The pedestrian timing at signalized intersections is studied aiming at the problems of the inconsistency of the vehicular and pedestrian timing requirements and the insufficiency of pedestrian clearance. Based on the ...The pedestrian timing at signalized intersections is studied aiming at the problems of the inconsistency of the vehicular and pedestrian timing requirements and the insufficiency of pedestrian clearance. Based on the formulae of WALK and flashing DON'T WALK (FDW) in the highway capacity manual (HCM), the relationship between pedestrian signal indications and vehicular signal indications is discussed using the theory of traffic flow. Then, methods of pedestrian timing for different cases are established, particularly the methods of the pedestrian green adjustment. Ways of pedestrian crossing are analyzed for roadways with different forms and widths of the median island. The sampling values of calculation parameters are studied, and the recommended formulae of pedestrian timing for different conditions are presented.展开更多
Research about the auto commuter's pre-trip route choice behavior ignores the combined influence of the real-time information and all respondents' historical information in the existing documents.To overcome this sh...Research about the auto commuter's pre-trip route choice behavior ignores the combined influence of the real-time information and all respondents' historical information in the existing documents.To overcome this shortcoming,an approach to describing the pre-trip route choice behavior with the incorporation of the real-time and historical information is proposed.Two types of real-time information are investigated,which are quantitative information and prescriptive information.By using the bounded rationality theory,the influence of historical information on the real-time information reference process is examined first.Estimation results show that the historical information has a significant influence on the quantitative information reference process,but not on the prescriptive information reference process.Then the route choice behavior is modeled.A comparison is also made among three route choice models,one of which does not incorporate the real-time information reference process,while the others do.Estimation results show that the route choice behavior is better described with the consideration of the reference process of both quantitative and prescriptive information.展开更多
A mine-used multi-function serial signal converter is introduced.This converter is based on Ethernet.The core of this design is embedded microprocessor STM32F107VCT6.Embedded operation system μC/OS-Ⅱ is transplanted...A mine-used multi-function serial signal converter is introduced.This converter is based on Ethernet.The core of this design is embedded microprocessor STM32F107VCT6.Embedded operation system μC/OS-Ⅱ is transplanted into this converter,and light-weight Internet protocal (LwIP) stack is also embedded to realize mutual conversion of serial signals such as meter bus (M-Bus) signal,RS485 signal,RS232 signal and Ethernet signal.Interconnection between all kinds of monitoring system interfaces under coal mine can be formed easily,which can solve compatibility problem between monitoring system and communication system and improve overall performance of safety monitoring system.The designed multi-function serial signal converter is of great value for application,which is worthy to be popularized in coal mine safety production.展开更多
Based on the questionnaires and interviews on 19 college English teachers of a university in Beijing, the paper discusses college English teachers' beliefs. Through the analysis of research results, the paper focuses...Based on the questionnaires and interviews on 19 college English teachers of a university in Beijing, the paper discusses college English teachers' beliefs. Through the analysis of research results, the paper focuses on the following questions: (1) What are the core beliefs of college English teachers? (2) What influence will the teachers' beliefs exert on teaching behaviors? (3) Will the teachers' beliefs change? If the answer is YES, how will they change and what is the source of the changes? The exploratory results and findings can help college English teachers realize the importance of teachers' beliefs, through which can help them improve their teaching practices and foster their professional development.展开更多
Design and fabrication of a parallel optical transmitter are reported. The optimized 12 channel parallel optical transmitter,with each channel's data rate up to 3Gbit/s,is designed, assembled, and measured. A top-emi...Design and fabrication of a parallel optical transmitter are reported. The optimized 12 channel parallel optical transmitter,with each channel's data rate up to 3Gbit/s,is designed, assembled, and measured. A top-emitting 850nm vertical cavity surface emitting laser(VCSEL) array is adopted as the light source,and the VCSEL chip is directly wire bonded to a 12 channel driver IC. The outputs of the VCSEL array are directly butt coupled into a 12 channel fiber array. Small form factor pluggable (SFP) packaging technology is used in the module to support hot pluggable in application. The performance results of the module are demonstrated. At an operating current of 8mA, an eye diagram at 3Gbit/s is achieved with an optical output of more than 1mW.展开更多
