In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ...In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.展开更多
In this paper,we innovatively associate the mutual information with the frame error rate(FER)performance and propose novel quantized decoders for polar codes.Based on the optimal quantizer of binary-input discrete mem...In this paper,we innovatively associate the mutual information with the frame error rate(FER)performance and propose novel quantized decoders for polar codes.Based on the optimal quantizer of binary-input discrete memoryless channels(BDMCs),the proposed decoders quantize the virtual subchannels of polar codes to maximize mutual information(MMI)between source bits and quantized symbols.The nested structure of polar codes ensures that the MMI quantization can be implemented stage by stage.Simulation results show that the proposed MMI decoders with 4 quantization bits outperform the existing nonuniform quantized decoders that minimize mean-squared error(MMSE)with 4 quantization bits,and yield even better performance than uniform MMI quantized decoders with 5 quantization bits.Furthermore,the proposed 5-bit quantized MMI decoders approach the floating-point decoders with negligible performance loss.展开更多
Degree of freedom(DOF)is a key indicator for spatial multiplexing layers of a wireless channel.Traditionally,the channel of a multiple-input multiple-output(MIMO)half-wavelength dipole array has a DOF that equals the ...Degree of freedom(DOF)is a key indicator for spatial multiplexing layers of a wireless channel.Traditionally,the channel of a multiple-input multiple-output(MIMO)half-wavelength dipole array has a DOF that equals the antenna number.However,recent studies suggest that the DOF could be less than the antenna number when strong mutual coupling is considered.We utilize a mutual-coupling-compliant channel model to investigate the DOF of the holographic MIMO(HMIMO)channel and give a upper bound of the DOF with strong mutual coupling.Our numerical simulations demonstrate that a dense array can support more DOF per unit aperture as compared with a half-wavelength MIMO system.展开更多
The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the a...The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.展开更多
Life Cycle Cost Analysis (LCCA) provides a systematic approach to assess the total cost associated with owning, operating, and maintaining assets throughout their entire life. BIM empowers architects and designers to ...Life Cycle Cost Analysis (LCCA) provides a systematic approach to assess the total cost associated with owning, operating, and maintaining assets throughout their entire life. BIM empowers architects and designers to perform real-time evaluations to explore various design options. However, when integrated with LCCA, BIM provides a comprehensive economic perspective that helps stakeholders understand the long-term financial implications of design decisions. This study presents a methodology for developing a model that seamlessly integrates BIM and LCCA during the conceptual design stage of buildings. This integration allows for a comprehensive evaluation and analysis of the design process, ensuring that the development aligns with the principles of low carbon emissions by employing modular construction, 3D concrete printing methods, and different building design alternatives. The model considers the initial construction costs in addition to all the long-term operational, maintenance, and salvage values. It combines various tools and data through different modules, including energy analysis, Life Cycle Assessment (LCA), and Life Cycle Cost Analysis (LCCA) to execute a comprehensive assessment of the financial implications of a specific design option throughout the lifecycle of building projects. The development of the said model and its implementation involves the creation of a new plug-in for the BIM tool (i.e., Autodesk Revit) to enhance its functionalities and capabilities in forecasting the life-cycle costs of buildings in addition to generating associated cash flows, creating scenarios, and sensitivity analyses in an automatic manner. This model empowers designers to evaluate and justify their initial investments while designing and selecting potential construction methods for buildings, and enabling stakeholders to make informed decisions by assessing different design alternatives based on long-term financial considerations during the early stages of design.展开更多
Computer vision-based inspection methods show promise for automating post-earthquake building inspections.These methods survey a building with unmanned aerial vehicles and automatically detect damage in the collected ...Computer vision-based inspection methods show promise for automating post-earthquake building inspections.These methods survey a building with unmanned aerial vehicles and automatically detect damage in the collected images.Nevertheless,assessing the damage′s impact on structural safety requires localizing damage to specific building components with known design and function.This paper proposes a BIM-based automated inspection framework to provide context for visual surveys.A deep learning-based semantic segmentation algorithm is trained to automatically identify damage in images.The BIM automatically associates any identified damage with specific building components.Then,components are classified into damage states consistent with component fragility models for integration with a structural analysis.To demonstrate the framework,methods are developed to photorealistically simulate severe structural damage in a synthetic computer graphics environment.A graphics model of a real building in Urbana,Illinois,is generated to test the framework;the model is integrated with a structural analysis to apply earthquake damage in a physically realistic manner.A simulated UAV survey is flown of the graphics model and the framework is applied.The method achieves high accuracy in assigning damage states to visible structural components.This assignment enables integration with a performance-based earthquake assessment to classify building safety.展开更多
