A new modular solution to the state explosion problem caused by the Markov-based modular solution of dynamic multiple-phased systems is proposed. First, the solution makes full use of the static parts of dynamic multi...A new modular solution to the state explosion problem caused by the Markov-based modular solution of dynamic multiple-phased systems is proposed. First, the solution makes full use of the static parts of dynamic multiple-phased systems and constructs cross-phase dynamic modules by combining the dynamic modules of phase fault trees. Secondly, the system binary decision diagram (BDD) from a modularized multiple- phased system (MPS)is generated by using variable ordering and BDD operations. The computational formulations of the BDD node event probability are derived for various node links and the system reliability results are figured out. Finally, a hypothetical multiple-phased system is given to demonstrate the advantages of the dynamic modular solution when the Markov state space and the size of the system BDD are reduced.展开更多
A 2GHz differentially tuned CMOS monolithic LC-VCO is designed and fabricated in a 0.18μm CMOS process. The VCO has a 16.15% tuning range (from 1. 8998 to 2. 2335GHz) through a combination of analog and digital tun...A 2GHz differentially tuned CMOS monolithic LC-VCO is designed and fabricated in a 0.18μm CMOS process. The VCO has a 16.15% tuning range (from 1. 8998 to 2. 2335GHz) through a combination of analog and digital tuning techniques (4-bit binary switch-capacitor array). The measured phase noise is - 118.17dBc/Hz at a 1MHz offset from a 2. 158GHz carrier. With the presented improved switch,the phase noise varies no more than 3dB at different digital control bits. The phase noise changes only by about 2dB in the tuning range because of the pn-junctions as the varactors. The VCO draws a current of about 2. lmA from a 1.8V power supply and works normally with a 1.5V power supply.展开更多
We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic binary sequences constructed using the Legendre symbol,both of which are derived from Fermat quotie...We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic binary sequences constructed using the Legendre symbol,both of which are derived from Fermat quotients modulo an odd prime p.If 2 is a primitive element modulo p2,the linear complexity equals to p2-p or p2-1,which is very close to the period and it is large enough for cryptographic purpose.展开更多
The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and ...The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and surface tensions of the mixtures decreased monotonously with increasing temperatures and increasing ionic liquid (IL) molar fraction. IL with longer alkyl side-chain length brings a lower density and a smaller surface tension to the ILs/H2SO4 binary mixtures. The densities and surface tensions of the mixtures are fitted well by Jouyban-Acree (JAM) model and LWW model respectively. Redlich-Kister (R-K)equation and modified Redlich-Kister (R-K) equation describe the excess molar volumes and excess surface tensions of the mixtures well respectively. Adding a small amount of ILs (XIL 〈 0.1 ) into sulfuric acid brings an obvious decrease to the density and the surface tension. The results imply that the densities and surface tensions of IL5/H2SO4 binary mixtures can be modulated by changing the IL dosage or tailoring the IL structure.展开更多
Linear complexity and k-error linear complexity of the stream cipher are two important standards to scale the randomicity of keystreams. For the 2n -periodicperiodic binary sequence with linear complexity 2n 1and k = ...Linear complexity and k-error linear complexity of the stream cipher are two important standards to scale the randomicity of keystreams. For the 2n -periodicperiodic binary sequence with linear complexity 2n 1and k = 2,3,the number of sequences with given k-error linear complexity and the expected k-error linear complexity are provided. Moreover,the proportion of the sequences whose k-error linear complexity is bigger than the expected value is analyzed.展开更多
In orthogonal frequency division multiplexing (OFDM) based multihop communications, the conventional decodeand-forward (DF) relay scheme severely suffers from the error propagation problem. This drawback is seriou...In orthogonal frequency division multiplexing (OFDM) based multihop communications, the conventional decodeand-forward (DF) relay scheme severely suffers from the error propagation problem. This drawback is serious in multihop networks as errors made by any relay node may fail the decoder at the destination in great chance. In this paper, we propose a bit error rate (BER) modified DF protocol (BMDF) which can be applied to systems where error correction channel coding and M-ary modulation are used. By modeling all links except the last one as a binary symmetric channel (BSC), we derive a log likelihood ratio (LLR) modification function relying only on the accumulated BER of all previous links to be applied to the output of the soft demapper. Furthermore, to reduce the computational complexity and signaling overhead, the modification function is simplified from its original exponential expression and less BERs are delivered between nodes by making successive subcarriers share the same BER. In addition, for situations where the channel state information (CSI) of forward link is available, the proposed BMDF can be further enhanced by combining with subcarrier pairing (SP) and power allocation (PA), where a sorted-channel gain SP scheme and a greedy PA algorithm are proposed. The simulation results verify thesignificant performance improvement to the conventional DF.展开更多