To improve the forecasting reliability of travel time, the time-varying confidence interval of travel time on arterials is forecasted using an autoregressive integrated moving average and generalized autoregressive co...To improve the forecasting reliability of travel time, the time-varying confidence interval of travel time on arterials is forecasted using an autoregressive integrated moving average and generalized autoregressive conditional heteroskedasticity (ARIMA-GARCH) model. In which, the ARIMA model is used as the mean equation of the GARCH model to model the travel time levels and the GARCH model is used to model the conditional variances of travel time. The proposed method is validated and evaluated using actual traffic flow data collected from the traffic monitoring system of Kunshan city. The evaluation results show that, compared with the conventional ARIMA model, the proposed model cannot significantly improve the forecasting performance of travel time levels but has advantage in travel time volatility forecasting. The proposed model can well capture the travel time heteroskedasticity and forecast the time-varying confidence intervals of travel time which can better reflect the volatility of observed travel times than the fixed confidence interval provided by the ARIMA model.展开更多
In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chanc...In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.展开更多
In an industrial computer control system, if a communication with a single chip computer built with the aid of serial port I/O ports can be got easily to connect with equipment. Meanwhile, the system reliability would...In an industrial computer control system, if a communication with a single chip computer built with the aid of serial port I/O ports can be got easily to connect with equipment. Meanwhile, the system reliability would be improved and the system cost would be reduced.To save ±15 V power supply and electrical level convert circuit,the author provide a simple interface circuit and operational procedure between PC and the single chip computer in this paper. The application of multithread is introduced and the advantages of data acquisition and processing with multithread are also analyzed.展开更多
For studying the law of pedestrian cross-time in the signalized intersection, based on gap theory, a probability chorological discipline model of crossing pedestrians is built based on the observed data. Moreover, the...For studying the law of pedestrian cross-time in the signalized intersection, based on gap theory, a probability chorological discipline model of crossing pedestrians is built based on the observed data. Moreover, the number of pedestrians passing through in a critical gap is estimated under different conditions by three models. Then the models of pedestrian crosswalk average time, the 85th percentile pedestrian cross-time and the 90th percentile pedestrian cross-time are deduced. By quantitative analyses and the exemplification of the models, the main correlative factors acting on pedestrian cross-time are found, including the length of the crosswalk, the probability of the time-headway being less than the critical gap and the number of the turned motor vehicles in the intersection. The results indicate that the estimated errors of the models are less than 5%.展开更多
This article uses discriminant sampling method to select 1062 small and micro enterprises from 25 provinces in China. Researches were conducted on their credit demand and credit behavior, with the Probit model to carr...This article uses discriminant sampling method to select 1062 small and micro enterprises from 25 provinces in China. Researches were conducted on their credit demand and credit behavior, with the Probit model to carry out metrologic tests on influential factors of these enterprises' credit demand and credit behavior.The metrologic analysis shows: Literacy level of leader, asset size, annual revenue of the enterprises have significantly positive effects on the credit demand of these small and micro enterprises. Annual revenue has significantly negative influence on overall credit behavior and the occurrence of informal financial behavior, but significantly positive influence on the occurrence of formal financial behavior. Literacy level of staff and asset size of enterprises have significantly positive influence on the occurrence of the overall credit behavior of small and micro enterprises.展开更多
Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like Chi...Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like China,it is an important fundamental supporting technology worth researching. China is in the international forefront in the field of trusted computing. This paper gives comprehensive introductions to the new development and application of key technologies in trusted computing,such as various trusted platform modules(TPM、TCM、TPCM),TCG Software Stack(TSS),trusted cloud server and Trusted Execution Environment(TEE). We illustrate the progressing and application extension of these technologies and also point out some key problems worth studying in the future.展开更多
This paper introduces the Chinese"Dove"——A practical application system of bird-mimetic air vehicles developed for more than a decade by the Institute of Flight Vehicle Innovation of Northwest Polytechnic ...This paper introduces the Chinese"Dove"——A practical application system of bird-mimetic air vehicles developed for more than a decade by the Institute of Flight Vehicle Innovation of Northwest Polytechnic University(NWPU)in China.Firstly,the main components,flight capability and flight verification of the Chinese"Dove"are presented.Then,the methods for the aerodynamic simulation and wind tunnel experiments are put forward.Secondly,the design of high-lift and high-thrust flexible flapping wings,a series of flapping mechanisms,gust-resistance layout and micro flight control/navigation system are presented.Some future studies on the application system of bionic micro air vehicles are given,including observation of natural flight creatures,aerodynamics in flight,mechanical and new material driving systems,structural mechanics,flight mechanics,and the information perception and intelligent decision-making control,which are related to research of flight bioinformatic perception and brain science.Finally,some application examples of complex flapping movements,active/passive deformation of bird wings,new low-energy motion-driven system,bionic intelligent decision-making and control/navigation are discussed.展开更多
