By inducing the typical inventory control problem - the bullwhip effect, this paper presents vendor managed inventory (VMI) control methods on the basis of traditional methods of inventory management methods, construc...By inducing the typical inventory control problem - the bullwhip effect, this paper presents vendor managed inventory (VMI) control methods on the basis of traditional methods of inventory management methods, constructs a VMI mathematics model, and analyzes the influence of VMI on inventory cost and channel profit. Finally, a special case is studied to verify that VMI is an effective supply chain strategy that can not only increase channel profit of supplier and customer but also improve full channel coordination, thereby reducing the bullwhip effect.展开更多
With enormous growth of the number of Internet users and appearance of new applications, characterization of Internet traffic has attracted more and more attention and has become one of the major challenging issues in...With enormous growth of the number of Internet users and appearance of new applications, characterization of Internet traffic has attracted more and more attention and has become one of the major challenging issues in telecommunication network over the past few years. In this paper, we study the network traffic pattern of the aggregate traffic and of specific application traffic, especially the popular applications such as P2P, VoIP that contribute most network traffic. Our study verified that majority Internet backbone traffic is contributed by a small portion of users and a power function can be used to approximate the contribution of each user to the overall traffic. We show that P2P applications are the dominant traffic contributor in current Internet Backbone of China. In addition, we selectively present the traffic pattern of different applications in detail.展开更多
The wavelet transform-based adaptive multiuser detection algorithm is presented. The novel adaptive multiuser detection algorithm uses the wavelet transform for the preprocessing, and wavelet-transformed signal uses L...The wavelet transform-based adaptive multiuser detection algorithm is presented. The novel adaptive multiuser detection algorithm uses the wavelet transform for the preprocessing, and wavelet-transformed signal uses LMS algorithm to implement the adaptive multiuser detection. The algorithm makes use of wavelet transform to divide the wavelet space, which shows that the wavelet transform has a better decorrelation ability and leads to better convergence. White noise can be wiped off under the wavelet transform according to different characteristics of signal and white noise under the wavelet transform. Theoretical analyses and simulations demonstrate that the algorithm converges faster than the conventional adaptive multiuser detection algorithm, and has the better performance. Simulation results reveal that the algorithm convergence relates to the wavelet base, and show that the algorithm convergence gets better with the increasing of regularity for the same series of the wavelet base. Finally the algorithm shows that it can be easily implemented.展开更多
The flexibility of MIP technology to meet market demand is mainly introduced in this study. Their commercial application and technical principle are analyzed too. The MIP technology with wide feed adaptability can for...The flexibility of MIP technology to meet market demand is mainly introduced in this study. Their commercial application and technical principle are analyzed too. The MIP technology with wide feed adaptability can form a good combination with other technologies. The MIP technology has been applied extensively in China. Based on this platform, the CGP, MIP-LTG and MIP-DCR technologies have been developed, which can further improve the flexibility of MIP technology. Based on its novel reaction control technique with a sole sequential two-zone riser, the MIP users can easily switch to different operating modes between producing either more clean gasoline and propylene or diesel through changing the catalysts and varying the operating conditions. That offers MIP users with enough production flexibility and a rational production arrangement to meet the market demand. The MIP-DCR technology with less dry gas and coke yields can provide a more flexible operating mode since the catalysts to oil ratio has become an independent variable.展开更多
Video streaming,especially hypertext transfer protocol based(HTTP) adaptive streaming(HAS) of video,has been expected to be a dominant application over mobile networks in the near future,which brings huge challenge fo...Video streaming,especially hypertext transfer protocol based(HTTP) adaptive streaming(HAS) of video,has been expected to be a dominant application over mobile networks in the near future,which brings huge challenge for the mobile networks.Although some works have been done for video streaming delivery in heterogeneous cellular networks,most of them focus on the video streaming scheduling or the caching strategy design.The problem of joint user association and rate allocation to maximize the system utility while satisfying the requirement of the quality of experience of users is largely ignored.In this paper,the problem of joint user association and rate allocation for HTTP adaptive streaming in heterogeneous cellular networks is studied,we model the optimization problem as a mixed integer programming problem.And to reduce the computational complexity,an optimal rate allocation using the Lagrangian dual method under the assumption of knowing user association for BSs is first solved.Then we use the many-to-one matching model to analyze the user association problem,and the joint user association and rate allocation based on the distributed greedy matching algorithm is proposed.Finally,extensive simulation results are illustrated to demonstrate the performance of the proposed scheme.展开更多
Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network....Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network.There is also a trend towards the personalization of web applications;to do this,the applications need to acquire information about the particular user.To maximise the use of the various sets of user information distributed on the web,this paper proposes a method to support the reuse and sharing of user profiles by different applications,and is based on user profile integration.To realize this goal,the initial task is user identification,and this forms the focus of the current paper.A new user identification method based on Multiple Attribute Decision Making(MADM) is described in which a subjective weight-directed objective weighting,which is obtained from the Similarity Weight method,is proposed to determine the relative weights of the common properties.Attribute Synthetic Evaluation is used to determine the equivalence of users.Experimental results show that the method is both feasible and effective despite the incompleteness of the candidate user dataset.展开更多
The rapid development of industry application products has greatly influenced society. It has become essential for some telecommunication companies to focus on customer satisfaction with industrial products used by th...The rapid development of industry application products has greatly influenced society. It has become essential for some telecommunication companies to focus on customer satisfaction with industrial products used by the government and enterprise customers. Following the review of a previous study of customer satisfaction and with the help of experiential level theory,this article attempts to establish a Satisfaction Factors Model for researching customer satisfaction with industry applications. We chose a product named "Mobile Monitor" and investigated the emotional satisfaction of 127 users and company leaders from different walks of life,and showed that 7 of the product's features affected the customers' overall emotional satisfaction. Lastly,this paper points out management implications of this application based on quantitative results. It presents a preliminary exploration program for customer satisfaction research in this specific field. The empirical research on a specific product based on experimental level theory may serve as a reference for other companies that desire to carry out similar surveys in future.展开更多
User generated content,e.g.,from YouTube,the most popular online video sharing site,is one of the major sources of today's big data and it is crucial to understand their inherent characteristics.Recently,YouTube h...User generated content,e.g.,from YouTube,the most popular online video sharing site,is one of the major sources of today's big data and it is crucial to understand their inherent characteristics.Recently,YouTube has started working with content providers(known as YouTube partners) to promote the users' watching and sharing activities.The substantial benefit is to further augment its service and monetize more videos,which is crucial to both YouTube and its partners,as well as to other providers of relevant services.In this paper,our main contribution is to analyze the massive amounts of video data from a YouTube partner's view.We make effective use of Insight,a new analytics service of YouTube that offers simple data analysis for partners.To provide the practical guidance from the raw Insight data,we enable more complex investigations for the inherent features that affect the popularity of the videos.Our findings facilitate YouTube partners to re-design current video publishing strategies,having more opportunities to attract more views.展开更多
The rate satisfaction of government and corporate customers,to which telecom companies pay special attention,is an important part of the overall satisfaction of the market segment.Focusing on specialline products and ...The rate satisfaction of government and corporate customers,to which telecom companies pay special attention,is an important part of the overall satisfaction of the market segment.Focusing on specialline products and based on interview with experts and literature review,this article builds an effect model comprising four factors affecting the major government and corporate customers' satisfaction with the rate,including cost performance,discount degree,rate communication and bill composition.Besides,employing AMOS and other analytical tools,it reveals significant positive effects of the aforementioned four factors on the customer's rate satisfaction,and arranges them in sequence according to the path coefficient of each influence.Based on quantified results,this article proposes management recommendations to improve the rate satisfaction,providing basis for research on the overall rate satisfaction optimization of government and corporate customers.展开更多
The supply chain network with capacity constraints of manufacturers and retailers is considered.The linkage between supply chain network equilibrium and transportation network equilibrium is investigated.By analyzing ...The supply chain network with capacity constraints of manufacturers and retailers is considered.The linkage between supply chain network equilibrium and transportation network equilibrium is investigated.By analyzing the relationships among the manufacturers,retailers and consumers in the supply chain network and their own decisions concerning maximum profits,a combined variational inequality for the supply chain network equilibrium mode is proposed.Then an equivalent supernetwork of the supply chain network is constructed by adding additional links which denote the producing of manufactures and the handling of retailers.By the supernetwork,the supply chain network equilibrium model can be reformulated as a transportation network equilibrium model.Equivalent mathematical programming is,therefore,obtained based on the principle of a Wardrop user equilibrium.The corresponding Lagrange multiplier of the capacity constraints can be explained as the extra cost of marginal production when capacity is exceeded.A numerical example is given to illustrate the rationality of the model and the validity of the results.展开更多
This paper examines how capital account liberalization (CAL) affects foreign direct investment (FDI) inflows. Authors use a dynamic panel model encompassing 14 Middle East countries over the period from 1985 to 20...This paper examines how capital account liberalization (CAL) affects foreign direct investment (FDI) inflows. Authors use a dynamic panel model encompassing 14 Middle East countries over the period from 1985 to 2009. The findings suggest that countries that are able to reap the benefits of the capital openness policy satisfy certain threshold conditions regarding the level of financial development and institutional quality. Thus to promote FDI, governments in this region should develop a set of policies that not only focus on financial openness, but also on the improvement of the financial system and legal institutions.展开更多
