Let { E i∶i∈I } be a family of Archimedean Riesz algebras.The product of Riesz algebras is denoted by Π i∈I E i .The main result in this paper is the following conclusion:there ...Let { E i∶i∈I } be a family of Archimedean Riesz algebras.The product of Riesz algebras is denoted by Π i∈I E i .The main result in this paper is the following conclusion:there exists a completely regular Hausdorff space X such that Π i∈I E i is Riesz algebra isomorphic to C(X) if and only if for every i∈I there exists a completely regular Hausdorff space X i such that E i is Riesz algebra isomorphic to C(X i) .展开更多
Comfort levels on modern superyachts have recently been the object of specific attention of the most important Classification Societies, which issued new rules and regulations for evaluating noise and vibration maximu...Comfort levels on modern superyachts have recently been the object of specific attention of the most important Classification Societies, which issued new rules and regulations for evaluating noise and vibration maximum levels. These rules are named "Comfort Class Rules" and set the general criteria for noise and vibration measurements in different vessels' areas, as well as the maximum noise and vibration limit values. As far as the vibration assessment is concerned, the Comfort Class Rules follow either the ISO 6954:1984 standard or the ISO 6954:2000. After an introduction to these relevant standards, the authors herein present a procedure developed to predict the vibration levels on ships. This procedure builds on finite element linear dynamic analysis and is applied to predict the vibration levels on a 60 m superyacht considered as a case study. The results of the numerical simulations are then benchmarked against experimental data acquired during the sea trial of the vessel. This analysis also allows the authors to evaluate the global damping ratio to be used by designers in the vibration analysis of superyachts.展开更多
We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic binary sequences constructed using the Legendre symbol,both of which are derived from Fermat quotie...We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic binary sequences constructed using the Legendre symbol,both of which are derived from Fermat quotients modulo an odd prime p.If 2 is a primitive element modulo p2,the linear complexity equals to p2-p or p2-1,which is very close to the period and it is large enough for cryptographic purpose.展开更多
In the present paper, we examine the performance of an efficient type of wave-absorbing porous marine structure under the attack of regular oblique waves by using a Multi-Domain Boundary Element Method(MDBEM). The str...In the present paper, we examine the performance of an efficient type of wave-absorbing porous marine structure under the attack of regular oblique waves by using a Multi-Domain Boundary Element Method(MDBEM). The structure consists of two perforated vertical thin barriers creating what can be called a wave absorbing chamber system. The barriers are surface piercing, thereby eliminating wave overtopping. The problem of the interaction of obliquely incident linear waves upon a pair of perforated barriers is first formulated in the context of linear diffraction theory. The resulting boundary integral equation, which is matched with far-field solutions presented in terms of analytical series with unknown coefficients, as well as the appropriate boundary conditions at the free surface, seabed, and barriers, is then solved numerically using MDBEM. Dissipation of the wave energy due to the presence of the perforated barriers is represented by a simple yet effective relation in terms of the porosity parameter appropriate for thin perforated walls. The results are presented in terms of reflection and transmission coefficients. The effects of the incident wave angles, relative water depths, porosities, depths of the walls, and other major parameters of interest are explored.展开更多
The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in...The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants.展开更多
A methodology for topology optimization based on element independent nodal density(EIND) is developed.Nodal densities are implemented as the design variables and interpolated onto element space to determine the densit...A methodology for topology optimization based on element independent nodal density(EIND) is developed.Nodal densities are implemented as the design variables and interpolated onto element space to determine the density of any point with Shepard interpolation function.The influence of the diameter of interpolation is discussed which shows good robustness.The new approach is demonstrated on the minimum volume problem subjected to a displacement constraint.The rational approximation for material properties(RAMP) method and a dual programming optimization algorithm are used to penalize the intermediate density point to achieve nearly 0-1 solutions.Solutions are shown to meet stability,mesh dependence or non-checkerboard patterns of topology optimization without additional constraints.Finally,the computational efficiency is greatly improved by multithread parallel computing with OpenMP.展开更多