Advanced traveler information systems (ATIS) can not only improve drivers' accessibility to the more accurate route travel time information, but also can improve drivers' adaptability to the stochastic network cap...Advanced traveler information systems (ATIS) can not only improve drivers' accessibility to the more accurate route travel time information, but also can improve drivers' adaptability to the stochastic network capacity degradations. In this paper, a mixed stochastic user equilibrium model was proposed to describe the interactive route choice behaviors between ATIS equipped and unequipped drivers on a degradable transport network. In the proposed model the information accessibility of equipped drivers was reflected by lower degree of uncertainty in their stochastic equilibrium flow distributions, and their behavioral adaptability was captured by multiple equilibrium behaviors over the stochastic network state set. The mixed equilibrium model was formulated as a fixed point problem defined in the mixed route flows, and its solution was achieved by executing an iterative algorithm. Numerical experiments were provided to verify the properties of the mixed network equilibrium model and the efficiency of the iterative algorithm.展开更多
This article brings forward the conception of potential and filed potential in bank's competition under the inspiration of law of electric current in electrodynamics. It discusses the impact of potential shifting ...This article brings forward the conception of potential and filed potential in bank's competition under the inspiration of law of electric current in electrodynamics. It discusses the impact of potential shifting on commercial bank's credit scale and builds up a model for commercial bank to control the scale by credit pricing and risk policy in a dynamic way, and also gives some advice to domestic commercial bank for improving loan business, aiming to settle down the existing credit management problems.展开更多
In this paper, we propose and experimentally demonstrate a bi-directional indoor communication system based on visible light RGB-LED. Spectrally efficient modulation formats (QAM-OFDM), advanced digital signal proce...In this paper, we propose and experimentally demonstrate a bi-directional indoor communication system based on visible light RGB-LED. Spectrally efficient modulation formats (QAM-OFDM), advanced digital signal processing, pre- and post- equalization are adopted to compensate the severe frequency response of indoor channel. In this system, we utilize red-green-blue Light emitting diodes (LEDs), of which each color can be used to carry different signals. For downlink, the low frequencies of each color are used while for uplink, the high frequencies are used. The overall data rate of downlink and uplink are 1.15-Gb/s and 300-Mb/s. The bit error ratios (BERs) for all channels after 0.7 m indoor delivery are below pre-forward- error-correction (pre-FEC) threshold of 3.8×10-3. To the best of our knowledge, this is the highest data rate in bi-directional visible light communication system.展开更多
In this letter,a novel algorithm is proposed for identification of one popular type of VoIP(Voice over IP) application,MSN VoIP,based on both behavior pattern and protocol characteristics.In addition,the experiment fo...In this letter,a novel algorithm is proposed for identification of one popular type of VoIP(Voice over IP) application,MSN VoIP,based on both behavior pattern and protocol characteristics.In addition,the experiment for validation is implemented.Since there exists no method identifying MSN VoIP session and furthermore the IP addresses,domain names,ports and even the protocols MSNP works over,are all alterable during the application,which makes it difficult to identify MSN VoIP session,this work will be helpful to advance the research on VoIP identification.展开更多
This is the final of a three-part series of papers which mainly discusses the implementation issues of the CRNM. The first two papers in the series have introduced the modeling background and methodology, respectively...This is the final of a three-part series of papers which mainly discusses the implementation issues of the CRNM. The first two papers in the series have introduced the modeling background and methodology, respectively. An overall architecture of the CRNM has been proposed in the last paper. On the basis of the above discusses, a linear reference method (LRM) for providing spatial references for location points of a trajectory is developed. A case study is introduced to illustrate the application of the CRNM for modeling a road network in the real world is given. A comprehensive conclusion is given for the series of papers.展开更多
基金The National Natural Science Foundation of China(No50378016)
文摘The pedestrian timing at signalized intersections is studied aiming at the problems of the inconsistency of the vehicular and pedestrian timing requirements and the insufficiency of pedestrian clearance. Based on the formulae of WALK and flashing DON'T WALK (FDW) in the highway capacity manual (HCM), the relationship between pedestrian signal indications and vehicular signal indications is discussed using the theory of traffic flow. Then, methods of pedestrian timing for different cases are established, particularly the methods of the pedestrian green adjustment. Ways of pedestrian crossing are analyzed for roadways with different forms and widths of the median island. The sampling values of calculation parameters are studied, and the recommended formulae of pedestrian timing for different conditions are presented.
