A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently...A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers.展开更多
Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,fr...Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,from the perspective of the defender,according to the differential impact of the system under DoS attacks of different energies,the DoS attacks energy grading detection standard was formulated,and the ICPS comprehensive security control framework was constructed.Secondly,a security transmission strategy based on event triggering was designed.Under the DoS attack energy classification detection mechanism,for large-energy attacks,the method based on time series analysis was considered to predict and compensate for lost data.Therefore,on the basis of passive and elastic response to small energy attacks,the active defense capability against DoS attacks was increased.Then by introducing the conecomplement linearization algorithm,the calculation methods of the state and fault estimation observer and the integrated safety controller were deduced,the goal of DoS attack active and passive hybrid intrusion tolerance and actuator failure active fault tolerance were realized.Finally,a simulation example of a four-capacity water tank system was given to verify the validity of the obtained conclusions.展开更多
An integrated approach is proposed to investigate the fuzzy multi-attribute decision-making (MADM) problems, where subjective preferences are expressed by a pairwise comparison matrix on the relative weights of attr...An integrated approach is proposed to investigate the fuzzy multi-attribute decision-making (MADM) problems, where subjective preferences are expressed by a pairwise comparison matrix on the relative weights of attributes and objective information is expressed by a decision matrix. An eigenvector method integrated the subjective fuzzy preference matrix and objective information is proposed. Two linear programming models based on subjective and objective information are introduced to assess the relative importance weights of attributes in an MADM problem. The simple additive weighting method is utilized to aggregate the decision information, and then all the alternatives are ranked. Finally, a numerical example is given to show the feasibility and effectiveness of the method. The result shows that it is easier than other methods of integrating subjective and objective information.展开更多
With using the cone and partial ordering t heory and mixed monotone operator theory, the existence and uniqueness for solut ion of systems of non-monotone binary nonliear operator equations are discussed. And the it...With using the cone and partial ordering t heory and mixed monotone operator theory, the existence and uniqueness for solut ion of systems of non-monotone binary nonliear operator equations are discussed. And the iterative sequences which converge to solution of systems of operator e quations and the error estimates are also given. Some corresponding results for the mixed monotone operations and the unary operator equations are improved and generalized.展开更多
Validating simulation model is one of the important aspects for modeling and simulation. Some methods of validating model are compared and analyzed. Several typical methods, such as TIC’s inequality coefficient, gray...Validating simulation model is one of the important aspects for modeling and simulation. Some methods of validating model are compared and analyzed. Several typical methods, such as TIC’s inequality coefficient, gray interconnected analysis, direct spectrum estimation, maximum entropy spectral estimation based on Burg or Marple, are chosen and programmed in C language. Some examples by using the program are given. The results show that the program is available and it is best to adopt multi methods for validating models.展开更多
Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher ...Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher order Markov chain model and how to automatically select the proper order are given in this paper. The chi square test is first run on synthetic data sets to show that it can efficiently find the proper order of Markov chain. Using chi square test, distinct higher order context dependences inherent in ten sets of sequences of yeast S.cerevisiae from other literature have been found. So the Markov chain with higher order would be more suitable for modeling the non coding background sequences than an independent model.展开更多
In time series modeling, the residuals are often checked for white noise and normality. In practice, the useful tests are Ljung Box test. Mcleod Li test and Lin Mudholkar test. In this paper, we present a nonparame...In time series modeling, the residuals are often checked for white noise and normality. In practice, the useful tests are Ljung Box test. Mcleod Li test and Lin Mudholkar test. In this paper, we present a nonparametric approach for checking the residuals of time series models. This approach is based on the maximal correlation coefficient ρ 2 * between the residuals and time t . The basic idea is to use the bootstrap to form the null distribution of the statistic ρ 2 * under the null hypothesis H 0:ρ 2 * =0. For calculating ρ 2 * , we proposes a ρ algorithm, analogous to ACE procedure. Power study shows this approach is more powerful than Ljung Box test. Meanwhile, some numerical results and two examples are reported in this paper.展开更多
From a perspective of theoretical study, there are some faults in the models of the existing object-oriented programming languages. For example, C# does not support metaclasses, the primitive types of Java and C# are ...From a perspective of theoretical study, there are some faults in the models of the existing object-oriented programming languages. For example, C# does not support metaclasses, the primitive types of Java and C# are not objects, etc. So, this paper designs a programming language, Shrek, which integrates many language features and constructions in a compact and consistent model. The Shrek language is a class-based purely object-oriented language. It has a dynamical strong type system, and adopts a single-inheritance mechanism with Mixin as its complement. It has a consistent class instantiation and inheritance structure, and the ability of intercessive structural computational reflection, which enables it to support safe metaclass programming. It also supports multi-thread programming and automatic garbage collection, and enforces its expressive power by adopting a native method mechanism. The prototype system of the Shrek language is implemented and anticipated design goals are achieved.展开更多
In this paper, we present a fast and fraction free procedure for computing the inertia of Bezout matrix and we can determine the numbers of different real roots and different pairs of conjugate complex roots of a pol...In this paper, we present a fast and fraction free procedure for computing the inertia of Bezout matrix and we can determine the numbers of different real roots and different pairs of conjugate complex roots of a polynomial equation with integer coefficients quickly based on this result.展开更多
As an improved version of trial equation method, a new trial equation method is proposed. Using this method, abundant new exact traveling wave solutions to a high-order KdV-type equation are obtained.