Fully homomorphic encryption is faced with two problems now. One is candidate fully homomorphic encryption schemes are few. Another is that the efficiency of fully homomorphic encryption is a big question. In this pap...Fully homomorphic encryption is faced with two problems now. One is candidate fully homomorphic encryption schemes are few. Another is that the efficiency of fully homomorphic encryption is a big question. In this paper, we propose a fully homomorphic encryption scheme based on LWE, which has better key size. Our main contributions are: (1) According to the binary-LWE recently, we choose secret key from binary set and modify the basic encryption scheme proposed in Linder and Peikert in 2010. We propose a fully homomorphic encryption scheme based on the new basic encryption scheme. We analyze the correctness and give the proof of the security of our scheme. The public key, evaluation keys and tensored ciphertext have better size in our scheme. (2) Estimating parameters for fully homomorphic encryption scheme is an important work. We estimate the concert parameters for our scheme. We compare these parameters between our scheme and Bral2 scheme. Our scheme have public key and private key that smaller by a factor of about logq than in Bral2 scheme. Tensored ciphertext in our scheme is smaller by a factor of about log2q than in Bral2 scheme. Key switching matrix in our scheme is smaller by a factor of about log3q than in Bra12 scheme.展开更多
The coupled Korteweg-de Vries (CKdV) equation with self-consistent sources (CKdVESCS) and its Lax representation are derived. We present a generalized binary Darboux transformation (GBDT) with an arbitrary time-...The coupled Korteweg-de Vries (CKdV) equation with self-consistent sources (CKdVESCS) and its Lax representation are derived. We present a generalized binary Darboux transformation (GBDT) with an arbitrary time- dependent function for the CKdVESCS as well as the formula for the N-times repeated GBDT. This GBDT provides non-auto-Biicklund transformation between two CKdVESCSs with different degrees of sources and enables us to construct more generM solutions with N arbitrary t-dependent functions. We obtain positon, negaton, complexiton, and negaton- positon solutions of the CKdVESCS.展开更多
Using the 1949-2007 western North Pacific tropical cyclones (TCs) best-track data archived at the Shanghai Typhoon Institute of China Meteorological Administration for the western North Pacific from 1949 to 2007,both ...Using the 1949-2007 western North Pacific tropical cyclones (TCs) best-track data archived at the Shanghai Typhoon Institute of China Meteorological Administration for the western North Pacific from 1949 to 2007,both the characteristics of binary and multiple TCs and samples of interactions among TCs and multi-TCs are identified and statistically analyzed.According to the various features of individual TC tracks and interacting tracks,seven distinct types are proposed to describe the binary system of TCs and their interaction samples.The mean trajectories of the west and east component of binary TCs in each type are obtained using a new cluster analysis technique.These types are then analyzed in terms of landfall process,occurrence seasonality,coexistent lifetime,especially the large-scale patterns of atmospheric circulation.Finally,typical steering flows and conceptual models of the binary TCs at different phases are established based on six-hourly flow maps of the binary system and the averages are determined of the mean steering flow of ten representative binary TCs.Then,typical steering flows and conceptual models at the beginning,middle and final phase in each type are established to describe the large-scale circulation patterns of the binary system interaction types.展开更多
Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically th...Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically the potential buffer overflow vulnerabilities in the binary code of software. The binary code was translated into assembly code without the lose of the information of string operation functions. The feature code abstract graph was constructed to generate more accurate constraint statements, and analyze the assembly code using the method of integer range constraint. After getting the elementary report on suspicious code where buffer overflows possibly happen, the control flow sensitive analysis using program dependence graph was done to decrease the rate of false positive. A prototype was implemented which demonstrates the feasibility and efficiency of the new approach.展开更多
