New and emerging use cases, such as the interconnection of geographically distributed data centers(DCs), are drawing attention to the requirement for dynamic end-to-end service provisioning, spanning multiple and hete...New and emerging use cases, such as the interconnection of geographically distributed data centers(DCs), are drawing attention to the requirement for dynamic end-to-end service provisioning, spanning multiple and heterogeneous optical network domains. This heterogeneity is, not only due to the diverse data transmission and switching technologies, but also due to the different options of control plane techniques. In light of this, the problem of heterogeneous control plane interworking needs to be solved, and in particular, the solution must address the specific issues of multi-domain networks, such as limited domain topology visibility, given the scalability and confidentiality constraints. In this article, some of the recent activities regarding the Software-Defined Networking(SDN) orchestration are reviewed to address such a multi-domain control plane interworking problem. Specifically, three different models, including the single SDN controller model, multiple SDN controllers in mesh, and multiple SDN controllers in a hierarchical setting, are presented for the DC interconnection network with multiple SDN/Open Flow domains or multiple Open Flow/Generalized Multi-Protocol Label Switching( GMPLS) heterogeneous domains. I n addition, two concrete implementations of the orchestration architectures are detailed, showing the overall feasibility and procedures of SDN orchestration for the end-to-endservice provisioning in multi-domain data center optical networks.展开更多
Due to frequent drinking water pollution accidents in the past decade, it is common that mountain reservoirs were used as the source of drinking water in China. However, some coastal areas frequently suffer from typho...Due to frequent drinking water pollution accidents in the past decade, it is common that mountain reservoirs were used as the source of drinking water in China. However, some coastal areas frequently suffer from typhoon with extreme precipitation, which results in the water quality deterioration of the reservoirs. The influence of typhoons with extreme precipitation on Jiaokou reservoir and the emergency treatment process of Maojiaping water treatment plant in the past three typical typhoons with extreme precipitation from the year of 2012-2015 were studied. It was found that the degradation of water quality, such as the increase of turbidity and bacteria index, may not merely appear during the events, but last for several days. Changing the dosage of water purification agent, such as coagulant and disinfectant at right time and place may be an efficient emergency water treatment process. Based on the analysis of water quality variation rule during and after the events, it was also found that emergency treatment can be fully prepared before the arrival of a typhoon with extreme precipitation. And in order to better respond to the typhoon with extreme precipitation, several suggestions are also proposed in this paper as follows: establishing vegetated buffers at right place, such as macrophanerophytes,shrub or herbage, increasing investments in infrastructure management, merging or cancelling the small-scale water treatment plants, preparing adequate water purification agent before the typhoon comes, etc.展开更多
With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontation...With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily.展开更多
Many specified business needs in enterprise context cannot be effectively satisfied using current business process technology.This phenomenon is called the "long tail" of business processes.In addition,more ...Many specified business needs in enterprise context cannot be effectively satisfied using current business process technology.This phenomenon is called the "long tail" of business processes.In addition,more and more business applications need to be accessed from mobile devices such as smartphones by enterprise end users.This paper attempts to solve both two challenges above.A lightweight event-driven process model is proposed aiming at satisfying the spontaneous business needs in enterprise.And we design an innovative wizard,which works like a tutorial,guiding end users in creating this lightweight process model.Moreover,end users are allowed to interact with the process created by themselves on smartphones.Finally,the usability of our approach was evaluated on a small set of users in a real business scenario.The results show that end users can effectively build their personalized business processes using our approach and interact with them in mobile environment.展开更多
Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age c...Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age contexts that restrict their ability when they are applied in the current network envi-ronment. For example, the port based ap-proach cannot identify network applications with dynamic ports; the deep packet inspec-tion approach is invalid for encrypted network applications; and the statistical based approach is time-onsuming. In this paper, a novel tech-nique is proposed to classify different catego-ries of network applications. The port based, deep packet inspection based and statistical based approaches are integrated as a multi-stage classifier. The experimental results demonstrate that this approach has high rec-ognition rate which is up to 98% and good performance of real-time for traffic identifica-tion.展开更多