A 1.8-V 64-kb four-way set-associative CMOS cache memory implemented by 0.18μm/1.8V 1P6M logic CMOS technology for a super performance 32-b RISC microprocessor is presented.For comparison,a conventional parallel acce...A 1.8-V 64-kb four-way set-associative CMOS cache memory implemented by 0.18μm/1.8V 1P6M logic CMOS technology for a super performance 32-b RISC microprocessor is presented.For comparison,a conventional parallel access cache with the same storage and organization is also designed and simulated using the same technology.Simulation results indicate that by using sequential access,power reduction of 26% on a cache hit and 35% on a cache miss is achieved.High-speed approaches including modified current-mode sense amplifier and split dynamic tag comparators are adopted to achieve fast data access.Simulation results indicate that a typical clock to data access of 2.7ns is achieved...展开更多
A time-series similarity measurement method based on wavelet and matrix transform was proposed,and its anti-noise ability,sensitivity and accuracy were discussed. The time-series sequences were compressed into wavelet...A time-series similarity measurement method based on wavelet and matrix transform was proposed,and its anti-noise ability,sensitivity and accuracy were discussed. The time-series sequences were compressed into wavelet subspace,and sample feature vector and orthogonal basics of sample time-series sequences were obtained by K-L transform. Then the inner product transform was carried out to project analyzed time-series sequence into orthogonal basics to gain analyzed feature vectors. The similarity was calculated between sample feature vector and analyzed feature vector by the Euclid distance. Taking fault wave of power electronic devices for example,the experimental results show that the proposed method has low dimension of feature vector,the anti-noise ability of proposed method is 30 times as large as that of plain wavelet method,the sensitivity of proposed method is 1/3 as large as that of plain wavelet method,and the accuracy of proposed method is higher than that of the wavelet singular value decomposition method. The proposed method can be applied in similarity matching and indexing for lager time series databases.展开更多
Injection of water to enhance oil production is commonplace, and improvements in understanding the process are economically important. This study examines predictive models of the injection-to-production ratio. First...Injection of water to enhance oil production is commonplace, and improvements in understanding the process are economically important. This study examines predictive models of the injection-to-production ratio. Firstly, the error between the fitting and actual injection-production ratio is calculated with such methods as the injection-production ratio and water-oil ratio method, the material balance method, the multiple regression method, the gray theory GM (1,1) model and the back-propogation (BP) neural network method by computer applications in this paper. The relative average errors calculated are respectively 1.67%, 1.08%, 19.2%, 1.38% and 0.88%. Secondly, the reasons for the errors from different prediction methods are analyzed theoretically, indicating that the prediction precision of the BP neural network method is high, and that it has a better self-adaptability, so that it can reflect the internal relationship between the injection-production ratio and the influencing factors. Therefore, the BP neural network method is suitable to the prediction of injection-production ratio.展开更多
The interpolatory edge operator is applied to the recognition of cotton and ramie fibers. Its performance is studied in comparison with the Canny edge operator in the fiber’s edge detection for cross-sectional image....The interpolatory edge operator is applied to the recognition of cotton and ramie fibers. Its performance is studied in comparison with the Canny edge operator in the fiber’s edge detection for cross-sectional image. The input image is interpolated other than Gaussian function smoothing. The quality of edge output is improved by the interpolatory edge operator. It produces edge output with good continuity for low-resolution input. The fine edge output, such as cross-markings, can be distinguished clearly, so the interpolatory edge operator is suitable for the study of cotton and ramie fibers. Furthermore, the application of the interpolatory edge operator can cut the hardware cost, reduce the storage and speed up the data transmission.展开更多