A large amount of information is frequently encountered when characterizing the sample model in chemical process.A fault diagnosis method based on dynamic modeling of feature engineering is proposed to effectively rem...A large amount of information is frequently encountered when characterizing the sample model in chemical process.A fault diagnosis method based on dynamic modeling of feature engineering is proposed to effectively remove the nonlinear correlation redundancy of chemical process in this paper.From the whole process point of view,the method makes use of the characteristic of mutual information to select the optimal variable subset.It extracts the correlation among variables in the whitening process without limiting to only linear correlations.Further,PCA(Principal Component Analysis)dimension reduction is used to extract feature subset before fault diagnosis.The application results of the TE(Tennessee Eastman)simulation process show that the dynamic modeling process of MIFE(Mutual Information Feature Engineering)can accurately extract the nonlinear correlation relationship among process variables and can effectively reduce the dimension of feature detection in process monitoring.展开更多
Text event mining,as an indispensable method of text mining processing,has attracted the extensive attention of researchers.A modeling method for knowledge graph of events based on mutual information among neighbor do...Text event mining,as an indispensable method of text mining processing,has attracted the extensive attention of researchers.A modeling method for knowledge graph of events based on mutual information among neighbor domains and sparse representation is proposed in this paper,i.e.UKGE-MS.Specifically,UKGE-MS can improve the existing text mining technology's ability of understanding and discovering high-dimensional unmarked information,and solves the problems of traditional unsupervised feature selection methods,which only focus on selecting features from a global perspective and ignoring the impact of local connection of samples.Firstly,considering the influence of local information of samples in feature correlation evaluation,a feature clustering algorithm based on average neighborhood mutual information is proposed,and the feature clusters with certain event correlation are obtained;Secondly,an unsupervised feature selection method based on the high-order correlation of multi-dimensional statistical data is designed by combining the dimension reduction advantage of local linear embedding algorithm and the feature selection ability of sparse representation,so as to enhance the generalization ability of the selected feature items.Finally,the events knowledge graph is constructed by means of sparse representation and l1 norm.Extensive experiments are carried out on five real datasets and synthetic datasets,and the UKGE-MS are compared with five corresponding algorithms.The experimental results show that UKGE-MS is better than the traditional method in event clustering and feature selection,and has some advantages over other methods in text event recognition and discovery.展开更多
[Objective] To study virtual plant modeling based on mutual feedback of function-structure.[Method] With the analysis of the shortcomings of current virtual plant modeling method,the modeling with the idea of function...[Objective] To study virtual plant modeling based on mutual feedback of function-structure.[Method] With the analysis of the shortcomings of current virtual plant modeling method,the modeling with the idea of function-structure mutual feedback was put forward,and the steps of this modeling were elaborated,including the determination of morphological structure model,biomass production model,biomass allocation model,organ reconstruction model,and the integration method of function model and morphological structure model.[Results] The breakthrough of function-structure mutual feedback based mechanism from the boundaries of physiological ecology model and morphological structure model can solve the difficulty of data transmission between the two models and build an integrated model from the two,which can effectively reflect the incidence relation between plant morphology and function,and more suitable for the growth mechanisms of plants.This modeling approach has significant advantages in the dynamic simulation of plant growth.[Conclusion] The virtual plant modeling based on function-structure mutual feedback provides basis for the simulation of plant growth status in the next stage,and has important significance for the accurate simulation of the dynamic growth process of plant.展开更多
