Parallel corpus is of great importance to machine translation, and automatic sentence alignment is the first step towards its processing. This paper puts forward a bilingual dictionary based sentence alignment method ...Parallel corpus is of great importance to machine translation, and automatic sentence alignment is the first step towards its processing. This paper puts forward a bilingual dictionary based sentence alignment method for Chinese English parallel corpus, which differs from previous length based algorithm in its knowledge-rich approach. Experimental result shows that this method produces over 93% accuracy with usual English-Chinese dictionaries whose translations cover 31 88%~47 90% of the corpus.展开更多
Some cylindrically symmetric inhomogeneous viscous fluid string cosmological models with magnetic field and cosmological term A varying with time are investigated. To get the deterministic solution, it has been assume...Some cylindrically symmetric inhomogeneous viscous fluid string cosmological models with magnetic field and cosmological term A varying with time are investigated. To get the deterministic solution, it has been assumed that the expansion (θ) in the model is proportional to the eigen value σ^11 of the shear tensor σ^ij. The value of cosmological constant for the model is found to be small and positive, which is supported by the results from recent supernovae Ia observations. The effect of bulk viscosity is to produce a change in perfect fluid and hence exhibits essential influence on the character of the solution. The physical and geometric properties of the models are also discussed in presence and absence of magnetic field.展开更多
The autofocusing technique based on contourlet transform is discussed in this paper and an autofocusing method is proposed for images with much information in certain directions. The experimental results show that the...The autofocusing technique based on contourlet transform is discussed in this paper and an autofocusing method is proposed for images with much information in certain directions. The experimental results show that the proposed method can focus accurately and the sensitivity ratio is higher than that of the other autofocusing methods based on conventional image processing展开更多
Observational analysis shows that a Mesoscale Convective System (MCS) occurred on May 13-14 2004 along the coastal area in South China. The MCS initiated among the southwesterly flows within a west-east orientation lo...Observational analysis shows that a Mesoscale Convective System (MCS) occurred on May 13-14 2004 along the coastal area in South China. The MCS initiated among the southwesterly flows within a west-east orientation low-level shear line. Associated with the system, in its subsequent development stages, no distinct vortex circulation developed in low-level. Instead, a cyclonic flow disturbance was observed in the mid-troposphere. How the convection starts to develop and evolve into a MCS With observational analysis and numerical simulation, the problem has been studied. The high-resolution MM5 simulation shows that topographic convergence along the coastal line and the nearby mountains in western South China plays an important role to initiate the MCS convection. Once the convection occurs, due to the condensation heating, a cooperative interaction between the preexisting mid-level disturbance and convection is created, which may greatly affect the MCS development during periods when the system continues moving eastward. Compared to some typical MCS that happen in Southern China, which are usually accompanied with upward development of cyclonic vorticity, the development and evolution of the investigated MCS shows distinguishing features. In this article, the physical mechanisms responsible for the intensification of mid-level disturbance are discussed, and a viewpoint to interpret the effects of mid-level disturbance on the MCS organizational development is proposed.展开更多
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ...Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead.展开更多
Efficient numerical schemes were presented for the steady state solutions of towed marine cables. For most of towed systems,the steady state problem can be resolved into two-point boundary-value problem,or initial val...Efficient numerical schemes were presented for the steady state solutions of towed marine cables. For most of towed systems,the steady state problem can be resolved into two-point boundary-value problem,or initial value problem in some special cases where the initial values are available directly.A new technique was proposed and attempted to solve the two-point boundary-value problem rather than the conventional shooting method due to its algorithm complexity and low efficiency.First,the boundary conditions are transformed into a set of nonlinear governing equations about the initial values,then bisection method is employed to solve these nonlinear equations with the aid of 4th order Runge-Kutta method.In common sense,non-uniform (sheared) current is assumed,which varies in magnitude and direction with depth.The schemes are validated through the DE Zoysa's example,then several numerical examples are also presented to illustrate the numerical schemes.展开更多
In this paper, we give the most general duality gates, or generalized quantum gates in duality quantum computers. Here we show by explicit construction that a n-bit duality quantum computer with d slits can be simulat...In this paper, we give the most general duality gates, or generalized quantum gates in duality quantum computers. Here we show by explicit construction that a n-bit duality quantum computer with d slits can be simulated perfectly with an ordinary quantum computer with n qubits and one auxiliary qudit. Using this model, we give the most general form of duality gates which is of the form ∑i=0^d-1piUi,and the pi 's are complex numbers with module less or equal to 1 and constrained by|∑iPi|≤1.展开更多
This paper presents modified version of an affirmative answer of Centro symmetric convex body Busemann-Petty problem, and proved that at all strings about the origin, the star dual of ball has the smallest volume.