To seek new infinite sequence soliton-like exact solutions to nonlinear evolution equations (NEE(s)), by developing two characteristics of construction and mechanization on auxiliary equation method, the second ki...To seek new infinite sequence soliton-like exact solutions to nonlinear evolution equations (NEE(s)), by developing two characteristics of construction and mechanization on auxiliary equation method, the second kind of elliptie equation is highly studied and new type solutions and Backlund transformation are obtained. Then (2+ l )-dimensional breaking soliton equation is chosen as an example and its infinite sequence soliton-like exact solutions are constructed with the help of symbolic computation system Mathematica, which include infinite sequence smooth soliton-like solutions of Jacobi elliptic type, infinite sequence compact soliton solutions of Jacobi elliptic type and infinite sequence peak soliton solutions of exponential function type and triangular function type.展开更多
Batrachospermum arcuatum Kylin is typically dioecious,although some monoecious specimens have been collected from four locations in North China.In this study,B.arcuatum populations,including monoecious and dioecious t...Batrachospermum arcuatum Kylin is typically dioecious,although some monoecious specimens have been collected from four locations in North China.In this study,B.arcuatum populations,including monoecious and dioecious thalli,were collected from seven stream segments.The nuclear DNA internal transcribed spacer(ITS)region was sequenced for the seven populations,and a phylogenetic tree was constructed using Bayesian inference to assess intraspecifi c relationships.A haplotype network was also created.The ITS region in B.arcuatum from North China comprised 822–853 bp,with 10 haplotypes detected from the seven locations.The results of this study support the inclusion of monoecious individuals in the species B.arcuatum.展开更多
Blockade of immune checkpoints has recently emerged as a novel therapeutic strategy in various tumors. In particular,monoclonal antibodies targeting programmed cell death 1(PD-1) or its ligand(PD-L1) have been most st...Blockade of immune checkpoints has recently emerged as a novel therapeutic strategy in various tumors. In particular,monoclonal antibodies targeting programmed cell death 1(PD-1) or its ligand(PD-L1) have been most studied in lung cancer,and PD-1 inhibitors are now established agents in the management of non-small cell lung cancer(NSCLC). The reports on highprofile clinical trials have shown the association of PD-L1 expression by immunohistochemistry(IHC) with higher overall response rates to the PD-1/PD-L1 axis blockade suggesting that PD-L1 expression may serve as a predictive marker. Unfortunately,however, each PD-1 or PD-L1 inhibitor is coupled with a specific PD-L1 antibody, IHC protocol and scoring system for the biomarker assessment, making the head-to-head comparison of the studies difficult. Similarly, multiple clinical series that correlated PD-L1 expression with clinicopathologic and/or molecular variables and/or survival have reported conflicting results.The discrepancy could be explained by the differences in ethnicity and/or histologic types included in the studies, but it appears to be attributed in part to the differences in PD-L1 IHC methods. Thus, orchestrated efforts to standardize the PD-L1 IHC are warranted to establish the IHC as a predictive and/or prognostic biomarker in NSCLC.展开更多
Recently, the desiccation effect of the North Atlantic Oscillation(NAO) is found to be positively correlated with violent conflict in pre-industrial Europe, with agricultural shrinkage and its subsequent economic shoc...Recently, the desiccation effect of the North Atlantic Oscillation(NAO) is found to be positively correlated with violent conflict in pre-industrial Europe, with agricultural shrinkage and its subsequent economic shocks to be their causal link. However, it remains unexplored whether the correlation persists if the study period is extended backward in time, a different definition of violent conflict is applied, or the relationship is examined at lower geographic levels. In this study, we based on 835 internal disturbance incidents in Europe during 1049–1800 to conduct long-temporal and multi-scalar examination on the NAO-conflict nexus. ′Time-series′ and ′panel data′ disaggregation approaches, together with Granger Causality, Multiple Regression, and Survival Analyses were applied to verify the nexus quantitatively. Results show that the positive NAO-conflict correlation was significant at the continent and physiographic zone levels. During the positive NAO phases, the annual probability of internal disturbance outbreak increased by 70.0% in the southern Europe and the Mediterranean, a zone most affected by the NAO-induced desiccation effect. Yet, the NAO-conflict correlation was rather inconsistent when it was downscaled to the sub-regional level. Moreover, the NAO-conflict correlation was inflated under the time-series approach, while the panel data approach demonstrated the region-specific nature of the NAO forcing more clearly. The associated implications in examining climate-conflict nexus are discussed. Our findings may be crucial in examining violent conflict in the northwestern Africa, a highly agricultural region affected by the NAO.展开更多
