Based on the coded and non-coded targets, the targets are extracted from the images according to their size, shape and intensity etc., and thus an improved method to identify the unique identity(D) of every coded ta...Based on the coded and non-coded targets, the targets are extracted from the images according to their size, shape and intensity etc., and thus an improved method to identify the unique identity(D) of every coded target is put forward and the non-coded and coded targets are classified. Moreover, the gray scale centroid algorithm is applied to obtain the subpixel location of both uncoded and coded targets. The initial matching of the uncoded target correspondences between an image pair is established according to similarity and compatibility, which are based on the ID correspondences of the coded targets. The outliers in the initial matching of the uncoded target are eliminated according to three rules to finally obtain the uncoded target correspondences. Practical examples show that the algorithm is rapid, robust and is of high precision and matching ratio.展开更多
Wireless Sensor Network (WSN) nodes are severely limited by their power, communication bandwidth, and storage space, and the traditional signature algorithm is not suitable for WSN environments. In this paper, we pr...Wireless Sensor Network (WSN) nodes are severely limited by their power, communication bandwidth, and storage space, and the traditional signature algorithm is not suitable for WSN environments. In this paper, we present a ring signature scheme designed for WSNs. In this scheme, all of the wireless sensor nodes are divided into several sub-groups and the sub-group nodes are used to generate the signature instead of the WSN cluster nodes. This scheme can effectively avoid the single node failure problem, and it also has a high availability. All nodes are flee to sign their own message, and the nodes that generate signatures can simultaneously calculate their own part of the signature, meeting the distributed parallel computing requirements. Compared with the traditional ring signature, this scheme reduces the energy consumption, and therefore is very suitable for WSNs.展开更多
The following new synonymy is proposed: Acompus rufipes (Wolff, 1804) = Heterogaster minimus Zou & Zheng, 1981, syn. nov. Habitus photos and male genitalia illustrations of this species are presented.
To accurately track computer viruses,an overlay network that monitors the activities of viruses is constructed.Identifying and locating nodes infected by virus on network is achieved by a naming system in which a node...To accurately track computer viruses,an overlay network that monitors the activities of viruses is constructed.Identifying and locating nodes infected by virus on network is achieved by a naming system in which a node in the network is mapped to a unique serial number of the hard-drive.By carefully monitoring and recording sensitive communication between local system and remote nodes on the network,and suspicious operations on files that originate from remote nodes and entered via some form of file transfer,activities of viruses in both local and network level are recorded and ready for future analysis.These data can also be used in analysis of the mechanism of a computer virus as well as its spreading mode and pattern.展开更多
Security problem is an important issue for Wireless Sensor Network.The paper focuses on the privacy protection of WSN applications.An anonymity enhancement tactic based on pseudonym mechanism is presented for clustere...Security problem is an important issue for Wireless Sensor Network.The paper focuses on the privacy protection of WSN applications.An anonymity enhancement tactic based on pseudonym mechanism is presented for clustered Wireless Sensor Network,which provides anonymity for both the sensors within a cluster and the cluster head nodes.Simulation experiments are launched through NS2 platform to validate the anonymity performance.The theoretical analysis and empirical study imply that the proposed scheme based on pseudonym can protect the privacies of both the sensor nodes and the cluster head nodes.The work is valuable and the experimental results are convincible.展开更多
Form consumer learning perspective, a theoretical analysis of the structure of brand knowledge is gave. Product concepts will be transformed into knowledge nodes, association links and affective response which are sto...Form consumer learning perspective, a theoretical analysis of the structure of brand knowledge is gave. Product concepts will be transformed into knowledge nodes, association links and affective response which are stored in consumer memory. Consumer brand knowledge is composed of brand awareness, brand image and brand attitude. Data are collected from questionnaire. The structure of brand knowledge is confirmed by exploratory factor analysis. Form a binary logistic regression analysis of brand knowledge and consumer purchase behavior, it found that brand attitude is the main factor to predict and explain the purchase behavior based on product concepts.展开更多
Marine hydrate reservoirs can be divided into focused high-flux and distributed low-flux gas hydrate systems according to free gas migration control mechanisms. In focused high-flux hydrate reservoirs, fluids easily b...Marine hydrate reservoirs can be divided into focused high-flux and distributed low-flux gas hydrate systems according to free gas migration control mechanisms. In focused high-flux hydrate reservoirs, fluids easily break through the pressure of overlying sediments and reach the shallows, creating a series of geomorphological-geological-geophysical anomalies at and near the seafloor. Based on detailed interpretation of pre-drilling data in the eastern Pearl River Mouth Basin(PRMB),many anomalies related to the high-flux fluid flow are found, including seafloor mounds with intrusive characteristics, bright spot reflections above the bottom-stimulating reflector(BSR), phase reversals in the superficial layer, and an efficient fluid migration and accumulation system composed of fractures and uplifts. The second hydrate drilling expedition was carried out in the eastern PRMB in 2013 to study these anomalies. The acquired data show that high-flux fluid flow occurred in these sites. Gas hydrate pingoes, bright spot reflection above the BSR, and an efficient fluid migration and accumulation system can be used as identification signatures for high-flux fluid migration. The modes of high flux fluid flow are different in deep and shallow sediments during upward migration of fluid. Gas dissolved within migrating water dominates deep fluid migration and upward migration of a separate gas phase dominates the shallow process. This difference in migration models leads to formation of upper and lower concentrated hydrate reservoirs in the drilling area. The discovery of signatures of high-flux fluid flow and their migration modes will help with site selection and reduce risk in gas hydrate drilling.展开更多