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ...may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query.展开更多
Using the method of numerical matrix diagonalization within the effective-mass approximation, we investigated a D^--center quantum dot system subjected to a Gaussian potential confinement. We obtain the dependence of ...Using the method of numerical matrix diagonalization within the effective-mass approximation, we investigated a D^--center quantum dot system subjected to a Gaussian potential confinement. We obtain the dependence of binding energies of the ground-states of the D^--center on the depth of Gaussian potential and the magnetic field strength. The result shows clearly that the binding energies of the ground-states of the D^--center are rather sensitive to the depth of potential and the strength of magnetic field.展开更多
A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inhe...A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inherited and expanded in the new system. The integrity and security of the SOTER database are enhanced. The attribute database management, the spatial database management and the model base are integrated into SOTER based on the component object model (COM), and the graphical user interface (GUI) for Windows is used to interact with clients, thus being easy to create and maintain the SOTER, and convenient to promote the quantification and automation of soil information application.展开更多
The Fokker Planck package which without the relativity effect has been developed in 2002. The package with relativity effect, which induced from Italy, is now developed. It conrains relativity effect, and is bounce a...The Fokker Planck package which without the relativity effect has been developed in 2002. The package with relativity effect, which induced from Italy, is now developed. It conrains relativity effect, and is bounce averaged. It can deal with such as the trapping effect, wave heating, neutral beam injecting, and particle losses. It is very useful for our HL-2A experimental results analysis.展开更多
In this study, a numerical method was proposed to evaluate the calligraphy work called calligraphy evaluation system. Four classical chirographies of "Kaisho", "Gyosho", "Sousho" and "Hiragana", and 47 charact...In this study, a numerical method was proposed to evaluate the calligraphy work called calligraphy evaluation system. Four classical chirographies of "Kaisho", "Gyosho", "Sousho" and "Hiragana", and 47 characters for each chirography, were selected and analyzed by this system. The "Sumi" distribution of character was clarified from 12 directions and summarized into four parts of horizontal part, diagonal left part, vertical part and diagonal fight part. The character's contour line was converted to a signal data in order to calculate roundness index. The degree of character's radian was presented by roundness index. The smooth index was calculated at the same time. Additionally, width index, "Sumi" ratio, stability index also were calculated to contrast the features of each style. The main character points of four styles of "Kaisho', "Gyosho", "Sousho", "Hiragana" were extracted to compare each other, and provide a reference for learners. The learners could obtain the quantitative data to understand their work's characteristics. It can also be compared with other person's work by this system in order to improve learners' writing skill.展开更多
文摘Parallel corpus is of great importance to machine translation, and automatic sentence alignment is the first step towards its processing. This paper puts forward a bilingual dictionary based sentence alignment method for Chinese English parallel corpus, which differs from previous length based algorithm in its knowledge-rich approach. Experimental result shows that this method produces over 93% accuracy with usual English-Chinese dictionaries whose translations cover 31 88%~47 90% of the corpus.
文摘Some cylindrically symmetric inhomogeneous viscous fluid string cosmological models with magnetic field and cosmological term A varying with time are investigated. To get the deterministic solution, it has been assumed that the expansion (θ) in the model is proportional to the eigen value σ^11 of the shear tensor σ^ij. The value of cosmological constant for the model is found to be small and positive, which is supported by the results from recent supernovae Ia observations. The effect of bulk viscosity is to produce a change in perfect fluid and hence exhibits essential influence on the character of the solution. The physical and geometric properties of the models are also discussed in presence and absence of magnetic field.
基金This work was supported by the National Natural Science Founda-tion of China (grant No.60472100, 60672073)Natural ScienceFoundation of Zhejiang Province (grant RC01057, Y105577)the Key Project of Chinese Ministry of Education (grant No.206059).
文摘The autofocusing technique based on contourlet transform is discussed in this paper and an autofocusing method is proposed for images with much information in certain directions. The experimental results show that the proposed method can focus accurately and the sensitivity ratio is higher than that of the other autofocusing methods based on conventional image processing
基金Fundamental Scientific Research Condition, a project of Ministry of Science & Technology(2003DIB4J145)Key Scientific Project for Guangdong Province (2004B32601002)
文摘Observational analysis shows that a Mesoscale Convective System (MCS) occurred on May 13-14 2004 along the coastal area in South China. The MCS initiated among the southwesterly flows within a west-east orientation low-level shear line. Associated with the system, in its subsequent development stages, no distinct vortex circulation developed in low-level. Instead, a cyclonic flow disturbance was observed in the mid-troposphere. How the convection starts to develop and evolve into a MCS With observational analysis and numerical simulation, the problem has been studied. The high-resolution MM5 simulation shows that topographic convergence along the coastal line and the nearby mountains in western South China plays an important role to initiate the MCS convection. Once the convection occurs, due to the condensation heating, a cooperative interaction between the preexisting mid-level disturbance and convection is created, which may greatly affect the MCS development during periods when the system continues moving eastward. Compared to some typical MCS that happen in Southern China, which are usually accompanied with upward development of cyclonic vorticity, the development and evolution of the investigated MCS shows distinguishing features. In this article, the physical mechanisms responsible for the intensification of mid-level disturbance are discussed, and a viewpoint to interpret the effects of mid-level disturbance on the MCS organizational development is proposed.