Mutual information is widely used in medical image registration, because it does not require preprocessing the image. However, the local maximum problem in the registration is insurmountable. We combine mutual informa...Mutual information is widely used in medical image registration, because it does not require preprocessing the image. However, the local maximum problem in the registration is insurmountable. We combine mutual information and gradient information to solve this problem and apply it to the non-rigid deformation image registration. To improve the accuracy, we provide some implemental issues, for example, the Powell searching algorithm, gray interpolation and consideration of outlier points. The experimental results show the accuracy of the method and the feasibility in non-rigid medical image registration.展开更多
Structural redundancy elimination in case resource pools (CRP) is critical for avoiding performance bottlenecks and maintaining robust decision capabilities in cloud computing services. For these purposes, this pape...Structural redundancy elimination in case resource pools (CRP) is critical for avoiding performance bottlenecks and maintaining robust decision capabilities in cloud computing services. For these purposes, this paper proposes a novel approach to ensure redundancy elimination of a reasoning system in CRP. By using α entropy and mutual information, functional measures to eliminate redundancy of a system are developed with respect to a set of outputs. These measures help to distinguish both the optimal feature and the relations among the nodes in reasoning networks from the redundant ones with the elimination criterion. Based on the optimal feature and its harmonic weight, a model for knowledge reasoning in CRP (CRPKR) is built to complete the task of query matching, and the missing values are estimated with Bayesian networks. Moreover, the robustness of decisions is verified through parameter analyses. This approach is validated by the simulation with benchmark data sets using cloud SQL. Compared with several state-of-the-art techniques, the results show that the proposed approach has a good performance and boosts the robustness of decisions.展开更多
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ...As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.展开更多
Mutual information is an important information measure for feature subset. In this paper, a hashing mechanism is proposed to calculate the mutual information on the feature subset. Redundancy-synergy coefficient, a no...Mutual information is an important information measure for feature subset. In this paper, a hashing mechanism is proposed to calculate the mutual information on the feature subset. Redundancy-synergy coefficient, a novel redundancy and synergy measure of features to express the class feature, is defined by mutual information. The information maximization rule was applied to derive the heuristic feature subset selection method based on mutual information and redundancy-synergy coefficient. Our experiment results showed the good performance of the new feature selection method.展开更多
In this paper, the mutual information between clock-controlled input and output sequences is discussed. It is proved that the mutual information is a strictly monotone increasing function of the length of output seque...In this paper, the mutual information between clock-controlled input and output sequences is discussed. It is proved that the mutual information is a strictly monotone increasing function of the length of output sequence, and its divergent rate is gaven.展开更多
Fuzzy entropy was designed for non convex fuzzy membership function using well known Hamming distance measure.The proposed fuzzy entropy had the same structure as that of convex fuzzy membership case.Design procedure ...Fuzzy entropy was designed for non convex fuzzy membership function using well known Hamming distance measure.The proposed fuzzy entropy had the same structure as that of convex fuzzy membership case.Design procedure of fuzzy entropy was proposed by considering fuzzy membership through distance measure,and the obtained results contained more flexibility than the general fuzzy membership function.Furthermore,characteristic analyses for non convex function were also illustrated.Analyses on the mutual information were carried out through the proposed fuzzy entropy and similarity measure,which was also dual structure of fuzzy entropy.By the illustrative example,mutual information was discussed.展开更多
The frame of text classification system was presented. The high dimensionality in feature space for text classification was studied. The mutual information is a widely used information theoretic measure, in a descript...The frame of text classification system was presented. The high dimensionality in feature space for text classification was studied. The mutual information is a widely used information theoretic measure, in a descriptive way, to measure the stochastic dependency of discrete random variables. The measure method was used as a criterion to reduce high dimensionality of feature vectors in text classification on Web. Feature selections or conversions were performed by using maximum mutual information including linear and non-linear feature conversions. Entropy was used and extended to find right features commendably in pattern recognition systems. Favorable foundation would be established for text classification mining.展开更多