The process of constructing hydraulic projects on international rivers is governed by several legal regulations, among the most important of these regulations are: the Principle of no harm, and the Principle of Prior...The process of constructing hydraulic projects on international rivers is governed by several legal regulations, among the most important of these regulations are: the Principle of no harm, and the Principle of Prior Notification, protection of the river's environment and the Principle of Settling the International Disputes via Peaceful Means, which is considered one of the most important principles called for by the UN Pact, as it provides for adopting the peaceful means by the member states of the organization to settle international disputes through peaceful means, in addition to an applied study on the Nile Basin's projects.展开更多
Lack of up-to-date information on efficient operation and maintenance of EPDS (electric power distribution systems), Nigeria is addressed by designing and implementing an indigenous real-time monitoring and diagnosi...Lack of up-to-date information on efficient operation and maintenance of EPDS (electric power distribution systems), Nigeria is addressed by designing and implementing an indigenous real-time monitoring and diagnosis system. The system encompasses the development of software driven hardware positioned at the remotely located sub-stations at the low voltage level to keep track of the network in real-time. The detection of faults exploits threshold passing algorithm through continuous monitoring of the network power quality. Communication between the RTU (remote terminal unit) and the DCC (distribution control center) which is based on GSM is initiated by disturbance. The DCC performs fault evaluation processing using the received data and predetermined faults signatures to determine the nature of disturbance and presents the result in graphic user interface environment. A fault reporting time of 2 s was achieved. The developed system exhibits a high degree of accuracy and manifests no spurious reports during testing. The resultant system limits the effects of interruption and increases power availability by reducing the down time. The system strengthens engineering and management capabilities required to enhance reliability by providing information about the network health status.展开更多
The frequency and extent of debris flows have increased tremendously due to the extreme weather and the Wenchuan earthquake on May 12, 2008. Previous studies focused on the debris flow from gullies damming the mountai...The frequency and extent of debris flows have increased tremendously due to the extreme weather and the Wenchuan earthquake on May 12, 2008. Previous studies focused on the debris flow from gullies damming the mountain streams. In this paper, an equation for the run-out distance of debris flow in the main river is proposed based on the dynamic equation of debris flow at different slopes given by Takahashi. By undertaking field investigations and flume experiments, a new calculation method of the volume of debris flow damming large river is obtained. Using the percolation theory and the renormalization group theory it was deduced that the large particles should comprise more than 50% for forming a stable debris flow dam. Hence, the criteria of damming large river by debris flow is presented in terms of run-out distance and grain composition which was then validated through the event of damming river by debris flow at Gaojia gully, the upper reaches of the Minjiang River, Sichuan, China, on July 3, 2011.展开更多
This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communicatio...This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communication with the application server. The network administrator can monitor and intelligent management of the client computer through the server program, the computer will execute the corresponding operation according to the server to send command instructions. The system realize the main module of the whole system framework, network monitoring data initialization module, network data transmission module, image coding and decoding module, the advantages of system make full use of existing LAN resources, timely delivery and manaRement information.展开更多
In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients su...In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients suffering arms or legs injuries, fn this paper, the concept of an ambidextrous design lbr robot hands is introduced. The fingers can curl in one xvay or another, to imitate either a right hand or a left hand. The advantages and inconveniences of different models have been investigated to optimise the range and the maximum force applied by fingers. Besides, a remote control interthce is integrated to the system, allowing both to send comrnands through internet and to display a video streaming of the ambidextrous hand as feedback. Therefore, a robotic prosthesis could be used for the first time in telerehabilitation. The main application areas targeted are physiotherapy alter strokes or management of phantom pains/br amputees by/earning to control the ambidextrous hand. A client application is also accessible on Facehook social network, making the robotic limb easily reachable for the patients. Additionally the ambidextrous hand can be used tbr robotics research as well as artistic performances.展开更多