基金financially supported by Shenzhen Key Fundamental Research Projects(Grant No.:JCYJ20170306091556329).
文摘Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead.
文摘Efficient numerical schemes were presented for the steady state solutions of towed marine cables. For most of towed systems,the steady state problem can be resolved into two-point boundary-value problem,or initial value problem in some special cases where the initial values are available directly.A new technique was proposed and attempted to solve the two-point boundary-value problem rather than the conventional shooting method due to its algorithm complexity and low efficiency.First,the boundary conditions are transformed into a set of nonlinear governing equations about the initial values,then bisection method is employed to solve these nonlinear equations with the aid of 4th order Runge-Kutta method.In common sense,non-uniform (sheared) current is assumed,which varies in magnitude and direction with depth.The schemes are validated through the DE Zoysa's example,then several numerical examples are also presented to illustrate the numerical schemes.
基金supported by the National Fundamental Research Program Grant Nos.2006CB921106, 2009CB929042National Natural Science Foundation of China under Grant Nos. 10874098, 10775076, and 60433050
文摘In this paper, we give the most general duality gates, or generalized quantum gates in duality quantum computers. Here we show by explicit construction that a n-bit duality quantum computer with d slits can be simulated perfectly with an ordinary quantum computer with n qubits and one auxiliary qudit. Using this model, we give the most general form of duality gates which is of the form ∑i=0^d-1piUi,and the pi 's are complex numbers with module less or equal to 1 and constrained by|∑iPi|≤1.
文摘This paper presents modified version of an affirmative answer of Centro symmetric convex body Busemann-Petty problem, and proved that at all strings about the origin, the star dual of ball has the smallest volume.
基金Project supported by the National Natural Science Foundation of China (No. 60221120145) and Science & Technology Committee of Shanghai Municipality Key Project (No. 02DJ14045), China
文摘may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query.
基金Thc project supported by National Natural Science Foundation of China under Grant Nos. 10475021 and 10275014
文摘Using the method of numerical matrix diagonalization within the effective-mass approximation, we investigated a D^--center quantum dot system subjected to a Gaussian potential confinement. We obtain the dependence of binding energies of the ground-states of the D^--center on the depth of Gaussian potential and the magnetic field strength. The result shows clearly that the binding energies of the ground-states of the D^--center are rather sensitive to the depth of potential and the strength of magnetic field.
基金Project supported by the National Natural Science Foundation of China (No. 40271056) Hubei Provin- cial Natural Science Foundation of China (No. 99J123).
文摘A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inherited and expanded in the new system. The integrity and security of the SOTER database are enhanced. The attribute database management, the spatial database management and the model base are integrated into SOTER based on the component object model (COM), and the graphical user interface (GUI) for Windows is used to interact with clients, thus being easy to create and maintain the SOTER, and convenient to promote the quantification and automation of soil information application.
文摘The Fokker Planck package which without the relativity effect has been developed in 2002. The package with relativity effect, which induced from Italy, is now developed. It conrains relativity effect, and is bounce averaged. It can deal with such as the trapping effect, wave heating, neutral beam injecting, and particle losses. It is very useful for our HL-2A experimental results analysis.
文摘In this study, a numerical method was proposed to evaluate the calligraphy work called calligraphy evaluation system. Four classical chirographies of "Kaisho", "Gyosho", "Sousho" and "Hiragana", and 47 characters for each chirography, were selected and analyzed by this system. The "Sumi" distribution of character was clarified from 12 directions and summarized into four parts of horizontal part, diagonal left part, vertical part and diagonal fight part. The character's contour line was converted to a signal data in order to calculate roundness index. The degree of character's radian was presented by roundness index. The smooth index was calculated at the same time. Additionally, width index, "Sumi" ratio, stability index also were calculated to contrast the features of each style. The main character points of four styles of "Kaisho', "Gyosho", "Sousho", "Hiragana" were extracted to compare each other, and provide a reference for learners. The learners could obtain the quantitative data to understand their work's characteristics. It can also be compared with other person's work by this system in order to improve learners' writing skill.