文章在广泛收集研究区已有地质、物探、化探、遥感等资料的基础上,基于GIS建立了湖南省地学空间数据库。通过对比分析多个不同成因类型金矿床的成矿条件,建立矿床统计学预测数学模型,选取四大类68个标志信息,利用DPIS系统(Deposit’s Po...文章在广泛收集研究区已有地质、物探、化探、遥感等资料的基础上,基于GIS建立了湖南省地学空间数据库。通过对比分析多个不同成因类型金矿床的成矿条件,建立矿床统计学预测数学模型,选取四大类68个标志信息,利用DPIS系统(Deposit’s Position Indicating System)的信息量计算法,筛选出25个有用找矿地质标志,并计算出各标志对预测湖南省金矿的影响因子,最终圈定了研究区金成矿信息总量异常区,结合地质、矿产、化探等数据综合分析,进行金矿床定位预测。展开更多
TH742.64 2003053947共焦扫描荧光显微镜的信噪比与信息量=Signal-to-noiseratio and information capacity of a confocal scanning fluorescencemicroscope[刊,中]/高万荣(南京理工大学电光学院.江苏,南京(210094)),杨晓春…//光学学...TH742.64 2003053947共焦扫描荧光显微镜的信噪比与信息量=Signal-to-noiseratio and information capacity of a confocal scanning fluorescencemicroscope[刊,中]/高万荣(南京理工大学电光学院.江苏,南京(210094)),杨晓春…//光学学报.—2002,22(10).—1229-1235运用光学信息量的概念,在已有的光学成像系统信息量计算、共焦扫描荧光显微镜信噪比及传递函数计算的基础上,详细分析了共焦扫描荧光显微镜信息量与信噪比等之间的定量关系。该关系表明,为了充分利用共焦扫描荧光显微镜的成像性能。展开更多
Information embodied in machine component classification codes has internal relation with the probability distribu- tion of the code symbol. This paper presents a model considering codes as information source based on...Information embodied in machine component classification codes has internal relation with the probability distribu- tion of the code symbol. This paper presents a model considering codes as information source based on Shannon’s information theory. Using information entropy, it preserves the mathematical form and quantitatively measures the information amount of a symbol and a bit in the machine component classification coding system. It also gets the maximum value of information amount and the corresponding coding scheme when the category of symbols is fixed. Samples are given to show how to evaluate the information amount of component codes and how to optimize a coding system.展开更多
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encode...A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.展开更多
To improve the efficiency of the attribute reduction, we present an attribute reduction algorithm based on background knowledge and information entropy by making use of background knowledge from research fields. Under...To improve the efficiency of the attribute reduction, we present an attribute reduction algorithm based on background knowledge and information entropy by making use of background knowledge from research fields. Under the condition of known background knowledge, the algorithm can not only greatly improve the efficiency of attribute reduction, but also avoid the defection of information entropy partial to attribute with much value. The experimental result verifies that the algorithm is effective. In the end, the algorithm produces better results when applied in the classification of the star spectra data.展开更多
To find the optimal routing is always an important topic in wireless sensor networks (WSNs). Considering a WSN where the nodes have limited energy, we propose a novel Energy*Delay model based on ant algorithms ("...To find the optimal routing is always an important topic in wireless sensor networks (WSNs). Considering a WSN where the nodes have limited energy, we propose a novel Energy*Delay model based on ant algorithms ("E&D ANTS" for short) to minimize the time delay in transferring a fixed number of data packets in an energy-constrained manner in one round. Our goal is not only to maximize the lifetime of the network but also to provide real-time data transmission services. However, because of the tradeoff of energy and delay in wireless network systems, the reinforcement learning (RL) algorithm is introduced to train the model. In this survey, the paradigm of E&D ANTS is explicated and compared to other ant-based routing algorithms like AntNet and AntChain about the issues of routing information, routing overhead and adaptation. Simulation results show that our method performs about seven times better than AntNet and also outperforms AntChain by more than 150% in terms of energy cost and delay per round.展开更多
Glacier length is a key morphological element that has many glaciological applications; however, it is often difficult to determine, especially for glaciers that cover larger spatial areas or those that exhibit freque...Glacier length is a key morphological element that has many glaciological applications; however, it is often difficult to determine, especially for glaciers that cover larger spatial areas or those that exhibit frequent temporal change. In this paper, we describe a new Arc GIS-based method that can derive glacier flow lines for determining glacier length based on digital elevation model and glacier outlines. This method involves(1) extraction of the highest and lowest points on a glacier,(2) calculation of 10-m contour lines on the glacier from 10 m to 100 m height, and(3) connection of the midpoints of each contour line with the highest and the lowest points in order to create a flow line, which is subsequently smoothed. In order to assess the reliability of this method, we tested the algorithm's results against flow lines calculated using field measurements, analysing data from the Chinese Glacier Inventory, and manual interpretation. These data showed that the new automated method is effective in deriving glacier flow lines when contour lines are relatively large; in particular, when they are between 70 m and 100 m. Nonetheless, a key limitation of the algorithm is the requirement to automatically delete repeated and closed curves in the pre-treatment processes. In addition to calculating glacier flow lines for derivation of glacier length, this method also can be used to effectively determine glacier terminus change.展开更多
文摘文章在广泛收集研究区已有地质、物探、化探、遥感等资料的基础上,基于GIS建立了湖南省地学空间数据库。通过对比分析多个不同成因类型金矿床的成矿条件,建立矿床统计学预测数学模型,选取四大类68个标志信息,利用DPIS系统(Deposit’s Position Indicating System)的信息量计算法,筛选出25个有用找矿地质标志,并计算出各标志对预测湖南省金矿的影响因子,最终圈定了研究区金成矿信息总量异常区,结合地质、矿产、化探等数据综合分析,进行金矿床定位预测。
文摘TH742.64 2003053947共焦扫描荧光显微镜的信噪比与信息量=Signal-to-noiseratio and information capacity of a confocal scanning fluorescencemicroscope[刊,中]/高万荣(南京理工大学电光学院.江苏,南京(210094)),杨晓春…//光学学报.—2002,22(10).—1229-1235运用光学信息量的概念,在已有的光学成像系统信息量计算、共焦扫描荧光显微镜信噪比及传递函数计算的基础上,详细分析了共焦扫描荧光显微镜信息量与信噪比等之间的定量关系。该关系表明,为了充分利用共焦扫描荧光显微镜的成像性能。
基金Projects supported by the Hi-Tech Research and Development Pro-gram (863) of China (No. 2004AA84ts03) and the Science and Technology Committee of Zhejiang Province (No. 2004C31018), China
文摘Information embodied in machine component classification codes has internal relation with the probability distribu- tion of the code symbol. This paper presents a model considering codes as information source based on Shannon’s information theory. Using information entropy, it preserves the mathematical form and quantitatively measures the information amount of a symbol and a bit in the machine component classification coding system. It also gets the maximum value of information amount and the corresponding coding scheme when the category of symbols is fixed. Samples are given to show how to evaluate the information amount of component codes and how to optimize a coding system.
基金supported in part by National Natural Science Foundation of China under Grant Nos.60573127,60773012,and 60873082Natural Science Foundation of Hunan Province under Grant Nos.07JJ3128 and 2008RS4016+1 种基金Scientific Research Fund of Hunan Provincial Education Department under Grant No.08B011Postdoctoral Science Foundation of China under Grant Nos.20070420184 and 200801341
文摘A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.
基金Supported by the National Natural Science Foundation of China(No. 60573075), the National High Technology Research and Development Program of China (No. 2003AA133060) and the Natural Science Foundation of Shanxi Province (No. 200601104).
文摘To improve the efficiency of the attribute reduction, we present an attribute reduction algorithm based on background knowledge and information entropy by making use of background knowledge from research fields. Under the condition of known background knowledge, the algorithm can not only greatly improve the efficiency of attribute reduction, but also avoid the defection of information entropy partial to attribute with much value. The experimental result verifies that the algorithm is effective. In the end, the algorithm produces better results when applied in the classification of the star spectra data.
基金Project (No. 30470461) supported in part by the National NaturalScience Foundation of China
文摘To find the optimal routing is always an important topic in wireless sensor networks (WSNs). Considering a WSN where the nodes have limited energy, we propose a novel Energy*Delay model based on ant algorithms ("E&D ANTS" for short) to minimize the time delay in transferring a fixed number of data packets in an energy-constrained manner in one round. Our goal is not only to maximize the lifetime of the network but also to provide real-time data transmission services. However, because of the tradeoff of energy and delay in wireless network systems, the reinforcement learning (RL) algorithm is introduced to train the model. In this survey, the paradigm of E&D ANTS is explicated and compared to other ant-based routing algorithms like AntNet and AntChain about the issues of routing information, routing overhead and adaptation. Simulation results show that our method performs about seven times better than AntNet and also outperforms AntChain by more than 150% in terms of energy cost and delay per round.
基金supported by the National Science Foundation of China (grant Nos. 41271024, 41444430204, and J1210065)the Fundamental Research Funds for the Central Universities (Nos. lzujbky-2016-266 and lzujbky2016-270)
文摘Glacier length is a key morphological element that has many glaciological applications; however, it is often difficult to determine, especially for glaciers that cover larger spatial areas or those that exhibit frequent temporal change. In this paper, we describe a new Arc GIS-based method that can derive glacier flow lines for determining glacier length based on digital elevation model and glacier outlines. This method involves(1) extraction of the highest and lowest points on a glacier,(2) calculation of 10-m contour lines on the glacier from 10 m to 100 m height, and(3) connection of the midpoints of each contour line with the highest and the lowest points in order to create a flow line, which is subsequently smoothed. In order to assess the reliability of this method, we tested the algorithm's results against flow lines calculated using field measurements, analysing data from the Chinese Glacier Inventory, and manual interpretation. These data showed that the new automated method is effective in deriving glacier flow lines when contour lines are relatively large; in particular, when they are between 70 m and 100 m. Nonetheless, a key limitation of the algorithm is the requirement to automatically delete repeated and closed curves in the pre-treatment processes. In addition to calculating glacier flow lines for derivation of glacier length, this method also can be used to effectively determine glacier terminus change.