基金The Scientific Research Innovation Project for College Graduates in Jiangsu Province(No.CX10B_071Z)the National High Technology Research and Development Program of China(863 Program)(No.2011AA110304)
文摘Research about the auto commuter's pre-trip route choice behavior ignores the combined influence of the real-time information and all respondents' historical information in the existing documents.To overcome this shortcoming,an approach to describing the pre-trip route choice behavior with the incorporation of the real-time and historical information is proposed.Two types of real-time information are investigated,which are quantitative information and prescriptive information.By using the bounded rationality theory,the influence of historical information on the real-time information reference process is examined first.Estimation results show that the historical information has a significant influence on the quantitative information reference process,but not on the prescriptive information reference process.Then the route choice behavior is modeled.A comparison is also made among three route choice models,one of which does not incorporate the real-time information reference process,while the others do.Estimation results show that the route choice behavior is better described with the consideration of the reference process of both quantitative and prescriptive information.
文摘A mine-used multi-function serial signal converter is introduced.This converter is based on Ethernet.The core of this design is embedded microprocessor STM32F107VCT6.Embedded operation system μC/OS-Ⅱ is transplanted into this converter,and light-weight Internet protocal (LwIP) stack is also embedded to realize mutual conversion of serial signals such as meter bus (M-Bus) signal,RS485 signal,RS232 signal and Ethernet signal.Interconnection between all kinds of monitoring system interfaces under coal mine can be formed easily,which can solve compatibility problem between monitoring system and communication system and improve overall performance of safety monitoring system.The designed multi-function serial signal converter is of great value for application,which is worthy to be popularized in coal mine safety production.
文摘Based on the questionnaires and interviews on 19 college English teachers of a university in Beijing, the paper discusses college English teachers' beliefs. Through the analysis of research results, the paper focuses on the following questions: (1) What are the core beliefs of college English teachers? (2) What influence will the teachers' beliefs exert on teaching behaviors? (3) Will the teachers' beliefs change? If the answer is YES, how will they change and what is the source of the changes? The exploratory results and findings can help college English teachers realize the importance of teachers' beliefs, through which can help them improve their teaching practices and foster their professional development.
文摘Design and fabrication of a parallel optical transmitter are reported. The optimized 12 channel parallel optical transmitter,with each channel's data rate up to 3Gbit/s,is designed, assembled, and measured. A top-emitting 850nm vertical cavity surface emitting laser(VCSEL) array is adopted as the light source,and the VCSEL chip is directly wire bonded to a 12 channel driver IC. The outputs of the VCSEL array are directly butt coupled into a 12 channel fiber array. Small form factor pluggable (SFP) packaging technology is used in the module to support hot pluggable in application. The performance results of the module are demonstrated. At an operating current of 8mA, an eye diagram at 3Gbit/s is achieved with an optical output of more than 1mW.
基金The National Natural Science Foundation of China(No.51108079)
文摘To improve the forecasting reliability of travel time, the time-varying confidence interval of travel time on arterials is forecasted using an autoregressive integrated moving average and generalized autoregressive conditional heteroskedasticity (ARIMA-GARCH) model. In which, the ARIMA model is used as the mean equation of the GARCH model to model the travel time levels and the GARCH model is used to model the conditional variances of travel time. The proposed method is validated and evaluated using actual traffic flow data collected from the traffic monitoring system of Kunshan city. The evaluation results show that, compared with the conventional ARIMA model, the proposed model cannot significantly improve the forecasting performance of travel time levels but has advantage in travel time volatility forecasting. The proposed model can well capture the travel time heteroskedasticity and forecast the time-varying confidence intervals of travel time which can better reflect the volatility of observed travel times than the fixed confidence interval provided by the ARIMA model.
