针对矿区植被多、易造成失相干的问题,提出了一种将小基线集和干涉点目标分析(small baseline subsat and interferometric point target analyisis,SBAS-IPTA)方法与随机森林(random forest,RF)算法相结合的开采沉陷监测与预计方法。...针对矿区植被多、易造成失相干的问题,提出了一种将小基线集和干涉点目标分析(small baseline subsat and interferometric point target analyisis,SBAS-IPTA)方法与随机森林(random forest,RF)算法相结合的开采沉陷监测与预计方法。首先提取陕西省桑树坪矿区的沉陷速率及时序累积沉陷值,然后定量分析沉陷规律,最后将沉陷值作为RF的训练样本建立预计函数,并与灰色模型(gray model,GM)算法预计结果进行对比分析。结果表明:通过对该矿区在2007—2011年期间沉陷面积及沉陷值的分析,SBAS-IPTA方法可监测植被多的矿区的地表沉陷;结合GM算法预计的3个测试点的绝对误差和相对误差分别为35~423 mm和7%~88%,而结合RF算法预计的绝对误差和相对误差分别为1~29 mm和0~16%,RF算法预计结果明显优于GM算法预计结果,可将RF算法应用于开采沉陷预计。展开更多
A weakly nonlinear oscillator was modeled by a sort of differential equation, a saddle-node bifurcation was found in case of primary and secondary resonance. To control the jumping phenomena and the unstable region of...A weakly nonlinear oscillator was modeled by a sort of differential equation, a saddle-node bifurcation was found in case of primary and secondary resonance. To control the jumping phenomena and the unstable region of the nonlinear oscillator, feedback controllers were designed. Bifurcation control equations were obtained by using the multiple scales method. And through the numerical analysis, good controller could be obtained by changing the feedback control gain. Then a feasible way of further research of saddle-node bifurcation was provided. Finally, an example shows that the feedback control method applied to the hanging bridge system of gas turbine is doable.展开更多
Meshfree method offers high accuracy and computational capability and constructs the shape function without relying on predefined elements. We comparatively analyze the global weak form meshfree methods, such as eleme...Meshfree method offers high accuracy and computational capability and constructs the shape function without relying on predefined elements. We comparatively analyze the global weak form meshfree methods, such as element-free Galerkin method (EFGM), the point interpolation method (PIM), and the radial point interpolation method (RPIM). Taking two dimensional Poisson equation as an example, we discuss the support-domain dimensionless size, the field nodes, and background element settings with respect to their effect on calculation accuracy of the meshfree method. RPIM and EFGM are applied to controlled- source two-dimensional electromagnetic modeling with fixed shape parameters. The accuracy of boundary conditions imposed directly and by a penalty function are discussed in the case of forward modeling of two-dimensional magnetotellurics in a homogeneous medium model. The coupling algorithm of EFG-PIM and EFG-RPIM are generated by integrating the PIM or RPIM and EFGM. The results of the numerical modeling suggest the following. First, the proposed meshfree method and corresponding coupled methods are well-suited for electromagnetic numerical modeling. The accuracy of the algorithm is the highest when the support-domain dimensionless size is 1.0 and the distribution of field nodes is consistent with the nodes of background elements. Second, the accuracy of PIM and RPIM are lower than that of EFGM for the Poisson equation but higher than EFGM for the homogeneous medium MT response. Third, RPIM overcomes the matrix inversion problem of PIM and has a wider selection of support-domain dimensionless sizes as compared to RPIM.展开更多
Bubble seed image filling is an important prerequisite for the image segmentation of flotation bubble that can be used to improve flotation automatic control. These common image filling algorithms in dealing with comp...Bubble seed image filling is an important prerequisite for the image segmentation of flotation bubble that can be used to improve flotation automatic control. These common image filling algorithms in dealing with complex bubble image exists under-filling and over-filling problems. A new filling algorithm based on boundary point feature and scan lines ~PFSL) is proposed in the paper. The filling a|gorithm describes these boundary points of image objects by means of chain codes. The features of each boundary point, including convex points, concave points, left points and right points, are defined by the point's entrancing chain code and leaving chain code. The algorithm firstly finds out all double-matched boundary points based on the features of boundary points, and fill image objects by these double-matched boundary points on scan lines. Experimental results of bubble seed image filling show that under-filling and over-filling problem can be eliminated by the proposed algorithm.展开更多
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ...Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.展开更多
Genetic comparison between Rhynchophorus ferrugineus (Coleoptera: Curculionidae: Rhynchophorinae) and other four Rhynchophorus spp. such as R. bilineatus, R. phoenicis, R. cruentatus and R. palmarum was investigat...Genetic comparison between Rhynchophorus ferrugineus (Coleoptera: Curculionidae: Rhynchophorinae) and other four Rhynchophorus spp. such as R. bilineatus, R. phoenicis, R. cruentatus and R. palmarum was investigated using partial sequences of Cytochrome c oxidase subunit I (COl) mitochondrial gene. The number ofpolymorphic sites ranged from 79 to 102 while the genetic distances ranged from 0.058 to 0.095. The number of polymorphic sites, genetic distances and phylogenetic relationships among R. ferrugineus and the other four tested species revealed that R.ferrugineus was more closely related to R. bilineatus while it was distantly related to R. palmarum. It is possible to rank the five tested species as follows: R.ferrugineus, R. bilineatus, R. phoenicis, R. cruentatus and R. palmarum. The result of this study is the first step of the revision of the uncertain taxonomic status and phylogenetic relationships among the Rhynchophorus genus. Further analysis should be performed using other Rhynchophorus species as well as other molecular markers.展开更多
This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, a...This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, and a corresponding greedy tree is obtained using a greedy algorithm in DTN connectivity graph. While there are some bad nodes such as disabled nodes or selfish nodes in delay tolerant networks, the nodes can choose the next p^oper intermediate node to transmit the mes- sage by comparing the location of neighboring nodes in the greedy tree. The single-copy routing method is very appropriate for energy-constrained, storage-constrained and bandwidth-constrained applications such as mobile wireless DTN networks. We show that delivery ratio is increased significantly by using the graph-based single-copy routing when bad nodes exist.展开更多
Some insights and analysis are presented concerning the monitoring model of the VLBI(Very Long Baseline Interferometry) antenna,settings of parameters and selection of constraints to the observation equation,which are...Some insights and analysis are presented concerning the monitoring model of the VLBI(Very Long Baseline Interferometry) antenna,settings of parameters and selection of constraints to the observation equation,which are verified via data simulation analysis to be reasonable and effective.The effects of the number of targets and antenna orientations,the precision of target positioning observations,the observation outliers detection and deletion on the determination precision of antenna parameters are also analyzed,and some preliminary conclusions are given.展开更多
基金Project(10672053) supported by the National Natural Science Foundation of ChinaProject(2002AA503010) supported by the National High-Tech Research and Development Program of China
文摘A weakly nonlinear oscillator was modeled by a sort of differential equation, a saddle-node bifurcation was found in case of primary and secondary resonance. To control the jumping phenomena and the unstable region of the nonlinear oscillator, feedback controllers were designed. Bifurcation control equations were obtained by using the multiple scales method. And through the numerical analysis, good controller could be obtained by changing the feedback control gain. Then a feasible way of further research of saddle-node bifurcation was provided. Finally, an example shows that the feedback control method applied to the hanging bridge system of gas turbine is doable.
基金supported by the National Nature Science Foundation of China(Grant No.40874055)the Natural Science Foundation of the Hunan Province,China(Grant No.14JJ2012)
文摘Meshfree method offers high accuracy and computational capability and constructs the shape function without relying on predefined elements. We comparatively analyze the global weak form meshfree methods, such as element-free Galerkin method (EFGM), the point interpolation method (PIM), and the radial point interpolation method (RPIM). Taking two dimensional Poisson equation as an example, we discuss the support-domain dimensionless size, the field nodes, and background element settings with respect to their effect on calculation accuracy of the meshfree method. RPIM and EFGM are applied to controlled- source two-dimensional electromagnetic modeling with fixed shape parameters. The accuracy of boundary conditions imposed directly and by a penalty function are discussed in the case of forward modeling of two-dimensional magnetotellurics in a homogeneous medium model. The coupling algorithm of EFG-PIM and EFG-RPIM are generated by integrating the PIM or RPIM and EFGM. The results of the numerical modeling suggest the following. First, the proposed meshfree method and corresponding coupled methods are well-suited for electromagnetic numerical modeling. The accuracy of the algorithm is the highest when the support-domain dimensionless size is 1.0 and the distribution of field nodes is consistent with the nodes of background elements. Second, the accuracy of PIM and RPIM are lower than that of EFGM for the Poisson equation but higher than EFGM for the homogeneous medium MT response. Third, RPIM overcomes the matrix inversion problem of PIM and has a wider selection of support-domain dimensionless sizes as compared to RPIM.
基金supported by the National Science & Technology Support Plan of China (No. 2009BAB48B02)the Basic Scientific Research Foundation for Institution of Higher Education (No.2008AA062101)
文摘Bubble seed image filling is an important prerequisite for the image segmentation of flotation bubble that can be used to improve flotation automatic control. These common image filling algorithms in dealing with complex bubble image exists under-filling and over-filling problems. A new filling algorithm based on boundary point feature and scan lines ~PFSL) is proposed in the paper. The filling a|gorithm describes these boundary points of image objects by means of chain codes. The features of each boundary point, including convex points, concave points, left points and right points, are defined by the point's entrancing chain code and leaving chain code. The algorithm firstly finds out all double-matched boundary points based on the features of boundary points, and fill image objects by these double-matched boundary points on scan lines. Experimental results of bubble seed image filling show that under-filling and over-filling problem can be eliminated by the proposed algorithm.
基金supported by the Sharing and Diffusion of National R&D Outcome funded by the Korea Institute of Science and Technology Information
文摘Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
文摘Genetic comparison between Rhynchophorus ferrugineus (Coleoptera: Curculionidae: Rhynchophorinae) and other four Rhynchophorus spp. such as R. bilineatus, R. phoenicis, R. cruentatus and R. palmarum was investigated using partial sequences of Cytochrome c oxidase subunit I (COl) mitochondrial gene. The number ofpolymorphic sites ranged from 79 to 102 while the genetic distances ranged from 0.058 to 0.095. The number of polymorphic sites, genetic distances and phylogenetic relationships among R. ferrugineus and the other four tested species revealed that R.ferrugineus was more closely related to R. bilineatus while it was distantly related to R. palmarum. It is possible to rank the five tested species as follows: R.ferrugineus, R. bilineatus, R. phoenicis, R. cruentatus and R. palmarum. The result of this study is the first step of the revision of the uncertain taxonomic status and phylogenetic relationships among the Rhynchophorus genus. Further analysis should be performed using other Rhynchophorus species as well as other molecular markers.
基金Supported by the National High Technology Research and Development Programme of China (No. 2007AA01Z429, 2007AA01Z405 ) and the National Natural Science Foundation of China (No. 60633020, 60702059, 60872041 ).
文摘This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, and a corresponding greedy tree is obtained using a greedy algorithm in DTN connectivity graph. While there are some bad nodes such as disabled nodes or selfish nodes in delay tolerant networks, the nodes can choose the next p^oper intermediate node to transmit the mes- sage by comparing the location of neighboring nodes in the greedy tree. The single-copy routing method is very appropriate for energy-constrained, storage-constrained and bandwidth-constrained applications such as mobile wireless DTN networks. We show that delivery ratio is increased significantly by using the graph-based single-copy routing when bad nodes exist.
基金supported by the National Natural Sciences Foundation of China(Grant Nos.11178024 and 10973030)the Lunar Exploration of China(Chang’E 2 and 3)+1 种基金the Committee of Sciences and Technology of Shanghai(Grant No.06DZ22101)the National High Technology Research and Development Program of China(Grant No.2012AA121603)
文摘Some insights and analysis are presented concerning the monitoring model of the VLBI(Very Long Baseline Interferometry) antenna,settings of parameters and selection of constraints to the observation equation,which are verified via data simulation analysis to be reasonable and effective.The effects of the number of targets and antenna orientations,the precision of target positioning observations,the observation outliers detection and deletion on the determination precision of antenna parameters are also analyzed,and some preliminary conclusions are given.