A novel nonlinear multi-input multi-output MIMO detection algorithm is proposed which is referred to as an ordered successive noise projection cancellation OSNPC algorithm. It is capable of improving the computation p...A novel nonlinear multi-input multi-output MIMO detection algorithm is proposed which is referred to as an ordered successive noise projection cancellation OSNPC algorithm. It is capable of improving the computation performance of the MIMO detector with the conventional ordered successive interference cancellation OSIC algorithm. In contrast to the OSIC in which the known interferences in the input signal vector are successively cancelled the OSNPC successively cancels the known noise projections from the decision statistic vector. Analysis indicates that the OSNPC is equivalent to the OSIC in error performance but it has significantly less complexity in computation.Furthermore when the OSNPC is applied to the MIMO detection with the preprocessing of dual lattice reduction DLR the computational complexity of the proposed OSNPC-based DLR-aided detector is further reduced due to the avoidance of the inverse of the reduced basis of the dual lattice in computation compared to that of the OSIC-based one. Simulation results validate the theoretical conclusions with regard to both the performance and complexity of the proposed MIMO detection scheme.展开更多
To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With th...To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With this protocol, the resource reservation table of each node will record the bandwidth requirements of data flows, which access itself, its neighbor nodes and hidden nodes, and every node calculates the remaining available bandwidth by deducting the bandwidth reserved in the resource reservation table from the total available bandwidth of the node. Moreover, the BCMR searches in a distributed manner for the paths with the shortest delay conditioned by the bandwidth constraint. Simulation results demonstrate the good performance of BCMR in terms of packet delivery reliability and the delay. BCMR can meet the requirements of real time communication and can be used in the multicast applications with low mobility in wireless ad hoc networks.展开更多
The authors have treated 50 cases of frozen shoulder in recent years with electro-acupuncture and the elevation manipulation. The results were satisfactory and reported as follows.
AIM To investigate the clinical utility of biological age(BA) measurement in screening colonoscopy for the detection of colorectal adenomas in the average-risk population.METHODS A consecutive series of asymptomatic s...AIM To investigate the clinical utility of biological age(BA) measurement in screening colonoscopy for the detection of colorectal adenomas in the average-risk population.METHODS A consecutive series of asymptomatic subjects aged ≥ 30 years who underwent colonoscopy in routine check-ups were enrolled. Colorectal adenoma was classified according to size, number, and location. BAs were calculated using the MEDIAGETM Biological Age Measurement System.RESULTS A total of 2696 subjects were investigated(1876 men and 820 women). The mean chronological age(CA) was 46.0 years and the mean BA was 44.7 years. Metabolic syndrome(MS) was diagnosed in 218 subjects(8.1%). The prevalence of overall colorectal adenoma was 23.1%(622/2,696). When the subjects were divided into four groups based on BA(≤ 39 years; 40-49 years; 50-59 years; ≥ 60 years), the prevalence of colorectal adenoma was increased as BA increased(P < 0.001). Colorectal adenoma located in the proximal colon was more prevalent in the BA-dominant group(BA-CA ≥ 5years) than the CA-dominant group(CA-BA ≥ 5 years)(P = 0.034). When the subjects were categorized into four groups according to MS and age gap between BA and CA, the incidence of colorectal adenoma increased with MS and BA-dominance(P < 0.05).CONCLUSION Measurement of BA may help to assess the risk of colorectal adenoma in screening colonoscopy.展开更多
The authors have treated 172 cases of cervical spondylopathy by electro-acupuncture and massage in recent 6 years. The results were satisfactory as reported in the following.
In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was pre...In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was presented with the definitions. From the model, data mining method was used to acquire the risk transmission matrix from the historical databases analysis. The quantitative calculation problem among the generic project risk elements was solved. This method deals with well the risk element transmission problems with limited states. And in order to get the limited states, fuzzy theory was used to discrete the historical data in historical databases. In an example, the controlling risk degree is chosen as P(Rs≥2) ≤0.1, it means that the probability of risk state which is not less than 2 in project is not more than 0.1, the risk element R3 is chosen to control the project, respectively. The result shows that three risk element transmission matrix can be acquired in 4 risk elements, and the frequency histogram and cumulative frequency histogram of each risk element are also given.展开更多
Thirty cases of vertebral-artery-type cervical spondylopathy were treated by Dr. Zhang Tao's technique. The cure rate was 50%, and the total effective rate was 100%.