The Internet of things(IoT) as an important application of future communication networks puts a high premium on delay issues. Thus when Io T applications meet heterogeneous networks(HetNets) where macro cells are over...The Internet of things(IoT) as an important application of future communication networks puts a high premium on delay issues. Thus when Io T applications meet heterogeneous networks(HetNets) where macro cells are overlaid with small cells, some traditional problems need rethinking. In this paper, we investigate the delay-addressed association problem in two-tier Het Nets considering different backhaul technologies. Specifically, millimeter wave and fiber links are used to provide high-capacity backhaul for small cells. We first formulate the user association problem to minimize the total delay which depends on the probability of successful transmission, the number of user terminals(UTs), and the number of base stations(BSs). And then two algorithms for active mode and mixed mode are proposed to minimize the network delay. Simulation results show that algorithms based on mutual selection between UTs and BSs have better performance than those based on distance. And algorithms for mixed modes have less delay than those for active mode when the number of BSs is large enough, compared to the number of UTs.展开更多
In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network moni...In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network monitoring and keywords spotting. In the part of network monitoring, this paper adopts a method which is based on ARP spoofing technology to monitor the users' data, and to obtain the original audio streams. In the part of keywords spotting, the extraction methods of PLP (one of the main characteristic arameters) is studied, and improved feature parameters- PMCC are put forward. Meanwhile, in order to accurately detect syllable, the paper the double-threshold method with variance of frequency band method, and use the latter to carry out endpoint detection. Finally, keywords recognition module is built by HMM, and identification results are contrasted under Matlab environment. From the experiment results, a better solution for the application of key words recognition technology in network monitoring is found.展开更多
A novel hybrid self-reconfigurable modular robot is designed to finish the morphing action from line shape to hexagon shape. The robot is composed of many basic modules,each of which consists of a master module and a ...A novel hybrid self-reconfigurable modular robot is designed to finish the morphing action from line shape to hexagon shape. The robot is composed of many basic modules,each of which consists of a master module and a slave module in the shape of triangular prism. There are four connection ports on each basic module. For the master module there are two holes on each connection port,and for the slave one there are two pegs on each connection. The docking process between two neighboring basic modules is analyzed with a peg-in-hole mechanical structure. A small motion's method is presented and the contact forces are derived. According to the force/moment,the pose of a motion module should be adjusted to make two neighboring modules align and finish the docking process.Finally,a simulation of 3 basic modules is shown to finish the morphing and docking process effectively. The system can finish the morphing task from the line shape to the hexagon shape.展开更多
With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expec...With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services.展开更多
OBJECTIVE To observe the effects of sense and antisense oligodeoxynucleotides of tankyrase 1 (TANK1-SODN and TANK1-ASODN) on murine tumor growth following intratumoral injection, investigate the actual suppressing r...OBJECTIVE To observe the effects of sense and antisense oligodeoxynucleotides of tankyrase 1 (TANK1-SODN and TANK1-ASODN) on murine tumor growth following intratumoral injection, investigate the actual suppressing result and mechanism of TANK1-ASODN on cancer cell proliferation, and discuss the possibility of using it in gene therapy on human lung cancer cells. METHODS After BALB/c nude mice had been subcutaneously inoculated with human lung cancer cell line CALU and it had grown into tumor nodules, we distributed these mice randomly into 3 groups: 4 in saline treatment group, and 5 each in TANK1-SODN group, and TANK1-ASODN groups. Then multiple direct intratumoral injections of synthesized TANK1-ASODN given continuously into tumor nodules for 16 days, this was compared with TANK1-SODN and saline control groups. During the experiment we measured the tumor volume every 5 days with vernier calipers; observed the histopathological characteristics of tumor tissues under microscope; went further to detect the minute changing of ultrastructure of cancer cells by electron microscope; tested the expression levels of ki67 and hTERT protein by means of SABC immunohistochemical method; and detected the lung cancer cells' hTERT mRNA expression level by hybridization in situ (ISH) in each group. RESULTS After 16 days of continuous injection, the tumor volume in TANK1-ASODN group was significantly smaller than the other 2 groups (both P 〈 0.01); quite a lot of tumor cell degeneration and necrosis were observed in mice given TANK1-ASODN. The results of electron microscope also showed that TANK1-ASODN has the power to kill cancer cells in various ways. Moreover, statistically signi.cant decreases in the positive expression ratio of Ki67 Labeling Index (P 〈 0.01), hTERT protein (P 〈 0.01), and hTERT mRNA (P 〈 0.01) were consistently observed in the TANK1-ASODN group. CONCLUSION Human lung cancer cell line CALU expressed high telomerase activity. TANK1-ASODN had the ability to decline the high expression level of hTERT; inhibit the activity of telomerase, accelerate tumor cell degeneration and necrosis; and then suppress the proliferation of cancer cells.展开更多
Because of the action of strong magnetic forces, it's difficult to avoid end winding vibration in the large turbo-generator stator. Sometimes it leads to the occurrence of accidents and affects the normal operatio...Because of the action of strong magnetic forces, it's difficult to avoid end winding vibration in the large turbo-generator stator. Sometimes it leads to the occurrence of accidents and affects the normal operation of the generator. This paper firstly lays out the calculation method for end winding magnetic force. Second, based on the structure of large machines, the natural vibration frequency equation and forced oscillation equation is set up. Third, through the analysis of magnetic force calculation and vibration on the end winding of turbo-generator, it will be shown that the end winding vibration is related to the magnetic force and the position of winding binds as well as binding tightness. We can ease the winding vibration by distributing binding position appropriately or add more bindings, and test the concept through experimental data.展开更多
文摘New and emerging use cases, such as the interconnection of geographically distributed data centers(DCs), are drawing attention to the requirement for dynamic end-to-end service provisioning, spanning multiple and heterogeneous optical network domains. This heterogeneity is, not only due to the diverse data transmission and switching technologies, but also due to the different options of control plane techniques. In light of this, the problem of heterogeneous control plane interworking needs to be solved, and in particular, the solution must address the specific issues of multi-domain networks, such as limited domain topology visibility, given the scalability and confidentiality constraints. In this article, some of the recent activities regarding the Software-Defined Networking(SDN) orchestration are reviewed to address such a multi-domain control plane interworking problem. Specifically, three different models, including the single SDN controller model, multiple SDN controllers in mesh, and multiple SDN controllers in a hierarchical setting, are presented for the DC interconnection network with multiple SDN/Open Flow domains or multiple Open Flow/Generalized Multi-Protocol Label Switching( GMPLS) heterogeneous domains. I n addition, two concrete implementations of the orchestration architectures are detailed, showing the overall feasibility and procedures of SDN orchestration for the end-to-endservice provisioning in multi-domain data center optical networks.
基金supported by the National Science Foundation of China(NSFC)(grant number 51438006)Priority Academic Program Development of Jiangsu Higher Education Institutions
文摘Due to frequent drinking water pollution accidents in the past decade, it is common that mountain reservoirs were used as the source of drinking water in China. However, some coastal areas frequently suffer from typhoon with extreme precipitation, which results in the water quality deterioration of the reservoirs. The influence of typhoons with extreme precipitation on Jiaokou reservoir and the emergency treatment process of Maojiaping water treatment plant in the past three typical typhoons with extreme precipitation from the year of 2012-2015 were studied. It was found that the degradation of water quality, such as the increase of turbidity and bacteria index, may not merely appear during the events, but last for several days. Changing the dosage of water purification agent, such as coagulant and disinfectant at right time and place may be an efficient emergency water treatment process. Based on the analysis of water quality variation rule during and after the events, it was also found that emergency treatment can be fully prepared before the arrival of a typhoon with extreme precipitation. And in order to better respond to the typhoon with extreme precipitation, several suggestions are also proposed in this paper as follows: establishing vegetated buffers at right place, such as macrophanerophytes,shrub or herbage, increasing investments in infrastructure management, merging or cancelling the small-scale water treatment plants, preparing adequate water purification agent before the typhoon comes, etc.
