A practical method of current mode circuit symbolic analysis using Mathematica is proposed. With the powerful symbolic manipulation capacity of Mathematica, current mode circuit symbolic analysis can be significantly ...A practical method of current mode circuit symbolic analysis using Mathematica is proposed. With the powerful symbolic manipulation capacity of Mathematica, current mode circuit symbolic analysis can be significantly simplified. The active devices are modelled by nullors. The examples of current mode filters using CCIIs are presented.展开更多
Formal verification is playing a significant role in IC design.However,the common models for verification either have their complexity problems or have applicable limitations.In order to overcome the deficiencies,a no...Formal verification is playing a significant role in IC design.However,the common models for verification either have their complexity problems or have applicable limitations.In order to overcome the deficiencies,a novel model-WGL(Weighted Generalized List)is proposed,which is based on the general-list decomposition of polynomials,with three different weights and manipulation rules introduced to effect node sharing and the canonicity.Timing parameters and operations on them are also considered.Examples show the word-level WGL is the only model to linearly represent the common word-level functions and the bit-level WGL is especially suitable for arithmetic intensive circuits.The model is proved to be a uniform and efficient model for both bit-level and word-level functions.Then based on the WGL model,a backward-construction verification approach is proposed,which reduces time and space complexity for multipliers to polynomial complexity(time complexity is less than O(n3.6)and space complexity is less than O(n1.5))without hierarchical partitioning.Both the model and the verification method show their theoretical and applicable significance in IC design.展开更多
Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel dist...Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel distributed algorithm was proposed to achieve the multi-hop authentication for mobile ad hoc networks. In addition, a protocol verifying the identity with zero knowledge proofs was designed so that the reuse of certificates comes into truth. Moreover, the security of this algorithm was proved through the random oracle model. With the lower cost of computation and communication, this algorithm is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.展开更多
By using the compatibility method, many explicit solutions of the (1+1)-dimensional variable-coefficientBroer-Kaup system are constructed, which include new solutions expressed by error function, Bessel function, expo...By using the compatibility method, many explicit solutions of the (1+1)-dimensional variable-coefficientBroer-Kaup system are constructed, which include new solutions expressed by error function, Bessel function, exponentialfunction, and Airy function.Some figures of the solutions are given by the symbolic computation system Maple.展开更多
To enhance the bandwidth efficiency of the guard interval (GI) assisted wireless communication system, an attractive scheme is proposed, which combines the functions of pilots and the GI together, so that the pilot ...To enhance the bandwidth efficiency of the guard interval (GI) assisted wireless communication system, an attractive scheme is proposed, which combines the functions of pilots and the GI together, so that the pilot resource used for estimating channel state is saved. Based on the proposed different known guard intervals (DKGI), the time-domain channel estimation can be simply applied on the receiver side. After channel estimation, the receiver can employ the cyclic convolution restoring (CCR) function to reconstruct the cyclical convolution relationship between the signal and the channel, by which the receiver can also achieve good performance through the conventional 1-tap frequency domain equalization (FDE).展开更多
In the present paper, under investigation is a nonisospectral modified Kadomtsev-Petviashvili equation, which is shown to have two Painleve branches through the Painleve analysis. With symbolic computation, two Lax pa...In the present paper, under investigation is a nonisospectral modified Kadomtsev-Petviashvili equation, which is shown to have two Painleve branches through the Painleve analysis. With symbolic computation, two Lax pairs for such an equation are derived by applying the generalized singular manifold method. Furthermore, based on the two obtained Lax pairs, the binary Darboux transformation is constructed and then the N-th-iterated potential transformation formula in the form of Grammian is also presented.展开更多
Investigated in this paper is the generalized nonlinear Schrodinger equation with radial symmetry. With the help of symbolic computation, the one-, two-, and N-soliton solutions are obtained through the bilinear metho...Investigated in this paper is the generalized nonlinear Schrodinger equation with radial symmetry. With the help of symbolic computation, the one-, two-, and N-soliton solutions are obtained through the bilinear method. B^cklund transformation in the bilinear form is presented, through which a new solution is constructed. Graphically, we have found that the solitons are symmetric about x = O, while the soliton pulse width and amplitude will change along with the distance and time during the propagation.展开更多