The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how t...The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how technology and financial innovation transformed the mortgage loan from a local security into a premier global security traded worldwide. It examines the fundamental flaws of this process and why it does not work in regards to mortgage lending and the re-securitization products that were created through financial innovation. The findings show that regulation was unable to keep pace with financial innovation, which created an environment where actors in the financial service sector were able to behave geographically irresponsibly by using information asymmetries to their advantage by par- ticipating in moral hazard activities and engaging in other immoral and unethical business practices that were centered around localized geography, which ultimately contributed to the global financial crisis. It also examines the roll of financial innovation in regard to the Lehman Brothers Mini-Bond in Hung and its role as a driving force behind China's newly emerging shadow banking sector. It concludes with a policy recommendation and its implication for China's continued economic development.展开更多
Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on-...Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.展开更多
Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystr...Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last,展开更多
基金The National Science and Technology Major Project(No.2012ZX03004005-003)the National Natural Science Foundation of China(No.61171081,61201175)the Innovation Technology Fund of Jiangsu Province(No.BC2012006)
文摘A novel nonlinear multi-input multi-output MIMO detection algorithm is proposed which is referred to as an ordered successive noise projection cancellation OSNPC algorithm. It is capable of improving the computation performance of the MIMO detector with the conventional ordered successive interference cancellation OSIC algorithm. In contrast to the OSIC in which the known interferences in the input signal vector are successively cancelled the OSNPC successively cancels the known noise projections from the decision statistic vector. Analysis indicates that the OSNPC is equivalent to the OSIC in error performance but it has significantly less complexity in computation.Furthermore when the OSNPC is applied to the MIMO detection with the preprocessing of dual lattice reduction DLR the computational complexity of the proposed OSNPC-based DLR-aided detector is further reduced due to the avoidance of the inverse of the reduced basis of the dual lattice in computation compared to that of the OSIC-based one. Simulation results validate the theoretical conclusions with regard to both the performance and complexity of the proposed MIMO detection scheme.
基金The Natural Science Foundation of Zhejiang Province(No.Y1090232)
文摘To meet the bandwidth requirement for the multicasting data flow in ad hoc networks, a distributed on- demand bandwidth-constrained multicast routing (BCMR) protocol for wireless ad hoc networks is proposed. With this protocol, the resource reservation table of each node will record the bandwidth requirements of data flows, which access itself, its neighbor nodes and hidden nodes, and every node calculates the remaining available bandwidth by deducting the bandwidth reserved in the resource reservation table from the total available bandwidth of the node. Moreover, the BCMR searches in a distributed manner for the paths with the shortest delay conditioned by the bandwidth constraint. Simulation results demonstrate the good performance of BCMR in terms of packet delivery reliability and the delay. BCMR can meet the requirements of real time communication and can be used in the multicast applications with low mobility in wireless ad hoc networks.
文摘The authors have treated 50 cases of frozen shoulder in recent years with electro-acupuncture and the elevation manipulation. The results were satisfactory and reported as follows.