In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients su...In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients suffering arms or legs injuries, fn this paper, the concept of an ambidextrous design lbr robot hands is introduced. The fingers can curl in one xvay or another, to imitate either a right hand or a left hand. The advantages and inconveniences of different models have been investigated to optimise the range and the maximum force applied by fingers. Besides, a remote control interthce is integrated to the system, allowing both to send comrnands through internet and to display a video streaming of the ambidextrous hand as feedback. Therefore, a robotic prosthesis could be used for the first time in telerehabilitation. The main application areas targeted are physiotherapy alter strokes or management of phantom pains/br amputees by/earning to control the ambidextrous hand. A client application is also accessible on Facehook social network, making the robotic limb easily reachable for the patients. Additionally the ambidextrous hand can be used tbr robotics research as well as artistic performances.展开更多
The proposed blind adaptive multiuser detector utilizes the signature waveform and time information of the desired user. With each received sample vector, the proposed algorithm updates the detector and gives the symb...The proposed blind adaptive multiuser detector utilizes the signature waveform and time information of the desired user. With each received sample vector, the proposed algorithm updates the detector and gives the symbol estimate in the current time slot. Such property facilitates it to track time-varying channels.展开更多
Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data an...Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.展开更多
Blind adaptive multiuser detector has become a research hotspot in recent years due to a number of advantages, but many blind adaptive algorithms involve low convergence rate. This paper presents a novel stochastic bl...Blind adaptive multiuser detector has become a research hotspot in recent years due to a number of advantages, but many blind adaptive algorithms involve low convergence rate. This paper presents a novel stochastic blind adaptive multiuser detector without requiring training sequences, which needs only two system parameters: the signature sequence of the desired user i, s i and the variance of the additive white Gaussian noise (AWGN),σ 2. Simulation results show that by reasonably choosing time varying step size, the proposed detector can not only improve the convergence rate, but also reduce the limiting NSE (Normalized Squared Error) values, so it can effectively increase the performance of the system.展开更多
A variation account was applied to divergent thinking accommodated as a kind of creative thinking. To provide control (contrast) condition the variation account was applied to psychometric intelligence. Guilford's ...A variation account was applied to divergent thinking accommodated as a kind of creative thinking. To provide control (contrast) condition the variation account was applied to psychometric intelligence. Guilford's (1956, 1967, 1988) theory of divergent-----convergent thinking served the background of our study. The main premise was that creative variation represents "thought trials" with diverse ways to find a solution to the problem. Task demands and the respective creative problem solving reveal advantageous sources that suggest the variation. Probably, uncertainty, information search, and finding alternatives extracted from memory precede, entail and provide variety of seeking, as well. A principal hypothesis to be tested was that divergent thinking enables its variation rather than intelligence does that to its variation. As predicted, the divergent thinking and its variation were related. Compared to uncreative, creative persons were characterized by larger variation. Apart from the mathematical intelligence, other kinds of intelligence and their variation did not correlate. Mainly, the data obtained, thus, lend support to the claimed hypothesis.展开更多
This paper introduces and analyzes a detection scheme for adaptive suppression of Multiuser Access Interference (MAI) and MultiPath Distortion (MPD) for mobile station of DS/CDMA system. The proposed detection scheme ...This paper introduces and analyzes a detection scheme for adaptive suppression of Multiuser Access Interference (MAI) and MultiPath Distortion (MPD) for mobile station of DS/CDMA system. The proposed detection scheme may amount to a RAKE receiver structure,wherein each branch is considered as a linear multiuser filter designed under a Linear Constrained Minimum Variance (LCMV) optimization strategy to suppress MAI, followed by a proper combining rule to suppress MPD. The adaptive blind multiuser detecting and optimum combining of the proposed receiver are realized, based on the Least-Mean-Square (LMS) algorithm and an adaptive vector tracking algorithm respectively. Finally, the feasibility of the above two algorithms is proved by the numerical results provided by computer simulation.展开更多
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S...Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.展开更多
Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the app...Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption.展开更多
文摘By inducing the typical inventory control problem - the bullwhip effect, this paper presents vendor managed inventory (VMI) control methods on the basis of traditional methods of inventory management methods, constructs a VMI mathematics model, and analyzes the influence of VMI on inventory cost and channel profit. Finally, a special case is studied to verify that VMI is an effective supply chain strategy that can not only increase channel profit of supplier and customer but also improve full channel coordination, thereby reducing the bullwhip effect.