In this paper, exact outage probability and symbol error rate (SER) expressions are derived in closed-form for dual-hop amplify-and-forward cooperative network over independent non-identically Nakagami-m fading chan...In this paper, exact outage probability and symbol error rate (SER) expressions are derived in closed-form for dual-hop amplify-and-forward cooperative network over independent non-identically Nakagami-m fading channels. In the analysis, partial relay selection is employed. This selection scheme proposed recently is found applicable in different wireless systems such as ad hoc and sensor networks. The results are verified through comparison with Monte Carlo simulations.展开更多
Taking the (2+1)-dimensional Broer-Kaup-Kupershmidt system as a simple example, some families of rational form solitary wave solutions, triangular periodic wave solutions, and rational wave solutions are constructed b...Taking the (2+1)-dimensional Broer-Kaup-Kupershmidt system as a simple example, some families of rational form solitary wave solutions, triangular periodic wave solutions, and rational wave solutions are constructed by using the Riccati equation rational expansion method presented by us. The method can also be applied to solve more nonlinear partial differential equation or equations.展开更多
The adaptation of the novel A Pedra do Reino e o principe do sangue do vai-e-volta, (1971), by Ariano Suassuna, for the minisseries A Pedra do Reino2 (2007) directed by Luiz Fernando Carvalho, in the microseries f...The adaptation of the novel A Pedra do Reino e o principe do sangue do vai-e-volta, (1971), by Ariano Suassuna, for the minisseries A Pedra do Reino2 (2007) directed by Luiz Fernando Carvalho, in the microseries format, has caused surprise and bewilderment to reviewers and audience alike. The extensive and originally hermetic literary work, when re-created for television, became difficult to understand, resulting in poor reception by the public - though highly praised by reviewers - compared to works in the same format and time of exhibition. In this study, the author proposes a reflection, in the light of semiotic and communication theories, in order to understand the relationship between the work and the viewer. The analysis takes into account especially the options of the expression plan as well as the closeness that the audiovisual narrative maintains with the literary work. The conclusion reached is that the introduction of the elements of the enunciation - person, time and place - inherited from the novel, as well as expressive options like camera movements, light, prosody and gesture, impart an excessively accelerated rhythm, which interferes in the understanding of the work and in its consequent reception.展开更多
Traditional Chinese architecture in the narrative of a system has existed more than 3,000 years. As the core values of the enlightenment function of social ethics, traditional architecture externalizes symbol of "st...Traditional Chinese architecture in the narrative of a system has existed more than 3,000 years. As the core values of the enlightenment function of social ethics, traditional architecture externalizes symbol of "state" sensual ethical echo. So metaphorical rules in architecture can combine with the normal life. Traditional architectural form as famous communication home Marshall McLuhan's "human extension", leads the order and the rules in the form of elevation. The spread of universal ethics, traditional architectural symmetry axis ceremony, and the adornment of the mythical thinking component, are traditional Chinese ethics of society to describe the core of creation through three points sequence structure constraint. The wisdom of metaphor in these ideas is the life gene of Chinese culture. In the construction of the contemporary social upheaval spreading vision, recognition of traditional architecture ethics through righteousness obviously has been recasting social ethics of "treatment".展开更多
Under investigation in this paper are two coupled integrable dispersionless (CID) equations modelingthe dynamics of the current-fed string within an external magnetic field.Through a set of the dependent variabletrans...Under investigation in this paper are two coupled integrable dispersionless (CID) equations modelingthe dynamics of the current-fed string within an external magnetic field.Through a set of the dependent variabletransformations, the bilinear forms for the CID equations are derived.Based on the Hirota method and symboliccomputation, the analytic N-soliton solutions are presented.Infinitely many conservation laws for the CID equationsare given through the known spectral problem.Propagation characteristics and interaction behaviors of the solitons areanalyzed graphically.展开更多