Majorana fermions(MFs) are exotic particles that are their own anti-particles. Currently, the search for MFs occurring as quasiparticle excitations in condensed matter systems has attracted widespread interest, becaus...Majorana fermions(MFs) are exotic particles that are their own anti-particles. Currently, the search for MFs occurring as quasiparticle excitations in condensed matter systems has attracted widespread interest, because of their importance in fundamental physics and potential applications in topological quantum computation based on solid-state devices. Motivated by recent experimental progress towards the detection and manipulation of MFs in hybrid semiconductor/superconductor heterostructures, in this review, we present a novel proposal to probe MFs in all-optical domain. We introduce a single quantum dot(QD), a hybrid quantum dot-nanomechanical resonators(QD-NR) system, and a carbon nanotube(CNT) resonator implanted in a single electron spin system with optical pump-probe technology to detect MFs, respectively. With this scheme, a possible Majorana signature is investigated via the probe absorption spectrum and nonlinear optical Kerr effect, and the coupling strength between MFs and the QD or the single electron spin is also determined. In the hybrid QD-NR system, vibration of the NR will enhance the nonlinear optical effect, which makes the MFs more sensitive for detection. In the CNT resonator with a single electron, the single electron spin can be considered as a sensitive probe, and the CNT resonator behaved as a phonon cavity is robust for detecting of MFs. This optical scheme will provide another method for the detection MFs and will open the door for new applications ranging from robust manipulation of MFs to quantum information processing based on MFs.展开更多
Yueyang Tower,located by Dongting Lake in the city of Yueyang,central China’s Hunan Province,is a time-honored scenic spot,well known across the nation.Its fame is particularly attributed to a renowned Song Dynasty p...Yueyang Tower,located by Dongting Lake in the city of Yueyang,central China’s Hunan Province,is a time-honored scenic spot,well known across the nation.Its fame is particularly attributed to a renowned Song Dynasty poet and intellectual,Fan Zhongyan(989-1052),展开更多
基金The National Natural Science Foundation of China(No50475041)
文摘Based on the coded and non-coded targets, the targets are extracted from the images according to their size, shape and intensity etc., and thus an improved method to identify the unique identity(D) of every coded target is put forward and the non-coded and coded targets are classified. Moreover, the gray scale centroid algorithm is applied to obtain the subpixel location of both uncoded and coded targets. The initial matching of the uncoded target correspondences between an image pair is established according to similarity and compatibility, which are based on the ID correspondences of the coded targets. The outliers in the initial matching of the uncoded target are eliminated according to three rules to finally obtain the uncoded target correspondences. Practical examples show that the algorithm is rapid, robust and is of high precision and matching ratio.
基金This paper was supported by the National Natural Science Foundation of China under Grants No.61001091,No.61271118
文摘Wireless Sensor Network (WSN) nodes are severely limited by their power, communication bandwidth, and storage space, and the traditional signature algorithm is not suitable for WSN environments. In this paper, we present a ring signature scheme designed for WSNs. In this scheme, all of the wireless sensor nodes are divided into several sub-groups and the sub-group nodes are used to generate the signature instead of the WSN cluster nodes. This scheme can effectively avoid the single node failure problem, and it also has a high availability. All nodes are flee to sign their own message, and the nodes that generate signatures can simultaneously calculate their own part of the signature, meeting the distributed parallel computing requirements. Compared with the traditional ring signature, this scheme reduces the energy consumption, and therefore is very suitable for WSNs.
基金supported by the Natural Science Foundation of China(31071959 and J0630963)
文摘The following new synonymy is proposed: Acompus rufipes (Wolff, 1804) = Heterogaster minimus Zou & Zheng, 1981, syn. nov. Habitus photos and male genitalia illustrations of this species are presented.
基金Project is supported by the National Nature Science Foundation of China(Grant No.60672142,60772053,90304005)New architecture and technology for the Internet information sharing,The relation and Countermeasure of Application Layer Behavior and Collective Performance of Internet,Forecast of Traffic Model on Internet+1 种基金Supported by National Basic Research Program of China,(Grant No.2007CB307100,Project No.2007CB307105)The Theory of Mobility and Sensor Network under The Integrated Network and the Universal Ap-plicable Service System
文摘To accurately track computer viruses,an overlay network that monitors the activities of viruses is constructed.Identifying and locating nodes infected by virus on network is achieved by a naming system in which a node in the network is mapped to a unique serial number of the hard-drive.By carefully monitoring and recording sensitive communication between local system and remote nodes on the network,and suspicious operations on files that originate from remote nodes and entered via some form of file transfer,activities of viruses in both local and network level are recorded and ready for future analysis.These data can also be used in analysis of the mechanism of a computer virus as well as its spreading mode and pattern.
基金the National Natural Science Foundation of China (NSFC) under grant No.61309024,the National Key Basic Research Program of China (973) under Grant No.2013CB834204,the Fundamental Research Funds for the Central Universities under grant No.14CX06009A at China University of Petroleum
文摘Security problem is an important issue for Wireless Sensor Network.The paper focuses on the privacy protection of WSN applications.An anonymity enhancement tactic based on pseudonym mechanism is presented for clustered Wireless Sensor Network,which provides anonymity for both the sensors within a cluster and the cluster head nodes.Simulation experiments are launched through NS2 platform to validate the anonymity performance.The theoretical analysis and empirical study imply that the proposed scheme based on pseudonym can protect the privacies of both the sensor nodes and the cluster head nodes.The work is valuable and the experimental results are convincible.
基金Acknowledgement Fund: the National Natural Science Foundation of China (No. 71172042). Wuhan University of Technology Innovation Fund (No. 2012-IB-092).
文摘Form consumer learning perspective, a theoretical analysis of the structure of brand knowledge is gave. Product concepts will be transformed into knowledge nodes, association links and affective response which are stored in consumer memory. Consumer brand knowledge is composed of brand awareness, brand image and brand attitude. Data are collected from questionnaire. The structure of brand knowledge is confirmed by exploratory factor analysis. Form a binary logistic regression analysis of brand knowledge and consumer purchase behavior, it found that brand attitude is the main factor to predict and explain the purchase behavior based on product concepts.
基金supported by the National Natural Science Foundation of China (Grant No. 41406068)
文摘Marine hydrate reservoirs can be divided into focused high-flux and distributed low-flux gas hydrate systems according to free gas migration control mechanisms. In focused high-flux hydrate reservoirs, fluids easily break through the pressure of overlying sediments and reach the shallows, creating a series of geomorphological-geological-geophysical anomalies at and near the seafloor. Based on detailed interpretation of pre-drilling data in the eastern Pearl River Mouth Basin(PRMB),many anomalies related to the high-flux fluid flow are found, including seafloor mounds with intrusive characteristics, bright spot reflections above the bottom-stimulating reflector(BSR), phase reversals in the superficial layer, and an efficient fluid migration and accumulation system composed of fractures and uplifts. The second hydrate drilling expedition was carried out in the eastern PRMB in 2013 to study these anomalies. The acquired data show that high-flux fluid flow occurred in these sites. Gas hydrate pingoes, bright spot reflection above the BSR, and an efficient fluid migration and accumulation system can be used as identification signatures for high-flux fluid migration. The modes of high flux fluid flow are different in deep and shallow sediments during upward migration of fluid. Gas dissolved within migrating water dominates deep fluid migration and upward migration of a separate gas phase dominates the shallow process. This difference in migration models leads to formation of upper and lower concentrated hydrate reservoirs in the drilling area. The discovery of signatures of high-flux fluid flow and their migration modes will help with site selection and reduce risk in gas hydrate drilling.
基金supported by the National Natural Science Foundation of China(Grant Nos.10974133 and 11274230)the Basic Research Program of the Committee of Science and Technology of Shanghai(Grant No.14JC1491700)
文摘Majorana fermions(MFs) are exotic particles that are their own anti-particles. Currently, the search for MFs occurring as quasiparticle excitations in condensed matter systems has attracted widespread interest, because of their importance in fundamental physics and potential applications in topological quantum computation based on solid-state devices. Motivated by recent experimental progress towards the detection and manipulation of MFs in hybrid semiconductor/superconductor heterostructures, in this review, we present a novel proposal to probe MFs in all-optical domain. We introduce a single quantum dot(QD), a hybrid quantum dot-nanomechanical resonators(QD-NR) system, and a carbon nanotube(CNT) resonator implanted in a single electron spin system with optical pump-probe technology to detect MFs, respectively. With this scheme, a possible Majorana signature is investigated via the probe absorption spectrum and nonlinear optical Kerr effect, and the coupling strength between MFs and the QD or the single electron spin is also determined. In the hybrid QD-NR system, vibration of the NR will enhance the nonlinear optical effect, which makes the MFs more sensitive for detection. In the CNT resonator with a single electron, the single electron spin can be considered as a sensitive probe, and the CNT resonator behaved as a phonon cavity is robust for detecting of MFs. This optical scheme will provide another method for the detection MFs and will open the door for new applications ranging from robust manipulation of MFs to quantum information processing based on MFs.
文摘Yueyang Tower,located by Dongting Lake in the city of Yueyang,central China’s Hunan Province,is a time-honored scenic spot,well known across the nation.Its fame is particularly attributed to a renowned Song Dynasty poet and intellectual,Fan Zhongyan(989-1052),