Torrentophryne aspinia is a new kind of toads discovered in China recently, it lives in the forest floor in West Yunnan, the most important things for this kind of species is that they have a kind of torrent-adapted t...Torrentophryne aspinia is a new kind of toads discovered in China recently, it lives in the forest floor in West Yunnan, the most important things for this kind of species is that they have a kind of torrent-adapted tadpoles which have abdominal suckers and can adhere to the surfaces of rocks in moving waters. In this article, we described the forming procedures of abdominal sucker and some breeding behaviors, habitats and habits. After comparing with those of other toads, it is confirmed that Torrentophryne should be a new valid genus, it is derived from ancestor toads because of adaptation to the torrent habitats, by the forming of torrent -adapted organ-abdominal sucker in the early development.展开更多
In order to solve transport problems of industry solid,firstly,a new applicationnotion of pipeline transport was presented,that is to say,combining pretreatment andtransport with disposal techniques of industry solid ...In order to solve transport problems of industry solid,firstly,a new applicationnotion of pipeline transport was presented,that is to say,combining pretreatment andtransport with disposal techniques of industry solid waste.Secondly,the integrated dis-posal and transport system for industry solid waste was introduced,in particular,the oper-ating principles,equipment set-up,key technology and technical parameters.Next,thispaper illustrated the application of this integrated system.Such as it can transport coalsludge with sufficiently high solids content(about 72%~77%)and high apparent viscosity(about 1 000~3 000 Pa.s)directly by pipeline having no use for water and addition agent.Generally,the transport distance is about 1 000 m.This system has been successfullyused in innocuous disposition and efficient utilization of other industrial byproducts or solidwastes,such as city sludge and paper making waste.The integrated system causes nopollution to the environment for its complete seal and realizes protecting the environment,conserving the energy,promoting the development of cycling economic.Finally,the paperdiscussed the research works that were needed for studying such pipeline transport sys-tem and narrates the relevant condition and application status.展开更多
A behavior model for the receiver of the Ethernet passive optical network(EPON) is presented. The model consists of a fiber, a photodetector, a transimpedance amplifier (TIA) followed by a limiting amplifier and a...A behavior model for the receiver of the Ethernet passive optical network(EPON) is presented. The model consists of a fiber, a photodetector, a transimpedance amplifier (TIA) followed by a limiting amplifier and a clock and data recovery' circuit (CDR). Each sub-model is constructed based on the architecture of a circuit. The noise and jitter in each block such as shot noise, thermal noise, deterministic and random jitter are also considered. The performance of the whole receiver can be evaluated by the simulation of the behavior model, which is faster than the ordinary circuit model and more accurate than the analytical model. The whole model is implemented with C ++ and simulated in Microsoft Visual C ++ 6. 0. Using the Monte Carlo method, the EPON receiver is simulated. The simulation results show a good agreement with experimental ones.展开更多
High temperature plastic deformation behavior of non-orientated electrical steel was investigated by Gleeble 1500 thermo-mechanical simulator at strain rate of 0.01-10 s^-1 and high temperature of 500-1 200 ℃. The st...High temperature plastic deformation behavior of non-orientated electrical steel was investigated by Gleeble 1500 thermo-mechanical simulator at strain rate of 0.01-10 s^-1 and high temperature of 500-1 200 ℃. The stress level factor (a), stress exponent (n), structural factor (A) and activation energy (Q) of high temperature plastic deformation process of non-orientated electrical steel in different temperature ranges were calculated by the Arrhenius model. The results show that, with dynamic elevation of deformation temperature, phase transformation from α-Fe to γ-Fe takes place simultaneously during plastic deformation, dynamic recovery and dynamic recrystallization process, leading to an irregular change of the steady flow stress. For high temperature plastic deformation between 500 and 800 ℃, the calculated values of a, n, A, and Q are 0.039 0 MPa 1, 7.93, 1.9× 10^18 s^-1, and 334.8 kJ/mol, respectively, and for high temperature plastic deformation between 1 050 and 1 200 ℃, the calculated values of a, n, A, and Q are 0.125 8 MPa1, 5.29, 1.0 × 10^28 s^-1, and 769.9 kJ/mol, respectively.展开更多
The tilting-train is very attractive to the railroad users in the world due to the advantage of high speed in curved track using pre-existing infrastructure of railway.Tilting-train has a unique allowable speed and me...The tilting-train is very attractive to the railroad users in the world due to the advantage of high speed in curved track using pre-existing infrastructure of railway.Tilting-train has a unique allowable speed and mechanism especially in curved track.In this work,when tilting-train is operated with the allowable speed,the behavior of roadbed is evaluated by examining its settlement and bearing capacity.Additionally,the stability of roadbed is estimated as the roadbed is in the condition of soft soil influenced by the weather effects and cyclic train loading.Numerical results show that the roadbed settlement satisfies the allowable settlement when the elastic moduli of upper roadbed and in-situ soil are greater than 3800 and 4600 kN/m2 for rail joint and 2300 and 3300 kN/m2 for continuous welded rail(CWR).展开更多