For the magnetized fluidized bed(MFB)with the binary mixture of Geldart-B magnetizable and nonmagnetizable particles,the magnetically induced segregation between these two kinds of particles occurs at high magnetic fi...For the magnetized fluidized bed(MFB)with the binary mixture of Geldart-B magnetizable and nonmagnetizable particles,the magnetically induced segregation between these two kinds of particles occurs at high magnetic field intensities(H),leading to the deterioration of the fluidization quality.The critical intensity(H_(ms))above which such segregation commences varies with the gas velocity(U_g).This work focuses on establishing a segregation model to theoretically derive the H_(ms)–U_g relationship.In a magnetic field,the magnetizable particles form agglomerates.The magnetically induced segregation in essence refers to the size segregation of the binary mixture of agglomerates and nonmagnetizable particles.Consequently,the segregation model was established in two steps:first,the size of agglomerates(d_A)was calculated by the force balance model;then,the H_(ms)–U_g relationship was obtained by substituting the expression of d_Ainto the basic size segregation model for binary mixtures.As per the force balance model,the cohesive and collision forces were 1_2 orders of magnitude greater than the other forces exerted on the agglomerates.Therefore,the balance between these two forces largely determined d_A.The calculated d_A increased with increasing H and decreasing U_g,agreeing qualitatively with the experimental observation.The calculated H_(ms)–U_ g relationship agreed reasonably with the experimental data,indicating that the present segregation model could predict well the segregation behavior in the MFB with the binary mixture.展开更多
In the present letter, we get the appropriate bilinear forms of (2 + 1)-dimensional KdV equation, extended (2 + 1)-dimensional shallow water wave equation and (2 + 1)-dimensional Sawada -Kotera equation in a ...In the present letter, we get the appropriate bilinear forms of (2 + 1)-dimensional KdV equation, extended (2 + 1)-dimensional shallow water wave equation and (2 + 1)-dimensional Sawada -Kotera equation in a quick and natural manner, namely by appling the binary Bell polynomials. Then the Hirota direct method and Riemann theta function are combined to construct the periodic wave solutions of the three types nonlinear evolution equations. And the corresponding figures of the periodic wave solutions are given. Furthermore, the asymptotic properties of the periodic wave solutions indicate that the soliton solutions can be derived from the periodic wave solutions.展开更多
We propose a new integrated method which covers addition of any two signed digit numbers in all-optical domain. To implement this scheme we have exploited some photo-refractive characters of optical non-linear materia...We propose a new integrated method which covers addition of any two signed digit numbers in all-optical domain. To implement this scheme we have exploited some photo-refractive characters of optical non-linear materials,which may experience 0.1-0.2dB attenuation loss as silica is used as non-linear medium. Moreover,the attenuation loss may be reduced to 0.001 dB/m if we consider the use of slow light at 1.56μm.展开更多
A novel binary particle swarm optimization for frequent item sets mining from high-dimensional dataset(BPSO-HD) was proposed, where two improvements were joined. Firstly, the dimensionality reduction of initial partic...A novel binary particle swarm optimization for frequent item sets mining from high-dimensional dataset(BPSO-HD) was proposed, where two improvements were joined. Firstly, the dimensionality reduction of initial particles was designed to ensure the reasonable initial fitness, and then, the dynamically dimensionality cutting of dataset was built to decrease the search space. Based on four high-dimensional datasets, BPSO-HD was compared with Apriori to test its reliability, and was compared with the ordinary BPSO and quantum swarm evolutionary(QSE) to prove its advantages. The experiments show that the results given by BPSO-HD is reliable and better than the results generated by BPSO and QSE.展开更多
Recently, there has been a radial shift from traditional online social networks to content-generated social networks(CGSNs). Contemporary CGSNs, such as Dianping and Trip Advisor, are often the targets of click farmin...Recently, there has been a radial shift from traditional online social networks to content-generated social networks(CGSNs). Contemporary CGSNs, such as Dianping and Trip Advisor, are often the targets of click farming in which fake reviews are posted in order to boost or diminish the ratings of listed products and services simply through clicking. Click farming often emanates from a collection of multiple fake or compromised accounts, which we call click farmers. In this paper, we conduct a three-phase methodology to detect click farming. We begin by clustering communities based on newly-defined collusion networks. We then apply the Louvain community detection method to detecting communities. We finally perform a binary classification on detected-communities. Our results of over a year-long study show that(1) the prevalence of click farming is different across CGSNs;(2) most click farmers are lowly-rated;(3) click-farming communities have relatively tight relations between users;(4) more highly-ranked stores have a greater portion of fake reviews.展开更多