Classical mathematical morphology operations use a fixed size and shape structuring element to process the whole image.Due to the diversity of image content and the complexity of target structure,for processed image,i...Classical mathematical morphology operations use a fixed size and shape structuring element to process the whole image.Due to the diversity of image content and the complexity of target structure,for processed image,its shape may be changed and part of the information may be lost.Therefore,we propose a method for constructing salience adaptive morphological structuring elements based on minimum spanning tree(MST).First,the gradient image of the input image is calculated,the edge image is obtained by non-maximum suppression(NMS)of the gradient image,and then chamfer distance transformation is performed on the edge image to obtain a salience map(SM).Second,the radius of structuring element is determined by calculating the maximum and minimum values of SM and then the minimum spanning tree is calculated on the SM.Finally,the radius is used to construct a structuring element whose shape and size adaptively change with the local features of the input image.In addition,the basic morphological operators such as erosion,dilation,opening and closing are redefined using the adaptive structuring elements and then compared with the classical morphological operators.The simulation results show that the proposed method can make full use of the local features of the image and has better processing results in image structure preservation and image filtering.展开更多
The standard method to construct a finite field requires a primitive irreducible polynomial of a given degree. Therefore, it is difficult to apply for the construction of huge finite fields. To avoid this problem, we ...The standard method to construct a finite field requires a primitive irreducible polynomial of a given degree. Therefore, it is difficult to apply for the construction of huge finite fields. To avoid this problem, we propose a new method to construct huge finite fields with the characteristic p = 5 by using an Artin-Schreier tower. Utilizing the recursive basis of the Artin-Schreier tower, we define a nmltiplication algorithm The algorithm can explicitly calculate the multiplication of two elements on the top finite field of this tower, without any primitive element. We also define a linear recurrence equation as an application, which produces a sequence of numbers, and call the new pseudorandom number generator Abstract Syntax Tree (AST) for p = 5. The experircental results show that our new pseudorandom number generator can produce a sequence of numbers with a long period.展开更多
The element partitioning in a Pb-Bi concentrate oxygen-rich bath smelting process was studied using thermodynamic equilibrium simulation method. Effects of oxygen to feed ratio(OFR) and sulfur dioxide partial pressure...The element partitioning in a Pb-Bi concentrate oxygen-rich bath smelting process was studied using thermodynamic equilibrium simulation method. Effects of oxygen to feed ratio(OFR) and sulfur dioxide partial pressure(pSO2) on the partitionings of Bi, Pb, As, Sb, Cu and Ag were analyzed and compared with industrial data. The results suggested that the optimal OFR was between 6.3 and 6.8 kmol/t to maximize Bi, Pb, Cu and Ag partitioning in the metal phase. Further increase of OFR led to the drop of metal partitioning and increase of slag liquidus temperature. High pSO2 led to high deportment of Bi and Pb in the gas phase mainly in the form of sulfides, suggesting that a low pSO2 was conducive for reducing the dust ratio.展开更多
Abstract: A hierarchical method for scene analysis in audio sensor networks is proposed. This meth-od consists of two stages: element detection stage and audio scene analysis stage. In the former stage, the basic au...Abstract: A hierarchical method for scene analysis in audio sensor networks is proposed. This meth-od consists of two stages: element detection stage and audio scene analysis stage. In the former stage, the basic audio elements are modeled by the HMM models and trained by enough samples off-line, and we adaptively add or remove basic ele- ment from the targeted element pool according to the time, place and other environment parameters. In the latter stage, a data fusion algorithm is used to combine the sensory information of the same ar-ea, and then, a role-based method is employed to analyze the audio scene based on the fused data. We conduct some experiments to evaluate the per-formance of the proposed method that about 70% audio scenes can be detected correctly by this method. The experiment evaluations demonstrate that our method can achieve satisfactory results.展开更多
Nine Platanus acerifolia (Ait.) Willd. trees growing in the Nanjing Children Teacher’s School, Nanjing,China, were selected to determine the contents of 13 chemical elements both in the 1994’s growth rings,C(Z, t), ...Nine Platanus acerifolia (Ait.) Willd. trees growing in the Nanjing Children Teacher’s School, Nanjing,China, were selected to determine the contents of 13 chemical elements both in the 1994’s growth rings,C(Z, t), and in the soils near the roots, C’(Z, t), of the trees. The results showed that the relationship between C(Z, t) and C’(Z, t) followed the logarithmic linear correlation model, lgC’(Z, t)=a(Z)+b(Z) ig C (Z, t).Based on this model the chrono-sequences of chemical element contents in the soils were reproduced from those in the tree rings; i.e., the dynamic variations in the chemical element contents of the soils at the sites were traced. In this study the chrono-sequences of the chemical elements including Cd, Ph, Mn, Co and Zn in the soils near the roots of a Platanus acerifolia tree from 1957 to 1994 were established, and the background values of Cd, Pb, Mn, Co and Zn in the soil were calculated by taking the lowest values of the chrono-sequences of the element contents as upper limits of the background values.展开更多
The previous methods of figuring the numbers of chemical elements is summed up in this paper. Based on that, another two creative calculative methods are introduced as well.