The formation maintenance of multiple unmanned aerial vehicles(UAVs)based on proximity behavior is explored in this study.Individual decision-making is conducted according to the expected UAV formation structure and t...The formation maintenance of multiple unmanned aerial vehicles(UAVs)based on proximity behavior is explored in this study.Individual decision-making is conducted according to the expected UAV formation structure and the position,velocity,and attitude information of other UAVs in the azimuth area.This resolves problems wherein nodes are necessarily strongly connected and communication is strictly consistent under the traditional distributed formation control method.An adaptive distributed formation flight strategy is established for multiple UAVs by exploiting proximity behavior observations,which remedies the poor flexibility in distributed formation.This technique ensures consistent position and attitude among UAVs.In the proposed method,the azimuth area relative to the UAV itself is established to capture the state information of proximal UAVs.The dependency degree factor is introduced to state update equation based on proximity behavior.Finally,the formation position,speed,and attitude errors are used to form an adaptive dynamic adjustment strategy.Simulations are conducted to demonstrate the effectiveness and robustness of the theoretical results,thus validating the effectiveness of the proposed method.展开更多
Pressure plate instrument is employed during drying, and unconfined compressive strength test is performed on the unsaturated specimen. Curves of shear force versus shear displacement, and curves of saturation degree ...Pressure plate instrument is employed during drying, and unconfined compressive strength test is performed on the unsaturated specimen. Curves of shear force versus shear displacement, and curves of saturation degree versus time are investigated. The results show that the specimens with similar curves of saturation degree versus time have nearly identical mechanical behavior. In particular, the uniform specimens should be chosen within the lower equilibrium saturation degree because steady test results are presented. Further, the conclusion is verified by the repeated test. Thus, the method for distinguishing the uniform unsaturated specimen is obtained. In the light of the method, an improved test process is proposed. The uniform specimens should be chosen by this method under the specific matric suction, and then shear tests are carried out on the chosen unsaturated specimen. Namely, initial value of unsaturated soil is not zero matric suction but a specific suction.展开更多
Voherra series behavioral model for radio frequency (RF) power amplifier (PA) has been widely used in system-level simulation, however, high computational complexity makes this kind of model limited to "weak" no...Voherra series behavioral model for radio frequency (RF) power amplifier (PA) has been widely used in system-level simulation, however, high computational complexity makes this kind of model limited to "weak" nonlinearity. In order to reduce the computational complexity and the number of coefficients of Volterra series kernels, a Volterra series improved behavioral model based on Laguerre orthogonal polynomials function, namely Voherra-Laguerre behavioral model, is proposed. Mathematical expressions of Volterra-Laguerre behavioral model is derived, and accuracy of the model is verified through comparison of measured and simulation output data from a freescale PA using MRF21030 transistor. Mathematical analysis and simulation results show that Voherra-Laguerre behavioral model has a simple structure, much less coefficients and better modeling performance than general Volterra series model. The model can be used more correctly for system-level simulation of RF PA with wideband signal.展开更多
In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intell...In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users.展开更多
The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory...The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented.Then an advanced ID3 algorithm was presented to classify the abnormal traffic.Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall.The firewall limits the bandwidth based on different types of abnormal traffic.Experiments show the outstanding performance of the proposed approach in real-time property,high detection rate,and unsupervised learning.展开更多
The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, ...The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, a wireless node can distinguish if there is a selfish behavior in the wireless network. The detection efficiency is validated using a Qualnet simulator. An IEEE 802.11 wireless ad hoc network with 20 senders and 20 receivers spreading out randomly in a given area is evaluated. The well-behaved senders use minimum contention window size of 32 and maximum con- tention window size of I 024, and the selfish nodes are assumed not to use the binary exponential strategy for which the contention window sizes are both fixed as 16. The transmission radius of all nodes is 250 m. Two scenarios are investigated: a single-hop network with nodes spreading out in 100 m^100 m, and all the nodes are in the range of each other; and a multi-hop network with nodes spreading out in 1 000 m~ 1 000 m. The node can monitor the backoff time from all the other nodes and run the detection algorithms over those samples. It is noted that the threshold can significantly affect the detection time and the detection accuracy. For a given threshold of 0.3 s, the false alarm rates and the missed alarm rates are less than 5%. The detection delay is less than 1.0 s. The simulation results show that the algorithm has short detection time and high detection accuracy.展开更多