The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted sl...The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted slags were characterized by X-ray diffraction(XRD),scanning electron microscopy(SEM),energy-dispersive X-ray spectroscopy,and thermogravimetric(TG)analysis.The XRD analysis revealed that hydrosoluble mischcrystal K2Ca2(SO4)3was obtained by ion exchange of Ca^2+ in CaSO4 and K^+ in KAlSi3O8.Meanwhile,the intermediate product,SiO2,separated from KAl Si3O8and reacted with CaSO4to decompose CaSO4.The SEM results showed that some blowholes emerged on the surface of the CaSO4particles when they reacted with SiO2at 1200℃,which indicates that SO2and O2gases were released from CaSO4.The TG curves displayed that pure CaSO4could not be decomposed below 1200℃,while the mixture of K-feldspar ore and CaSO4began to lose weight at 1000℃.The extraction rate of potassium and decomposition rate of CaSO4were 62%and 44%,respectively,at a mass ratio of CaSO4to K-feldspar ore of 3:1,temperature of 1200℃,tablet-forming pressure of6 MPa,and roasting time of 2 h.The decomposition of CaSO4reduced the potassium extraction rate;therefore,the required amount of CaSO4was more than the theoretical amount.However,excess CaSO4was also undesirable for the potassium extraction reaction because a massive amount of SO2and O2gas were derived from the decomposition of CaSO4,which provided poor contact between the reactants.The SO2released from CaSO4decomposition can be effectively recycled.展开更多
Based on stochastic optimization strategy, a formulation methodology is proposed for synthesizing distillation column sequences, allowing more than one middle component as the distributing components between a pair of...Based on stochastic optimization strategy, a formulation methodology is proposed for synthesizing distillation column sequences, allowing more than one middle component as the distributing components between a pair of key components in the non-sharp split. In order to represent and manipulate the distillation configuration structures, a new coding procedure is proposed in the form of one-dimensional array. Theoretically, an array can represent any kind of split(non-sharp and sharp). With the application of a binary sort tree approach, a robust flow sheet encoding and decoding procedure is developed so that the problem formulation and solution becomes tractable. In this paper,the synthesis problem is formulated as a mixed-integer nonlinear programming(MINLP) problem and an improved simulated annealing approach is adopted to solve the optimization problem. Besides, a shortcut method is applied to the evaluation of all required design parameters as well as the total function.展开更多
基金The National Natural Science Foundation of China(No.60903011)the Natural Science Foundation of Jiangsu Province(No.BK2009267)
文摘A new modular solution to the state explosion problem caused by the Markov-based modular solution of dynamic multiple-phased systems is proposed. First, the solution makes full use of the static parts of dynamic multiple-phased systems and constructs cross-phase dynamic modules by combining the dynamic modules of phase fault trees. Secondly, the system binary decision diagram (BDD) from a modularized multiple- phased system (MPS)is generated by using variable ordering and BDD operations. The computational formulations of the BDD node event probability are derived for various node links and the system reliability results are figured out. Finally, a hypothetical multiple-phased system is given to demonstrate the advantages of the dynamic modular solution when the Markov state space and the size of the system BDD are reduced.
文摘A 2GHz differentially tuned CMOS monolithic LC-VCO is designed and fabricated in a 0.18μm CMOS process. The VCO has a 16.15% tuning range (from 1. 8998 to 2. 2335GHz) through a combination of analog and digital tuning techniques (4-bit binary switch-capacitor array). The measured phase noise is - 118.17dBc/Hz at a 1MHz offset from a 2. 158GHz carrier. With the presented improved switch,the phase noise varies no more than 3dB at different digital control bits. The phase noise changes only by about 2dB in the tuning range because of the pn-junctions as the varactors. The VCO draws a current of about 2. lmA from a 1.8V power supply and works normally with a 1.5V power supply.
基金the National Natural Science Foundation of China,the Open Funds of State Key Laboratory of Information Security (Chinese Academy of Sciences),the Program for New Century Excellent Talents in Fujian Province University
文摘We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic binary sequences constructed using the Legendre symbol,both of which are derived from Fermat quotients modulo an odd prime p.If 2 is a primitive element modulo p2,the linear complexity equals to p2-p or p2-1,which is very close to the period and it is large enough for cryptographic purpose.