基金supported by the Program for Changjiang Scholars and Innovative Research Team in University (IRT1078)the Key Program of NSFC-Guangdong Union Foundation (U1135002)+3 种基金the Major national S&T program(2012ZX03002003)the Fundamental Research Funds for the Central Universities(JY10000903001)the National Natural Sci ence Foundation of China (Grant No. 61363068, 61100233)the Natural Science Foundation of Shaanxi Province (Grant No. 2012JM8030, 2011JQ8003)
文摘In the harsh environment where n ode density is sparse, the slow-moving nodes cannot effectively utilize the encountering opportunities to realize the self-organized identity authentications, and do not have the chance to join the network routing. However, considering m ost of the communications in opportunistic networks are caused by forwarding operations, there is no need to establish the complete mutual authentications for each conversation. Accordingly, a novel trust management scheme is presented based on the information of behavior feedback, in order to complement the insufficiency of identity authentications. By utilizing the certificate chains based on social attributes, the mobile nodes build the local certificate graphs gradually to realize the web of "Identity Trust" relationship. Meanwhile, the successors generate Verified Feedback Packets for each positive behavior, and consequently the "Behavior Trust" relationship is formed for slow-moving nodes. Simulation result shows that, by implementing our trust scheme, the d elivery probability and trust reconstruction ratio can be effectively improved when there are large numbers of compromised nodes, and it means that our trust management scheme can efficiently explore and filter the trust nodes for secure forwarding in opportunistic networks.
文摘In an industrial computer control system, if a communication with a single chip computer built with the aid of serial port I/O ports can be got easily to connect with equipment. Meanwhile, the system reliability would be improved and the system cost would be reduced.To save ±15 V power supply and electrical level convert circuit,the author provide a simple interface circuit and operational procedure between PC and the single chip computer in this paper. The application of multithread is introduced and the advantages of data acquisition and processing with multithread are also analyzed.
基金The National Natural Science Foundation of China(No.50778141)the National Basic Research Program of China(973Program)(No.2006CB705505)National Key Technology R&D Program during the11th Five Year Plan of China(No.2006BAJ18B07)
文摘For studying the law of pedestrian cross-time in the signalized intersection, based on gap theory, a probability chorological discipline model of crossing pedestrians is built based on the observed data. Moreover, the number of pedestrians passing through in a critical gap is estimated under different conditions by three models. Then the models of pedestrian crosswalk average time, the 85th percentile pedestrian cross-time and the 90th percentile pedestrian cross-time are deduced. By quantitative analyses and the exemplification of the models, the main correlative factors acting on pedestrian cross-time are found, including the length of the crosswalk, the probability of the time-headway being less than the critical gap and the number of the turned motor vehicles in the intersection. The results indicate that the estimated errors of the models are less than 5%.
基金subsidized by Ministry of Education Humanities and Social Sciences Planning Fund(11YJA790146) "Coordinated Development of Urban and Rural Finance Research in Dual Economic Structure"Southwestern University Research Funds for the Central Universities Special Funds for Basic Items(SWU1009002) "Coordinated Development of Theoretical Research in Dual Economic Structure in Rural Finance"+1 种基金Chongqing talents project "Chongqing Urban and Rural Finance Coordination development Research"National Social Science Fund Project (12CJY062) "Construction of Rural Supporting Financial Systems and Innovation Research",national Social Science Fund Project(10BJY082) "Rural Microfinance Institutions Innovation and Risk Control Study" and "Statistics First-level Discipline and Doctoral Discipline Construction Funds in Southwestern University"
文摘This article uses discriminant sampling method to select 1062 small and micro enterprises from 25 provinces in China. Researches were conducted on their credit demand and credit behavior, with the Probit model to carry out metrologic tests on influential factors of these enterprises' credit demand and credit behavior.The metrologic analysis shows: Literacy level of leader, asset size, annual revenue of the enterprises have significantly positive effects on the credit demand of these small and micro enterprises. Annual revenue has significantly negative influence on overall credit behavior and the occurrence of informal financial behavior, but significantly positive influence on the occurrence of formal financial behavior. Literacy level of staff and asset size of enterprises have significantly positive influence on the occurrence of the overall credit behavior of small and micro enterprises.
基金supported by the National Natural Science Foundation of China (Grant NO.61332019, NO.61402342, NO.61202387)the National Basic Research Program of China ("973" Program) (Grant No.2014CB340600)the National High–Tech Research and Development Program of China ("863" Program) (Grant No.2015AA016002)
文摘Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network construction like China,it is an important fundamental supporting technology worth researching. China is in the international forefront in the field of trusted computing. This paper gives comprehensive introductions to the new development and application of key technologies in trusted computing,such as various trusted platform modules(TPM、TCM、TPCM),TCG Software Stack(TSS),trusted cloud server and Trusted Execution Environment(TEE). We illustrate the progressing and application extension of these technologies and also point out some key problems worth studying in the future.
基金supported by the National Key Research and Development Program of China(No.2017YFB1300102)the National Natural Science Foundation of China(No.U1613227)。
文摘This paper introduces the Chinese"Dove"——A practical application system of bird-mimetic air vehicles developed for more than a decade by the Institute of Flight Vehicle Innovation of Northwest Polytechnic University(NWPU)in China.Firstly,the main components,flight capability and flight verification of the Chinese"Dove"are presented.Then,the methods for the aerodynamic simulation and wind tunnel experiments are put forward.Secondly,the design of high-lift and high-thrust flexible flapping wings,a series of flapping mechanisms,gust-resistance layout and micro flight control/navigation system are presented.Some future studies on the application system of bionic micro air vehicles are given,including observation of natural flight creatures,aerodynamics in flight,mechanical and new material driving systems,structural mechanics,flight mechanics,and the information perception and intelligent decision-making control,which are related to research of flight bioinformatic perception and brain science.Finally,some application examples of complex flapping movements,active/passive deformation of bird wings,new low-energy motion-driven system,bionic intelligent decision-making and control/navigation are discussed.
基金Projects(51378119,51578150)supported by the National Natural Science Foundation of China
文摘Advanced traveler information systems (ATIS) can not only improve drivers' accessibility to the more accurate route travel time information, but also can improve drivers' adaptability to the stochastic network capacity degradations. In this paper, a mixed stochastic user equilibrium model was proposed to describe the interactive route choice behaviors between ATIS equipped and unequipped drivers on a degradable transport network. In the proposed model the information accessibility of equipped drivers was reflected by lower degree of uncertainty in their stochastic equilibrium flow distributions, and their behavioral adaptability was captured by multiple equilibrium behaviors over the stochastic network state set. The mixed equilibrium model was formulated as a fixed point problem defined in the mixed route flows, and its solution was achieved by executing an iterative algorithm. Numerical experiments were provided to verify the properties of the mixed network equilibrium model and the efficiency of the iterative algorithm.
文摘This article brings forward the conception of potential and filed potential in bank's competition under the inspiration of law of electric current in electrodynamics. It discusses the impact of potential shifting on commercial bank's credit scale and builds up a model for commercial bank to control the scale by credit pricing and risk policy in a dynamic way, and also gives some advice to domestic commercial bank for improving loan business, aiming to settle down the existing credit management problems.
基金supported by the NNSF of China(No.61177071, No.61250018)the Key Program of Shanghai Science and Technology Association (12dz1143000)
文摘In this paper, we propose and experimentally demonstrate a bi-directional indoor communication system based on visible light RGB-LED. Spectrally efficient modulation formats (QAM-OFDM), advanced digital signal processing, pre- and post- equalization are adopted to compensate the severe frequency response of indoor channel. In this system, we utilize red-green-blue Light emitting diodes (LEDs), of which each color can be used to carry different signals. For downlink, the low frequencies of each color are used while for uplink, the high frequencies are used. The overall data rate of downlink and uplink are 1.15-Gb/s and 300-Mb/s. The bit error ratios (BERs) for all channels after 0.7 m indoor delivery are below pre-forward- error-correction (pre-FEC) threshold of 3.8×10-3. To the best of our knowledge, this is the highest data rate in bi-directional visible light communication system.
基金the Hi-Tech R&D Program (863) of China (2006AA01Z444)the National Natural Science Foundation of China (No.60773140)
文摘In this letter,a novel algorithm is proposed for identification of one popular type of VoIP(Voice over IP) application,MSN VoIP,based on both behavior pattern and protocol characteristics.In addition,the experiment for validation is implemented.Since there exists no method identifying MSN VoIP session and furthermore the IP addresses,domain names,ports and even the protocols MSNP works over,are all alterable during the application,which makes it difficult to identify MSN VoIP session,this work will be helpful to advance the research on VoIP identification.
文摘This is the final of a three-part series of papers which mainly discusses the implementation issues of the CRNM. The first two papers in the series have introduced the modeling background and methodology, respectively. An overall architecture of the CRNM has been proposed in the last paper. On the basis of the above discusses, a linear reference method (LRM) for providing spatial references for location points of a trajectory is developed. A case study is introduced to illustrate the application of the CRNM for modeling a road network in the real world is given. A comprehensive conclusion is given for the series of papers.