This paper presents a new approach to determining whether an interested personal name across doeuments refers to the same entity. Firstly,three vectors for each text are formed: the personal name Boolean vectors deno...This paper presents a new approach to determining whether an interested personal name across doeuments refers to the same entity. Firstly,three vectors for each text are formed: the personal name Boolean vectors denoting whether a personal name occurs the text the biographical word Boolean vector representing title, occupation and so forth, and the feature vector with real values. Then, by combining a heuristic strategy based on Boolean vectors with an agglomeratie clustering algorithm based on feature vectors, it seeks to resolve multi-document personal name coreference. Experimental results show that this approach achieves a good performance by testing on "Wang Gang" corpus.展开更多
Barney and Hoskisson (1990) argue that the strategic group research has neither established the existence of strategic groups, nor their relationship to firm performance. The primary reason behind the unsatisfactory...Barney and Hoskisson (1990) argue that the strategic group research has neither established the existence of strategic groups, nor their relationship to firm performance. The primary reason behind the unsatisfactory results is the lack of a theoretical framework: what strategic variables to include in the analysis and their relative importance; the definition of an industry, and how to make competitive strategy operational. First, the author presents a customer-oriented theory of management which submits that, like Procter and Gamble, understanding customers should be the primary focus of a business. Second, the author proposes an integrated approach to competitive strategy. Because customer-perceived quality is far more critical to long-term success than any other factor, it should be the centerpiece of competitive strategy. The author suggests that competitive strategy should be divided in two interdependent dimensions: external and internal. It is the external strategy that should be considered the primary dimension because it reflects the customers' perspective, and provides a sense of direction regarding how the internal resources should be used. Next, the author presents an operational framework of competitive strategy which proposes that the best route to market share leadership in consumer markets is competing in the mid-price segment, offering superior quality compared to competition at a somewhat higher price: (1) to maintain an image of quality, and (2) to ensure that the strategy is profitable and sustainable. Finally, the author offers a framework of business or industry definition that extends Abell's (1980) three dimensions to seven. He suggests that an integrated approach to market segmentation provides the foundation for conducting strategic group analysis in consumer markets. So, in strategic group research, we need a bottom-up approach that begins with a product-market segment. In each product market, real competition occurs at the brand level. This is the ground where actual competitive wars are fought, and this is where the rich dynamics of competition often come to light.展开更多
An optimal control strategy is proposed to improve the fermentation titer,which combines the support vector machine(SVM)with real code genetic algorithm(RGA).A prediction model is established with SVM for penicillin f...An optimal control strategy is proposed to improve the fermentation titer,which combines the support vector machine(SVM)with real code genetic algorithm(RGA).A prediction model is established with SVM for penicillin fermentation processes,and it is used in RGA for fitting function.A control pattern is proposed to overcome the coupling problem of fermentation parameters,which describes the overall production condition.Experimental results show that the optimal control strategy improves the penicillin titer of the fermentation process by 22.88%,compared with the routine operation.展开更多
In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte...In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice.展开更多
Railway seat inventory control strategies play a crucial role in the growth of profit and train load factor. The railway passenger seat inventory control problem in China was addressed. Chinese passenger railway opera...Railway seat inventory control strategies play a crucial role in the growth of profit and train load factor. The railway passenger seat inventory control problem in China was addressed. Chinese passenger railway operation features and seat inventory control practice were analyzed firstly. A dynamic demand forecasting method was introduced to forecast the coming demand in a ticket booking period. By clustering, passengers' historical ticket bookings were used to forecast the demand to come in a ticket booking period with least squares support vector machine. Three seat inventory control methods: non-nested booking limits, nested booking limits and bid-price control, were modeled under a single-fare class. Different seat inventory control methods were compared with the same demand based on ticket booking data of Train T15 from Beijing West to Guangzhou. The result shows that the dynamic non-nested booking limits control method performs the best, which gives railway operators evidence to adjust the remaining capacity in a ticket booking period.展开更多
The performance of data-driven models relies heavily on the amount and quality of training samples, so it might deteriorate significantly in the regions where samples are scarce. The objective of this paper is to deve...The performance of data-driven models relies heavily on the amount and quality of training samples, so it might deteriorate significantly in the regions where samples are scarce. The objective of this paper is to develop an online SVR model updating strategy to track the change in the process characteristics efficiently with affordable computational burden. This is achieved by adding a new sample that violates the Karush–Kuhn–Tucker conditions of the existing SVR model and by deleting the old sample that has the maximum distance with respect to the newly added sample in feature space. The benefits offered by such an updating strategy are exploited to develop an adaptive model-based control scheme, where model updating and control task perform alternately.The effectiveness of the adaptive controller is demonstrated by simulation study on a continuous stirred tank reactor. The results reveal that the adaptive MPC scheme outperforms its non-adaptive counterpart for largemagnitude set point changes and variations in process parameters.展开更多
All-graphene devices are new class of graphene devices with simple layouts and low contact resistances. Here we report a clean fabrication strategy for all-graphene devices via a defect-assisted anisotropic etching. T...All-graphene devices are new class of graphene devices with simple layouts and low contact resistances. Here we report a clean fabrication strategy for all-graphene devices via a defect-assisted anisotropic etching. The as-fabricated graphene is free of contamination and retains the quality of pristine graphene. The contact resistance at room temperature (RT) between a bilayer graphene channel and a multilayer graphene electrode can be as low as -5 Ω.·μm, the lowest ever achieved experimentally. Our results suggest the feasibility of employing such all-graphene devices in high performance carbon-based integrated circuits.展开更多
We demonstrate that an arbitrary Bell state can be achieved in a two qubit anisotropic Heisenberg XY chain via Lyapunov control. During the whole process, we only need to apply an external field along a given directio...We demonstrate that an arbitrary Bell state can be achieved in a two qubit anisotropic Heisenberg XY chain via Lyapunov control. During the whole process, we only need to apply an external field along a given direction to a single qubit. This control strategy is effective for all initial states in the four-dimensional Hilbert space where the target state is asymptotically stable. The effects of imperfections on the fidelity for the target state such as Gaussian leakage of local control and localized dephasing of individual spins are also considered.展开更多
文摘This paper presents a new approach to determining whether an interested personal name across doeuments refers to the same entity. Firstly,three vectors for each text are formed: the personal name Boolean vectors denoting whether a personal name occurs the text the biographical word Boolean vector representing title, occupation and so forth, and the feature vector with real values. Then, by combining a heuristic strategy based on Boolean vectors with an agglomeratie clustering algorithm based on feature vectors, it seeks to resolve multi-document personal name coreference. Experimental results show that this approach achieves a good performance by testing on "Wang Gang" corpus.
文摘Barney and Hoskisson (1990) argue that the strategic group research has neither established the existence of strategic groups, nor their relationship to firm performance. The primary reason behind the unsatisfactory results is the lack of a theoretical framework: what strategic variables to include in the analysis and their relative importance; the definition of an industry, and how to make competitive strategy operational. First, the author presents a customer-oriented theory of management which submits that, like Procter and Gamble, understanding customers should be the primary focus of a business. Second, the author proposes an integrated approach to competitive strategy. Because customer-perceived quality is far more critical to long-term success than any other factor, it should be the centerpiece of competitive strategy. The author suggests that competitive strategy should be divided in two interdependent dimensions: external and internal. It is the external strategy that should be considered the primary dimension because it reflects the customers' perspective, and provides a sense of direction regarding how the internal resources should be used. Next, the author presents an operational framework of competitive strategy which proposes that the best route to market share leadership in consumer markets is competing in the mid-price segment, offering superior quality compared to competition at a somewhat higher price: (1) to maintain an image of quality, and (2) to ensure that the strategy is profitable and sustainable. Finally, the author offers a framework of business or industry definition that extends Abell's (1980) three dimensions to seven. He suggests that an integrated approach to market segmentation provides the foundation for conducting strategic group analysis in consumer markets. So, in strategic group research, we need a bottom-up approach that begins with a product-market segment. In each product market, real competition occurs at the brand level. This is the ground where actual competitive wars are fought, and this is where the rich dynamics of competition often come to light.
基金Supported by the National Natural Science Foundation of China(60704036)
文摘An optimal control strategy is proposed to improve the fermentation titer,which combines the support vector machine(SVM)with real code genetic algorithm(RGA).A prediction model is established with SVM for penicillin fermentation processes,and it is used in RGA for fitting function.A control pattern is proposed to overcome the coupling problem of fermentation parameters,which describes the overall production condition.Experimental results show that the optimal control strategy improves the penicillin titer of the fermentation process by 22.88%,compared with the routine operation.
基金supported by the National Science Foundation of China (No.61373040,No.61173137)The Ph.D.Pro-grams Foundation of Ministry of Education of China(20120141110073)Key Project of Natural Science Foundation of Hubei Province (No.2010CDA004)
文摘In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice.
基金Project(2009BAG12A10)supported by the State Technical Support Program of ChinaProject(71201009)supported by National Natural Science Foundation of ChinaProject(RCS2009ZT009)supported by the State Key Laboratory of Rail Traffic Control and Safety,Beijing Jiaotong University,China
文摘Railway seat inventory control strategies play a crucial role in the growth of profit and train load factor. The railway passenger seat inventory control problem in China was addressed. Chinese passenger railway operation features and seat inventory control practice were analyzed firstly. A dynamic demand forecasting method was introduced to forecast the coming demand in a ticket booking period. By clustering, passengers' historical ticket bookings were used to forecast the demand to come in a ticket booking period with least squares support vector machine. Three seat inventory control methods: non-nested booking limits, nested booking limits and bid-price control, were modeled under a single-fare class. Different seat inventory control methods were compared with the same demand based on ticket booking data of Train T15 from Beijing West to Guangzhou. The result shows that the dynamic non-nested booking limits control method performs the best, which gives railway operators evidence to adjust the remaining capacity in a ticket booking period.
基金Supported by the National Basic Research Program of China(2012CB720500)Postdoctoral Science Foundation of China(2013M541964)Fundamental Research Funds for the Central Universities(13CX05021A)
文摘The performance of data-driven models relies heavily on the amount and quality of training samples, so it might deteriorate significantly in the regions where samples are scarce. The objective of this paper is to develop an online SVR model updating strategy to track the change in the process characteristics efficiently with affordable computational burden. This is achieved by adding a new sample that violates the Karush–Kuhn–Tucker conditions of the existing SVR model and by deleting the old sample that has the maximum distance with respect to the newly added sample in feature space. The benefits offered by such an updating strategy are exploited to develop an adaptive model-based control scheme, where model updating and control task perform alternately.The effectiveness of the adaptive controller is demonstrated by simulation study on a continuous stirred tank reactor. The results reveal that the adaptive MPC scheme outperforms its non-adaptive counterpart for largemagnitude set point changes and variations in process parameters.
基金This work was supported by the National Basic Research Program of China (973 Program) (Nos. 2013CB934500 and 2013CBA01600), the National Natural Science Foundation of China (NSFC) (Nos. 61325021, 91223204, 11174333 and 11204358), and the Chinese Academy of Sciences.
文摘All-graphene devices are new class of graphene devices with simple layouts and low contact resistances. Here we report a clean fabrication strategy for all-graphene devices via a defect-assisted anisotropic etching. The as-fabricated graphene is free of contamination and retains the quality of pristine graphene. The contact resistance at room temperature (RT) between a bilayer graphene channel and a multilayer graphene electrode can be as low as -5 Ω.·μm, the lowest ever achieved experimentally. Our results suggest the feasibility of employing such all-graphene devices in high performance carbon-based integrated circuits.
文摘We demonstrate that an arbitrary Bell state can be achieved in a two qubit anisotropic Heisenberg XY chain via Lyapunov control. During the whole process, we only need to apply an external field along a given direction to a single qubit. This control strategy is effective for all initial states in the four-dimensional Hilbert space where the target state is asymptotically stable. The effects of imperfections on the fidelity for the target state such as Gaussian leakage of local control and localized dephasing of individual spins are also considered.