Underground pipeline networks constitute a major component of urban infrastructure,and thus,it is imperative to have an efficient mechanism to manage them.This study introduces a secondary development system to effici...Underground pipeline networks constitute a major component of urban infrastructure,and thus,it is imperative to have an efficient mechanism to manage them.This study introduces a secondary development system to efficiently model underground pipeline networks,using the building information modeling(BIM)-based software Revit.The system comprises separate pipe point and tubulation models.Using a Revit application programming interface(API),the spatial position and attribute data of the pipe points are extracted from a pipeline database,and the corresponding tubulation data are extracted from a tubulation database.Using the Family class in Revit API,the cluster in the self-built library of pipe point is inserted into the spatial location and the attribute data is added;in the same way,all pipeline instances in the pipeline system are created.The extension and localization of the model accelerated the modeling speed.The system was then used in a real construction project.The expansion of the model database and rapid modeling made the application of BIM technology in three-dimensional visualization of underground pipeline networks more convenient.Furthermore,it has applications in pipeline engineering construction and management.展开更多
In this paper, the temporal and spatial patterns of a diffusive predator-prey model with mutual interference under homogeneous Neumann boundary conditions were studied. Specifically, first, taking the intrinsic growth...In this paper, the temporal and spatial patterns of a diffusive predator-prey model with mutual interference under homogeneous Neumann boundary conditions were studied. Specifically, first, taking the intrinsic growth rate of the predator as the parameter, we give a computational and theoretical analysis of Hopf bifurcation on the positive equilibrium for the ODE system. As well, we have discussed the conditions for determining the bifurcation direction and the stability of the bifurcating periodic solutions.展开更多
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo...It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.展开更多
As a convenient approach to the characterization of cerebral cortex electrical information, electroencephalograph (EEG) has potential clinical application in monitoring the acupuncture effects. In this paper, a meth...As a convenient approach to the characterization of cerebral cortex electrical information, electroencephalograph (EEG) has potential clinical application in monitoring the acupuncture effects. In this paper, a method composed of the mutual information method and Lempel-Ziv complexity method (MILZC) is proposed to investigate the effects of acupuncture on the complexity of information exchanges between different brain regions based on EEGs. In the experiments, eight subjects are manually acupunctured at 'Zusanli' acupuncture point (ST-36) with different frequencies (i.e., 50, 100, 150, and 200 times/min) and the EEGs are recorded simultaneously. First, MILZC values are compared in general. Then average brain connections are used to quantify the effectiveness of acupuncture under the above four frequencies. Finally, significance index P values are used to study the spatiality of the acupuncture effect on the brain. Three main findings are obtained: (i) MILZC values increase during the acupuncture; (ii) manual acupunctures (MAs) with 100 times/rain and 150 times/min are more effective than with 50 times/min and 200 times/rain; (iii) contralateral hemisphere activation is more prominent than ipsilateral hemisphere's. All these findings suggest that acupuncture contributes to the increase of brain information exchange complexity and the MILZC method can successfully describe these changes.展开更多
文摘In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance.
基金financially supported in part by National Key R&D Program of China(No.2018YFB1801402)in part by Huawei Technologies Co.,Ltd.
文摘In this paper,we innovatively associate the mutual information with the frame error rate(FER)performance and propose novel quantized decoders for polar codes.Based on the optimal quantizer of binary-input discrete memoryless channels(BDMCs),the proposed decoders quantize the virtual subchannels of polar codes to maximize mutual information(MMI)between source bits and quantized symbols.The nested structure of polar codes ensures that the MMI quantization can be implemented stage by stage.Simulation results show that the proposed MMI decoders with 4 quantization bits outperform the existing nonuniform quantized decoders that minimize mean-squared error(MMSE)with 4 quantization bits,and yield even better performance than uniform MMI quantized decoders with 5 quantization bits.Furthermore,the proposed 5-bit quantized MMI decoders approach the floating-point decoders with negligible performance loss.
基金supported in part by National Key Research and Develop⁃ment Program of China under Grant No.2020YFB1807600.
文摘Degree of freedom(DOF)is a key indicator for spatial multiplexing layers of a wireless channel.Traditionally,the channel of a multiple-input multiple-output(MIMO)half-wavelength dipole array has a DOF that equals the antenna number.However,recent studies suggest that the DOF could be less than the antenna number when strong mutual coupling is considered.We utilize a mutual-coupling-compliant channel model to investigate the DOF of the holographic MIMO(HMIMO)channel and give a upper bound of the DOF with strong mutual coupling.Our numerical simulations demonstrate that a dense array can support more DOF per unit aperture as compared with a half-wavelength MIMO system.
文摘The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.