The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. G...The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation ideally made in a single development environment should cover different areas and all components of the system. In this paper, the authors briefly describe the behavioral models of the elements of a large scale WSN (wireless sensors network) used to create simulator, focusing specifically on the model of the transmission channel, and how it can retrieve results from the behavioral simulator. In side to legacy network simulator, for the testing and modeling of communication protocols, this simulator should not omit WSN specific aspect, in accuracy it covers the modeling of node platforms, protocols, and real world phenomena.展开更多
Physiological and functional traits, especially those related to behavior and whole-organism performance capacities, are subject to a variety of both parallel and opposing natural and sexual selection pressures. These...Physiological and functional traits, especially those related to behavior and whole-organism performance capacities, are subject to a variety of both parallel and opposing natural and sexual selection pressures. These selection pressures show considerable interspeciflc variation, shaping contemporary behavioral and functional diversity, but the form and intensity of selection on physiological and functional traits can also vary intraspecifically. The same suites of traits can experience quite different se- lection pressures, depending on the sex or age of a given individual, as well as the presence and nature of alternative reproductive strategies and tactics. These inter- and intra-locus genetic conflicts have potentially important consequences for the evolutionary trajectories of traits subject to them. Consequently, any intraspecific conflicts which could displace traits from their selective op- tima in certain classes of individuals relative to others are expected to result in selection for mechanisms to compensate for devia- tion from those optima. Such conflicts include interlocus sexual conflict, intralocus sexual conflict, and interacting phenotypes, as well as conflict within a sex. In this paper, we consider the evidence for, and implications of, such conflicts for physiological and functional traits in diverse taxa, including both vertebrates and invertebrates, and evaluate the various mechanisms, ranging from behavioral and mechanical to energetic and genetic, enabling compensation. We also discuss how pre- and post-mating conflicts, as well as interacting phenotypes, might affect the evolution of behavior and physiological and functional traits. Investigators that seek to understand the links among behavior, morphology, physiology, and function should consider such conflicts.展开更多
Human action recognition is currently one of the most active research areas in computer vision. It has been widely used in many applications, such as intelligent surveillance, perceptual interface, and content-based v...Human action recognition is currently one of the most active research areas in computer vision. It has been widely used in many applications, such as intelligent surveillance, perceptual interface, and content-based video retrieval. However, some extrinsic factors are barriers for the development of action recognition; e.g., human actions may be observed from arbitrary camera viewpoints in realistic scene. Thus, view-invariant analysis becomes important for action recognition algorithms, and a number of researchers have paid much attention to this issue. In this paper, we present a multi-view learning approach to recognize human actions from different views. As most existing multi-view learning algorithms often suffer from the problem of lacking data adaptiveness in the nearest neighborhood graph construction procedure, a robust locally adaptive multi-view learning algorithm based on learning multiple local L 1-graphs is proposed. Moreover, an efficient iterative optimization method is proposed to solve the proposed objective function. Experiments on three public view-invariant action recognition datasets, i.e., ViHASi, IXMAS, and WVU, demonstrate data adaptiveness, effectiveness, and efficiency of our algorithm. More importantly, when the feature dimension is correctly selected (i.e., 〉60), the proposed algorithm stably outperforms state-of-the-art counterparts and obtains about 6% improvement in recognition accuracy on the three datasets.展开更多
文摘Torrentophryne aspinia is a new kind of toads discovered in China recently, it lives in the forest floor in West Yunnan, the most important things for this kind of species is that they have a kind of torrent-adapted tadpoles which have abdominal suckers and can adhere to the surfaces of rocks in moving waters. In this article, we described the forming procedures of abdominal sucker and some breeding behaviors, habitats and habits. After comparing with those of other toads, it is confirmed that Torrentophryne should be a new valid genus, it is derived from ancestor toads because of adaptation to the torrent habitats, by the forming of torrent -adapted organ-abdominal sucker in the early development.