In this paper, we study the rank of matrices over GF(2~p),and propose two construction methods for algebraic-based nonbinary LDPC codes from an existing LDPC code, referred to as the original code. By multiplying all ...In this paper, we study the rank of matrices over GF(2~p),and propose two construction methods for algebraic-based nonbinary LDPC codes from an existing LDPC code, referred to as the original code. By multiplying all elements of each column of the binary parity-check matrix H corresponding to the original code with the same nonzero element of any field, the first class of nonbinary LDPC codes with flexible field order is proposed. The second method is to replace the nonzero elements of some columns in H with different nonzero field elements in a given field, and then another class of nonbinary LDPC codes with various rates is obtained. Simulation results show that the proposed nonbinary LDPC codes perform well over the AWGN channel with the iterative decoding algorithms.展开更多
A novel algorithm for image edge detection is presented. This algorithm combines the nonsubsampled contourlet transform and the mathematical morphology. First, the source image is decomposed by the nonsubsampled conto...A novel algorithm for image edge detection is presented. This algorithm combines the nonsubsampled contourlet transform and the mathematical morphology. First, the source image is decomposed by the nonsubsampled contourlet transform into multi-scale and multi-directional subbands. Then the edges in the high-frequency and low-frequency sub-bands are respectively extracted by the dualthreshold modulus maxima method and the mathematical morphology operator. Finally, the edges from the high- frequency and low-frequency sub-bands are integrated to the edges of the source image, which are refined, and isolated points are excluded to achieve the edges of the source image. The simulation results show that the proposed algorithm can effectively suppress noise, eliminate pseudo-edges and overcome the adverse effects caused by uneven illumination to a certain extent. Compared with the traditional methods such as LoG, Sobel, and Carmy operators and the modulus maxima algorithm, the proposed method can maintain sufficient positioning accuracy and edge details, and it can also make an improvement in the completeness, smoothness and clearness of the outline.展开更多
文摘Let { E i∶i∈I } be a family of Archimedean Riesz algebras.The product of Riesz algebras is denoted by Π i∈I E i .The main result in this paper is the following conclusion:there exists a completely regular Hausdorff space X such that Π i∈I E i is Riesz algebra isomorphic to C(X) if and only if for every i∈I there exists a completely regular Hausdorff space X i such that E i is Riesz algebra isomorphic to C(X i) .
文摘Comfort levels on modern superyachts have recently been the object of specific attention of the most important Classification Societies, which issued new rules and regulations for evaluating noise and vibration maximum levels. These rules are named "Comfort Class Rules" and set the general criteria for noise and vibration measurements in different vessels' areas, as well as the maximum noise and vibration limit values. As far as the vibration assessment is concerned, the Comfort Class Rules follow either the ISO 6954:1984 standard or the ISO 6954:2000. After an introduction to these relevant standards, the authors herein present a procedure developed to predict the vibration levels on ships. This procedure builds on finite element linear dynamic analysis and is applied to predict the vibration levels on a 60 m superyacht considered as a case study. The results of the numerical simulations are then benchmarked against experimental data acquired during the sea trial of the vessel. This analysis also allows the authors to evaluate the global damping ratio to be used by designers in the vibration analysis of superyachts.
基金the National Natural Science Foundation of China,the Open Funds of State Key Laboratory of Information Security (Chinese Academy of Sciences),the Program for New Century Excellent Talents in Fujian Province University
文摘We determined the linear complexity of a family of p2-periodic binary threshold sequences and a family of p2-periodic binary sequences constructed using the Legendre symbol,both of which are derived from Fermat quotients modulo an odd prime p.If 2 is a primitive element modulo p2,the linear complexity equals to p2-p or p2-1,which is very close to the period and it is large enough for cryptographic purpose.
文摘In the present paper, we examine the performance of an efficient type of wave-absorbing porous marine structure under the attack of regular oblique waves by using a Multi-Domain Boundary Element Method(MDBEM). The structure consists of two perforated vertical thin barriers creating what can be called a wave absorbing chamber system. The barriers are surface piercing, thereby eliminating wave overtopping. The problem of the interaction of obliquely incident linear waves upon a pair of perforated barriers is first formulated in the context of linear diffraction theory. The resulting boundary integral equation, which is matched with far-field solutions presented in terms of analytical series with unknown coefficients, as well as the appropriate boundary conditions at the free surface, seabed, and barriers, is then solved numerically using MDBEM. Dissipation of the wave energy due to the presence of the perforated barriers is represented by a simple yet effective relation in terms of the porosity parameter appropriate for thin perforated walls. The results are presented in terms of reflection and transmission coefficients. The effects of the incident wave angles, relative water depths, porosities, depths of the walls, and other major parameters of interest are explored.
基金supported in part by the National Nature Science Foundation of China under Grant No.61402413 and 61340058 the "Six Kinds Peak Talents Plan" project of Jiangsu Province under Grant No.ll-JY-009+2 种基金the Nature Science Foundation of Zhejiang Province under Grant No.LY14F020019, Z14F020006 and Y1101183the China Postdoctoral Science Foundation funded project under Grant No.2012M511732Jiangsu Province Postdoctoral Science Foundation funded project Grant No.1102014C
文摘The Cloud is increasingly being used to store and process big data for its tenants and classical security mechanisms using encryption are neither sufficiently efficient nor suited to the task of protecting big data in the Cloud.In this paper,we present an alternative approach which divides big data into sequenced parts and stores them among multiple Cloud storage service providers.Instead of protecting the big data itself,the proposed scheme protects the mapping of the various data elements to each provider using a trapdoor function.Analysis,comparison and simulation prove that the proposed scheme is efficient and secure for the big data of Cloud tenants.
基金Projects(11372055,11302033)supported by the National Natural Science Foundation of ChinaProject supported by the Huxiang Scholar Foundation from Changsha University of Science and Technology,ChinaProject(2012KFJJ02)supported by the Key Labortory of Lightweight and Reliability Technology for Engineering Velicle,Education Department of Hunan Province,China
文摘A methodology for topology optimization based on element independent nodal density(EIND) is developed.Nodal densities are implemented as the design variables and interpolated onto element space to determine the density of any point with Shepard interpolation function.The influence of the diameter of interpolation is discussed which shows good robustness.The new approach is demonstrated on the minimum volume problem subjected to a displacement constraint.The rational approximation for material properties(RAMP) method and a dual programming optimization algorithm are used to penalize the intermediate density point to achieve nearly 0-1 solutions.Solutions are shown to meet stability,mesh dependence or non-checkerboard patterns of topology optimization without additional constraints.Finally,the computational efficiency is greatly improved by multithread parallel computing with OpenMP.
基金National Natural Science Foundation of China(No.61761027)。
文摘Classical mathematical morphology operations use a fixed size and shape structuring element to process the whole image.Due to the diversity of image content and the complexity of target structure,for processed image,its shape may be changed and part of the information may be lost.Therefore,we propose a method for constructing salience adaptive morphological structuring elements based on minimum spanning tree(MST).First,the gradient image of the input image is calculated,the edge image is obtained by non-maximum suppression(NMS)of the gradient image,and then chamfer distance transformation is performed on the edge image to obtain a salience map(SM).Second,the radius of structuring element is determined by calculating the maximum and minimum values of SM and then the minimum spanning tree is calculated on the SM.Finally,the radius is used to construct a structuring element whose shape and size adaptively change with the local features of the input image.In addition,the basic morphological operators such as erosion,dilation,opening and closing are redefined using the adaptive structuring elements and then compared with the classical morphological operators.The simulation results show that the proposed method can make full use of the local features of the image and has better processing results in image structure preservation and image filtering.
基金supported by Overseas Scholars Research Fund of Heilongjiang Provinicial Education Department
文摘The standard method to construct a finite field requires a primitive irreducible polynomial of a given degree. Therefore, it is difficult to apply for the construction of huge finite fields. To avoid this problem, we propose a new method to construct huge finite fields with the characteristic p = 5 by using an Artin-Schreier tower. Utilizing the recursive basis of the Artin-Schreier tower, we define a nmltiplication algorithm The algorithm can explicitly calculate the multiplication of two elements on the top finite field of this tower, without any primitive element. We also define a linear recurrence equation as an application, which produces a sequence of numbers, and call the new pseudorandom number generator Abstract Syntax Tree (AST) for p = 5. The experircental results show that our new pseudorandom number generator can produce a sequence of numbers with a long period.
基金financial supports from the National Key R&D Program of China (2018YFC1901604)the Natural Science Foundation of Hunan Province,China (2018JJ3662)+1 种基金the China Scholarship Council (201706375005)the China Postdoctoral Science Foundation (2018M632988)。
文摘The element partitioning in a Pb-Bi concentrate oxygen-rich bath smelting process was studied using thermodynamic equilibrium simulation method. Effects of oxygen to feed ratio(OFR) and sulfur dioxide partial pressure(pSO2) on the partitionings of Bi, Pb, As, Sb, Cu and Ag were analyzed and compared with industrial data. The results suggested that the optimal OFR was between 6.3 and 6.8 kmol/t to maximize Bi, Pb, Cu and Ag partitioning in the metal phase. Further increase of OFR led to the drop of metal partitioning and increase of slag liquidus temperature. High pSO2 led to high deportment of Bi and Pb in the gas phase mainly in the form of sulfides, suggesting that a low pSO2 was conducive for reducing the dust ratio.
基金This work was supported by the Projects of the National Nat-ura! Science Foundation of China under Crant No.U0835001 the Fundamental Research Funds for the Central Universities-2011PTB-00-28.
文摘Abstract: A hierarchical method for scene analysis in audio sensor networks is proposed. This meth-od consists of two stages: element detection stage and audio scene analysis stage. In the former stage, the basic audio elements are modeled by the HMM models and trained by enough samples off-line, and we adaptively add or remove basic ele- ment from the targeted element pool according to the time, place and other environment parameters. In the latter stage, a data fusion algorithm is used to combine the sensory information of the same ar-ea, and then, a role-based method is employed to analyze the audio scene based on the fused data. We conduct some experiments to evaluate the per-formance of the proposed method that about 70% audio scenes can be detected correctly by this method. The experiment evaluations demonstrate that our method can achieve satisfactory results.
文摘Nine Platanus acerifolia (Ait.) Willd. trees growing in the Nanjing Children Teacher’s School, Nanjing,China, were selected to determine the contents of 13 chemical elements both in the 1994’s growth rings,C(Z, t), and in the soils near the roots, C’(Z, t), of the trees. The results showed that the relationship between C(Z, t) and C’(Z, t) followed the logarithmic linear correlation model, lgC’(Z, t)=a(Z)+b(Z) ig C (Z, t).Based on this model the chrono-sequences of chemical element contents in the soils were reproduced from those in the tree rings; i.e., the dynamic variations in the chemical element contents of the soils at the sites were traced. In this study the chrono-sequences of the chemical elements including Cd, Ph, Mn, Co and Zn in the soils near the roots of a Platanus acerifolia tree from 1957 to 1994 were established, and the background values of Cd, Pb, Mn, Co and Zn in the soil were calculated by taking the lowest values of the chrono-sequences of the element contents as upper limits of the background values.
基金This work is supported by the National Science Foundation of China (No. 20471001 and 20671001), the Important Project of Anhui Provincial Education Department (No. ZD2007004-1), the Specific Project for Talents of Science and Technology of Universities of Anhui Province (No. 2005hbz03) and the Key Laboratory of Environment-friendly Polymer Materials of Anhui Province.
文摘The previous methods of figuring the numbers of chemical elements is summed up in this paper. Based on that, another two creative calculative methods are introduced as well.
基金supported in part by National Basic Research Program of China under Grant No.2012CB316100National Natural Science Foundation of China under Grants 61372074 and 91438101+1 种基金Joint Funds of the National Natural Science Foundation of China under Grant No.U1504601Science and Technology on Communication Networks Laboratory under Grant KX132600032
文摘In this paper, we study the rank of matrices over GF(2~p),and propose two construction methods for algebraic-based nonbinary LDPC codes from an existing LDPC code, referred to as the original code. By multiplying all elements of each column of the binary parity-check matrix H corresponding to the original code with the same nonzero element of any field, the first class of nonbinary LDPC codes with flexible field order is proposed. The second method is to replace the nonzero elements of some columns in H with different nonzero field elements in a given field, and then another class of nonbinary LDPC codes with various rates is obtained. Simulation results show that the proposed nonbinary LDPC codes perform well over the AWGN channel with the iterative decoding algorithms.
基金The National Key Technologies R&D Program during the 12th Five-Year Period of China(No.2012BAJ23B02)Science and Technology Support Program of Jiangsu Province(No.BE2010606)
文摘A novel algorithm for image edge detection is presented. This algorithm combines the nonsubsampled contourlet transform and the mathematical morphology. First, the source image is decomposed by the nonsubsampled contourlet transform into multi-scale and multi-directional subbands. Then the edges in the high-frequency and low-frequency sub-bands are respectively extracted by the dualthreshold modulus maxima method and the mathematical morphology operator. Finally, the edges from the high- frequency and low-frequency sub-bands are integrated to the edges of the source image, which are refined, and isolated points are excluded to achieve the edges of the source image. The simulation results show that the proposed algorithm can effectively suppress noise, eliminate pseudo-edges and overcome the adverse effects caused by uneven illumination to a certain extent. Compared with the traditional methods such as LoG, Sobel, and Carmy operators and the modulus maxima algorithm, the proposed method can maintain sufficient positioning accuracy and edge details, and it can also make an improvement in the completeness, smoothness and clearness of the outline.