文摘Life Cycle Cost Analysis (LCCA) provides a systematic approach to assess the total cost associated with owning, operating, and maintaining assets throughout their entire life. BIM empowers architects and designers to perform real-time evaluations to explore various design options. However, when integrated with LCCA, BIM provides a comprehensive economic perspective that helps stakeholders understand the long-term financial implications of design decisions. This study presents a methodology for developing a model that seamlessly integrates BIM and LCCA during the conceptual design stage of buildings. This integration allows for a comprehensive evaluation and analysis of the design process, ensuring that the development aligns with the principles of low carbon emissions by employing modular construction, 3D concrete printing methods, and different building design alternatives. The model considers the initial construction costs in addition to all the long-term operational, maintenance, and salvage values. It combines various tools and data through different modules, including energy analysis, Life Cycle Assessment (LCA), and Life Cycle Cost Analysis (LCCA) to execute a comprehensive assessment of the financial implications of a specific design option throughout the lifecycle of building projects. The development of the said model and its implementation involves the creation of a new plug-in for the BIM tool (i.e., Autodesk Revit) to enhance its functionalities and capabilities in forecasting the life-cycle costs of buildings in addition to generating associated cash flows, creating scenarios, and sensitivity analyses in an automatic manner. This model empowers designers to evaluate and justify their initial investments while designing and selecting potential construction methods for buildings, and enabling stakeholders to make informed decisions by assessing different design alternatives based on long-term financial considerations during the early stages of design.
基金Financial support for this research was provided in part by the US Army Corps of Engineers through a subaward from the University of California,San Diego,USA。
文摘Computer vision-based inspection methods show promise for automating post-earthquake building inspections.These methods survey a building with unmanned aerial vehicles and automatically detect damage in the collected images.Nevertheless,assessing the damage′s impact on structural safety requires localizing damage to specific building components with known design and function.This paper proposes a BIM-based automated inspection framework to provide context for visual surveys.A deep learning-based semantic segmentation algorithm is trained to automatically identify damage in images.The BIM automatically associates any identified damage with specific building components.Then,components are classified into damage states consistent with component fragility models for integration with a structural analysis.To demonstrate the framework,methods are developed to photorealistically simulate severe structural damage in a synthetic computer graphics environment.A graphics model of a real building in Urbana,Illinois,is generated to test the framework;the model is integrated with a structural analysis to apply earthquake damage in a physically realistic manner.A simulated UAV survey is flown of the graphics model and the framework is applied.The method achieves high accuracy in assigning damage states to visible structural components.This assignment enables integration with a performance-based earthquake assessment to classify building safety.
基金Supported by the National Natural Science Foundation of China(21576143).
文摘A large amount of information is frequently encountered when characterizing the sample model in chemical process.A fault diagnosis method based on dynamic modeling of feature engineering is proposed to effectively remove the nonlinear correlation redundancy of chemical process in this paper.From the whole process point of view,the method makes use of the characteristic of mutual information to select the optimal variable subset.It extracts the correlation among variables in the whitening process without limiting to only linear correlations.Further,PCA(Principal Component Analysis)dimension reduction is used to extract feature subset before fault diagnosis.The application results of the TE(Tennessee Eastman)simulation process show that the dynamic modeling process of MIFE(Mutual Information Feature Engineering)can accurately extract the nonlinear correlation relationship among process variables and can effectively reduce the dimension of feature detection in process monitoring.
基金This study was funded by the International Science and Technology Cooperation Program of the Science and Technology Department of Shaanxi Province,China(No.2021KW-16)the Science and Technology Project in Xi’an(No.2019218114GXRC017CG018-GXYD17.11),Thesis work was supported by the special fund construction project of Key Disciplines in Ordinary Colleges and Universities in Shaanxi Province,the authors would like to thank the anonymous reviewers for their helpful comments and suggestions.
文摘Text event mining,as an indispensable method of text mining processing,has attracted the extensive attention of researchers.A modeling method for knowledge graph of events based on mutual information among neighbor domains and sparse representation is proposed in this paper,i.e.UKGE-MS.Specifically,UKGE-MS can improve the existing text mining technology's ability of understanding and discovering high-dimensional unmarked information,and solves the problems of traditional unsupervised feature selection methods,which only focus on selecting features from a global perspective and ignoring the impact of local connection of samples.Firstly,considering the influence of local information of samples in feature correlation evaluation,a feature clustering algorithm based on average neighborhood mutual information is proposed,and the feature clusters with certain event correlation are obtained;Secondly,an unsupervised feature selection method based on the high-order correlation of multi-dimensional statistical data is designed by combining the dimension reduction advantage of local linear embedding algorithm and the feature selection ability of sparse representation,so as to enhance the generalization ability of the selected feature items.Finally,the events knowledge graph is constructed by means of sparse representation and l1 norm.Extensive experiments are carried out on five real datasets and synthetic datasets,and the UKGE-MS are compared with five corresponding algorithms.The experimental results show that UKGE-MS is better than the traditional method in event clustering and feature selection,and has some advantages over other methods in text event recognition and discovery.
基金Supported by the National Natural Science Foundation of China (610620-07)the Principal Fund Project of Tarim University (TDZKSS201115)~~
文摘[Objective] To study virtual plant modeling based on mutual feedback of function-structure.[Method] With the analysis of the shortcomings of current virtual plant modeling method,the modeling with the idea of function-structure mutual feedback was put forward,and the steps of this modeling were elaborated,including the determination of morphological structure model,biomass production model,biomass allocation model,organ reconstruction model,and the integration method of function model and morphological structure model.[Results] The breakthrough of function-structure mutual feedback based mechanism from the boundaries of physiological ecology model and morphological structure model can solve the difficulty of data transmission between the two models and build an integrated model from the two,which can effectively reflect the incidence relation between plant morphology and function,and more suitable for the growth mechanisms of plants.This modeling approach has significant advantages in the dynamic simulation of plant growth.[Conclusion] The virtual plant modeling based on function-structure mutual feedback provides basis for the simulation of plant growth status in the next stage,and has important significance for the accurate simulation of the dynamic growth process of plant.
文摘Mutual information is widely used in medical image registration, because it does not require preprocessing the image. However, the local maximum problem in the registration is insurmountable. We combine mutual information and gradient information to solve this problem and apply it to the non-rigid deformation image registration. To improve the accuracy, we provide some implemental issues, for example, the Powell searching algorithm, gray interpolation and consideration of outlier points. The experimental results show the accuracy of the method and the feasibility in non-rigid medical image registration.
基金supported by the National Natural Science Foundation of China (7117114371201087)+1 种基金the Tianjin Municipal Research Program of Application Foundation and Advanced Technology of China (10JCY-BJC07300)the Science and Technology Program of FOXCONN Group (120024001156)
文摘Structural redundancy elimination in case resource pools (CRP) is critical for avoiding performance bottlenecks and maintaining robust decision capabilities in cloud computing services. For these purposes, this paper proposes a novel approach to ensure redundancy elimination of a reasoning system in CRP. By using α entropy and mutual information, functional measures to eliminate redundancy of a system are developed with respect to a set of outputs. These measures help to distinguish both the optimal feature and the relations among the nodes in reasoning networks from the redundant ones with the elimination criterion. Based on the optimal feature and its harmonic weight, a model for knowledge reasoning in CRP (CRPKR) is built to complete the task of query matching, and the missing values are estimated with Bayesian networks. Moreover, the robustness of decisions is verified through parameter analyses. This approach is validated by the simulation with benchmark data sets using cloud SQL. Compared with several state-of-the-art techniques, the results show that the proposed approach has a good performance and boosts the robustness of decisions.
基金ACKNOWLEDGEMENT This paper is supported by the Opening Project of State Key Laboratory for Novel Software Technology of Nanjing University, China (Grant No.KFKT2012B25) and National Science Foundation of China (Grant No.61303263).
文摘As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
基金Project supported by the National Natural Science Foundation ofChina (No. 60075007) and the National Basic Research Program(973) of China (No. G1998030401)
文摘Mutual information is an important information measure for feature subset. In this paper, a hashing mechanism is proposed to calculate the mutual information on the feature subset. Redundancy-synergy coefficient, a novel redundancy and synergy measure of features to express the class feature, is defined by mutual information. The information maximization rule was applied to derive the heuristic feature subset selection method based on mutual information and redundancy-synergy coefficient. Our experiment results showed the good performance of the new feature selection method.
文摘In this paper, the mutual information between clock-controlled input and output sequences is discussed. It is proved that the mutual information is a strictly monotone increasing function of the length of output sequence, and its divergent rate is gaven.