基金Science and Technology Corporation Innovation Fund of China(02C26211100499) PH.D Program Fund(20020290011)
文摘In order to solve transport problems of industry solid,firstly,a new applicationnotion of pipeline transport was presented,that is to say,combining pretreatment andtransport with disposal techniques of industry solid waste.Secondly,the integrated dis-posal and transport system for industry solid waste was introduced,in particular,the oper-ating principles,equipment set-up,key technology and technical parameters.Next,thispaper illustrated the application of this integrated system.Such as it can transport coalsludge with sufficiently high solids content(about 72%~77%)and high apparent viscosity(about 1 000~3 000 Pa.s)directly by pipeline having no use for water and addition agent.Generally,the transport distance is about 1 000 m.This system has been successfullyused in innocuous disposition and efficient utilization of other industrial byproducts or solidwastes,such as city sludge and paper making waste.The integrated system causes nopollution to the environment for its complete seal and realizes protecting the environment,conserving the energy,promoting the development of cycling economic.Finally,the paperdiscussed the research works that were needed for studying such pipeline transport sys-tem and narrates the relevant condition and application status.
文摘A behavior model for the receiver of the Ethernet passive optical network(EPON) is presented. The model consists of a fiber, a photodetector, a transimpedance amplifier (TIA) followed by a limiting amplifier and a clock and data recovery' circuit (CDR). Each sub-model is constructed based on the architecture of a circuit. The noise and jitter in each block such as shot noise, thermal noise, deterministic and random jitter are also considered. The performance of the whole receiver can be evaluated by the simulation of the behavior model, which is faster than the ordinary circuit model and more accurate than the analytical model. The whole model is implemented with C ++ and simulated in Microsoft Visual C ++ 6. 0. Using the Monte Carlo method, the EPON receiver is simulated. The simulation results show a good agreement with experimental ones.
基金Project(2005038560) supported by the Postdoctoral Foundation of ChinaProject(05GK1002-2) supported by Key Program of Hunan Province
文摘High temperature plastic deformation behavior of non-orientated electrical steel was investigated by Gleeble 1500 thermo-mechanical simulator at strain rate of 0.01-10 s^-1 and high temperature of 500-1 200 ℃. The stress level factor (a), stress exponent (n), structural factor (A) and activation energy (Q) of high temperature plastic deformation process of non-orientated electrical steel in different temperature ranges were calculated by the Arrhenius model. The results show that, with dynamic elevation of deformation temperature, phase transformation from α-Fe to γ-Fe takes place simultaneously during plastic deformation, dynamic recovery and dynamic recrystallization process, leading to an irregular change of the steady flow stress. For high temperature plastic deformation between 500 and 800 ℃, the calculated values of a, n, A, and Q are 0.039 0 MPa 1, 7.93, 1.9× 10^18 s^-1, and 334.8 kJ/mol, respectively, and for high temperature plastic deformation between 1 050 and 1 200 ℃, the calculated values of a, n, A, and Q are 0.125 8 MPa1, 5.29, 1.0 × 10^28 s^-1, and 769.9 kJ/mol, respectively.