We re-explain the Weyl quantization scheme by virtue of the technique of integration within Weyl orderedproduct of operators,i.e.,the Weyl correspondence rule can be reconstructed by classical functions' Fourier t...We re-explain the Weyl quantization scheme by virtue of the technique of integration within Weyl orderedproduct of operators,i.e.,the Weyl correspondence rule can be reconstructed by classical functions' Fourier transfor-mation followed by an inverse Fourier transformation within Weyl ordering of operators.As an application of thisreconstruction,we derive the quantum operator coresponding to the angular spectrum amplitude of a spherical wave.展开更多
AIM: To define the clinical characteristics, and to as- sess the management of colonoscopic complications at a local clinic. METHODS: A retrospective review of the medical re- cords was performed for the patients wi...AIM: To define the clinical characteristics, and to as- sess the management of colonoscopic complications at a local clinic. METHODS: A retrospective review of the medical re- cords was performed for the patients with iatrogenic colon perforations after endoscopy at a local clinic be- tween April 2006 and December 2010. Data obtained from a tertiary hospital in the same region were also analyzed. The underlying conditions, clinical presenta- tions, perforation locations, treatment types (operative or conservative) and outcome data for patients at the local clinic and the tertiary hospital were compared. RESULTS: A total of 10 826 colonoscopies, and 2625 therapeutic procedures were performed at a local clinic and 32 148 colonoscopies, and 7787 therapeutic proce-dures were performed at the tertiary hospital. The clinic had no perforations during diagnostic colonoscopy and 8 (0.3%) perforations were determined to be related to therapeutic procedures. The perforation rates in each therapeutic procedure were 0.06% (1/1609) in polyp- ectomy, 0.2% (2/885) in endoscopic mucosal resection (EMR), and 3.8% (5/131) in endoscopic submucosal dis- section (ESD). Perforation rates for ESD were significantly higher than those for polypectomy or EMR (P 〈 0.01). All of these patients were treated conservatively. On the oth- er hand, three (0.01%) perforation cases were observed among the 24 361 diagnostic procedures performed, and these cases were treated with surgery in a tertiary hospi- tal. Six perforations occurred with therapeutic endoscopy (perforation rate, 0.08%; 1 per 1298 procedures). Perfo- ration rates for specific procedure types were 0.02% (1 per 5500) for polypectomy, 0.17% (1 per 561) for EMR, 2.3% (1 per 43) for ESD in the tertiary hospital. There were no differences in the perforation rates for each therapeutic procedure between the clinic and the tertiary hospital. The incidence of iatrogenic perforation requiring surgical treatment was quite low in both the clinic and the tertiary hospital. No procedure-related mortalities occurred. Performing closure with endoscopic clipping reduced the C-reactive protein (CRP) titers. The mean maximum CRP titer was 2.9:1:1.6 mg/dL with clipping and 9.7 + 6.2 mg/dL without clipping, respectively (P 〈 0.05). An operation is indicated in the presence of a large perforation, and in the setting of generalized peritonitis or ongoing sepsis. Although we did not experience such case in the clinic, patients with large perforations should be immediately transferred to a tertiary hospital. Good relationships between local clinics and nearby tertiary hospitals should therefore be maintained. CONCLUSION: It was therefore found to be possible to perform endoscopic treatment at a local clinic when sufficient back up was available at a nearby tertiary hospital.展开更多
基金National Natural Science Foundation of China(62372464)。
文摘A critical problem in the cube attack is how to recover superpolies efficiently.As the targeting number of rounds of an iterative stream cipher increases,the scale of its superpolies becomes larger and larger.Recently,to recover massive superpolies,the nested monomial prediction technique,the algorithm based on the divide-and-conquer strategy,and stretching cube attacks were proposed,which have been used to recover a superpoly with over ten million monomials for the NFSR-based stream ciphers such as Trivium and Grain-128AEAD.Nevertheless,when these methods are used to recover superpolies,many invalid calculations are performed,which makes recovering superpolies more difficult.This study finds an interesting observation that can be used to improve the above methods.Based on the observation,a new method is proposed to avoid a part of invalid calculations during the process of recovering superpolies.Then,the new method is applied to the nested monomial prediction technique and an improved superpoly recovery framework is presented.To verify the effectiveness of the proposed scheme,the improved framework is applied to 844-and 846-round Trivium and the exact ANFs of the superpolies is obtained with over one hundred million monomials,showing the improved superpoly recovery technique is powerful.Besides,extensive experiments on other scaled-down variants of NFSR-based stream ciphers show that the proposed scheme indeed could be more efficient on the superpoly recovery against NFSR-based stream ciphers.
基金supported by Gansu Higher Education Innovation Fund Project(No.2023B-439)。
文摘Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,from the perspective of the defender,according to the differential impact of the system under DoS attacks of different energies,the DoS attacks energy grading detection standard was formulated,and the ICPS comprehensive security control framework was constructed.Secondly,a security transmission strategy based on event triggering was designed.Under the DoS attack energy classification detection mechanism,for large-energy attacks,the method based on time series analysis was considered to predict and compensate for lost data.Therefore,on the basis of passive and elastic response to small energy attacks,the active defense capability against DoS attacks was increased.Then by introducing the conecomplement linearization algorithm,the calculation methods of the state and fault estimation observer and the integrated safety controller were deduced,the goal of DoS attack active and passive hybrid intrusion tolerance and actuator failure active fault tolerance were realized.Finally,a simulation example of a four-capacity water tank system was given to verify the validity of the obtained conclusions.
文摘An integrated approach is proposed to investigate the fuzzy multi-attribute decision-making (MADM) problems, where subjective preferences are expressed by a pairwise comparison matrix on the relative weights of attributes and objective information is expressed by a decision matrix. An eigenvector method integrated the subjective fuzzy preference matrix and objective information is proposed. Two linear programming models based on subjective and objective information are introduced to assess the relative importance weights of attributes in an MADM problem. The simple additive weighting method is utilized to aggregate the decision information, and then all the alternatives are ranked. Finally, a numerical example is given to show the feasibility and effectiveness of the method. The result shows that it is easier than other methods of integrating subjective and objective information.
文摘With using the cone and partial ordering t heory and mixed monotone operator theory, the existence and uniqueness for solut ion of systems of non-monotone binary nonliear operator equations are discussed. And the iterative sequences which converge to solution of systems of operator e quations and the error estimates are also given. Some corresponding results for the mixed monotone operations and the unary operator equations are improved and generalized.
文摘Validating simulation model is one of the important aspects for modeling and simulation. Some methods of validating model are compared and analyzed. Several typical methods, such as TIC’s inequality coefficient, gray interconnected analysis, direct spectrum estimation, maximum entropy spectral estimation based on Burg or Marple, are chosen and programmed in C language. Some examples by using the program are given. The results show that the program is available and it is best to adopt multi methods for validating models.
文摘Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher order Markov chain model and how to automatically select the proper order are given in this paper. The chi square test is first run on synthetic data sets to show that it can efficiently find the proper order of Markov chain. Using chi square test, distinct higher order context dependences inherent in ten sets of sequences of yeast S.cerevisiae from other literature have been found. So the Markov chain with higher order would be more suitable for modeling the non coding background sequences than an independent model.
文摘In time series modeling, the residuals are often checked for white noise and normality. In practice, the useful tests are Ljung Box test. Mcleod Li test and Lin Mudholkar test. In this paper, we present a nonparametric approach for checking the residuals of time series models. This approach is based on the maximal correlation coefficient ρ 2 * between the residuals and time t . The basic idea is to use the bootstrap to form the null distribution of the statistic ρ 2 * under the null hypothesis H 0:ρ 2 * =0. For calculating ρ 2 * , we proposes a ρ algorithm, analogous to ACE procedure. Power study shows this approach is more powerful than Ljung Box test. Meanwhile, some numerical results and two examples are reported in this paper.
基金The National Science Fund for Distinguished Young Scholars (No.60425206)the National Natural Science Foundation of China (No.60633010)the Natural Science Foundation of Jiangsu Province(No.BK2006094)
文摘From a perspective of theoretical study, there are some faults in the models of the existing object-oriented programming languages. For example, C# does not support metaclasses, the primitive types of Java and C# are not objects, etc. So, this paper designs a programming language, Shrek, which integrates many language features and constructions in a compact and consistent model. The Shrek language is a class-based purely object-oriented language. It has a dynamical strong type system, and adopts a single-inheritance mechanism with Mixin as its complement. It has a consistent class instantiation and inheritance structure, and the ability of intercessive structural computational reflection, which enables it to support safe metaclass programming. It also supports multi-thread programming and automatic garbage collection, and enforces its expressive power by adopting a native method mechanism. The prototype system of the Shrek language is implemented and anticipated design goals are achieved.
文摘In this paper, we present a fast and fraction free procedure for computing the inertia of Bezout matrix and we can determine the numbers of different real roots and different pairs of conjugate complex roots of a polynomial equation with integer coefficients quickly based on this result.
文摘As an improved version of trial equation method, a new trial equation method is proposed. Using this method, abundant new exact traveling wave solutions to a high-order KdV-type equation are obtained.
文摘A 1.8-V 64-kb four-way set-associative CMOS cache memory implemented by 0.18μm/1.8V 1P6M logic CMOS technology for a super performance 32-b RISC microprocessor is presented.For comparison,a conventional parallel access cache with the same storage and organization is also designed and simulated using the same technology.Simulation results indicate that by using sequential access,power reduction of 26% on a cache hit and 35% on a cache miss is achieved.High-speed approaches including modified current-mode sense amplifier and split dynamic tag comparators are adopted to achieve fast data access.Simulation results indicate that a typical clock to data access of 2.7ns is achieved...
基金Projects(60634020, 60904077, 60874069) supported by the National Natural Science Foundation of ChinaProject(JC200903180555A) supported by the Foundation Project of Shenzhen City Science and Technology Plan of China
文摘A time-series similarity measurement method based on wavelet and matrix transform was proposed,and its anti-noise ability,sensitivity and accuracy were discussed. The time-series sequences were compressed into wavelet subspace,and sample feature vector and orthogonal basics of sample time-series sequences were obtained by K-L transform. Then the inner product transform was carried out to project analyzed time-series sequence into orthogonal basics to gain analyzed feature vectors. The similarity was calculated between sample feature vector and analyzed feature vector by the Euclid distance. Taking fault wave of power electronic devices for example,the experimental results show that the proposed method has low dimension of feature vector,the anti-noise ability of proposed method is 30 times as large as that of plain wavelet method,the sensitivity of proposed method is 1/3 as large as that of plain wavelet method,and the accuracy of proposed method is higher than that of the wavelet singular value decomposition method. The proposed method can be applied in similarity matching and indexing for lager time series databases.
文摘Injection of water to enhance oil production is commonplace, and improvements in understanding the process are economically important. This study examines predictive models of the injection-to-production ratio. Firstly, the error between the fitting and actual injection-production ratio is calculated with such methods as the injection-production ratio and water-oil ratio method, the material balance method, the multiple regression method, the gray theory GM (1,1) model and the back-propogation (BP) neural network method by computer applications in this paper. The relative average errors calculated are respectively 1.67%, 1.08%, 19.2%, 1.38% and 0.88%. Secondly, the reasons for the errors from different prediction methods are analyzed theoretically, indicating that the prediction precision of the BP neural network method is high, and that it has a better self-adaptability, so that it can reflect the internal relationship between the injection-production ratio and the influencing factors. Therefore, the BP neural network method is suitable to the prediction of injection-production ratio.
基金Supported by Foundation of National Excellent Doctoral Dissertation of China (No.200350) , NSFC (No.90204006,60377013) ,863Project (No.2005AA122110) ,the Ministry of Education, China (No.20030248035)
文摘The interpolatory edge operator is applied to the recognition of cotton and ramie fibers. Its performance is studied in comparison with the Canny edge operator in the fiber’s edge detection for cross-sectional image. The input image is interpolated other than Gaussian function smoothing. The quality of edge output is improved by the interpolatory edge operator. It produces edge output with good continuity for low-resolution input. The fine edge output, such as cross-markings, can be distinguished clearly, so the interpolatory edge operator is suitable for the study of cotton and ramie fibers. Furthermore, the application of the interpolatory edge operator can cut the hardware cost, reduce the storage and speed up the data transmission.
基金Supported by the Natural Natural Science Foundation of China under Grant No.10461006the Science Research Foundation of Institution of Higher Education of Inner Mongolia Autonomous Region,China under Grant No.NJZZ07031the Natural Science Foundation of Inner Mongolia Autonomous Region,China under Grant No.2010MS0111
文摘To seek new infinite sequence soliton-like exact solutions to nonlinear evolution equations (NEE(s)), by developing two characteristics of construction and mechanization on auxiliary equation method, the second kind of elliptie equation is highly studied and new type solutions and Backlund transformation are obtained. Then (2+ l )-dimensional breaking soliton equation is chosen as an example and its infinite sequence soliton-like exact solutions are constructed with the help of symbolic computation system Mathematica, which include infinite sequence smooth soliton-like solutions of Jacobi elliptic type, infinite sequence compact soliton solutions of Jacobi elliptic type and infinite sequence peak soliton solutions of exponential function type and triangular function type.
基金Supported by the National Natural Science Foundation of China(Nos.30970187,31200164)
文摘Batrachospermum arcuatum Kylin is typically dioecious,although some monoecious specimens have been collected from four locations in North China.In this study,B.arcuatum populations,including monoecious and dioecious thalli,were collected from seven stream segments.The nuclear DNA internal transcribed spacer(ITS)region was sequenced for the seven populations,and a phylogenetic tree was constructed using Bayesian inference to assess intraspecifi c relationships.A haplotype network was also created.The ITS region in B.arcuatum from North China comprised 822–853 bp,with 10 haplotypes detected from the seven locations.The results of this study support the inclusion of monoecious individuals in the species B.arcuatum.
基金supported by a Stand Up To Cancer-American Cancer Society Dream Team Translation Research Grant
文摘Blockade of immune checkpoints has recently emerged as a novel therapeutic strategy in various tumors. In particular,monoclonal antibodies targeting programmed cell death 1(PD-1) or its ligand(PD-L1) have been most studied in lung cancer,and PD-1 inhibitors are now established agents in the management of non-small cell lung cancer(NSCLC). The reports on highprofile clinical trials have shown the association of PD-L1 expression by immunohistochemistry(IHC) with higher overall response rates to the PD-1/PD-L1 axis blockade suggesting that PD-L1 expression may serve as a predictive marker. Unfortunately,however, each PD-1 or PD-L1 inhibitor is coupled with a specific PD-L1 antibody, IHC protocol and scoring system for the biomarker assessment, making the head-to-head comparison of the studies difficult. Similarly, multiple clinical series that correlated PD-L1 expression with clinicopathologic and/or molecular variables and/or survival have reported conflicting results.The discrepancy could be explained by the differences in ethnicity and/or histologic types included in the studies, but it appears to be attributed in part to the differences in PD-L1 IHC methods. Thus, orchestrated efforts to standardize the PD-L1 IHC are warranted to establish the IHC as a predictive and/or prognostic biomarker in NSCLC.
