Analytic hierarchy process(Group AHP) is combined with two different methods of assigning experts' priority to weight indicators in building energy efficiency assessment.One is to assign the experts' priority ...Analytic hierarchy process(Group AHP) is combined with two different methods of assigning experts' priority to weight indicators in building energy efficiency assessment.One is to assign the experts' priority averagely,and the other is to use cluster analysis to assign experts' priority.The results show that,1) Different expert's priority assigns result in great different weights of indicators in building energy efficiency assessment,therefore,the method of assigning experts' priority should be taken into account carefully while weighting indicators of building energy efficiency assessment using Group AHP;2) Three indicators are found to be overwhelmingly important in residential building energy efficiency assessment in the hot summer and cold winter zone in China.They are 'Outdoor & indoor shadow','Heating & air-conditioning facilities' and 'Insulation of envelope';3) The method combining cluster analysis with Group AHP to weight indicator of building energy efficiency assessment has the advantage of finding overwhelming important indicator,whereas,some less important indicators have a tendency to be ignored.A useful reference is provided for building energy conservation including policy revision and energy efficient residential building design.展开更多
The inclusion of more potentially correct words in the candidate sets is important to improve the accuracy of Large Vocabulary Continuous Speech Recognition (LVCSR). A candidate expansion algorithm based on the Weig...The inclusion of more potentially correct words in the candidate sets is important to improve the accuracy of Large Vocabulary Continuous Speech Recognition (LVCSR). A candidate expansion algorithm based on the Weighted Syllable Confusion Matrix (WSCM) is proposed. First, WSCM is derived from a confusion network. Then, the reeognised candidates in the confusion network is used to conjeeture the most likely correct words based on WSCM, after which, the conjectured words are combined with the recognised candidates to produce an expanded candidate set. Finally, a combined model having mutual information and a trigram language model is used to rerank the candidates. The experiments on Mandarin film data show that an improvement of 9.57% in the character correction rate is obtained over the initial recognition performance on those light erroneous utterances.展开更多
The objective of this study is to investigate a network failure problem with a significant path, emerging from the context of crisis management, such as in the case of natural disasters. For a given tree with m failed...The objective of this study is to investigate a network failure problem with a significant path, emerging from the context of crisis management, such as in the case of natural disasters. For a given tree with m failed edges, we assume that we have sufficient resources to recover k edges of the m edges. Each node has a positive weight. In this situation, we consider which k edges should be fixed in order to maximize the sum of the weights of the nodes reachable from the significant path. In this paper, we formulate such a problem as a combinatorial problem. Further, we show that a part of our problem may be solved by translating it into the terms of the so-called tree knapsack problem.展开更多
A dynamically positioned vessel, by the International Maritime Organization (IMO) and the certifying class societies (DNV, ABS, LR, etc.), is defined as a vessel that maintains its position and heading (fixed loc...A dynamically positioned vessel, by the International Maritime Organization (IMO) and the certifying class societies (DNV, ABS, LR, etc.), is defined as a vessel that maintains its position and heading (fixed location or pre-determined track) exclu- sively by means of active thrusters. The development of control technology promotes the upgrading of dynamic positioning (DP) systems. Today there are two different DP systems solutions available on the market: DP system based on PID regulator and that based on model-based control. Both systems have limited disturbance rejection capability due to their design principle. In this paper, a new DP system solution is proposed based on Active Dis^n'bance Rejection Control (ADRC) technology. This technology is com- posed of Tracking-Differentiator (TD), Extended State Observer (ESO) and Nonlinear Feedback Combination. On one hand, both TD and ESO can act as filters and can be used in place of conventional filters; on the other hand, the total disturbance of the system can be estimated and compensated by ESO, which therefore enhances the system's disturbance rejection capability. This technology's advantages over other methods lie in two aspects: 1) This method itself can not only achieve control objectives but also filter noisy measurements without other specialized filters; 2) This method offers a new useful approach to suppress the ocean disturbance. The simulation results demonstrate the effectiveness of the proposed method.展开更多
Internet of Things (IoT) refers to an infrastructure which enables the forms of com- munication and collaboration between people and things, and between things themselves. In order to improve its performance, we pre...Internet of Things (IoT) refers to an infrastructure which enables the forms of com- munication and collaboration between people and things, and between things themselves. In order to improve its performance, we present a tradeoff between bandwidth and energy con- sumption in the loT in this paper. A service providing model is built to find the relation- ship between bandwidth and energy consump- tion using a cooperative differential game mo- del. The game solution is gotten in the condi- tion of grand coalition, feedback Nash equili- brium and intermediate coalitions and an allo- cation policy is obtain by Shapley theory. The results are shown as follows. Firstly, the per- formance of IoT decreases with the increasing of bandwidth cost or with the decreasing of en- ergy cost; secondly, all the nodes in the IoT com- posing a grand coalition can save bandwidth and energy consumption; thirdly, when the fac- tors of bandwidth cost and energy cost are eq- ual, the obtained number of provided services is an optimised value which is the trade-off between energy and bandwidth consumption.展开更多
Energy saving,emission reduction and economic development are major issues China has to meet in building a harmonious society.On one hand,China should pursue a sustainable,fast and sound economic development,on the ot...Energy saving,emission reduction and economic development are major issues China has to meet in building a harmonious society.On one hand,China should pursue a sustainable,fast and sound economic development,on the other hand,she should try to decrease the overuse of energy resources and the environ- mental problems caused by the rapid economic growth. In this regard,on June 24,the Standing Committee of National People's Congress deliberated the draft of Energy Saving Law,according to which China is to take"resources saving"as a basic national policy.This is a key issue to the long-term benefits of China.With relevant questions,China's Foreign Trade interviewed Dr, Yonglong L(?),Secretary-general,Chinese Committee for SCOPE(Scientific Committee on Problems of the Environment/ICSU).and Research Professor at the Chinese Academy of Sciences. Let's listen to Dr.L(?)'s comments with wisdom.展开更多
In this paper, an optimized rmlicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-base...In this paper, an optimized rmlicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-based hierarchical network figures out an average confidence degree by means of messages from its child nodes. The cluster head only accepts a message from the child node whose confidence degree is higher than the average. Meanwhile, it updates the confidence degrees for each of its child nodes by comparing the aggregation value and the received messages, and regards them as the weight of exactness of messages from nodes. A sensor node is judged to be rmlicious if its weight value is lower than the predefined threshold. Comparative simulation results verify that the proposed WCF algorithm is better than the Weighted Trust Evaluation (WTE) in terms of the detection ratio and the false alarm ratio. More specifically, with the WCF, the detection ratio is significantly improved and the false alarm ratio is observably reduced, especially when the malicious node ratio is 0.25 or greater. When 40% of 100 sensors are malicious, the detection accuracy is above 90% and the false alarm ratio is nearly only 1.8%.展开更多
Community structure is an important characteristic in real complex network.It is a network consists ofgroups of nodes within which links are dense but among which links are sparse.In this paper, the evolving network i...Community structure is an important characteristic in real complex network.It is a network consists ofgroups of nodes within which links are dense but among which links are sparse.In this paper, the evolving network includenode, link and community growth and we apply the community size preferential attachment and strength preferentialattachment to a growing weighted network model and utilize weight assigning mechanism from BBV model.Theresulting network reflects the intrinsic community structure with generalized power-law distributions of nodes'degreesand strengths.展开更多
Most of existing works on complex network assumed that the nodes and edges were uncapacitated during the evolving process,and displayed "rich club" phenomenon.Here we will show that the "rich club"...Most of existing works on complex network assumed that the nodes and edges were uncapacitated during the evolving process,and displayed "rich club" phenomenon.Here we will show that the "rich club" could be changed to "common rich" if we consider the node capacity.In this paper,we define the node and edge attractive index with node capacity,and propose a new evolving model on the base of BBV model,with evolving simulations of the networks.In the new model,an entering node is linked with an existing node according to the preferential attachment mechanism defined with the attractive index of the existing node.We give the theoretical approximation and simulation solutions.If node capacity is finite,the rich node may not be richer further when the node strength approaches or gets to the node capacity.This is confirmed by analyzing the passenger traffic and routes of Chinese main airports.Due to node strength being function of time t,we can use the theoretical approximation solution to forecast how node strength changes and the time when node strength reaches its maximum value.展开更多
Using degree distribution to assess network vulnerability represents a promising direction of network analysis.However,the traditional degree distribution model is inadequate for analyzing the vulnerability of spatial...Using degree distribution to assess network vulnerability represents a promising direction of network analysis.However,the traditional degree distribution model is inadequate for analyzing the vulnerability of spatial networks because it does not take into consideration the geographical aspects of spatial networks.This paper proposes a spatially weighted degree model in which both the functional class and the length of network links are considered to be important factors for determining the node degrees of spatial networks.A weight coefficient is used in this new model to account for the contribution of each factor to the node degree.The proposed model is compared with the traditional degree model and an accessibility-based vulnerability model in the vulnerabil-ity analysis of a highway network.Experiment results indicate that,although node degrees of spatial networks derived from the tra-ditional degree model follow a random distribution,node degrees determined by the spatially weighted model exhibit a scale-free distribution,which is a common characteristic of robust networks.Compared to the accessibility-based model,the proposed model has similar performance in identifying critical nodes but with higher computational efficiency and better ability to reveal the overall vulnerability of a spatial network.展开更多
The major aim of power quality(PQ) enhancing techniques is to maintain a specified voltage magnitude at a desired frequency for sensitive loads irrespective of faults on the power distribution network.The dynamic volt...The major aim of power quality(PQ) enhancing techniques is to maintain a specified voltage magnitude at a desired frequency for sensitive loads irrespective of faults on the power distribution network.The dynamic voltage restorer(DVR) is a device used to mitigate voltage sags to regulate load voltage.This paper presents a mathematical model for leading series voltage injection to mitigate sags thereby achieving the improvement of the utility power factor as well as power sharing between the DVR and utility.The power sharing will be as per requirement to compensate the sags considering the available distributed generation(DG).The approach of mitigating voltage sags using the concept of leading series voltage injection is suitable for those locations where phase shift in the voltage will not cause any problem.The MATLAB/SIMULINK SimPowerSystem toolbox has been used to obtain simulation results to verify the proposed mathematical model.展开更多
基金Project(2010R10036) supported by the Science and Technology Department of Zhejiang Province, China
文摘Analytic hierarchy process(Group AHP) is combined with two different methods of assigning experts' priority to weight indicators in building energy efficiency assessment.One is to assign the experts' priority averagely,and the other is to use cluster analysis to assign experts' priority.The results show that,1) Different expert's priority assigns result in great different weights of indicators in building energy efficiency assessment,therefore,the method of assigning experts' priority should be taken into account carefully while weighting indicators of building energy efficiency assessment using Group AHP;2) Three indicators are found to be overwhelmingly important in residential building energy efficiency assessment in the hot summer and cold winter zone in China.They are 'Outdoor & indoor shadow','Heating & air-conditioning facilities' and 'Insulation of envelope';3) The method combining cluster analysis with Group AHP to weight indicator of building energy efficiency assessment has the advantage of finding overwhelming important indicator,whereas,some less important indicators have a tendency to be ignored.A useful reference is provided for building energy conservation including policy revision and energy efficient residential building design.
基金supported by the National Natural Science Foundation of China under Grants No.61005004,No.61175011,No.61171193the Next-Generation Broadband Wireless Mobile Communications Network Technology Key Project under Grant No.2011ZX03002-005-01+2 种基金the One Church,One Family,One Purpose(111Project)under Grant No.B08004the Key Project of Ministry of Science and Technology of China under Grant No.2012ZX-03002019-002the National High Techni-cal Research and Development Program of China(863Program)under Grant No.2011A-A01A205
文摘The inclusion of more potentially correct words in the candidate sets is important to improve the accuracy of Large Vocabulary Continuous Speech Recognition (LVCSR). A candidate expansion algorithm based on the Weighted Syllable Confusion Matrix (WSCM) is proposed. First, WSCM is derived from a confusion network. Then, the reeognised candidates in the confusion network is used to conjeeture the most likely correct words based on WSCM, after which, the conjectured words are combined with the recognised candidates to produce an expanded candidate set. Finally, a combined model having mutual information and a trigram language model is used to rerank the candidates. The experiments on Mandarin film data show that an improvement of 9.57% in the character correction rate is obtained over the initial recognition performance on those light erroneous utterances.
文摘The objective of this study is to investigate a network failure problem with a significant path, emerging from the context of crisis management, such as in the case of natural disasters. For a given tree with m failed edges, we assume that we have sufficient resources to recover k edges of the m edges. Each node has a positive weight. In this situation, we consider which k edges should be fixed in order to maximize the sum of the weights of the nodes reachable from the significant path. In this paper, we formulate such a problem as a combinatorial problem. Further, we show that a part of our problem may be solved by translating it into the terms of the so-called tree knapsack problem.
基金The support of the National Nature Science Foundation of China(Nos.61074053 and 61374114)the Applied Basic Research Program of Ministry of Transport of China(No.2011-329-225-390)are gratefully acknowledged
文摘A dynamically positioned vessel, by the International Maritime Organization (IMO) and the certifying class societies (DNV, ABS, LR, etc.), is defined as a vessel that maintains its position and heading (fixed location or pre-determined track) exclu- sively by means of active thrusters. The development of control technology promotes the upgrading of dynamic positioning (DP) systems. Today there are two different DP systems solutions available on the market: DP system based on PID regulator and that based on model-based control. Both systems have limited disturbance rejection capability due to their design principle. In this paper, a new DP system solution is proposed based on Active Dis^n'bance Rejection Control (ADRC) technology. This technology is com- posed of Tracking-Differentiator (TD), Extended State Observer (ESO) and Nonlinear Feedback Combination. On one hand, both TD and ESO can act as filters and can be used in place of conventional filters; on the other hand, the total disturbance of the system can be estimated and compensated by ESO, which therefore enhances the system's disturbance rejection capability. This technology's advantages over other methods lie in two aspects: 1) This method itself can not only achieve control objectives but also filter noisy measurements without other specialized filters; 2) This method offers a new useful approach to suppress the ocean disturbance. The simulation results demonstrate the effectiveness of the proposed method.
基金ACKNOWLEDGEMENT We gratefully acknowledge anonymous revie- wers who read drafts and made many helpful suggestions. This work was supported by the National Natural Science Foundation of China under Grant No. 61202079 the China Post- doctoral Science Foundation under Grant No. 2013M530526+2 种基金 the Foundation of Beijing En- gineering the Fundamental Research Funds for the Central Universities under Grant No. FRF-TP-13-015A and the Technology Centre for Convergence Networks and Ubiquitous Services.
文摘Internet of Things (IoT) refers to an infrastructure which enables the forms of com- munication and collaboration between people and things, and between things themselves. In order to improve its performance, we present a tradeoff between bandwidth and energy con- sumption in the loT in this paper. A service providing model is built to find the relation- ship between bandwidth and energy consump- tion using a cooperative differential game mo- del. The game solution is gotten in the condi- tion of grand coalition, feedback Nash equili- brium and intermediate coalitions and an allo- cation policy is obtain by Shapley theory. The results are shown as follows. Firstly, the per- formance of IoT decreases with the increasing of bandwidth cost or with the decreasing of en- ergy cost; secondly, all the nodes in the IoT com- posing a grand coalition can save bandwidth and energy consumption; thirdly, when the fac- tors of bandwidth cost and energy cost are eq- ual, the obtained number of provided services is an optimised value which is the trade-off between energy and bandwidth consumption.
文摘Energy saving,emission reduction and economic development are major issues China has to meet in building a harmonious society.On one hand,China should pursue a sustainable,fast and sound economic development,on the other hand,she should try to decrease the overuse of energy resources and the environ- mental problems caused by the rapid economic growth. In this regard,on June 24,the Standing Committee of National People's Congress deliberated the draft of Energy Saving Law,according to which China is to take"resources saving"as a basic national policy.This is a key issue to the long-term benefits of China.With relevant questions,China's Foreign Trade interviewed Dr, Yonglong L(?),Secretary-general,Chinese Committee for SCOPE(Scientific Committee on Problems of the Environment/ICSU).and Research Professor at the Chinese Academy of Sciences. Let's listen to Dr.L(?)'s comments with wisdom.
基金Acknowledgements This paper was supported by the National Natural Science Foundation of China under Cant No. 61170219 the Natural Science Foundation Project of CQ CSTC under Grants No. 2009BB2278, No201 1jjA40028 the 2011 Talent Plan of Chongqing Higher Education.
文摘In this paper, an optimized rmlicious nodes detection algorithm, based on Weighted Confidence Filter (WCF), is proposed to protect sensor networks from attacks. In this algorithm, each cluster head in a cluster-based hierarchical network figures out an average confidence degree by means of messages from its child nodes. The cluster head only accepts a message from the child node whose confidence degree is higher than the average. Meanwhile, it updates the confidence degrees for each of its child nodes by comparing the aggregation value and the received messages, and regards them as the weight of exactness of messages from nodes. A sensor node is judged to be rmlicious if its weight value is lower than the predefined threshold. Comparative simulation results verify that the proposed WCF algorithm is better than the Weighted Trust Evaluation (WTE) in terms of the detection ratio and the false alarm ratio. More specifically, with the WCF, the detection ratio is significantly improved and the false alarm ratio is observably reduced, especially when the malicious node ratio is 0.25 or greater. When 40% of 100 sensors are malicious, the detection accuracy is above 90% and the false alarm ratio is nearly only 1.8%.
基金Supported by the National Nature Science Foundation of China under Grant No.10832006PuJiang Project of Shanghai under Grant No.09PJ1405000+1 种基金Key Disciplines of Shanghai Municipality (S30104)Research Grant of Shanghai University under Grant No.SHUCX092014
文摘Community structure is an important characteristic in real complex network.It is a network consists ofgroups of nodes within which links are dense but among which links are sparse.In this paper, the evolving network includenode, link and community growth and we apply the community size preferential attachment and strength preferentialattachment to a growing weighted network model and utilize weight assigning mechanism from BBV model.Theresulting network reflects the intrinsic community structure with generalized power-law distributions of nodes'degreesand strengths.
基金supported by the National Natural Science Foundation of China (Grant Nos.71171111,70771046 and 71201081)the Colleges Graduate Research and Innovation Program of Jiangsu Province (Grant Nos.CXZZ11-0220 and CX10B-102Z)
文摘Most of existing works on complex network assumed that the nodes and edges were uncapacitated during the evolving process,and displayed "rich club" phenomenon.Here we will show that the "rich club" could be changed to "common rich" if we consider the node capacity.In this paper,we define the node and edge attractive index with node capacity,and propose a new evolving model on the base of BBV model,with evolving simulations of the networks.In the new model,an entering node is linked with an existing node according to the preferential attachment mechanism defined with the attractive index of the existing node.We give the theoretical approximation and simulation solutions.If node capacity is finite,the rich node may not be richer further when the node strength approaches or gets to the node capacity.This is confirmed by analyzing the passenger traffic and routes of Chinese main airports.Due to node strength being function of time t,we can use the theoretical approximation solution to forecast how node strength changes and the time when node strength reaches its maximum value.
基金Supported by the Institute of Crustal Dynamics Funds (No. ZDJ2009‐01, No. ZDJ2007‐13)
文摘Using degree distribution to assess network vulnerability represents a promising direction of network analysis.However,the traditional degree distribution model is inadequate for analyzing the vulnerability of spatial networks because it does not take into consideration the geographical aspects of spatial networks.This paper proposes a spatially weighted degree model in which both the functional class and the length of network links are considered to be important factors for determining the node degrees of spatial networks.A weight coefficient is used in this new model to account for the contribution of each factor to the node degree.The proposed model is compared with the traditional degree model and an accessibility-based vulnerability model in the vulnerabil-ity analysis of a highway network.Experiment results indicate that,although node degrees of spatial networks derived from the tra-ditional degree model follow a random distribution,node degrees determined by the spatially weighted model exhibit a scale-free distribution,which is a common characteristic of robust networks.Compared to the accessibility-based model,the proposed model has similar performance in identifying critical nodes but with higher computational efficiency and better ability to reveal the overall vulnerability of a spatial network.
基金Project(No. UET/ASR&TD-251/2006)supported by the Higher Education Commission of Pakistan
文摘The major aim of power quality(PQ) enhancing techniques is to maintain a specified voltage magnitude at a desired frequency for sensitive loads irrespective of faults on the power distribution network.The dynamic voltage restorer(DVR) is a device used to mitigate voltage sags to regulate load voltage.This paper presents a mathematical model for leading series voltage injection to mitigate sags thereby achieving the improvement of the utility power factor as well as power sharing between the DVR and utility.The power sharing will be as per requirement to compensate the sags considering the available distributed generation(DG).The approach of mitigating voltage sags using the concept of leading series voltage injection is suitable for those locations where phase shift in the voltage will not cause any problem.The MATLAB/SIMULINK SimPowerSystem toolbox has been used to obtain simulation results to verify the proposed mathematical model.