The photocatalytic degradation of norfloxacin by bismuth tungstate(Bi2WO6)with different hierarchical architectures wasinvestigated under visible light irradiation.Bi2WO6was prepared by hydrothermal method with the re...The photocatalytic degradation of norfloxacin by bismuth tungstate(Bi2WO6)with different hierarchical architectures wasinvestigated under visible light irradiation.Bi2WO6was prepared by hydrothermal method with the reaction solution pH rangingfrom4to11.The relatively ultrathin Bi2WO6nanoflakes prepared at pH4showed excellent adsorption and photodegradationefficiency towards norfloxacin.The characterization results showed that Bi2WO6prepared at pH4had a larger specific area andfaster photo-generated carrier separation rate.The decay rate reached the maximum in weak alkaline reaction solution,which couldbe attributed to the presence of moderate OH-anions.The present study demonstrated that the smaller size of Bi2WO6could be anefficient photocatalyst on the degradation of norfloxacin in the aquatic environment.展开更多
A novel initiative in providing advanced civic amenities is the idea of smart city driven by the lnternet of Things. Owing to a lack of consensus regarding what constitutes a smart city, diverse smart city architectur...A novel initiative in providing advanced civic amenities is the idea of smart city driven by the lnternet of Things. Owing to a lack of consensus regarding what constitutes a smart city, diverse smart city architectures have been proposed. However, it is observed that adequate consideration is not given to the most important element of a smart city i.e. its people. In our opinion, energy efficient technologically driven city does not necessarily lead to a smart city. Ethics, tradition and law form essential ingredients of complex social palette that cannot be ignored. In this work we propose Ethics-Aware Object-Oriented Smart City Architecture (EOSCA) that has two distinguishing features. Firstly, we propose an object oriented layered architecture where an object represents an abstraction of a real world thing along with requisite security and ethics parameters. Secondly, we propose to integrate socio-cultural and ethical aspects within the smart city architecture by dedicating a separate ethics layer. Such enhancement not only addresses the challenge of privacy and security of a smart city, but also makes it people friendly by incorporating ethics. Such measures would facilitate social acceptance of smart city paradigm and augment its economic value.展开更多
Towards integration of supply chain, manufacturing/production and investment decision making, this paper presents a hierarchical model architecture which contains six sub-models covering the areas of manufacturing con...Towards integration of supply chain, manufacturing/production and investment decision making, this paper presents a hierarchical model architecture which contains six sub-models covering the areas of manufacturing control, production operation, design and revamp, production management, supply chain and investment decision making. Six types of flow, material, energy, information, humanware, partsware and capital are clasified. These flows connect enterprise components/subsystems to formulate system topology and logical structure. Enterprise components/subsystems are abstracted to generic elementary and composite classes. Finally, the model architecture is applied to a management system of an integrated suply chain, and suggestion are made on the usage of the model architecture and further development of the model as well as implementation issues.展开更多
This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essenti...This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V.展开更多
It is well-known that the finite-gap solutions of the KdV equation can be generated by its recursion operator. We generalize the result to a special form of Lax pair,from which a method to constrain the integrable sys...It is well-known that the finite-gap solutions of the KdV equation can be generated by its recursion operator. We generalize the result to a special form of Lax pair,from which a method to constrain the integrable system to a lower-dimensional or fewer variable integrable system is proposed.A direct result is that the n-soliton solutions of the KdV hierarchy can be completely depicted by a series of ordinary differential equations(ODEs),which may be gotten by a simple but unfamiliar Lax pair.Furthermore the AKNS hierarchy is constrained to a series of univariate integrable hierarchies.The key is a special form of Lax pair for the AKNS hierarchy.It is proved that under the constraints all equations of the AKNS hierarchy are linearizable.展开更多
Layered structures with upper porous and lower fractured media are widely distributed in the world. An experimen- tal investigation on rainfall infiltration and solute transport in such layered structures can provide ...Layered structures with upper porous and lower fractured media are widely distributed in the world. An experimen- tal investigation on rainfall infiltration and solute transport in such layered structures can provide the necessary foundation for effectively preventing and forecasting water bursting in mines, controlling contamination of mine water, and accomplishing ecological restoration of mining areas. A typical physical model of the layered structures with porous and fractured media was created in this study. Then rainfall infiltration experiments were conducted after salt solution was sprayed on the surface of the layered structure. The volumetric water content and concentration of chlorine ions at different specified positions along the profile of the experiment system were measured in real-time. The experimental results showed that the lower fractured media, with a considerably higher permeability than that of the upper porous media, had significant effects on preventing water infil- tration. Moreover, although the porous media were homogeneous statistically in the whole domain, spatial variations in the features of effluent concentrations with regards to time, or so called breakthrough curves, at various sampling points located at the horizontal plane in the porous media near the porous-fractured interface were observed, indicating the diversity of solute transport at small scales. Furthermore, the breakthrough curves of the outflow at the bottom, located beneath the underlying fractured rock, were able to capture and integrate features of the breakthrough curves of both the upper porous and fractured media, which exhibited multiple peaks, while the peak values were reduced one by one with time.展开更多