An improved algorithm for symbolic computation of Hirota bilinear forms of KdV-type equations withlogarithmic transformations is presented.In the algorithm,the general assumption of Hirota bilinear form is successfull...An improved algorithm for symbolic computation of Hirota bilinear forms of KdV-type equations withlogarithmic transformations is presented.In the algorithm,the general assumption of Hirota bilinear form is successfullyreduced based on the property of uniformity in rank.Furthermore,we discard the integral operation in the traditionalalgorithm.The software package HBFTrans is written in Maple and its running effectiveness is tested by a variety solitonequations.展开更多
Several computer theorists and professionals share the concepts of "signifier" and "signified" in intuitive terms but are often unfamiliar with semiotics. There is a special digital divide between semiotics and th...Several computer theorists and professionals share the concepts of "signifier" and "signified" in intuitive terms but are often unfamiliar with semiotics. There is a special digital divide between semiotics and the technology, because the semiotic notions are usually expressed through verbal expressions instead engineers use the mathematical language. In the first step, the present study suggests the formal descriptions of the signifier and the signified. In the second step, we show how these formal definitions are able to justify the hardware structure of a computer system, and even other properties of computing which are currently presented on the as-is basis. Concluding, the basic concepts of semiotics can unveil intriguing aspect of information technology展开更多
A sign pattern is a matrix whose entries axe from the set {+,-,0}. A sign pattern is a generalized star sign pattern if it is combinatorial symmetric and its graph is a generalized star graph. The purpose of this pap...A sign pattern is a matrix whose entries axe from the set {+,-,0}. A sign pattern is a generalized star sign pattern if it is combinatorial symmetric and its graph is a generalized star graph. The purpose of this paper is to obtain the bound of minimal rank of any generalized star sign pattern (possibly with nonzero diagonal entries).展开更多
A matrix whose entries are +,-, and 0 is called a sign pattern matrix. Let k be arbitrary positive integer. We first characterize sign patterns A such that .Ak≤0. Further, we determine the maximum number of negative ...A matrix whose entries are +,-, and 0 is called a sign pattern matrix. Let k be arbitrary positive integer. We first characterize sign patterns A such that .Ak≤0. Further, we determine the maximum number of negative entries that can occur in A whenever Ak≤0. Finally, we give a necessity and sufficiency condition for A2≤0.展开更多
Establishing a philosophical theory or a paradigm of philosophical understanding should be premised on its possession of a relatively well-defined research subject, relatively original research methodology, and relati...Establishing a philosophical theory or a paradigm of philosophical understanding should be premised on its possession of a relatively well-defined research subject, relatively original research methodology, and relatively outstanding theoretical objectives. In this regard, philosophy of culture aims at a general understanding of man through cultural symbols which in themselves are not the end of the research. Using the research methodology of historical science, philosophy of culture attempts to understand man as a non-continuous and heterogeneous being. The theoretical objective of philosophy of culture is the criticism and reconstruction of cultural patterns with cultural symbols at their core.展开更多
A new expanded approach is presented to find exact solutions of nonlinear differential-difference equations. As its application, the soliton solutions and periodic solutions of a lattice equation are obtained.
For integers b and c the generalized central trinomial coefficient Tn(b,c)denotes the coefficient of xnin the expansion of(x2+bx+c)n.Those Tn=Tn(1,1)(n=0,1,2,...)are the usual central trinomial coefficients,and Tn(3,2...For integers b and c the generalized central trinomial coefficient Tn(b,c)denotes the coefficient of xnin the expansion of(x2+bx+c)n.Those Tn=Tn(1,1)(n=0,1,2,...)are the usual central trinomial coefficients,and Tn(3,2)coincides with the Delannoy number Dn=n k=0n k n+k k in combinatorics.We investigate congruences involving generalized central trinomial coefficients systematically.Here are some typical results:For each n=1,2,3,...,we have n-1k=0(2k+1)Tk(b,c)2(b2-4c)n-1-k≡0(mod n2)and in particular n2|n-1k=0(2k+1)D2k;if p is an odd prime then p-1k=0T2k≡-1p(mod p)and p-1k=0D2k≡2p(mod p),where(-)denotes the Legendre symbol.We also raise several conjectures some of which involve parameters in the representations of primes by certain binary quadratic forms.展开更多
文摘A practical method of current mode circuit symbolic analysis using Mathematica is proposed. With the powerful symbolic manipulation capacity of Mathematica, current mode circuit symbolic analysis can be significantly simplified. The active devices are modelled by nullors. The examples of current mode filters using CCIIs are presented.