基金Supported by the National Natural Science Foundation of China(21576168,21276163)
文摘The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and surface tensions of the mixtures decreased monotonously with increasing temperatures and increasing ionic liquid (IL) molar fraction. IL with longer alkyl side-chain length brings a lower density and a smaller surface tension to the ILs/H2SO4 binary mixtures. The densities and surface tensions of the mixtures are fitted well by Jouyban-Acree (JAM) model and LWW model respectively. Redlich-Kister (R-K)equation and modified Redlich-Kister (R-K) equation describe the excess molar volumes and excess surface tensions of the mixtures well respectively. Adding a small amount of ILs (XIL 〈 0.1 ) into sulfuric acid brings an obvious decrease to the density and the surface tension. The results imply that the densities and surface tensions of IL5/H2SO4 binary mixtures can be modulated by changing the IL dosage or tailoring the IL structure.
基金the National Natural Science Foundation of China (No.60373092).
文摘Linear complexity and k-error linear complexity of the stream cipher are two important standards to scale the randomicity of keystreams. For the 2n -periodicperiodic binary sequence with linear complexity 2n 1and k = 2,3,the number of sequences with given k-error linear complexity and the expected k-error linear complexity are provided. Moreover,the proportion of the sequences whose k-error linear complexity is bigger than the expected value is analyzed.
基金The authors would like to thank National Natural Science Foundation of China (No. 61072059).
文摘In orthogonal frequency division multiplexing (OFDM) based multihop communications, the conventional decodeand-forward (DF) relay scheme severely suffers from the error propagation problem. This drawback is serious in multihop networks as errors made by any relay node may fail the decoder at the destination in great chance. In this paper, we propose a bit error rate (BER) modified DF protocol (BMDF) which can be applied to systems where error correction channel coding and M-ary modulation are used. By modeling all links except the last one as a binary symmetric channel (BSC), we derive a log likelihood ratio (LLR) modification function relying only on the accumulated BER of all previous links to be applied to the output of the soft demapper. Furthermore, to reduce the computational complexity and signaling overhead, the modification function is simplified from its original exponential expression and less BERs are delivered between nodes by making successive subcarriers share the same BER. In addition, for situations where the channel state information (CSI) of forward link is available, the proposed BMDF can be further enhanced by combining with subcarrier pairing (SP) and power allocation (PA), where a sorted-channel gain SP scheme and a greedy PA algorithm are proposed. The simulation results verify thesignificant performance improvement to the conventional DF.
基金The first author would like to thank for the Fund of Jiangsu Innovation Program for Graduate Education,the Fundamental Research Funds for the Central Universities,and Ningbo Natural Science Foundation,the Chinese National Scholarship fund,and also appreciate the benefit to this work from projects in science and technique of Ningbo municipal.The third author would like to thank for Ningbo Natural Science Foundation
文摘Fully homomorphic encryption is faced with two problems now. One is candidate fully homomorphic encryption schemes are few. Another is that the efficiency of fully homomorphic encryption is a big question. In this paper, we propose a fully homomorphic encryption scheme based on LWE, which has better key size. Our main contributions are: (1) According to the binary-LWE recently, we choose secret key from binary set and modify the basic encryption scheme proposed in Linder and Peikert in 2010. We propose a fully homomorphic encryption scheme based on the new basic encryption scheme. We analyze the correctness and give the proof of the security of our scheme. The public key, evaluation keys and tensored ciphertext have better size in our scheme. (2) Estimating parameters for fully homomorphic encryption scheme is an important work. We estimate the concert parameters for our scheme. We compare these parameters between our scheme and Bral2 scheme. Our scheme have public key and private key that smaller by a factor of about logq than in Bral2 scheme. Tensored ciphertext in our scheme is smaller by a factor of about log2q than in Bral2 scheme. Key switching matrix in our scheme is smaller by a factor of about log3q than in Bra12 scheme.
基金The project supported by the National Fundamental Research Program of China(973 Program)under Grant No.2007CB814800National Natural Science Foundation of China under Grant No.10601028
文摘The coupled Korteweg-de Vries (CKdV) equation with self-consistent sources (CKdVESCS) and its Lax representation are derived. We present a generalized binary Darboux transformation (GBDT) with an arbitrary time- dependent function for the CKdVESCS as well as the formula for the N-times repeated GBDT. This GBDT provides non-auto-Biicklund transformation between two CKdVESCSs with different degrees of sources and enables us to construct more generM solutions with N arbitrary t-dependent functions. We obtain positon, negaton, complexiton, and negaton- positon solutions of the CKdVESCS.
基金National Natural Science Foundation of China (4100502941105065)National Public Benefit (Meteorology) Research Foundaton of China (GYHY201106004)
文摘Using the 1949-2007 western North Pacific tropical cyclones (TCs) best-track data archived at the Shanghai Typhoon Institute of China Meteorological Administration for the western North Pacific from 1949 to 2007,both the characteristics of binary and multiple TCs and samples of interactions among TCs and multi-TCs are identified and statistically analyzed.According to the various features of individual TC tracks and interacting tracks,seven distinct types are proposed to describe the binary system of TCs and their interaction samples.The mean trajectories of the west and east component of binary TCs in each type are obtained using a new cluster analysis technique.These types are then analyzed in terms of landfall process,occurrence seasonality,coexistent lifetime,especially the large-scale patterns of atmospheric circulation.Finally,typical steering flows and conceptual models of the binary TCs at different phases are established based on six-hourly flow maps of the binary system and the averages are determined of the mean steering flow of ten representative binary TCs.Then,typical steering flows and conceptual models at the beginning,middle and final phase in each type are established to describe the large-scale circulation patterns of the binary system interaction types.
文摘Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically the potential buffer overflow vulnerabilities in the binary code of software. The binary code was translated into assembly code without the lose of the information of string operation functions. The feature code abstract graph was constructed to generate more accurate constraint statements, and analyze the assembly code using the method of integer range constraint. After getting the elementary report on suspicious code where buffer overflows possibly happen, the control flow sensitive analysis using program dependence graph was done to decrease the rate of false positive. A prototype was implemented which demonstrates the feasibility and efficiency of the new approach.
基金Supported by the National Natural Science Foundation of China(21325628)the Major Research Plan of the National Natural Science Foundation of China(91334108)the Scientific Instrument Developing Project of the Chinese Academy of Sciences(YZ201641)
文摘For the magnetized fluidized bed(MFB)with the binary mixture of Geldart-B magnetizable and nonmagnetizable particles,the magnetically induced segregation between these two kinds of particles occurs at high magnetic field intensities(H),leading to the deterioration of the fluidization quality.The critical intensity(H_(ms))above which such segregation commences varies with the gas velocity(U_g).This work focuses on establishing a segregation model to theoretically derive the H_(ms)–U_g relationship.In a magnetic field,the magnetizable particles form agglomerates.The magnetically induced segregation in essence refers to the size segregation of the binary mixture of agglomerates and nonmagnetizable particles.Consequently,the segregation model was established in two steps:first,the size of agglomerates(d_A)was calculated by the force balance model;then,the H_(ms)–U_g relationship was obtained by substituting the expression of d_Ainto the basic size segregation model for binary mixtures.As per the force balance model,the cohesive and collision forces were 1_2 orders of magnitude greater than the other forces exerted on the agglomerates.Therefore,the balance between these two forces largely determined d_A.The calculated d_A increased with increasing H and decreasing U_g,agreeing qualitatively with the experimental observation.The calculated H_(ms)–U_ g relationship agreed reasonably with the experimental data,indicating that the present segregation model could predict well the segregation behavior in the MFB with the binary mixture.
基金Supported by the National Natural Science Foundation of China under Grant Nos.11075055,61021004,10735030Shanghai Leading Academic Discipline Project under Grant No.B412Program for Changjiang Scholars and Innovative Research Team in University(IRT0734)
文摘In the present letter, we get the appropriate bilinear forms of (2 + 1)-dimensional KdV equation, extended (2 + 1)-dimensional shallow water wave equation and (2 + 1)-dimensional Sawada -Kotera equation in a quick and natural manner, namely by appling the binary Bell polynomials. Then the Hirota direct method and Riemann theta function are combined to construct the periodic wave solutions of the three types nonlinear evolution equations. And the corresponding figures of the periodic wave solutions are given. Furthermore, the asymptotic properties of the periodic wave solutions indicate that the soliton solutions can be derived from the periodic wave solutions.
文摘We propose a new integrated method which covers addition of any two signed digit numbers in all-optical domain. To implement this scheme we have exploited some photo-refractive characters of optical non-linear materials,which may experience 0.1-0.2dB attenuation loss as silica is used as non-linear medium. Moreover,the attenuation loss may be reduced to 0.001 dB/m if we consider the use of slow light at 1.56μm.
文摘A novel binary particle swarm optimization for frequent item sets mining from high-dimensional dataset(BPSO-HD) was proposed, where two improvements were joined. Firstly, the dimensionality reduction of initial particles was designed to ensure the reasonable initial fitness, and then, the dynamically dimensionality cutting of dataset was built to decrease the search space. Based on four high-dimensional datasets, BPSO-HD was compared with Apriori to test its reliability, and was compared with the ordinary BPSO and quantum swarm evolutionary(QSE) to prove its advantages. The experiments show that the results given by BPSO-HD is reliable and better than the results generated by BPSO and QSE.
基金supported in part by the National Science Foundation of China,under Grants 71671114,61672350,and U1405251
文摘Recently, there has been a radial shift from traditional online social networks to content-generated social networks(CGSNs). Contemporary CGSNs, such as Dianping and Trip Advisor, are often the targets of click farming in which fake reviews are posted in order to boost or diminish the ratings of listed products and services simply through clicking. Click farming often emanates from a collection of multiple fake or compromised accounts, which we call click farmers. In this paper, we conduct a three-phase methodology to detect click farming. We begin by clustering communities based on newly-defined collusion networks. We then apply the Louvain community detection method to detecting communities. We finally perform a binary classification on detected-communities. Our results of over a year-long study show that(1) the prevalence of click farming is different across CGSNs;(2) most click farmers are lowly-rated;(3) click-farming communities have relatively tight relations between users;(4) more highly-ranked stores have a greater portion of fake reviews.
基金Supported by the National Key Research and Development Program(2016YFB0600904)Sichuan Province Science and Technology Project(2017GZ0377)Sichuan University Postdoctoral Research and Development Fund(2017SCU12017)
文摘The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted slags were characterized by X-ray diffraction(XRD),scanning electron microscopy(SEM),energy-dispersive X-ray spectroscopy,and thermogravimetric(TG)analysis.The XRD analysis revealed that hydrosoluble mischcrystal K2Ca2(SO4)3was obtained by ion exchange of Ca^2+ in CaSO4 and K^+ in KAlSi3O8.Meanwhile,the intermediate product,SiO2,separated from KAl Si3O8and reacted with CaSO4to decompose CaSO4.The SEM results showed that some blowholes emerged on the surface of the CaSO4particles when they reacted with SiO2at 1200℃,which indicates that SO2and O2gases were released from CaSO4.The TG curves displayed that pure CaSO4could not be decomposed below 1200℃,while the mixture of K-feldspar ore and CaSO4began to lose weight at 1000℃.The extraction rate of potassium and decomposition rate of CaSO4were 62%and 44%,respectively,at a mass ratio of CaSO4to K-feldspar ore of 3:1,temperature of 1200℃,tablet-forming pressure of6 MPa,and roasting time of 2 h.The decomposition of CaSO4reduced the potassium extraction rate;therefore,the required amount of CaSO4was more than the theoretical amount.However,excess CaSO4was also undesirable for the potassium extraction reaction because a massive amount of SO2and O2gas were derived from the decomposition of CaSO4,which provided poor contact between the reactants.The SO2released from CaSO4decomposition can be effectively recycled.
基金Supported by the 973 Program of China(2012CB720503)the Open Research Project of State Kay Laboratory of Chemical Engineering(SKL-Ch E-13B02)
文摘Based on stochastic optimization strategy, a formulation methodology is proposed for synthesizing distillation column sequences, allowing more than one middle component as the distributing components between a pair of key components in the non-sharp split. In order to represent and manipulate the distillation configuration structures, a new coding procedure is proposed in the form of one-dimensional array. Theoretically, an array can represent any kind of split(non-sharp and sharp). With the application of a binary sort tree approach, a robust flow sheet encoding and decoding procedure is developed so that the problem formulation and solution becomes tractable. In this paper,the synthesis problem is formulated as a mixed-integer nonlinear programming(MINLP) problem and an improved simulated annealing approach is adopted to solve the optimization problem. Besides, a shortcut method is applied to the evaluation of all required design parameters as well as the total function.