文摘AIM To investigate the clinical utility of biological age(BA) measurement in screening colonoscopy for the detection of colorectal adenomas in the average-risk population.METHODS A consecutive series of asymptomatic subjects aged ≥ 30 years who underwent colonoscopy in routine check-ups were enrolled. Colorectal adenoma was classified according to size, number, and location. BAs were calculated using the MEDIAGETM Biological Age Measurement System.RESULTS A total of 2696 subjects were investigated(1876 men and 820 women). The mean chronological age(CA) was 46.0 years and the mean BA was 44.7 years. Metabolic syndrome(MS) was diagnosed in 218 subjects(8.1%). The prevalence of overall colorectal adenoma was 23.1%(622/2,696). When the subjects were divided into four groups based on BA(≤ 39 years; 40-49 years; 50-59 years; ≥ 60 years), the prevalence of colorectal adenoma was increased as BA increased(P < 0.001). Colorectal adenoma located in the proximal colon was more prevalent in the BA-dominant group(BA-CA ≥ 5years) than the CA-dominant group(CA-BA ≥ 5 years)(P = 0.034). When the subjects were categorized into four groups according to MS and age gap between BA and CA, the incidence of colorectal adenoma increased with MS and BA-dominance(P < 0.05).CONCLUSION Measurement of BA may help to assess the risk of colorectal adenoma in screening colonoscopy.
文摘The authors have treated 172 cases of cervical spondylopathy by electro-acupuncture and massage in recent 6 years. The results were satisfactory as reported in the following.
基金Project(70572090) supported by the National Natural Science Foundation of China
文摘In order to construct the data mining frame for the generic project risk research, the basic definitions of the generic project risk element were given, and then a new model of the generic project risk element was presented with the definitions. From the model, data mining method was used to acquire the risk transmission matrix from the historical databases analysis. The quantitative calculation problem among the generic project risk elements was solved. This method deals with well the risk element transmission problems with limited states. And in order to get the limited states, fuzzy theory was used to discrete the historical data in historical databases. In an example, the controlling risk degree is chosen as P(Rs≥2) ≤0.1, it means that the probability of risk state which is not less than 2 in project is not more than 0.1, the risk element R3 is chosen to control the project, respectively. The result shows that three risk element transmission matrix can be acquired in 4 risk elements, and the frequency histogram and cumulative frequency histogram of each risk element are also given.
文摘Thirty cases of vertebral-artery-type cervical spondylopathy were treated by Dr. Zhang Tao's technique. The cure rate was 50%, and the total effective rate was 100%.
基金Under the auspices of International Centre for China Development Studies,the University of Hong Kong
文摘The mortgage loan has evolved from a local lending instrument into a major global security and its role is unparallel to other financial instruments in the process of financial globalization. This paper explains how technology and financial innovation transformed the mortgage loan from a local security into a premier global security traded worldwide. It examines the fundamental flaws of this process and why it does not work in regards to mortgage lending and the re-securitization products that were created through financial innovation. The findings show that regulation was unable to keep pace with financial innovation, which created an environment where actors in the financial service sector were able to behave geographically irresponsibly by using information asymmetries to their advantage by par- ticipating in moral hazard activities and engaging in other immoral and unethical business practices that were centered around localized geography, which ultimately contributed to the global financial crisis. It also examines the roll of financial innovation in regard to the Lehman Brothers Mini-Bond in Hung and its role as a driving force behind China's newly emerging shadow banking sector. It concludes with a policy recommendation and its implication for China's continued economic development.
基金supported by the Coalition for National Science Fundingunder Grant No.61150110486the Central University Funding under Grant No.ZYGX2013J073
文摘Cloud computing is very attractive for schools, research institutions and enterpri- ses which need reducing IT costs, improving computing platform sharing and meeting lice- nse constraints. Sharing, management and on- demand allocation of network resources are particularly important in Cloud computing. Ho- wever, nearly all-current available cloud com- puting platforms are either proprietary or their software infrastructure is invisible to the rese- arch community except for a few open-source platforms. For universities and research insti- tutes, more open and testable experimental plat- forms are needed in a lab-level with PCs. In this paper, a platform of infrastructure resou- rce sharing system (Platform as a Service (PaaS)) is developed in virtual Cloud comput- hug environment. Its architecture, core modules, main functions, design and operational envir- onment and applications are introduced in de- tail. It has good expandability and can impr- ove resource sharing and utilization and is app- lied to regular computer science teaching and research process.
基金This paper has been performed in the Project "Key Technology Research of Eavesdropping Detection in the Quantum Security Communication" supported by the National Natural Science Foundation of China
文摘Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last,