基金supported by the 2014 Inje University research grant
文摘The tilting-train is very attractive to the railroad users in the world due to the advantage of high speed in curved track using pre-existing infrastructure of railway.Tilting-train has a unique allowable speed and mechanism especially in curved track.In this work,when tilting-train is operated with the allowable speed,the behavior of roadbed is evaluated by examining its settlement and bearing capacity.Additionally,the stability of roadbed is estimated as the roadbed is in the condition of soft soil influenced by the weather effects and cyclic train loading.Numerical results show that the roadbed settlement satisfies the allowable settlement when the elastic moduli of upper roadbed and in-situ soil are greater than 3800 and 4600 kN/m2 for rail joint and 2300 and 3300 kN/m2 for continuous welded rail(CWR).
文摘The formation maintenance of multiple unmanned aerial vehicles(UAVs)based on proximity behavior is explored in this study.Individual decision-making is conducted according to the expected UAV formation structure and the position,velocity,and attitude information of other UAVs in the azimuth area.This resolves problems wherein nodes are necessarily strongly connected and communication is strictly consistent under the traditional distributed formation control method.An adaptive distributed formation flight strategy is established for multiple UAVs by exploiting proximity behavior observations,which remedies the poor flexibility in distributed formation.This technique ensures consistent position and attitude among UAVs.In the proposed method,the azimuth area relative to the UAV itself is established to capture the state information of proximal UAVs.The dependency degree factor is introduced to state update equation based on proximity behavior.Finally,the formation position,speed,and attitude errors are used to form an adaptive dynamic adjustment strategy.Simulations are conducted to demonstrate the effectiveness and robustness of the theoretical results,thus validating the effectiveness of the proposed method.
基金Project(51179023) supported by the National Natural Science Foundation of China
文摘Pressure plate instrument is employed during drying, and unconfined compressive strength test is performed on the unsaturated specimen. Curves of shear force versus shear displacement, and curves of saturation degree versus time are investigated. The results show that the specimens with similar curves of saturation degree versus time have nearly identical mechanical behavior. In particular, the uniform specimens should be chosen within the lower equilibrium saturation degree because steady test results are presented. Further, the conclusion is verified by the repeated test. Thus, the method for distinguishing the uniform unsaturated specimen is obtained. In the light of the method, an improved test process is proposed. The uniform specimens should be chosen by this method under the specific matric suction, and then shear tests are carried out on the chosen unsaturated specimen. Namely, initial value of unsaturated soil is not zero matric suction but a specific suction.
基金Supported by the National Natural Science Foundation of China (No. 60573111 )
文摘Voherra series behavioral model for radio frequency (RF) power amplifier (PA) has been widely used in system-level simulation, however, high computational complexity makes this kind of model limited to "weak" nonlinearity. In order to reduce the computational complexity and the number of coefficients of Volterra series kernels, a Volterra series improved behavioral model based on Laguerre orthogonal polynomials function, namely Voherra-Laguerre behavioral model, is proposed. Mathematical expressions of Volterra-Laguerre behavioral model is derived, and accuracy of the model is verified through comparison of measured and simulation output data from a freescale PA using MRF21030 transistor. Mathematical analysis and simulation results show that Voherra-Laguerre behavioral model has a simple structure, much less coefficients and better modeling performance than general Volterra series model. The model can be used more correctly for system-level simulation of RF PA with wideband signal.
基金supported in part by the National Natural Science Foundation of China under Grants No. 61101113,No. 61072088,No.61201198the Beijing Natural Science Foundation under Grants No. 4132007,No. 4132015,No. 4132019the Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20111103120017
文摘In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users.
基金Shanghai Education Commission Foundation for Excellent Young High Education Teachers,China(No.xqz05001No.YYY-07008)
文摘The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented.Then an advanced ID3 algorithm was presented to classify the abnormal traffic.Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall.The firewall limits the bandwidth based on different types of abnormal traffic.Experiments show the outstanding performance of the proposed approach in real-time property,high detection rate,and unsupervised learning.
基金Supported by National Natural Science Foundation of China (No. 60702038)National High Technology Research and Development Program of China ("863"Program, No. 2007AA01Z220)Cultivation Fund of Innovation Project,Ministry of Education of China (No. 708024)
文摘The cumulative sum (CUSUM) algorithm is proposed to detect the selfish behavior of a node in a wireless ad hoc network. By tracing the statistics characteristic of the backoff time between successful transmissions, a wireless node can distinguish if there is a selfish behavior in the wireless network. The detection efficiency is validated using a Qualnet simulator. An IEEE 802.11 wireless ad hoc network with 20 senders and 20 receivers spreading out randomly in a given area is evaluated. The well-behaved senders use minimum contention window size of 32 and maximum con- tention window size of I 024, and the selfish nodes are assumed not to use the binary exponential strategy for which the contention window sizes are both fixed as 16. The transmission radius of all nodes is 250 m. Two scenarios are investigated: a single-hop network with nodes spreading out in 100 m^100 m, and all the nodes are in the range of each other; and a multi-hop network with nodes spreading out in 1 000 m~ 1 000 m. The node can monitor the backoff time from all the other nodes and run the detection algorithms over those samples. It is noted that the threshold can significantly affect the detection time and the detection accuracy. For a given threshold of 0.3 s, the false alarm rates and the missed alarm rates are less than 5%. The detection delay is less than 1.0 s. The simulation results show that the algorithm has short detection time and high detection accuracy.
文摘The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation ideally made in a single development environment should cover different areas and all components of the system. In this paper, the authors briefly describe the behavioral models of the elements of a large scale WSN (wireless sensors network) used to create simulator, focusing specifically on the model of the transmission channel, and how it can retrieve results from the behavioral simulator. In side to legacy network simulator, for the testing and modeling of communication protocols, this simulator should not omit WSN specific aspect, in accuracy it covers the modeling of node platforms, protocols, and real world phenomena.
文摘Physiological and functional traits, especially those related to behavior and whole-organism performance capacities, are subject to a variety of both parallel and opposing natural and sexual selection pressures. These selection pressures show considerable interspeciflc variation, shaping contemporary behavioral and functional diversity, but the form and intensity of selection on physiological and functional traits can also vary intraspecifically. The same suites of traits can experience quite different se- lection pressures, depending on the sex or age of a given individual, as well as the presence and nature of alternative reproductive strategies and tactics. These inter- and intra-locus genetic conflicts have potentially important consequences for the evolutionary trajectories of traits subject to them. Consequently, any intraspecific conflicts which could displace traits from their selective op- tima in certain classes of individuals relative to others are expected to result in selection for mechanisms to compensate for devia- tion from those optima. Such conflicts include interlocus sexual conflict, intralocus sexual conflict, and interacting phenotypes, as well as conflict within a sex. In this paper, we consider the evidence for, and implications of, such conflicts for physiological and functional traits in diverse taxa, including both vertebrates and invertebrates, and evaluate the various mechanisms, ranging from behavioral and mechanical to energetic and genetic, enabling compensation. We also discuss how pre- and post-mating conflicts, as well as interacting phenotypes, might affect the evolution of behavior and physiological and functional traits. Investigators that seek to understand the links among behavior, morphology, physiology, and function should consider such conflicts.
基金Project supported by the National Natural Science Foundation of China(No.61572431)the National Key Technology R&D Program(No.2013BAH59F00)+1 种基金the Zhejiang Provincial Natural Science Foundation of China(No.LY13F020001)the Zhejiang Province Public Technology Applied Research Projects,China(No.2014C33090)
文摘Human action recognition is currently one of the most active research areas in computer vision. It has been widely used in many applications, such as intelligent surveillance, perceptual interface, and content-based video retrieval. However, some extrinsic factors are barriers for the development of action recognition; e.g., human actions may be observed from arbitrary camera viewpoints in realistic scene. Thus, view-invariant analysis becomes important for action recognition algorithms, and a number of researchers have paid much attention to this issue. In this paper, we present a multi-view learning approach to recognize human actions from different views. As most existing multi-view learning algorithms often suffer from the problem of lacking data adaptiveness in the nearest neighborhood graph construction procedure, a robust locally adaptive multi-view learning algorithm based on learning multiple local L 1-graphs is proposed. Moreover, an efficient iterative optimization method is proposed to solve the proposed objective function. Experiments on three public view-invariant action recognition datasets, i.e., ViHASi, IXMAS, and WVU, demonstrate data adaptiveness, effectiveness, and efficiency of our algorithm. More importantly, when the feature dimension is correctly selected (i.e., 〉60), the proposed algorithm stably outperforms state-of-the-art counterparts and obtains about 6% improvement in recognition accuracy on the three datasets.