文摘With enormous growth of the number of Internet users and appearance of new applications, characterization of Internet traffic has attracted more and more attention and has become one of the major challenging issues in telecommunication network over the past few years. In this paper, we study the network traffic pattern of the aggregate traffic and of specific application traffic, especially the popular applications such as P2P, VoIP that contribute most network traffic. Our study verified that majority Internet backbone traffic is contributed by a small portion of users and a power function can be used to approximate the contribution of each user to the overall traffic. We show that P2P applications are the dominant traffic contributor in current Internet Backbone of China. In addition, we selectively present the traffic pattern of different applications in detail.
文摘The wavelet transform-based adaptive multiuser detection algorithm is presented. The novel adaptive multiuser detection algorithm uses the wavelet transform for the preprocessing, and wavelet-transformed signal uses LMS algorithm to implement the adaptive multiuser detection. The algorithm makes use of wavelet transform to divide the wavelet space, which shows that the wavelet transform has a better decorrelation ability and leads to better convergence. White noise can be wiped off under the wavelet transform according to different characteristics of signal and white noise under the wavelet transform. Theoretical analyses and simulations demonstrate that the algorithm converges faster than the conventional adaptive multiuser detection algorithm, and has the better performance. Simulation results reveal that the algorithm convergence relates to the wavelet base, and show that the algorithm convergence gets better with the increasing of regularity for the same series of the wavelet base. Finally the algorithm shows that it can be easily implemented.
文摘The flexibility of MIP technology to meet market demand is mainly introduced in this study. Their commercial application and technical principle are analyzed too. The MIP technology with wide feed adaptability can form a good combination with other technologies. The MIP technology has been applied extensively in China. Based on this platform, the CGP, MIP-LTG and MIP-DCR technologies have been developed, which can further improve the flexibility of MIP technology. Based on its novel reaction control technique with a sole sequential two-zone riser, the MIP users can easily switch to different operating modes between producing either more clean gasoline and propylene or diesel through changing the catalysts and varying the operating conditions. That offers MIP users with enough production flexibility and a rational production arrangement to meet the market demand. The MIP-DCR technology with less dry gas and coke yields can provide a more flexible operating mode since the catalysts to oil ratio has become an independent variable.
基金fully supported under the National Natural Science Funds(Project Number:61501042 and 61302089)National High Technology Research and Development Program(863)of China(Project Number:2015AA016101 and 2015AA015702)BUPT Special Program for Youth Scientific Research Innovation(Grant No.2015RC10)
文摘Video streaming,especially hypertext transfer protocol based(HTTP) adaptive streaming(HAS) of video,has been expected to be a dominant application over mobile networks in the near future,which brings huge challenge for the mobile networks.Although some works have been done for video streaming delivery in heterogeneous cellular networks,most of them focus on the video streaming scheduling or the caching strategy design.The problem of joint user association and rate allocation to maximize the system utility while satisfying the requirement of the quality of experience of users is largely ignored.In this paper,the problem of joint user association and rate allocation for HTTP adaptive streaming in heterogeneous cellular networks is studied,we model the optimization problem as a mixed integer programming problem.And to reduce the computational complexity,an optimal rate allocation using the Lagrangian dual method under the assumption of knowing user association for BSs is first solved.Then we use the many-to-one matching model to analyze the user association problem,and the joint user association and rate allocation based on the distributed greedy matching algorithm is proposed.Finally,extensive simulation results are illustrated to demonstrate the performance of the proposed scheme.
