The imaging of offset VSP data in local phase space can improve the image of the subsurface structure near the well.In this paper,we present a migration scheme for imaging VSP data in a local phase space,which uses th...The imaging of offset VSP data in local phase space can improve the image of the subsurface structure near the well.In this paper,we present a migration scheme for imaging VSP data in a local phase space,which uses the Gabor-Daubechies tight framebased extrapolator(G-D extrapolator) and its high-frequency asymptotic expansion to extrapolate wavefields and also delineates an improved correlation imaging condition in the local angle domain.The results for migrating synthetic and real VSP data demonstrate that the application of the high-frequency G-D extrapolator asymptotic expansion can effectively decrease computational complexity.The local angle domain correlation imaging condition can be used to weaken migration artifacts without increasing computation.展开更多
In conventional source-filter models, voiced and unvoiced components were considered independently. However, in practice it was difficult to separate the source into two parts. An actual source consists of a mixture o...In conventional source-filter models, voiced and unvoiced components were considered independently. However, in practice it was difficult to separate the source into two parts. An actual source consists of a mixture of two sources and the ratio varies according to the content or the intention of speaker. It had been investigated to separate the voiced and unvoiced components for different source models. Source signals were modeled based on the residual signal measured from inverse filtering. Three different source models were assumed. The parameters of each model were optimized for the original speech signal using a genetic algorithm. The resulting parameters were compared in terms of the mel-cepstral distance to the original signal, the spectrogram and the spectral envelope from the synthesized signal. The optimization method achieves an improvement of 15% for the Klatt model, but there is little improvement in the modified residual case.展开更多
A new analytical study on stresses around a post-tensioned anchor in rocks with two perpendicular joint sets is presented. The assumptions of orthotropic elastic rock with plane strain conditions are made in derivatio...A new analytical study on stresses around a post-tensioned anchor in rocks with two perpendicular joint sets is presented. The assumptions of orthotropic elastic rock with plane strain conditions are made in derivation of the formulations. A tri-linear bond-slip constitutive law is used for modeling the tendon-grout interface behavior and debonding of this interface. The bearing plate width is also considered in the analysis. The obtained solutions are in the integral forms and numerical techniques that have been used for evaluation. In the illustrative example given, the major principal stress is compressive in the anchor free zone and compressive stress concentrations of 815 k Pa and 727 k Pa(for the anchor load of 300 k N) are observed under the bearing plate and the bond length proximal end, respectively. However, large values of tensile stresses with the maximum of-434 k Pa are formed at the bond length distal end. The results obtained using the proposed solution are compared very those of numerical method(FEM).展开更多
A five-fingered underactuated prosthetic hand controlled by surface EMG (electromyographic) signals is presented in this paper. The prosthetic hand was designed with simplicity, lightweight and dexterity on the requir...A five-fingered underactuated prosthetic hand controlled by surface EMG (electromyographic) signals is presented in this paper. The prosthetic hand was designed with simplicity, lightweight and dexterity on the requirement of anthropomorphic hands. Underactuated self-adaptive theory was adopted to decrease the number of motors and weight. The control part of the prosthetic hand was based on a surface EMG motion pattern classifier which combines LM-based (Levenberg-Marquardt) neural network with the parametric AR (autoregressive) model. This motion pattern classifier can successfully identify the flexions of the thumb, the index finger and the middle finger by measuring the surface EMG signals through two electrodes mounted on the flexor digitorum profundus and flexor pollicis longus. Furthermore, via continuously controlling a single finger's motion, the five-fingered underactuated prosthetic hand can achieve more prehensile postures such as power grasp, centralized grip, fingertip grasp, cylindrical grasp, etc. The experimental results show that the classifier has a great potential application to the control of bionic man-machine systems because of its fast learning speed, high recognition capability and strong robustness.展开更多
In this paper, an absorbing Fictitious Boundary Condition (FBC) is presented to generate an iterative Domain Decomposition Method (DDM) for analyzing waveguide problems.The relaxed algorithm is introduced to improve t...In this paper, an absorbing Fictitious Boundary Condition (FBC) is presented to generate an iterative Domain Decomposition Method (DDM) for analyzing waveguide problems.The relaxed algorithm is introduced to improve the iterative convergence. And the matrix equations are solved using the multifrontal algorithm. The resulting CPU time is greatly reduced.Finally, a number of numerical examples are given to illustrate its accuracy and efficiency.展开更多
The inner relationship between Markov random field(MRF) and Markov chain random field(MCRF) is discussed. MCRF is a special MRF for dealing with high-order interactions of sparse data. It consists of a single spatial ...The inner relationship between Markov random field(MRF) and Markov chain random field(MCRF) is discussed. MCRF is a special MRF for dealing with high-order interactions of sparse data. It consists of a single spatial Markov chain(SMC) that can move in the whole space. Generally, the theoretical backbone of MCRF is conditional independence assumption, which is a way around the problem of knowing joint probabilities of multi-points. This so-called Naive Bayes assumption should not be taken lightly and should be checked whenever possible because it is mathematically difficult to prove. Rather than trap in this independence proving, an appropriate potential function in MRF theory is chosen instead. The MCRF formulas are well deduced and the joint probability of MRF is presented by localization approach, so that the complicated parameter estimation algorithm and iteration process can be avoided. The MCRF model is then applied to the lithofacies identification of a region and compared with triplex Markov chain(TMC) simulation. Analyses show that the MCRF model will not cause underestimation problem and can better reflect the geological sedimentation process.展开更多
This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essenti...This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V.展开更多
Recently, various concepts of D-η-properly prequasi-invex functions were introduced and characterizations of D-η-properly prequasi-invex functions were presented under a certain set of conditions. In this paper, we ...Recently, various concepts of D-η-properly prequasi-invex functions were introduced and characterizations of D-η-properly prequasi-invex functions were presented under a certain set of conditions. In this paper, we show that the same results can be obtained under weaker assumptions.展开更多
基金supported by the National Hi-Tech Research and Development Program of China (Grant No.2006AA09A102-11)the National Natural Science Fund of China (Grant No.40730424 and 40674064)
文摘The imaging of offset VSP data in local phase space can improve the image of the subsurface structure near the well.In this paper,we present a migration scheme for imaging VSP data in a local phase space,which uses the Gabor-Daubechies tight framebased extrapolator(G-D extrapolator) and its high-frequency asymptotic expansion to extrapolate wavefields and also delineates an improved correlation imaging condition in the local angle domain.The results for migrating synthetic and real VSP data demonstrate that the application of the high-frequency G-D extrapolator asymptotic expansion can effectively decrease computational complexity.The local angle domain correlation imaging condition can be used to weaken migration artifacts without increasing computation.
基金supported by the Second Stage of Brain Korea 21 Projects
文摘In conventional source-filter models, voiced and unvoiced components were considered independently. However, in practice it was difficult to separate the source into two parts. An actual source consists of a mixture of two sources and the ratio varies according to the content or the intention of speaker. It had been investigated to separate the voiced and unvoiced components for different source models. Source signals were modeled based on the residual signal measured from inverse filtering. Three different source models were assumed. The parameters of each model were optimized for the original speech signal using a genetic algorithm. The resulting parameters were compared in terms of the mel-cepstral distance to the original signal, the spectrogram and the spectral envelope from the synthesized signal. The optimization method achieves an improvement of 15% for the Klatt model, but there is little improvement in the modified residual case.
文摘A new analytical study on stresses around a post-tensioned anchor in rocks with two perpendicular joint sets is presented. The assumptions of orthotropic elastic rock with plane strain conditions are made in derivation of the formulations. A tri-linear bond-slip constitutive law is used for modeling the tendon-grout interface behavior and debonding of this interface. The bearing plate width is also considered in the analysis. The obtained solutions are in the integral forms and numerical techniques that have been used for evaluation. In the illustrative example given, the major principal stress is compressive in the anchor free zone and compressive stress concentrations of 815 k Pa and 727 k Pa(for the anchor load of 300 k N) are observed under the bearing plate and the bond length proximal end, respectively. However, large values of tensile stresses with the maximum of-434 k Pa are formed at the bond length distal end. The results obtained using the proposed solution are compared very those of numerical method(FEM).
基金the National Natural Science Foundation of China (Grant No. 50435040)Development Programfor Outstanding Young Teachers in Har-bin Institute of Technology(Grant No. HITQNJS.2007.011)
文摘A five-fingered underactuated prosthetic hand controlled by surface EMG (electromyographic) signals is presented in this paper. The prosthetic hand was designed with simplicity, lightweight and dexterity on the requirement of anthropomorphic hands. Underactuated self-adaptive theory was adopted to decrease the number of motors and weight. The control part of the prosthetic hand was based on a surface EMG motion pattern classifier which combines LM-based (Levenberg-Marquardt) neural network with the parametric AR (autoregressive) model. This motion pattern classifier can successfully identify the flexions of the thumb, the index finger and the middle finger by measuring the surface EMG signals through two electrodes mounted on the flexor digitorum profundus and flexor pollicis longus. Furthermore, via continuously controlling a single finger's motion, the five-fingered underactuated prosthetic hand can achieve more prehensile postures such as power grasp, centralized grip, fingertip grasp, cylindrical grasp, etc. The experimental results show that the classifier has a great potential application to the control of bionic man-machine systems because of its fast learning speed, high recognition capability and strong robustness.
文摘In this paper, an absorbing Fictitious Boundary Condition (FBC) is presented to generate an iterative Domain Decomposition Method (DDM) for analyzing waveguide problems.The relaxed algorithm is introduced to improve the iterative convergence. And the matrix equations are solved using the multifrontal algorithm. The resulting CPU time is greatly reduced.Finally, a number of numerical examples are given to illustrate its accuracy and efficiency.
基金Project(2011ZX05002-005-006) supported by the National Science and Technology Major Research Program during the Twelfth Five-Year Plan of China
文摘The inner relationship between Markov random field(MRF) and Markov chain random field(MCRF) is discussed. MCRF is a special MRF for dealing with high-order interactions of sparse data. It consists of a single spatial Markov chain(SMC) that can move in the whole space. Generally, the theoretical backbone of MCRF is conditional independence assumption, which is a way around the problem of knowing joint probabilities of multi-points. This so-called Naive Bayes assumption should not be taken lightly and should be checked whenever possible because it is mathematically difficult to prove. Rather than trap in this independence proving, an appropriate potential function in MRF theory is chosen instead. The MCRF formulas are well deduced and the joint probability of MRF is presented by localization approach, so that the complicated parameter estimation algorithm and iteration process can be avoided. The MCRF model is then applied to the lithofacies identification of a region and compared with triplex Markov chain(TMC) simulation. Analyses show that the MCRF model will not cause underestimation problem and can better reflect the geological sedimentation process.
基金supported by key special project of National Key Research and Development Program (2017YFC0803900)
文摘This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V.
基金The research was partially supported by the National Natural Science Foundation of China under Grants No 60473097 and 70671064.
文摘Recently, various concepts of D-η-properly prequasi-invex functions were introduced and characterizations of D-η-properly prequasi-invex functions were presented under a certain set of conditions. In this paper, we show that the same results can be obtained under weaker assumptions.