基金Sponsored by the National Natural Science Foundation of China(Grant No.69973014and60273081)the Natural Science Foundation of Heilongjiang Province(Grant No.F0209)HEU Foundation(Grant No.HEUF04088).
文摘Formal verification is playing a significant role in IC design.However,the common models for verification either have their complexity problems or have applicable limitations.In order to overcome the deficiencies,a novel model-WGL(Weighted Generalized List)is proposed,which is based on the general-list decomposition of polynomials,with three different weights and manipulation rules introduced to effect node sharing and the canonicity.Timing parameters and operations on them are also considered.Examples show the word-level WGL is the only model to linearly represent the common word-level functions and the bit-level WGL is especially suitable for arithmetic intensive circuits.The model is proved to be a uniform and efficient model for both bit-level and word-level functions.Then based on the WGL model,a backward-construction verification approach is proposed,which reduces time and space complexity for multipliers to polynomial complexity(time complexity is less than O(n3.6)and space complexity is less than O(n1.5))without hierarchical partitioning.Both the model and the verification method show their theoretical and applicable significance in IC design.
文摘Identity authentication plays an important role in ad hoc networks as a part of the secure mechanism. On the basis of GQ signature scheme, a new GQ threshold group signature scheme was presented, by which a novel distributed algorithm was proposed to achieve the multi-hop authentication for mobile ad hoc networks. In addition, a protocol verifying the identity with zero knowledge proofs was designed so that the reuse of certificates comes into truth. Moreover, the security of this algorithm was proved through the random oracle model. With the lower cost of computation and communication, this algorithm is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.
基金Supported by the Youth Nature Science Foundation of Anhui University of Technology in China under Grant No.QZ200823the Natural Science Foundation of the Anhui Higher Education Institutions of China under Grant No.KJ2010A043
文摘By using the compatibility method, many explicit solutions of the (1+1)-dimensional variable-coefficientBroer-Kaup system are constructed, which include new solutions expressed by error function, Bessel function, exponentialfunction, and Airy function.Some figures of the solutions are given by the symbolic computation system Maple.
基金The National High Technology Research and Deve-lopment Program of China (863Program)(No.2002AA123031).
文摘To enhance the bandwidth efficiency of the guard interval (GI) assisted wireless communication system, an attractive scheme is proposed, which combines the functions of pilots and the GI together, so that the pilot resource used for estimating channel state is saved. Based on the proposed different known guard intervals (DKGI), the time-domain channel estimation can be simply applied on the receiver side. After channel estimation, the receiver can employ the cyclic convolution restoring (CCR) function to reconstruct the cyclical convolution relationship between the signal and the channel, by which the receiver can also achieve good performance through the conventional 1-tap frequency domain equalization (FDE).
基金supported by National Natural Science Foundation of China under Grant Nos.60772023 and 60372095the Key Project of the Ministry of Education under Grant No.106033+3 种基金the Open Fund of the State Key Laboratory of Software Development Environment under Grant No.SKLSDE-07-001Beijing University of Aeronautics and Astronautics,the National Basic Research Program of China (973 Program) under Grant No.2005CB321901by the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.20060006024the Ministry of Education
文摘In the present paper, under investigation is a nonisospectral modified Kadomtsev-Petviashvili equation, which is shown to have two Painleve branches through the Painleve analysis. With symbolic computation, two Lax pairs for such an equation are derived by applying the generalized singular manifold method. Furthermore, based on the two obtained Lax pairs, the binary Darboux transformation is constructed and then the N-th-iterated potential transformation formula in the form of Grammian is also presented.
基金Supported by the National Natural Science Foundation of China under Grant No.60772023the Open Fund (No.BUAASKLSDE-09KF-04)+2 种基金Supported Project (No.SKLSDE-2010ZX-07) of the State Key Laboratory of Software Development Environment,Beijing University of Aeronautics and Astronauticsthe National Basic Research Program of China (973 Program) under Grant No.2005CB321901the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.200800130006,Chinese Ministry of Education
文摘Investigated in this paper is the generalized nonlinear Schrodinger equation with radial symmetry. With the help of symbolic computation, the one-, two-, and N-soliton solutions are obtained through the bilinear method. B^cklund transformation in the bilinear form is presented, through which a new solution is constructed. Graphically, we have found that the solitons are symmetric about x = O, while the soliton pulse width and amplitude will change along with the distance and time during the propagation.
基金Supported by the National Natural Science Foundation of China ( No. 60972051, 61001107 ), the Major National Science & Technology Pro- jects ( No. 2010ZX03006-002-04) and the Project of Natural Science Foundation of Jiangsu ( No. BK2010101 ).
文摘In this paper, exact outage probability and symbol error rate (SER) expressions are derived in closed-form for dual-hop amplify-and-forward cooperative network over independent non-identically Nakagami-m fading channels. In the analysis, partial relay selection is employed. This selection scheme proposed recently is found applicable in different wireless systems such as ad hoc and sensor networks. The results are verified through comparison with Monte Carlo simulations.
文摘Taking the (2+1)-dimensional Broer-Kaup-Kupershmidt system as a simple example, some families of rational form solitary wave solutions, triangular periodic wave solutions, and rational wave solutions are constructed by using the Riccati equation rational expansion method presented by us. The method can also be applied to solve more nonlinear partial differential equation or equations.
文摘The adaptation of the novel A Pedra do Reino e o principe do sangue do vai-e-volta, (1971), by Ariano Suassuna, for the minisseries A Pedra do Reino2 (2007) directed by Luiz Fernando Carvalho, in the microseries format, has caused surprise and bewilderment to reviewers and audience alike. The extensive and originally hermetic literary work, when re-created for television, became difficult to understand, resulting in poor reception by the public - though highly praised by reviewers - compared to works in the same format and time of exhibition. In this study, the author proposes a reflection, in the light of semiotic and communication theories, in order to understand the relationship between the work and the viewer. The analysis takes into account especially the options of the expression plan as well as the closeness that the audiovisual narrative maintains with the literary work. The conclusion reached is that the introduction of the elements of the enunciation - person, time and place - inherited from the novel, as well as expressive options like camera movements, light, prosody and gesture, impart an excessively accelerated rhythm, which interferes in the understanding of the work and in its consequent reception.
文摘Traditional Chinese architecture in the narrative of a system has existed more than 3,000 years. As the core values of the enlightenment function of social ethics, traditional architecture externalizes symbol of "state" sensual ethical echo. So metaphorical rules in architecture can combine with the normal life. Traditional architectural form as famous communication home Marshall McLuhan's "human extension", leads the order and the rules in the form of elevation. The spread of universal ethics, traditional architectural symmetry axis ceremony, and the adornment of the mythical thinking component, are traditional Chinese ethics of society to describe the core of creation through three points sequence structure constraint. The wisdom of metaphor in these ideas is the life gene of Chinese culture. In the construction of the contemporary social upheaval spreading vision, recognition of traditional architecture ethics through righteousness obviously has been recasting social ethics of "treatment".
基金Supported by the National Natural Science Foundation of China under Grant No.60772023the Open Fund No.BUAA-SKLSDE-09KF-04+2 种基金Supported Project No.SKLSDE-2010ZX-07 of the State Key Laboratory of Software Development Environment,Beijing University of Aeronautics and Astronauticsthe National Basic Research Program of China (973 Program) under Grant No.2005CB321901 the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No.200800130006,Chinese Ministry of Education
文摘Under investigation in this paper are two coupled integrable dispersionless (CID) equations modelingthe dynamics of the current-fed string within an external magnetic field.Through a set of the dependent variabletransformations, the bilinear forms for the CID equations are derived.Based on the Hirota method and symboliccomputation, the analytic N-soliton solutions are presented.Infinitely many conservation laws for the CID equationsare given through the known spectral problem.Propagation characteristics and interaction behaviors of the solitons areanalyzed graphically.
基金Supported by Scientific Research Fund of Zhejiang Provincial Education Department under Grant No.20070979the National Natural Science Foundations of China under Grant Nos.10675065 and 10735030+1 种基金the Scientific Research Found of Ningbo University under Grant No.XKL09059the K.C.Wong Magana Fund in Ningbo University
文摘An improved algorithm for symbolic computation of Hirota bilinear forms of KdV-type equations withlogarithmic transformations is presented.In the algorithm,the general assumption of Hirota bilinear form is successfullyreduced based on the property of uniformity in rank.Furthermore,we discard the integral operation in the traditionalalgorithm.The software package HBFTrans is written in Maple and its running effectiveness is tested by a variety solitonequations.
文摘Several computer theorists and professionals share the concepts of "signifier" and "signified" in intuitive terms but are often unfamiliar with semiotics. There is a special digital divide between semiotics and the technology, because the semiotic notions are usually expressed through verbal expressions instead engineers use the mathematical language. In the first step, the present study suggests the formal descriptions of the signifier and the signified. In the second step, we show how these formal definitions are able to justify the hardware structure of a computer system, and even other properties of computing which are currently presented on the as-is basis. Concluding, the basic concepts of semiotics can unveil intriguing aspect of information technology
基金the Shanxi Natural Science Foundation (20011006, 20041010)
文摘A sign pattern is a matrix whose entries axe from the set {+,-,0}. A sign pattern is a generalized star sign pattern if it is combinatorial symmetric and its graph is a generalized star graph. The purpose of this paper is to obtain the bound of minimal rank of any generalized star sign pattern (possibly with nonzero diagonal entries).
基金Supported by Shanxi Natural Science Foundation(20011006)
文摘A matrix whose entries are +,-, and 0 is called a sign pattern matrix. Let k be arbitrary positive integer. We first characterize sign patterns A such that .Ak≤0. Further, we determine the maximum number of negative entries that can occur in A whenever Ak≤0. Finally, we give a necessity and sufficiency condition for A2≤0.
文摘Establishing a philosophical theory or a paradigm of philosophical understanding should be premised on its possession of a relatively well-defined research subject, relatively original research methodology, and relatively outstanding theoretical objectives. In this regard, philosophy of culture aims at a general understanding of man through cultural symbols which in themselves are not the end of the research. Using the research methodology of historical science, philosophy of culture attempts to understand man as a non-continuous and heterogeneous being. The theoretical objective of philosophy of culture is the criticism and reconstruction of cultural patterns with cultural symbols at their core.
基金the National Natural Science Foundation of China (No. 60773119)
文摘A new expanded approach is presented to find exact solutions of nonlinear differential-difference equations. As its application, the soliton solutions and periodic solutions of a lattice equation are obtained.
基金supported by National Natural Science Foundation of China (Grant No.11171140)the PAPD of Jiangsu Higher Education Institutions
文摘For integers b and c the generalized central trinomial coefficient Tn(b,c)denotes the coefficient of xnin the expansion of(x2+bx+c)n.Those Tn=Tn(1,1)(n=0,1,2,...)are the usual central trinomial coefficients,and Tn(3,2)coincides with the Delannoy number Dn=n k=0n k n+k k in combinatorics.We investigate congruences involving generalized central trinomial coefficients systematically.Here are some typical results:For each n=1,2,3,...,we have n-1k=0(2k+1)Tk(b,c)2(b2-4c)n-1-k≡0(mod n2)and in particular n2|n-1k=0(2k+1)D2k;if p is an odd prime then p-1k=0T2k≡-1p(mod p)and p-1k=0D2k≡2p(mod p),where(-)denotes the Legendre symbol.We also raise several conjectures some of which involve parameters in the representations of primes by certain binary quadratic forms.