基金supported in part by the Natural Science Basic Research Plan in Shaanxi Province of China under Grant No.2013JM8021the National Natural Science Foundation of China under Grant No.61272458
文摘Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network.There is also a trend towards the personalization of web applications;to do this,the applications need to acquire information about the particular user.To maximise the use of the various sets of user information distributed on the web,this paper proposes a method to support the reuse and sharing of user profiles by different applications,and is based on user profile integration.To realize this goal,the initial task is user identification,and this forms the focus of the current paper.A new user identification method based on Multiple Attribute Decision Making(MADM) is described in which a subjective weight-directed objective weighting,which is obtained from the Similarity Weight method,is proposed to determine the relative weights of the common properties.Attribute Synthetic Evaluation is used to determine the equivalence of users.Experimental results show that the method is both feasible and effective despite the incompleteness of the candidate user dataset.
基金supported by the Research on Group Customers Satisfaction of Hubei Telecom
文摘The rapid development of industry application products has greatly influenced society. It has become essential for some telecommunication companies to focus on customer satisfaction with industrial products used by the government and enterprise customers. Following the review of a previous study of customer satisfaction and with the help of experiential level theory,this article attempts to establish a Satisfaction Factors Model for researching customer satisfaction with industry applications. We chose a product named "Mobile Monitor" and investigated the emotional satisfaction of 127 users and company leaders from different walks of life,and showed that 7 of the product's features affected the customers' overall emotional satisfaction. Lastly,this paper points out management implications of this application based on quantitative results. It presents a preliminary exploration program for customer satisfaction research in this specific field. The empirical research on a specific product based on experimental level theory may serve as a reference for other companies that desire to carry out similar surveys in future.
文摘User generated content,e.g.,from YouTube,the most popular online video sharing site,is one of the major sources of today's big data and it is crucial to understand their inherent characteristics.Recently,YouTube has started working with content providers(known as YouTube partners) to promote the users' watching and sharing activities.The substantial benefit is to further augment its service and monetize more videos,which is crucial to both YouTube and its partners,as well as to other providers of relevant services.In this paper,our main contribution is to analyze the massive amounts of video data from a YouTube partner's view.We make effective use of Insight,a new analytics service of YouTube that offers simple data analysis for partners.To provide the practical guidance from the raw Insight data,we enable more complex investigations for the inherent features that affect the popularity of the videos.Our findings facilitate YouTube partners to re-design current video publishing strategies,having more opportunities to attract more views.
文摘The rate satisfaction of government and corporate customers,to which telecom companies pay special attention,is an important part of the overall satisfaction of the market segment.Focusing on specialline products and based on interview with experts and literature review,this article builds an effect model comprising four factors affecting the major government and corporate customers' satisfaction with the rate,including cost performance,discount degree,rate communication and bill composition.Besides,employing AMOS and other analytical tools,it reveals significant positive effects of the aforementioned four factors on the customer's rate satisfaction,and arranges them in sequence according to the path coefficient of each influence.Based on quantified results,this article proposes management recommendations to improve the rate satisfaction,providing basis for research on the overall rate satisfaction optimization of government and corporate customers.
基金The National Natural Science Foundation of China(No.70571033)the National Key Technology R&D Program of China during the 11th Five-Year Plan Period(No.2006BAH02A06)
文摘The supply chain network with capacity constraints of manufacturers and retailers is considered.The linkage between supply chain network equilibrium and transportation network equilibrium is investigated.By analyzing the relationships among the manufacturers,retailers and consumers in the supply chain network and their own decisions concerning maximum profits,a combined variational inequality for the supply chain network equilibrium mode is proposed.Then an equivalent supernetwork of the supply chain network is constructed by adding additional links which denote the producing of manufactures and the handling of retailers.By the supernetwork,the supply chain network equilibrium model can be reformulated as a transportation network equilibrium model.Equivalent mathematical programming is,therefore,obtained based on the principle of a Wardrop user equilibrium.The corresponding Lagrange multiplier of the capacity constraints can be explained as the extra cost of marginal production when capacity is exceeded.A numerical example is given to illustrate the rationality of the model and the validity of the results.