基金Work supported by the Second Stage of Brain Korea 21 Projects Work(2010-0020163) supported by the Priority Research Centers Program through the National Research Foundation (NRF) funded by the Ministry of Education,Science and Technology of Korea
文摘Fuzzy entropy was designed for non convex fuzzy membership function using well known Hamming distance measure.The proposed fuzzy entropy had the same structure as that of convex fuzzy membership case.Design procedure of fuzzy entropy was proposed by considering fuzzy membership through distance measure,and the obtained results contained more flexibility than the general fuzzy membership function.Furthermore,characteristic analyses for non convex function were also illustrated.Analyses on the mutual information were carried out through the proposed fuzzy entropy and similarity measure,which was also dual structure of fuzzy entropy.By the illustrative example,mutual information was discussed.
文摘The frame of text classification system was presented. The high dimensionality in feature space for text classification was studied. The mutual information is a widely used information theoretic measure, in a descriptive way, to measure the stochastic dependency of discrete random variables. The measure method was used as a criterion to reduce high dimensionality of feature vectors in text classification on Web. Feature selections or conversions were performed by using maximum mutual information including linear and non-linear feature conversions. Entropy was used and extended to find right features commendably in pattern recognition systems. Favorable foundation would be established for text classification mining.
基金supported by a grant(No.14DZ2292800,http://www.greengeo.net/)from“Technology Service Platform of Civil Engineering”of Science and Technology Commission of Shanghai Municipality.
文摘Underground pipeline networks constitute a major component of urban infrastructure,and thus,it is imperative to have an efficient mechanism to manage them.This study introduces a secondary development system to efficiently model underground pipeline networks,using the building information modeling(BIM)-based software Revit.The system comprises separate pipe point and tubulation models.Using a Revit application programming interface(API),the spatial position and attribute data of the pipe points are extracted from a pipeline database,and the corresponding tubulation data are extracted from a tubulation database.Using the Family class in Revit API,the cluster in the self-built library of pipe point is inserted into the spatial location and the attribute data is added;in the same way,all pipeline instances in the pipeline system are created.The extension and localization of the model accelerated the modeling speed.The system was then used in a real construction project.The expansion of the model database and rapid modeling made the application of BIM technology in three-dimensional visualization of underground pipeline networks more convenient.Furthermore,it has applications in pipeline engineering construction and management.
文摘In this paper, the temporal and spatial patterns of a diffusive predator-prey model with mutual interference under homogeneous Neumann boundary conditions were studied. Specifically, first, taking the intrinsic growth rate of the predator as the parameter, we give a computational and theoretical analysis of Hopf bifurcation on the positive equilibrium for the ODE system. As well, we have discussed the conditions for determining the bifurcation direction and the stability of the bifurcating periodic solutions.
基金supported by National Natural Science Foundation of China (No.60873231)Research Fund for the Doctoral Program of Higher Education (No.20093223120001)+2 种基金Science and Technology Support Program of Jiangsu Province (No.BE2009158)Natural Science Fund of Higher Education of Jiangsu Province(No.09KJB520010)Special Fund for Fast Sharing of Science Paper in Net Era by CSTD (No.2009117)
文摘It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.
基金supported by the Key Program of the National Natural Science Foundation of China (Grant No.50537030)the National Natural Science Foundation of China (Grant No.61072012)the Young Scientists Fund of the National Natural Science Foundation of China (Grant Nos.50907044,61104032,and 60901035)
文摘As a convenient approach to the characterization of cerebral cortex electrical information, electroencephalograph (EEG) has potential clinical application in monitoring the acupuncture effects. In this paper, a method composed of the mutual information method and Lempel-Ziv complexity method (MILZC) is proposed to investigate the effects of acupuncture on the complexity of information exchanges between different brain regions based on EEGs. In the experiments, eight subjects are manually acupunctured at 'Zusanli' acupuncture point (ST-36) with different frequencies (i.e., 50, 100, 150, and 200 times/min) and the EEGs are recorded simultaneously. First, MILZC values are compared in general. Then average brain connections are used to quantify the effectiveness of acupuncture under the above four frequencies. Finally, significance index P values are used to study the spatiality of the acupuncture effect on the brain. Three main findings are obtained: (i) MILZC values increase during the acupuncture; (ii) manual acupunctures (MAs) with 100 times/rain and 150 times/min are more effective than with 50 times/min and 200 times/rain; (iii) contralateral hemisphere activation is more prominent than ipsilateral hemisphere's. All these findings suggest that acupuncture contributes to the increase of brain information exchange complexity and the MILZC method can successfully describe these changes.