基金supported by the National Science and Technology Support Program under Grant No.2012BAH46B02 and 2012BAH45B01the National High Technology Research and Development Program(863 Program) of China under Grant No.2011AA010703the Strategic Priority Research Program of the Chinese Academy of Sciences under Grant No.XDA06030200
文摘With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily.
基金supported by the National 973 Programs(Grant No.2013CB329102)the National Natural Science Foundation of China (Grant No.61003067)Key Project of National Natural Science Foundation of China (Grant No.61132001)
文摘Many specified business needs in enterprise context cannot be effectively satisfied using current business process technology.This phenomenon is called the "long tail" of business processes.In addition,more and more business applications need to be accessed from mobile devices such as smartphones by enterprise end users.This paper attempts to solve both two challenges above.A lightweight event-driven process model is proposed aiming at satisfying the spontaneous business needs in enterprise.And we design an innovative wizard,which works like a tutorial,guiding end users in creating this lightweight process model.Moreover,end users are allowed to interact with the process created by themselves on smartphones.Finally,the usability of our approach was evaluated on a small set of users in a real business scenario.The results show that end users can effectively build their personalized business processes using our approach and interact with them in mobile environment.
基金supported by the National Key Technology R&D Program under Grant No. 2012BAH18B05
文摘Internet traffic classification plays an important role in network management. Many approaches have been proposed to clas-sify different categories of Internet traffic. However, these approaches have specific us-age contexts that restrict their ability when they are applied in the current network envi-ronment. For example, the port based ap-proach cannot identify network applications with dynamic ports; the deep packet inspec-tion approach is invalid for encrypted network applications; and the statistical based approach is time-onsuming. In this paper, a novel tech-nique is proposed to classify different catego-ries of network applications. The port based, deep packet inspection based and statistical based approaches are integrated as a multi-stage classifier. The experimental results demonstrate that this approach has high rec-ognition rate which is up to 98% and good performance of real-time for traffic identifica-tion.
文摘The process of constructing hydraulic projects on international rivers is governed by several legal regulations, among the most important of these regulations are: the Principle of no harm, and the Principle of Prior Notification, protection of the river's environment and the Principle of Settling the International Disputes via Peaceful Means, which is considered one of the most important principles called for by the UN Pact, as it provides for adopting the peaceful means by the member states of the organization to settle international disputes through peaceful means, in addition to an applied study on the Nile Basin's projects.
文摘Lack of up-to-date information on efficient operation and maintenance of EPDS (electric power distribution systems), Nigeria is addressed by designing and implementing an indigenous real-time monitoring and diagnosis system. The system encompasses the development of software driven hardware positioned at the remotely located sub-stations at the low voltage level to keep track of the network in real-time. The detection of faults exploits threshold passing algorithm through continuous monitoring of the network power quality. Communication between the RTU (remote terminal unit) and the DCC (distribution control center) which is based on GSM is initiated by disturbance. The DCC performs fault evaluation processing using the received data and predetermined faults signatures to determine the nature of disturbance and presents the result in graphic user interface environment. A fault reporting time of 2 s was achieved. The developed system exhibits a high degree of accuracy and manifests no spurious reports during testing. The resultant system limits the effects of interruption and increases power availability by reducing the down time. The system strengthens engineering and management capabilities required to enhance reliability by providing information about the network health status.
基金supported by the National Basic Research and Development Program of China (Grant No. 973:2011CB409902)the Key Project of National Natural Science Foundation of China (Grant No. 41172321)Southwest Jiaotong University Doctor Innovation Fund
文摘The frequency and extent of debris flows have increased tremendously due to the extreme weather and the Wenchuan earthquake on May 12, 2008. Previous studies focused on the debris flow from gullies damming the mountain streams. In this paper, an equation for the run-out distance of debris flow in the main river is proposed based on the dynamic equation of debris flow at different slopes given by Takahashi. By undertaking field investigations and flume experiments, a new calculation method of the volume of debris flow damming large river is obtained. Using the percolation theory and the renormalization group theory it was deduced that the large particles should comprise more than 50% for forming a stable debris flow dam. Hence, the criteria of damming large river by debris flow is presented in terms of run-out distance and grain composition which was then validated through the event of damming river by debris flow at Gaojia gully, the upper reaches of the Minjiang River, Sichuan, China, on July 3, 2011.
文摘This article mainly introduces the multi-layer distributed C/S architecture of system design scheme. Its working principle is the client program runs automatically after the computer starts, and establish communication with the application server. The network administrator can monitor and intelligent management of the client computer through the server program, the computer will execute the corresponding operation according to the server to send command instructions. The system realize the main module of the whole system framework, network monitoring data initialization module, network data transmission module, image coding and decoding module, the advantages of system make full use of existing LAN resources, timely delivery and manaRement information.
文摘In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients suffering arms or legs injuries, fn this paper, the concept of an ambidextrous design lbr robot hands is introduced. The fingers can curl in one xvay or another, to imitate either a right hand or a left hand. The advantages and inconveniences of different models have been investigated to optimise the range and the maximum force applied by fingers. Besides, a remote control interthce is integrated to the system, allowing both to send comrnands through internet and to display a video streaming of the ambidextrous hand as feedback. Therefore, a robotic prosthesis could be used for the first time in telerehabilitation. The main application areas targeted are physiotherapy alter strokes or management of phantom pains/br amputees by/earning to control the ambidextrous hand. A client application is also accessible on Facehook social network, making the robotic limb easily reachable for the patients. Additionally the ambidextrous hand can be used tbr robotics research as well as artistic performances.
基金supported by the National Natural Science Foundation of China (NSFC) under Grants 61427801 and 61671251the Natural Science Foundation Program through Jiangsu Province of China under Grant BK20150852+3 种基金the open research fund of National Mobile Communications Research Laboratory, Southeast University under Grant 2017D05China Postdoctoral Science Foundation under Grant 2016M590481Jiangsu Planned Projects for Postdoctoral Research Funds under Grant 1501018Asupported by NSFC under Grants 61531011 and 61625106
文摘The Internet of things(IoT) as an important application of future communication networks puts a high premium on delay issues. Thus when Io T applications meet heterogeneous networks(HetNets) where macro cells are overlaid with small cells, some traditional problems need rethinking. In this paper, we investigate the delay-addressed association problem in two-tier Het Nets considering different backhaul technologies. Specifically, millimeter wave and fiber links are used to provide high-capacity backhaul for small cells. We first formulate the user association problem to minimize the total delay which depends on the probability of successful transmission, the number of user terminals(UTs), and the number of base stations(BSs). And then two algorithms for active mode and mixed mode are proposed to minimize the network delay. Simulation results show that algorithms based on mutual selection between UTs and BSs have better performance than those based on distance. And algorithms for mixed modes have less delay than those for active mode when the number of BSs is large enough, compared to the number of UTs.
基金supported by the Natural Science Foundation of Guangxi Province(No.60961002)
文摘In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network monitoring and keywords spotting. In the part of network monitoring, this paper adopts a method which is based on ARP spoofing technology to monitor the users' data, and to obtain the original audio streams. In the part of keywords spotting, the extraction methods of PLP (one of the main characteristic arameters) is studied, and improved feature parameters- PMCC are put forward. Meanwhile, in order to accurately detect syllable, the paper the double-threshold method with variance of frequency band method, and use the latter to carry out endpoint detection. Finally, keywords recognition module is built by HMM, and identification results are contrasted under Matlab environment. From the experiment results, a better solution for the application of key words recognition technology in network monitoring is found.
基金Supported by the National Natural Science Foundation of China(No.61175069,51075272,51475300)
文摘A novel hybrid self-reconfigurable modular robot is designed to finish the morphing action from line shape to hexagon shape. The robot is composed of many basic modules,each of which consists of a master module and a slave module in the shape of triangular prism. There are four connection ports on each basic module. For the master module there are two holes on each connection port,and for the slave one there are two pegs on each connection. The docking process between two neighboring basic modules is analyzed with a peg-in-hole mechanical structure. A small motion's method is presented and the contact forces are derived. According to the force/moment,the pose of a motion module should be adjusted to make two neighboring modules align and finish the docking process.Finally,a simulation of 3 basic modules is shown to finish the morphing and docking process effectively. The system can finish the morphing task from the line shape to the hexagon shape.
基金supported by China Fundamental Research Funds for the Central University under Grant No.BUPT 2009RC1022
文摘With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services.
文摘OBJECTIVE To observe the effects of sense and antisense oligodeoxynucleotides of tankyrase 1 (TANK1-SODN and TANK1-ASODN) on murine tumor growth following intratumoral injection, investigate the actual suppressing result and mechanism of TANK1-ASODN on cancer cell proliferation, and discuss the possibility of using it in gene therapy on human lung cancer cells. METHODS After BALB/c nude mice had been subcutaneously inoculated with human lung cancer cell line CALU and it had grown into tumor nodules, we distributed these mice randomly into 3 groups: 4 in saline treatment group, and 5 each in TANK1-SODN group, and TANK1-ASODN groups. Then multiple direct intratumoral injections of synthesized TANK1-ASODN given continuously into tumor nodules for 16 days, this was compared with TANK1-SODN and saline control groups. During the experiment we measured the tumor volume every 5 days with vernier calipers; observed the histopathological characteristics of tumor tissues under microscope; went further to detect the minute changing of ultrastructure of cancer cells by electron microscope; tested the expression levels of ki67 and hTERT protein by means of SABC immunohistochemical method; and detected the lung cancer cells' hTERT mRNA expression level by hybridization in situ (ISH) in each group. RESULTS After 16 days of continuous injection, the tumor volume in TANK1-ASODN group was significantly smaller than the other 2 groups (both P 〈 0.01); quite a lot of tumor cell degeneration and necrosis were observed in mice given TANK1-ASODN. The results of electron microscope also showed that TANK1-ASODN has the power to kill cancer cells in various ways. Moreover, statistically signi.cant decreases in the positive expression ratio of Ki67 Labeling Index (P 〈 0.01), hTERT protein (P 〈 0.01), and hTERT mRNA (P 〈 0.01) were consistently observed in the TANK1-ASODN group. CONCLUSION Human lung cancer cell line CALU expressed high telomerase activity. TANK1-ASODN had the ability to decline the high expression level of hTERT; inhibit the activity of telomerase, accelerate tumor cell degeneration and necrosis; and then suppress the proliferation of cancer cells.
基金This work is supported by the National Natural Science Foun- dation of China under Grant 51105261.
文摘Because of the action of strong magnetic forces, it's difficult to avoid end winding vibration in the large turbo-generator stator. Sometimes it leads to the occurrence of accidents and affects the normal operation of the generator. This paper firstly lays out the calculation method for end winding magnetic force. Second, based on the structure of large machines, the natural vibration frequency equation and forced oscillation equation is set up. Third, through the analysis of magnetic force calculation and vibration on the end winding of turbo-generator, it will be shown that the end winding vibration is related to the magnetic force and the position of winding binds as well as binding tightness. We can ease the winding vibration by distributing binding position appropriately or add more bindings, and test the concept through experimental data.