文摘This paper examines how capital account liberalization (CAL) affects foreign direct investment (FDI) inflows. Authors use a dynamic panel model encompassing 14 Middle East countries over the period from 1985 to 2009. The findings suggest that countries that are able to reap the benefits of the capital openness policy satisfy certain threshold conditions regarding the level of financial development and institutional quality. Thus to promote FDI, governments in this region should develop a set of policies that not only focus on financial openness, but also on the improvement of the financial system and legal institutions.
文摘In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients suffering arms or legs injuries, fn this paper, the concept of an ambidextrous design lbr robot hands is introduced. The fingers can curl in one xvay or another, to imitate either a right hand or a left hand. The advantages and inconveniences of different models have been investigated to optimise the range and the maximum force applied by fingers. Besides, a remote control interthce is integrated to the system, allowing both to send comrnands through internet and to display a video streaming of the ambidextrous hand as feedback. Therefore, a robotic prosthesis could be used for the first time in telerehabilitation. The main application areas targeted are physiotherapy alter strokes or management of phantom pains/br amputees by/earning to control the ambidextrous hand. A client application is also accessible on Facehook social network, making the robotic limb easily reachable for the patients. Additionally the ambidextrous hand can be used tbr robotics research as well as artistic performances.
基金the National Natural Science Foundation of China(No.60072048)and Natural Science Found of Guangdong Province(No.31390)
文摘The proposed blind adaptive multiuser detector utilizes the signature waveform and time information of the desired user. With each received sample vector, the proposed algorithm updates the detector and gives the symbol estimate in the current time slot. Such property facilitates it to track time-varying channels.
基金supported by HONG KONG RGC and HONG KONG PolyU under the Grant G-U752/PolyU5103/09Ethe National Natural Science Foundation of Chinaunder Grant No.61003040,No.61202354
文摘Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.
文摘Blind adaptive multiuser detector has become a research hotspot in recent years due to a number of advantages, but many blind adaptive algorithms involve low convergence rate. This paper presents a novel stochastic blind adaptive multiuser detector without requiring training sequences, which needs only two system parameters: the signature sequence of the desired user i, s i and the variance of the additive white Gaussian noise (AWGN),σ 2. Simulation results show that by reasonably choosing time varying step size, the proposed detector can not only improve the convergence rate, but also reduce the limiting NSE (Normalized Squared Error) values, so it can effectively increase the performance of the system.
文摘A variation account was applied to divergent thinking accommodated as a kind of creative thinking. To provide control (contrast) condition the variation account was applied to psychometric intelligence. Guilford's (1956, 1967, 1988) theory of divergent-----convergent thinking served the background of our study. The main premise was that creative variation represents "thought trials" with diverse ways to find a solution to the problem. Task demands and the respective creative problem solving reveal advantageous sources that suggest the variation. Probably, uncertainty, information search, and finding alternatives extracted from memory precede, entail and provide variety of seeking, as well. A principal hypothesis to be tested was that divergent thinking enables its variation rather than intelligence does that to its variation. As predicted, the divergent thinking and its variation were related. Compared to uncreative, creative persons were characterized by larger variation. Apart from the mathematical intelligence, other kinds of intelligence and their variation did not correlate. Mainly, the data obtained, thus, lend support to the claimed hypothesis.
文摘This paper introduces and analyzes a detection scheme for adaptive suppression of Multiuser Access Interference (MAI) and MultiPath Distortion (MPD) for mobile station of DS/CDMA system. The proposed detection scheme may amount to a RAKE receiver structure,wherein each branch is considered as a linear multiuser filter designed under a Linear Constrained Minimum Variance (LCMV) optimization strategy to suppress MAI, followed by a proper combining rule to suppress MPD. The adaptive blind multiuser detecting and optimum combining of the proposed receiver are realized, based on the Least-Mean-Square (LMS) algorithm and an adaptive vector tracking algorithm respectively. Finally, the feasibility of the above two algorithms is proved by the numerical results provided by computer simulation.
基金supported by the Foundation for Key Program of Ministry of Education, China under Grant No.311007National Science Foundation Project of China under Grants No. 61202079, No.61170225, No.61271199+1 种基金the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-09-015Athe Fundamental Research Funds in Beijing Jiaotong University under Grant No.W11JB00630
文摘Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.
文摘Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption.