an interdisciplinary collaboration with peers. We, therefore, suggest the need, going forward, for non-classical graphical methods for visualizing attack patterns and communicating analysis results. We also recommend training investigators in visualization principles and standards for effective visual perception and presentation.展开更多
The analytic expression of the special points on the intersection of two cones with their axes intersecting(ITCTAI) is given. It also presents a method to construct the special points graphically according to the anal...The analytic expression of the special points on the intersection of two cones with their axes intersecting(ITCTAI) is given. It also presents a method to construct the special points graphically according to the analytic expression of them. Finally, with computer programming language, it gives a program to generate the intersection in several different cases.展开更多
After volume fracturing of horizontal wells in shale gas reservoir, an extremely complex fracture system is formed. The space area of the fracture system is the reservoir reconstruction volume of shale gas reservoir. ...After volume fracturing of horizontal wells in shale gas reservoir, an extremely complex fracture system is formed. The space area of the fracture system is the reservoir reconstruction volume of shale gas reservoir. The geometric parameters such as crack length, crack width, crack height, and characteristic parameters such as crack permeability and fracture conductivity proposed for a single crack in conventional fracturing are insufficient to describe and characterize the complex network fracture system after volume fracturing. In this paper, the discrete fracture modeling method is used to establish the volume fracturing network fracture model of horizontal wells in shale gas reservoir by using the random modeling method within the determined reservoir space. The model is random and selective, and can fully provide different forms of volume fracturing fracture expansion, such as conventional fracture morphology, line network model and arbitrarily distributed network fractures. The research results provide a theoretical basis for the development plan and stimulation plan of shale gas reservoir, and have important reference value and significance for other unconventional gas reservoir fracturing.展开更多
Method for constructing the optimal water supply line and formulas for calculating the targets for single-contaminant regeneration recycling water systems are improved to apply to the situation of variational pararnet...Method for constructing the optimal water supply line and formulas for calculating the targets for single-contaminant regeneration recycling water systems are improved to apply to the situation of variational pararneters in this article. Based on these extending methods, the effect of varying freshwater consumption and regenerated water flow rate on the optimizing results are investigated. The interactions of parameters of regeneration recycling systems are summarized. Finally, all the conclusions are illustrated from the results of mathematical programming through an example.展开更多
The coupled models of LBM (Lattice Boltzmann Method) and RANS (Reynolds-Averaged Navier-Stokes) are more practical for the transient simulation of mixing processes at large spatial and temporal scales such as crud...The coupled models of LBM (Lattice Boltzmann Method) and RANS (Reynolds-Averaged Navier-Stokes) are more practical for the transient simulation of mixing processes at large spatial and temporal scales such as crude oil mixing in large-diameter storage tanks. To keep the efficiency of parallel computation of LBM, the RANS model should also be explicitly solved; whereas to keep the numerical stability the implicit method should be better for PANS model. This article explores the numerical stability of explicit methods in 2D cases on one hand, and on the other hand how to accelerate the computation of the coupled model of LBM and an implicitly solved RANS model in 3D cases. To ensure the numerical stability and meanwhile avoid the use of empirical artificial lim- itations on turbulent quantities in 2D cases, we investigated the impacts of collision models in LBM (LBGK, MRT) and the numerical schemes for convection terms (WENO, TVD) and production terms (FDM, NEQM) in an explic- itly solved standard k-e model. The combination of MRT and TVD or MRT and NEQM can be screened out for the 2D simulation of backward-facing step flow even at Re = 107. This scheme combination, however, may still not guarantee the numerical stability in 3D cases and hence much finer grids are required, which is not suitable for the simulation of industrial-scale processes.Then we proposed a new method to accelerate the coupled model of LBM with RANS (implicitly solved). When implemented on multiple GPUs, this new method can achieve 13.5-fold accelera- tion relative to the original coupled model and 40-fold acceleration compared to the traditional CFD simulation based on Finite Volume (FV) method accelerated by multiple CPUs. This study provides the basis for the transient flow simulation of larger spatial and temporal scales in industrial applications with LBM-RANS methods.展开更多
The modification to the matrix method for constructing the displacement field on the free surface of an anisotropic layered medium was presented. The source of seismic waves was modelled by a randomly oriented force a...The modification to the matrix method for constructing the displacement field on the free surface of an anisotropic layered medium was presented. The source of seismic waves was modelled by a randomly oriented force and seismic tensor. A trial and error method was presented for solving the inverse problem of determining parameters of the earthquake source. A number of analytical and numerical approaches to determining the earthquake source parameters, based on the direct problem solutions, were proposed. The focal mechanisms for the events in the Carpathian region of Ukraine are determined by the graphical method. The theory of determinating the angles of orientation of the fault plane and the earthquake's focal mechanism was presented. The focal mechanisms obtained by two different methods were compared.展开更多
This paper considers the graph sequence graph (f^n )={x×f^n : x ∈X} of the iterates f^n of a continuous map f : X →X on a compact metric space (X, d). The main aim is to introduce serval limit sets by usi...This paper considers the graph sequence graph (f^n )={x×f^n : x ∈X} of the iterates f^n of a continuous map f : X →X on a compact metric space (X, d). The main aim is to introduce serval limit sets by using different recurrent time sets, and discuss the relation between dynamics of the underlying compact system (X, f) and the structure of these limit sets, from a topological or fractal viewpoint.展开更多
The form of a building is among the most critical design aspects concerning building energy consumption.Form-based passive design strategies,like solar control,can significantly reduce heating and cooling demands if i...The form of a building is among the most critical design aspects concerning building energy consumption.Form-based passive design strategies,like solar control,can significantly reduce heating and cooling demands if implemented early in the design process.In this sense,there is an evident need for tools that can adequately support designers in their decisions.This paper aims to illustrate how geometry-based graphical methods(GGM)can provide effective support in the conceptual design stage.The paper introduces a novel digital framework for designing and analysing shading devices that leverages geometrical models and graphical methods.The digital implementation of GGM allows extending their applicability to threedimensional and non-planar geometries.A comprehensive review of existing methods and tools for the design of shading devices lays the ground for the proposed digital framework,which is then demonstrated through two case studies.The results show that the diagrammatic nature of GGM facilitates a better and more direct understanding of the relationship between form and performance.展开更多
The most controversial river in Thailand is the Yom River.It has not been modified by large dam because of several valuable natural resources.Therefore,the river is flooded in rainy season and very low flow in dry sea...The most controversial river in Thailand is the Yom River.It has not been modified by large dam because of several valuable natural resources.Therefore,the river is flooded in rainy season and very low flow in dry season.The low flow causes drought which is much more serious than flooding.The Yom River Basin management is only way to circumvent the low flow problem by studying base flow index(BFI).Base flow analyses for 8 gauging stations along the river were performed by 2 techniques i.e.graphical and modified U.K.Institute of Hydrology(MIH).The mean BFI results from graphical and MIH are 0.37(0.05)and 0.45(0.12).The result from graphical is more reasonable due to its lower standard deviation.BFI values from MIH vary with watershed area which may result from the using of fixing value of N-day at 10.Solution for this problem is ongoing in this study.展开更多
Locality preserving projection (LPP) is a typical and popular dimensionality reduction (DR) method,and it can potentially find discriminative projection directions by preserving the local geometric structure in da...Locality preserving projection (LPP) is a typical and popular dimensionality reduction (DR) method,and it can potentially find discriminative projection directions by preserving the local geometric structure in data. However,LPP is based on the neighborhood graph artificially constructed from the original data,and the performance of LPP relies on how well the nearest neighbor criterion work in the original space. To address this issue,a novel DR algorithm,called the self-dependent LPP (sdLPP) is proposed. And it is based on the fact that the nearest neighbor criterion usually achieves better performance in LPP transformed space than that in the original space. Firstly,LPP is performed based on the typical neighborhood graph; then,a new neighborhood graph is constructed in LPP transformed space and repeats LPP. Furthermore,a new criterion,called the improved Laplacian score,is developed as an empirical reference for the discriminative power and the iterative termination. Finally,the feasibility and the effectiveness of the method are verified by several publicly available UCI and face data sets with promising results.展开更多
We present a generic approximate graphical method for determining the equilibrium Fermi level and majority carrier density of a semiconductor with multiple donors and multiple acceptors compensating each other. Simple...We present a generic approximate graphical method for determining the equilibrium Fermi level and majority carrier density of a semiconductor with multiple donors and multiple acceptors compensating each other. Simple and easy-to-follow procedures of the graphical method are described.By graphically plotting two wrapping step functions facing each other,one for the positive hole-ionized donor and one for the negative electron-ionized acceptor,we have the crossing point that renders the Fermi level and majority carrier density.Using the graphical method,new equations are derived,such as the carrier compensation proportional to N;/N;,not the widely quoted N;-N;.Visual insight is offered to view not only the result of graphic determination of Fermi level and majority carrier density but also the dominant and critical pair of donors and acceptors in compensation.The graphical method presented in this work will help to guide the design,adjustment,and improvement of the multiply doped semiconductors.Comparison of this approximate graphical method with previous work on compensation,and with some experimental results,is made.Future work in the field is proposed.展开更多
One of the main reasons for the decline of urban historic areas in China is the coexistence of multiple property rights.It also deeply affects conservation and regeneration practice.This paper aims to propose a graphi...One of the main reasons for the decline of urban historic areas in China is the coexistence of multiple property rights.It also deeply affects conservation and regeneration practice.This paper aims to propose a graphical method that illustrates the association between property rights,space,and resident behavior.Based on typological maps and justified graphs,a three-step method was proposed to visualize the relationships between these three elements.The final graph and quantitative data were used to observe the evolution of the courtyard building from a diachronic perspective,as well as to compare the residential behavior in different types from a synchronic perspective.The results show that following the subdivision of property rights,the building layout become more diverse due to various illegal additions,while the residential behavior within different building types tends to be consistent.Moreover,the study observed the traditional Chinese courtyard buildings’adaptability.The findings contribute to understand the evolution of Chinese urban historic areas and internal motivation,and provide guidance for the conservation and regeneration practice.展开更多
Distribution-based degradation models (or graphical approach in some literature) occur in a wide range of applications. However, few of existing methods have taken the validation of the built model into consideratio...Distribution-based degradation models (or graphical approach in some literature) occur in a wide range of applications. However, few of existing methods have taken the validation of the built model into consideration. A validation methodology for distribution-based models is proposed in this paper. Since the model can be expressed as consisting of assumptions of model structures and embedded model parameters, the proposed methodology carries out the validation from these two aspects. By using appropriate statistical techniques, the rationality of degradation distributions, suitability of fitted models and validity of degradation models are validated respectively. A new statistical technique based on control limits is also proposed, which can be implemented in the validation of degradation models' validity. The case study on degradation modeling of an actual accelerometer shows that the proposed methodology is an effective solution to the validation problem of distribution-based de qradation models.展开更多
Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left...Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left unattended for most of the day-time and home invasion crimes are at its peak as constantly monitoring of the home is difficult. Another reason for the need of home safety is specifically when the elderly person is alone or the kids are with baby-sitter and servant. Home security system i.e. HomeOS is thus applicable and desirable for resident’s safety and convenience. This will be achieved by turning your home into a smart home by intelligent remote monitoring. Smart home comes into picture for the purpose of controlling and monitoring the home. It will give you peace of mind, as you can have a close watch and stay connected anytime, anywhere. But, is common man really concerned about home security? An investigative study was done by conducting a survey to get the inputs from different people from diverse backgrounds. The main motivation behind this survey was to make people aware of advanced HomeOS and analyze their need for security. This paper also studied the necessity of HomeOS investigative study in current situation where the home burglaries are rising at an exponential rate. In order to arrive at findings and conclusions, data were analyzed. The graphical method was employed to identify the relative significance of home security. From this analysis, we can infer that the cases of having kids and aged person at home or location of home contribute significantly to the need of advanced home security system. At the end, the proposed system model with its flow and the challenges faced while implementing home security systems are also discussed.展开更多
A new approach for predicting forming limit curves(FLCs)at elevated temperatures was proposed herein.FLCs are often used to predict failure and determine the optimal forming parameters of automotive parts.First,a grap...A new approach for predicting forming limit curves(FLCs)at elevated temperatures was proposed herein.FLCs are often used to predict failure and determine the optimal forming parameters of automotive parts.First,a graphical method based on a modified maximum force criterion was applied to estimate the FLCs of 22MnB5 boron steel sheets at room temperature using various hardening laws.Subsequently,the predicted FLC data at room temperature were compared with corresponding data obtained from Nakazima's tests to obtain the best prediction.To estimate the FLC at elevated temperatures,tensile tests were conducted at various temperatures to determine the ratios of equivalent fracture strains between the corresponding elevated temperatures and room temperature.FLCs at elevated temperatures could be established based on obtained ratios.However,the predicted FLCs at elevated temperatures did not agree well with the corresponding FLC experimental data of Zhou et al.A new method was proposed herein to improve the prediction of FLCs at elevated temperatures.An FLC calculated at room tem-perature was utilized to predict the failure of Nakazima's samples via finite element simulation.Based on the simulation results at room temperature,the mathematical relationships between the equivalent ductile fracture strain versus stress triaxiality and strain ratio were established and then combined with ratios between elevated and room temperatures to calculate the FLCs at different temperatures.The predicted FLCs at elevated temperatures agree well with the corresponding experimental FLC data.展开更多
This paper shows a number of Problems in pure and applied mathematicsthat are solved by constructing transportation networks.Moreover,it also shows thatall the solutions are characterized by forbidden configurations w...This paper shows a number of Problems in pure and applied mathematicsthat are solved by constructing transportation networks.Moreover,it also shows thatall the solutions are characterized by forbidden configurations which are not minors.However,all the characterizations are much related to the graphic method which wasfound by Chinese for solving a kind of the transportation problem in the fifties.展开更多
Japan is facing a demographic challenge of a falling birthrate coupled with an aging society that is already adversely affecting the economy. The situation is only expected to worsen as the working-age population cont...Japan is facing a demographic challenge of a falling birthrate coupled with an aging society that is already adversely affecting the economy. The situation is only expected to worsen as the working-age population continues to decrease. Well aware of this situation, businesses and offices are seeking ways to enhance the intellectual productivity of their workers. This paper explores environmental elements of work spaces that might stimulate intellectual activity. Using a CAD (AutoCAD) miniature garden program, subjects were asked to design a project room that is optimized for creative work using a certain number of elements--11 types of walls, 14 types of floors, 4 types of scenery, 3 types of furniture and 3 types of plantings--but the subjects were free to position and arrange these elements any way they want. The subjects were then interviewed using the evaluation grid method. Based on the results, we created an evaluation structure diagram by analyzing key words and phrases emphasized by subjects in the interviews. The overall evaluation structure represents a summary overview of all 30 subjects who participated in the experiment. This approach captures all the key elements of the office environment that might be used to stimulate intellectual activity of employees.展开更多
For deep-space mission design,the gravity of the Sun and the Moon can be first considered and utilized.Their gravity can provide the energy change for launching spacecraft and retrieving spacecraft as well as asteroid...For deep-space mission design,the gravity of the Sun and the Moon can be first considered and utilized.Their gravity can provide the energy change for launching spacecraft and retrieving spacecraft as well as asteroids.Regarding an asteroid retrieval mission,it can lead to the mitigation of asteroid hazards and an easy exploration and exploitation of the asteroid.This paper discusses the application of the Sun-driven lunar swingby sequence for asteroid missions.Characterizing the capacity of this technique is not only interesting in terms of the dynamic insights but also non-trivial for trajectory design.The capacity of a Sun-driven lunar swingby sequence is elucidated in this paper with the help of the“Swingby-Jacobi”graph.The capacity can be represented by a range of the Jacobi integral that encloses around 660 asteroids currently cataloged.To facilitate trajectory design,a database of Sun-perturbed Moon-to-Moon transfers,including multi-revolution cases,is generated and employed.Massive trajectory options for spacecraft launch and asteroid capture can then be explored and optimized.Finally,a number of asteroid flyby,rendezvous,sample-return,and retrieval mission options enabled by the proposed technique are obtained.展开更多
文摘Mitigating increasing cyberattack incidents may require strategies such as reinforcing organizations’ networks with Honeypots and effectively analyzing attack traffic for detection of zero-day attacks and vulnerabilities. To effectively detect and mitigate cyberattacks, both computerized and visual analyses are typically required. However, most security analysts are not adequately trained in visualization principles and/or methods, which is required for effective visual perception of useful attack information hidden in attack data. Additionally, Honeypot has proven useful in cyberattack research, but no studies have comprehensively investigated visualization practices in the field. In this paper, we reviewed visualization practices and methods commonly used in the discovery and communication of attack patterns based on Honeypot network traffic data. Using the PRISMA methodology, we identified and screened 218 papers and evaluated only 37 papers having a high impact. Most Honeypot papers conducted summary statistics of Honeypot data based on static data metrics such as IP address, port, and packet size. They visually analyzed Honeypot attack data using simple graphical methods (such as line, bar, and pie charts) that tend to hide useful attack information. Furthermore, only a few papers conducted extended attack analysis, and commonly visualized attack data using scatter and linear plots. Papers rarely included simple yet sophisticated graphical methods, such as box plots and histograms, which allow for critical evaluation of analysis results. While a significant number of automated visualization tools have incorporated visualization standards by default, the construction of effective and expressive graphical methods for easy pattern discovery and explainable insights still requires applied knowledge and skill of visualization principles and tools, and occasionally, an interdisciplinary collaboration with peers. We, therefore, suggest the need, going forward, for non-classical graphical methods for visualizing attack patterns and communicating analysis results. We also recommend training investigators in visualization principles and standards for effective visual perception and presentation.
文摘The analytic expression of the special points on the intersection of two cones with their axes intersecting(ITCTAI) is given. It also presents a method to construct the special points graphically according to the analytic expression of them. Finally, with computer programming language, it gives a program to generate the intersection in several different cases.
文摘After volume fracturing of horizontal wells in shale gas reservoir, an extremely complex fracture system is formed. The space area of the fracture system is the reservoir reconstruction volume of shale gas reservoir. The geometric parameters such as crack length, crack width, crack height, and characteristic parameters such as crack permeability and fracture conductivity proposed for a single crack in conventional fracturing are insufficient to describe and characterize the complex network fracture system after volume fracturing. In this paper, the discrete fracture modeling method is used to establish the volume fracturing network fracture model of horizontal wells in shale gas reservoir by using the random modeling method within the determined reservoir space. The model is random and selective, and can fully provide different forms of volume fracturing fracture expansion, such as conventional fracture morphology, line network model and arbitrarily distributed network fractures. The research results provide a theoretical basis for the development plan and stimulation plan of shale gas reservoir, and have important reference value and significance for other unconventional gas reservoir fracturing.
基金Supported by the National Natural Science Foundation of China (No.20436040).
文摘Method for constructing the optimal water supply line and formulas for calculating the targets for single-contaminant regeneration recycling water systems are improved to apply to the situation of variational pararneters in this article. Based on these extending methods, the effect of varying freshwater consumption and regenerated water flow rate on the optimizing results are investigated. The interactions of parameters of regeneration recycling systems are summarized. Finally, all the conclusions are illustrated from the results of mathematical programming through an example.
基金Supported by the National Key Research and Development Program of China(2017YFB0602500)National Natural Science Foundation of China(91634203 and91434121)Chinese Academy of Sciences(122111KYSB20150003)
文摘The coupled models of LBM (Lattice Boltzmann Method) and RANS (Reynolds-Averaged Navier-Stokes) are more practical for the transient simulation of mixing processes at large spatial and temporal scales such as crude oil mixing in large-diameter storage tanks. To keep the efficiency of parallel computation of LBM, the RANS model should also be explicitly solved; whereas to keep the numerical stability the implicit method should be better for PANS model. This article explores the numerical stability of explicit methods in 2D cases on one hand, and on the other hand how to accelerate the computation of the coupled model of LBM and an implicitly solved RANS model in 3D cases. To ensure the numerical stability and meanwhile avoid the use of empirical artificial lim- itations on turbulent quantities in 2D cases, we investigated the impacts of collision models in LBM (LBGK, MRT) and the numerical schemes for convection terms (WENO, TVD) and production terms (FDM, NEQM) in an explic- itly solved standard k-e model. The combination of MRT and TVD or MRT and NEQM can be screened out for the 2D simulation of backward-facing step flow even at Re = 107. This scheme combination, however, may still not guarantee the numerical stability in 3D cases and hence much finer grids are required, which is not suitable for the simulation of industrial-scale processes.Then we proposed a new method to accelerate the coupled model of LBM with RANS (implicitly solved). When implemented on multiple GPUs, this new method can achieve 13.5-fold accelera- tion relative to the original coupled model and 40-fold acceleration compared to the traditional CFD simulation based on Finite Volume (FV) method accelerated by multiple CPUs. This study provides the basis for the transient flow simulation of larger spatial and temporal scales in industrial applications with LBM-RANS methods.
文摘The modification to the matrix method for constructing the displacement field on the free surface of an anisotropic layered medium was presented. The source of seismic waves was modelled by a randomly oriented force and seismic tensor. A trial and error method was presented for solving the inverse problem of determining parameters of the earthquake source. A number of analytical and numerical approaches to determining the earthquake source parameters, based on the direct problem solutions, were proposed. The focal mechanisms for the events in the Carpathian region of Ukraine are determined by the graphical method. The theory of determinating the angles of orientation of the fault plane and the earthquake's focal mechanism was presented. The focal mechanisms obtained by two different methods were compared.
文摘This paper considers the graph sequence graph (f^n )={x×f^n : x ∈X} of the iterates f^n of a continuous map f : X →X on a compact metric space (X, d). The main aim is to introduce serval limit sets by using different recurrent time sets, and discuss the relation between dynamics of the underlying compact system (X, f) and the structure of these limit sets, from a topological or fractal viewpoint.
文摘The form of a building is among the most critical design aspects concerning building energy consumption.Form-based passive design strategies,like solar control,can significantly reduce heating and cooling demands if implemented early in the design process.In this sense,there is an evident need for tools that can adequately support designers in their decisions.This paper aims to illustrate how geometry-based graphical methods(GGM)can provide effective support in the conceptual design stage.The paper introduces a novel digital framework for designing and analysing shading devices that leverages geometrical models and graphical methods.The digital implementation of GGM allows extending their applicability to threedimensional and non-planar geometries.A comprehensive review of existing methods and tools for the design of shading devices lays the ground for the proposed digital framework,which is then demonstrated through two case studies.The results show that the diagrammatic nature of GGM facilitates a better and more direct understanding of the relationship between form and performance.
文摘The most controversial river in Thailand is the Yom River.It has not been modified by large dam because of several valuable natural resources.Therefore,the river is flooded in rainy season and very low flow in dry season.The low flow causes drought which is much more serious than flooding.The Yom River Basin management is only way to circumvent the low flow problem by studying base flow index(BFI).Base flow analyses for 8 gauging stations along the river were performed by 2 techniques i.e.graphical and modified U.K.Institute of Hydrology(MIH).The mean BFI results from graphical and MIH are 0.37(0.05)and 0.45(0.12).The result from graphical is more reasonable due to its lower standard deviation.BFI values from MIH vary with watershed area which may result from the using of fixing value of N-day at 10.Solution for this problem is ongoing in this study.
基金Supported by the National Natural Science Foundation of China (60973097)the Scientific Research Foundation of Liaocheng University(X0810029)~~
文摘Locality preserving projection (LPP) is a typical and popular dimensionality reduction (DR) method,and it can potentially find discriminative projection directions by preserving the local geometric structure in data. However,LPP is based on the neighborhood graph artificially constructed from the original data,and the performance of LPP relies on how well the nearest neighbor criterion work in the original space. To address this issue,a novel DR algorithm,called the self-dependent LPP (sdLPP) is proposed. And it is based on the fact that the nearest neighbor criterion usually achieves better performance in LPP transformed space than that in the original space. Firstly,LPP is performed based on the typical neighborhood graph; then,a new neighborhood graph is constructed in LPP transformed space and repeats LPP. Furthermore,a new criterion,called the improved Laplacian score,is developed as an empirical reference for the discriminative power and the iterative termination. Finally,the feasibility and the effectiveness of the method are verified by several publicly available UCI and face data sets with promising results.
文摘We present a generic approximate graphical method for determining the equilibrium Fermi level and majority carrier density of a semiconductor with multiple donors and multiple acceptors compensating each other. Simple and easy-to-follow procedures of the graphical method are described.By graphically plotting two wrapping step functions facing each other,one for the positive hole-ionized donor and one for the negative electron-ionized acceptor,we have the crossing point that renders the Fermi level and majority carrier density.Using the graphical method,new equations are derived,such as the carrier compensation proportional to N;/N;,not the widely quoted N;-N;.Visual insight is offered to view not only the result of graphic determination of Fermi level and majority carrier density but also the dominant and critical pair of donors and acceptors in compensation.The graphical method presented in this work will help to guide the design,adjustment,and improvement of the multiply doped semiconductors.Comparison of this approximate graphical method with previous work on compensation,and with some experimental results,is made.Future work in the field is proposed.
基金This work was supported by China Postdoctoral Science Foundation(grant No.2020M681458)the National Natural Science Foundation of China for project"Research on the Mechanism and Method of Conservation and Regenerationof Historic Areasunder the Background of Coexistence of Multiple Property Rights--a Case Study of Nanjing Old City"(grant No.52008083).
文摘One of the main reasons for the decline of urban historic areas in China is the coexistence of multiple property rights.It also deeply affects conservation and regeneration practice.This paper aims to propose a graphical method that illustrates the association between property rights,space,and resident behavior.Based on typological maps and justified graphs,a three-step method was proposed to visualize the relationships between these three elements.The final graph and quantitative data were used to observe the evolution of the courtyard building from a diachronic perspective,as well as to compare the residential behavior in different types from a synchronic perspective.The results show that following the subdivision of property rights,the building layout become more diverse due to various illegal additions,while the residential behavior within different building types tends to be consistent.Moreover,the study observed the traditional Chinese courtyard buildings’adaptability.The findings contribute to understand the evolution of Chinese urban historic areas and internal motivation,and provide guidance for the conservation and regeneration practice.
文摘Distribution-based degradation models (or graphical approach in some literature) occur in a wide range of applications. However, few of existing methods have taken the validation of the built model into consideration. A validation methodology for distribution-based models is proposed in this paper. Since the model can be expressed as consisting of assumptions of model structures and embedded model parameters, the proposed methodology carries out the validation from these two aspects. By using appropriate statistical techniques, the rationality of degradation distributions, suitability of fitted models and validity of degradation models are validated respectively. A new statistical technique based on control limits is also proposed, which can be implemented in the validation of degradation models' validity. The case study on degradation modeling of an actual accelerometer shows that the proposed methodology is an effective solution to the validation problem of distribution-based de qradation models.
基金supported in part by National Basic Research Program of China(973 Program)(2010CB731803)National Natural Science Foundation of China(61375105)+2 种基金China Postdoctoral Science Foundation Funded Project(2015M570235)Youth Foundation of Hebei Educational Committee(QN2015187)Science Foundation of Yanshan University(B832,14LGA010)
文摘Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left unattended for most of the day-time and home invasion crimes are at its peak as constantly monitoring of the home is difficult. Another reason for the need of home safety is specifically when the elderly person is alone or the kids are with baby-sitter and servant. Home security system i.e. HomeOS is thus applicable and desirable for resident’s safety and convenience. This will be achieved by turning your home into a smart home by intelligent remote monitoring. Smart home comes into picture for the purpose of controlling and monitoring the home. It will give you peace of mind, as you can have a close watch and stay connected anytime, anywhere. But, is common man really concerned about home security? An investigative study was done by conducting a survey to get the inputs from different people from diverse backgrounds. The main motivation behind this survey was to make people aware of advanced HomeOS and analyze their need for security. This paper also studied the necessity of HomeOS investigative study in current situation where the home burglaries are rising at an exponential rate. In order to arrive at findings and conclusions, data were analyzed. The graphical method was employed to identify the relative significance of home security. From this analysis, we can infer that the cases of having kids and aged person at home or location of home contribute significantly to the need of advanced home security system. At the end, the proposed system model with its flow and the challenges faced while implementing home security systems are also discussed.
基金funded by Vietnam National Foundation for Science and Technology Development(NAFOSTED)under Grant Number 107.02-2019.300.
文摘A new approach for predicting forming limit curves(FLCs)at elevated temperatures was proposed herein.FLCs are often used to predict failure and determine the optimal forming parameters of automotive parts.First,a graphical method based on a modified maximum force criterion was applied to estimate the FLCs of 22MnB5 boron steel sheets at room temperature using various hardening laws.Subsequently,the predicted FLC data at room temperature were compared with corresponding data obtained from Nakazima's tests to obtain the best prediction.To estimate the FLC at elevated temperatures,tensile tests were conducted at various temperatures to determine the ratios of equivalent fracture strains between the corresponding elevated temperatures and room temperature.FLCs at elevated temperatures could be established based on obtained ratios.However,the predicted FLCs at elevated temperatures did not agree well with the corresponding FLC experimental data of Zhou et al.A new method was proposed herein to improve the prediction of FLCs at elevated temperatures.An FLC calculated at room tem-perature was utilized to predict the failure of Nakazima's samples via finite element simulation.Based on the simulation results at room temperature,the mathematical relationships between the equivalent ductile fracture strain versus stress triaxiality and strain ratio were established and then combined with ratios between elevated and room temperatures to calculate the FLCs at different temperatures.The predicted FLCs at elevated temperatures agree well with the corresponding experimental FLC data.
基金supported by the National Natural Science Foundation of China(61471343)the National Key Technology Research and Development Program of the Ministry of Science and Technology of China(2014BAK14B03)
文摘This paper shows a number of Problems in pure and applied mathematicsthat are solved by constructing transportation networks.Moreover,it also shows thatall the solutions are characterized by forbidden configurations which are not minors.However,all the characterizations are much related to the graphic method which wasfound by Chinese for solving a kind of the transportation problem in the fifties.
文摘Japan is facing a demographic challenge of a falling birthrate coupled with an aging society that is already adversely affecting the economy. The situation is only expected to worsen as the working-age population continues to decrease. Well aware of this situation, businesses and offices are seeking ways to enhance the intellectual productivity of their workers. This paper explores environmental elements of work spaces that might stimulate intellectual activity. Using a CAD (AutoCAD) miniature garden program, subjects were asked to design a project room that is optimized for creative work using a certain number of elements--11 types of walls, 14 types of floors, 4 types of scenery, 3 types of furniture and 3 types of plantings--but the subjects were free to position and arrange these elements any way they want. The subjects were then interviewed using the evaluation grid method. Based on the results, we created an evaluation structure diagram by analyzing key words and phrases emphasized by subjects in the interviews. The overall evaluation structure represents a summary overview of all 30 subjects who participated in the experiment. This approach captures all the key elements of the office environment that might be used to stimulate intellectual activity of employees.
文摘For deep-space mission design,the gravity of the Sun and the Moon can be first considered and utilized.Their gravity can provide the energy change for launching spacecraft and retrieving spacecraft as well as asteroids.Regarding an asteroid retrieval mission,it can lead to the mitigation of asteroid hazards and an easy exploration and exploitation of the asteroid.This paper discusses the application of the Sun-driven lunar swingby sequence for asteroid missions.Characterizing the capacity of this technique is not only interesting in terms of the dynamic insights but also non-trivial for trajectory design.The capacity of a Sun-driven lunar swingby sequence is elucidated in this paper with the help of the“Swingby-Jacobi”graph.The capacity can be represented by a range of the Jacobi integral that encloses around 660 asteroids currently cataloged.To facilitate trajectory design,a database of Sun-perturbed Moon-to-Moon transfers,including multi-revolution cases,is generated and employed.Massive trajectory options for spacecraft launch and asteroid capture can then be explored and optimized.Finally,a number of asteroid flyby,rendezvous,sample-return,and retrieval mission options enabled by the proposed technique are obtained.