基金Under the auspices of Hui Oi-Chow Trust Fund(No.201302172003,201502172003)Research Grants Council of Government of Hong Kong Special Administrative Region of China(No.HKU758712H,HKU745113H,HKU17610715)
文摘Recently, the desiccation effect of the North Atlantic Oscillation(NAO) is found to be positively correlated with violent conflict in pre-industrial Europe, with agricultural shrinkage and its subsequent economic shocks to be their causal link. However, it remains unexplored whether the correlation persists if the study period is extended backward in time, a different definition of violent conflict is applied, or the relationship is examined at lower geographic levels. In this study, we based on 835 internal disturbance incidents in Europe during 1049–1800 to conduct long-temporal and multi-scalar examination on the NAO-conflict nexus. ′Time-series′ and ′panel data′ disaggregation approaches, together with Granger Causality, Multiple Regression, and Survival Analyses were applied to verify the nexus quantitatively. Results show that the positive NAO-conflict correlation was significant at the continent and physiographic zone levels. During the positive NAO phases, the annual probability of internal disturbance outbreak increased by 70.0% in the southern Europe and the Mediterranean, a zone most affected by the NAO-induced desiccation effect. Yet, the NAO-conflict correlation was rather inconsistent when it was downscaled to the sub-regional level. Moreover, the NAO-conflict correlation was inflated under the time-series approach, while the panel data approach demonstrated the region-specific nature of the NAO forcing more clearly. The associated implications in examining climate-conflict nexus are discussed. Our findings may be crucial in examining violent conflict in the northwestern Africa, a highly agricultural region affected by the NAO.
基金supported by the Specialized Research Fund for the Doctorial Progress of the Higher Education of China under Grant No.20040358019the National Natural Science Foundation of China under Grant No.10775097
文摘We re-explain the Weyl quantization scheme by virtue of the technique of integration within Weyl orderedproduct of operators,i.e.,the Weyl correspondence rule can be reconstructed by classical functions' Fourier transfor-mation followed by an inverse Fourier transformation within Weyl ordering of operators.As an application of thisreconstruction,we derive the quantum operator coresponding to the angular spectrum amplitude of a spherical wave.
文摘AIM: To define the clinical characteristics, and to as- sess the management of colonoscopic complications at a local clinic. METHODS: A retrospective review of the medical re- cords was performed for the patients with iatrogenic colon perforations after endoscopy at a local clinic be- tween April 2006 and December 2010. Data obtained from a tertiary hospital in the same region were also analyzed. The underlying conditions, clinical presenta- tions, perforation locations, treatment types (operative or conservative) and outcome data for patients at the local clinic and the tertiary hospital were compared. RESULTS: A total of 10 826 colonoscopies, and 2625 therapeutic procedures were performed at a local clinic and 32 148 colonoscopies, and 7787 therapeutic proce-dures were performed at the tertiary hospital. The clinic had no perforations during diagnostic colonoscopy and 8 (0.3%) perforations were determined to be related to therapeutic procedures. The perforation rates in each therapeutic procedure were 0.06% (1/1609) in polyp- ectomy, 0.2% (2/885) in endoscopic mucosal resection (EMR), and 3.8% (5/131) in endoscopic submucosal dis- section (ESD). Perforation rates for ESD were significantly higher than those for polypectomy or EMR (P 〈 0.01). All of these patients were treated conservatively. On the oth- er hand, three (0.01%) perforation cases were observed among the 24 361 diagnostic procedures performed, and these cases were treated with surgery in a tertiary hospi- tal. Six perforations occurred with therapeutic endoscopy (perforation rate, 0.08%; 1 per 1298 procedures). Perfo- ration rates for specific procedure types were 0.02% (1 per 5500) for polypectomy, 0.17% (1 per 561) for EMR, 2.3% (1 per 43) for ESD in the tertiary hospital. There were no differences in the perforation rates for each therapeutic procedure between the clinic and the tertiary hospital. The incidence of iatrogenic perforation requiring surgical treatment was quite low in both the clinic and the tertiary hospital. No procedure-related mortalities occurred. Performing closure with endoscopic clipping reduced the C-reactive protein (CRP) titers. The mean maximum CRP titer was 2.9:1:1.6 mg/dL with clipping and 9.7 + 6.2 mg/dL without clipping, respectively (P 〈 0.05). An operation is indicated in the presence of a large perforation, and in the setting of generalized peritonitis or ongoing sepsis. Although we did not experience such case in the clinic, patients with large perforations should be immediately transferred to a tertiary hospital. Good relationships between local clinics and nearby tertiary hospitals should therefore be maintained. CONCLUSION: It was therefore found to be possible to perform endoscopic treatment at a local clinic when sufficient back up was available at a nearby tertiary hospital.