We propose a systematic method for generalizing the integrable couplings of soliton eqhations hierarchy with self-consistent sources associated with s/(4). The JM equations hierarchy with self-consistent sources is ...We propose a systematic method for generalizing the integrable couplings of soliton eqhations hierarchy with self-consistent sources associated with s/(4). The JM equations hierarchy with self-consistent sources is derived. Furthermore, an integrable couplings of the JM soliton hierarchy with self-consistent sources is presented by using of the loop algebra sl(4).展开更多
3D visualisations of the microstructure of flocculated particulates and sediments using optical confocal laser mi- croscopy and high resolution X-ray microtomography (XMT) methods are described. Data obtained from in-...3D visualisations of the microstructure of flocculated particulates and sediments using optical confocal laser mi- croscopy and high resolution X-ray microtomography (XMT) methods are described. Data obtained from in-situ measurements should enable direct computation of the properties of solids assembly (shape, size, contact area) and their permeability to fluids. A specific application relating to the formation of silica aggregates is described from which the behaviour of sediments containing these materials can be predicted on the basis of a bench-top test and the use of a Lattice Boltzman simulation. It is proposed that the method can potentially be used to predict trends such as the filtration behaviour of porous structures under different states of compression. This offers a significant benefit in assisting the formulation design of flocculated materials pertinent to a number of industrial sectors wishing to design optimal filtration or relevant operations.展开更多
Different types of dominance hierarchies reflect different social relationships in primates. In this study, we clarified the hierarchy and social relationships in a one-male unit of captive Rhinopithecus bieti observe...Different types of dominance hierarchies reflect different social relationships in primates. In this study, we clarified the hierarchy and social relationships in a one-male unit of captive Rhinopithecus bieti observed between August 1998 and March 1999. Mean frequency of agonistic behaviour among adult females was 0.13 interactions per hour. Adult females exhibited a linear hierarchy with a reversal of 10.9%, indicating an unstable relationship; therefore, R. bieti appears to be a relaxed/tolerant species. The lack of a relationship between the agonistic ratio of the adult male towards adult females and their ranks indicated that males did not show increased aggression towards low-ranking females. Differentiated female affiliative relationships were loosely formed in terms of the male, and to some extent influenced by female estrus, implying that relationships between the male and females is influenced by estrus and not rank alone. A positive correlation between the agonistic ratio of adult females and their ranks showed that the degree to which one female negatively impacted others decreased with reduction in rank. Similarly, a positive correlation between the agonistic ratio of females and differences in rank suggests that a female had fewer negative effects on closely ranked individuals than distantly ranked ones. These data indicate that rank may influence relationships between females. A steeper slope of regression between the agonistic ratio and inter-female rank differences indicated that the extent of the power difference in high-ranking females exerting negative effects on low-ranking ones was larger during the mating season than the birth season, suggesting that rank may influence the mating success of females.展开更多
Cross-modal semantic mapping and cross-media retrieval are key problems of the multimedia search engine.This study analyzes the hierarchy,the functionality,and the structure in the visual and auditory sensations of co...Cross-modal semantic mapping and cross-media retrieval are key problems of the multimedia search engine.This study analyzes the hierarchy,the functionality,and the structure in the visual and auditory sensations of cognitive system,and establishes a brain-like cross-modal semantic mapping framework based on cognitive computing of visual and auditory sensations.The mechanism of visual-auditory multisensory integration,selective attention in thalamo-cortical,emotional control in limbic system and the memory-enhancing in hippocampal were considered in the framework.Then,the algorithms of cross-modal semantic mapping were given.Experimental results show that the framework can be effectively applied to the cross-modal semantic mapping,and also provides an important significance for brain-like computing of non-von Neumann structure.展开更多
The development of complex products is essentially concerned with multidisciplinary knowledge. Running on Internet, integration based on muhilayer federation architecture and dynamic reuse of simulation resources are ...The development of complex products is essentially concerned with multidisciplinary knowledge. Running on Internet, integration based on muhilayer federation architecture and dynamic reuse of simulation resources are the major difficulties for complex product collaborative design and simulation. Since the traditional Run-Time Infrastructure (RTI) is not good at supporting these new requirements, an extended high level architecture (HLA) multilayer federation integration architecture (MLFIA), based on the resource management federation (RMF) and its supporting environment based Service-oriented architecture (SOA) and HLA (SOHLA) are proposed, The idea and realization of two key technologies, the dynamic creation of simulation federation based on RMF, TH RTI, an extensible HLA runtime infrastructure (RTI), used at Internet are emphasized. Finally, an industry case about multiple unit (MU) is given.展开更多
The photonic band gap structure of 1D photonic crystal with a negative index medium defect layer is studied by using the transfer matrix method. Investigations show that the introdufion of negative index medium defect...The photonic band gap structure of 1D photonic crystal with a negative index medium defect layer is studied by using the transfer matrix method. Investigations show that the introdufion of negative index medium defect layer and the increase of the negative index value will result in an extension of the band gap. Moreover, by increasing the negative index, the width of defect layer and the numbers of period photonic crystal, the width of defect modes will be narrowed, which is advantaged to obtain optical filters with narrow band. Finally, the effects of absorption on the properties of band gap and on defect modes have been discussed.展开更多
Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of s...Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme.展开更多
A hierarchical clustered BitTorrent (CBT) system is proposed to improve the file sharing perior-mance of the BitTorrent system, in which peers are grouped into clusters in a large-scale BitTorrent-hke underlying ove...A hierarchical clustered BitTorrent (CBT) system is proposed to improve the file sharing perior-mance of the BitTorrent system, in which peers are grouped into clusters in a large-scale BitTorrent-hke underlying overlay network in such a way that clusters are evenly distributed and that the peers within the cluster are relatively close to each other. A fluid model is developed to compare the performance of the proposed CBT system with the BitTorrent system, and the result shows that the CBT system can effectively improve the performance of the system. Simulation results also demonstrate that the CBT system improves the system scalabihty and efficiency while retaining the robustness and incentives of the original BitTorrent paradigm.展开更多
This paper gives an overall introduction to the basic concept of LAC(location-aware computing) and its development status, puts forward an integrated location-aware computing architecture which is useful for designing...This paper gives an overall introduction to the basic concept of LAC(location-aware computing) and its development status, puts forward an integrated location-aware computing architecture which is useful for designing the reasonable logical model of LBS(location-based service). Finally, a brief introduction is conducted on a LAC experimental prototype, which acts as a mobile urban tourism assistant.展开更多
The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks....The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks.This paper presents a multilevel pattern mining architecture to support automatic network management by discovering interesting patterns from telecom network monitoring data.This architecture leverages and combines existing frequent itemset discovery over data streams,association rule deduction,frequent sequential pattern mining,and frequent temporal pattern mining techniques while also making use of distributed processing platforms to achieve high-volume throughput.展开更多
It has been shown in recent economic and statistical studies that combining forecasts may produce more accurate forecasts than individual ones. However, the literature on combining forecasts has almost exclusively foc...It has been shown in recent economic and statistical studies that combining forecasts may produce more accurate forecasts than individual ones. However, the literature on combining forecasts has almost exclusively focused on linear combining forecasts. In this paper, a new nonlinear combination forecasting method based on fuzzy inference system is present to overcome the difficulties and drawbacks in linear combination modeling of non-stationary time series. Furthermore, the optimization algorithm based on a hierarchical structure of learning automata is used to identify the parameters of the fuzzy system. Experiment results related to numerical examples demonstrate that the new technique has excellent identification performances and forecasting accuracy superior to other existing linear combining forecasts.展开更多
基金Projects(51579096,51222805,51521006,51508175) supported by the National Natural Science Foundation of ChinaProject supported by the National Program for Support of Top-Notch Young Professionals of China+1 种基金Project(NCET–11–0129) supported by the Program for New Century Excellent Talents in University from the Ministry of Education of ChinaProject(CX2015B095) supported by the Hunan Province Innovation Foundation for Postgraduate,China
文摘The photocatalytic degradation of norfloxacin by bismuth tungstate(Bi2WO6)with different hierarchical architectures wasinvestigated under visible light irradiation.Bi2WO6was prepared by hydrothermal method with the reaction solution pH rangingfrom4to11.The relatively ultrathin Bi2WO6nanoflakes prepared at pH4showed excellent adsorption and photodegradationefficiency towards norfloxacin.The characterization results showed that Bi2WO6prepared at pH4had a larger specific area andfaster photo-generated carrier separation rate.The decay rate reached the maximum in weak alkaline reaction solution,which couldbe attributed to the presence of moderate OH-anions.The present study demonstrated that the smaller size of Bi2WO6could be anefficient photocatalyst on the degradation of norfloxacin in the aquatic environment.
文摘A novel initiative in providing advanced civic amenities is the idea of smart city driven by the lnternet of Things. Owing to a lack of consensus regarding what constitutes a smart city, diverse smart city architectures have been proposed. However, it is observed that adequate consideration is not given to the most important element of a smart city i.e. its people. In our opinion, energy efficient technologically driven city does not necessarily lead to a smart city. Ethics, tradition and law form essential ingredients of complex social palette that cannot be ignored. In this work we propose Ethics-Aware Object-Oriented Smart City Architecture (EOSCA) that has two distinguishing features. Firstly, we propose an object oriented layered architecture where an object represents an abstraction of a real world thing along with requisite security and ethics parameters. Secondly, we propose to integrate socio-cultural and ethical aspects within the smart city architecture by dedicating a separate ethics layer. Such enhancement not only addresses the challenge of privacy and security of a smart city, but also makes it people friendly by incorporating ethics. Such measures would facilitate social acceptance of smart city paradigm and augment its economic value.
基金Supported by the National Natural Science Foundation of China (No. 79931000) and The State Major Basic Research Development Program (No. G20000263).
文摘Towards integration of supply chain, manufacturing/production and investment decision making, this paper presents a hierarchical model architecture which contains six sub-models covering the areas of manufacturing control, production operation, design and revamp, production management, supply chain and investment decision making. Six types of flow, material, energy, information, humanware, partsware and capital are clasified. These flows connect enterprise components/subsystems to formulate system topology and logical structure. Enterprise components/subsystems are abstracted to generic elementary and composite classes. Finally, the model architecture is applied to a management system of an integrated suply chain, and suggestion are made on the usage of the model architecture and further development of the model as well as implementation issues.
基金supported by key special project of National Key Research and Development Program (2017YFC0803900)
文摘This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V.
基金Supported by National Natural Science Foundation of China under Grant No.10735030Natural Science Foundation of Zhejiang Province under Grant Nos.R609077,Y6090592National Science Foundation of Ningbo City under Grant Nos.2009B21003,2010A610103, 2010A610095
文摘It is well-known that the finite-gap solutions of the KdV equation can be generated by its recursion operator. We generalize the result to a special form of Lax pair,from which a method to constrain the integrable system to a lower-dimensional or fewer variable integrable system is proposed.A direct result is that the n-soliton solutions of the KdV hierarchy can be completely depicted by a series of ordinary differential equations(ODEs),which may be gotten by a simple but unfamiliar Lax pair.Furthermore the AKNS hierarchy is constrained to a series of univariate integrable hierarchies.The key is a special form of Lax pair for the AKNS hierarchy.It is proved that under the constraints all equations of the AKNS hierarchy are linearizable.
基金Supported by ihe Major State Basic Research Development Program of China (973 Program) (2010CB428801, 2010CB428804) the National Science Foundation of China (40972166)+1 种基金 the Major Science and Technology Program for Water Pollution Control and Treatment (2009ZX07212-003) the Technology Development and Applications for Ecology System Reconstruction and Restoration of Yongding River (D08040903700000)
文摘Layered structures with upper porous and lower fractured media are widely distributed in the world. An experimen- tal investigation on rainfall infiltration and solute transport in such layered structures can provide the necessary foundation for effectively preventing and forecasting water bursting in mines, controlling contamination of mine water, and accomplishing ecological restoration of mining areas. A typical physical model of the layered structures with porous and fractured media was created in this study. Then rainfall infiltration experiments were conducted after salt solution was sprayed on the surface of the layered structure. The volumetric water content and concentration of chlorine ions at different specified positions along the profile of the experiment system were measured in real-time. The experimental results showed that the lower fractured media, with a considerably higher permeability than that of the upper porous media, had significant effects on preventing water infil- tration. Moreover, although the porous media were homogeneous statistically in the whole domain, spatial variations in the features of effluent concentrations with regards to time, or so called breakthrough curves, at various sampling points located at the horizontal plane in the porous media near the porous-fractured interface were observed, indicating the diversity of solute transport at small scales. Furthermore, the breakthrough curves of the outflow at the bottom, located beneath the underlying fractured rock, were able to capture and integrate features of the breakthrough curves of both the upper porous and fractured media, which exhibited multiple peaks, while the peak values were reduced one by one with time.
基金Supported by the Research Work of Liaoning Provincial Development of Education under Grant No,2008670
文摘We propose a systematic method for generalizing the integrable couplings of soliton eqhations hierarchy with self-consistent sources associated with s/(4). The JM equations hierarchy with self-consistent sources is derived. Furthermore, an integrable couplings of the JM soliton hierarchy with self-consistent sources is presented by using of the loop algebra sl(4).
文摘3D visualisations of the microstructure of flocculated particulates and sediments using optical confocal laser mi- croscopy and high resolution X-ray microtomography (XMT) methods are described. Data obtained from in-situ measurements should enable direct computation of the properties of solids assembly (shape, size, contact area) and their permeability to fluids. A specific application relating to the formation of silica aggregates is described from which the behaviour of sediments containing these materials can be predicted on the basis of a bench-top test and the use of a Lattice Boltzman simulation. It is proposed that the method can potentially be used to predict trends such as the filtration behaviour of porous structures under different states of compression. This offers a significant benefit in assisting the formulation design of flocculated materials pertinent to a number of industrial sectors wishing to design optimal filtration or relevant operations.
基金Foundation items: This work was supported by grants from the National Natural Science Foundation of China (31160422, 30960084) the China Postdoctoral Science Foundation (2013M542379), the Program for New Century Excellent Talents in University (NCET-12- 1079), and the Key Subject of Wildlife Conservation and Utilization in Yunnan Province. Acknowledgements: Special thanks to Prof. R.-J. ZOU at Kunming Institute of Zoology, Chinese Academy of Sciences for support Mr. Y.-Z. LU (animal keeper) for his assistance during data-collection and to three anonymous reviewers for valuable suggestions.
文摘Different types of dominance hierarchies reflect different social relationships in primates. In this study, we clarified the hierarchy and social relationships in a one-male unit of captive Rhinopithecus bieti observed between August 1998 and March 1999. Mean frequency of agonistic behaviour among adult females was 0.13 interactions per hour. Adult females exhibited a linear hierarchy with a reversal of 10.9%, indicating an unstable relationship; therefore, R. bieti appears to be a relaxed/tolerant species. The lack of a relationship between the agonistic ratio of the adult male towards adult females and their ranks indicated that males did not show increased aggression towards low-ranking females. Differentiated female affiliative relationships were loosely formed in terms of the male, and to some extent influenced by female estrus, implying that relationships between the male and females is influenced by estrus and not rank alone. A positive correlation between the agonistic ratio of adult females and their ranks showed that the degree to which one female negatively impacted others decreased with reduction in rank. Similarly, a positive correlation between the agonistic ratio of females and differences in rank suggests that a female had fewer negative effects on closely ranked individuals than distantly ranked ones. These data indicate that rank may influence relationships between females. A steeper slope of regression between the agonistic ratio and inter-female rank differences indicated that the extent of the power difference in high-ranking females exerting negative effects on low-ranking ones was larger during the mating season than the birth season, suggesting that rank may influence the mating success of females.
基金Supported by the National Natural Science Foundation of China(No.61305042,61202098)Projects of Center for Remote Sensing Mission Study of China National Space Administration(No.2012A03A0939)Science and Technological Research of Key Projects of Education Department of Henan Province of China(No.13A520071)
文摘Cross-modal semantic mapping and cross-media retrieval are key problems of the multimedia search engine.This study analyzes the hierarchy,the functionality,and the structure in the visual and auditory sensations of cognitive system,and establishes a brain-like cross-modal semantic mapping framework based on cognitive computing of visual and auditory sensations.The mechanism of visual-auditory multisensory integration,selective attention in thalamo-cortical,emotional control in limbic system and the memory-enhancing in hippocampal were considered in the framework.Then,the algorithms of cross-modal semantic mapping were given.Experimental results show that the framework can be effectively applied to the cross-modal semantic mapping,and also provides an important significance for brain-like computing of non-von Neumann structure.
基金Supported by the National High Technology Research and Development Programme of China (No. 2006AA04Z160).
文摘The development of complex products is essentially concerned with multidisciplinary knowledge. Running on Internet, integration based on muhilayer federation architecture and dynamic reuse of simulation resources are the major difficulties for complex product collaborative design and simulation. Since the traditional Run-Time Infrastructure (RTI) is not good at supporting these new requirements, an extended high level architecture (HLA) multilayer federation integration architecture (MLFIA), based on the resource management federation (RMF) and its supporting environment based Service-oriented architecture (SOA) and HLA (SOHLA) are proposed, The idea and realization of two key technologies, the dynamic creation of simulation federation based on RMF, TH RTI, an extensible HLA runtime infrastructure (RTI), used at Internet are emphasized. Finally, an industry case about multiple unit (MU) is given.
基金Thes work is supported by the National Natural Science Founda-tion of China (Grant No. 10576012 and 60538010)the programof the Ministry of Education of China for New Century ExcellentTalents in University, and the Specialized Research Fund for theDoctoral Program of Higher Education of China (Grant No.20040532005).
文摘The photonic band gap structure of 1D photonic crystal with a negative index medium defect layer is studied by using the transfer matrix method. Investigations show that the introdufion of negative index medium defect layer and the increase of the negative index value will result in an extension of the band gap. Moreover, by increasing the negative index, the width of defect layer and the numbers of period photonic crystal, the width of defect modes will be narrowed, which is advantaged to obtain optical filters with narrow band. Finally, the effects of absorption on the properties of band gap and on defect modes have been discussed.
文摘Fog computing is a new paradigm supporting the stringent requirements of mobility applications by bridging cloud computing and smart devices. Since the smart devices may be deployed in dynamic areas where are out of strict monitoring and protection, fog computing requires security protections to ensure confidentiality and integrity. In this article, to deal with security requirements and considering the distinctive features, a key management based on hypergraph schemed is designed. Firstly, based on the key hypergraph, the three hierarchy architecture of fog computing is divided into two subnetworks. Furthermore, each key management process of both two subnetworks is designed to satisfy the operational and security requirements of fog computing. Finally, the performance evaluation and numerical simulation have been provided to validate the proposed scheme.
基金the National High Technology Research and Development Programme of China(No2004AA104280,2006AA01Z172)
文摘A hierarchical clustered BitTorrent (CBT) system is proposed to improve the file sharing perior-mance of the BitTorrent system, in which peers are grouped into clusters in a large-scale BitTorrent-hke underlying overlay network in such a way that clusters are evenly distributed and that the peers within the cluster are relatively close to each other. A fluid model is developed to compare the performance of the proposed CBT system with the BitTorrent system, and the result shows that the CBT system can effectively improve the performance of the system. Simulation results also demonstrate that the CBT system improves the system scalabihty and efficiency while retaining the robustness and incentives of the original BitTorrent paradigm.
文摘This paper gives an overall introduction to the basic concept of LAC(location-aware computing) and its development status, puts forward an integrated location-aware computing architecture which is useful for designing the reasonable logical model of LBS(location-based service). Finally, a brief introduction is conducted on a LAC experimental prototype, which acts as a mobile urban tourism assistant.
基金funded by the Enterprise Ireland Innovation Partnership Programme with Ericsson under grant agreement IP/2011/0135[6]supported by the National Natural Science Foundation of China(No.61373131,61303039,61232016,61501247)+1 种基金the PAPDCICAEET funds
文摘The rapid development of network technology and its evolution toward heterogeneous networks has increased the demand to support automatic monitoring and the management of heterogeneous wireless communication networks.This paper presents a multilevel pattern mining architecture to support automatic network management by discovering interesting patterns from telecom network monitoring data.This architecture leverages and combines existing frequent itemset discovery over data streams,association rule deduction,frequent sequential pattern mining,and frequent temporal pattern mining techniques while also making use of distributed processing platforms to achieve high-volume throughput.
基金Funded by the Excellent Young Teachers of MOE (350) and Chongqing Education Committee Foundation
文摘It has been shown in recent economic and statistical studies that combining forecasts may produce more accurate forecasts than individual ones. However, the literature on combining forecasts has almost exclusively focused on linear combining forecasts. In this paper, a new nonlinear combination forecasting method based on fuzzy inference system is present to overcome the difficulties and drawbacks in linear combination modeling of non-stationary time series. Furthermore, the optimization algorithm based on a hierarchical structure of learning automata is used to identify the parameters of the fuzzy system. Experiment results related to numerical examples demonstrate that the new technique has excellent identification performances and forecasting accuracy superior to other existing linear combining forecasts.