To investigate the cost-effectiveness of different maintenance treatments of highways in Jiangsu Province, the historical pavement maintenance records, traffic load information and pavement performance data in the pav...To investigate the cost-effectiveness of different maintenance treatments of highways in Jiangsu Province, the historical pavement maintenance records, traffic load information and pavement performance data in the pavement management system (PMS) are recorded and analyzed. Compared with the growth model, the linear model, the logarithm model and the exponential model, the cubic model has higher regression accuracy R2 and it can capture the sigmoid shape of the deterioration curve. So it is selected to simulate the pavement rotting development. The benefit over cost ratio is calculated to quantify the treatment cost- effectiveness. The analysis results show that thin hot mix asphalt (HMA) overlays and micro surfacing are more cost- effective than the. other two treatments on light and moderate traffic roads. Hot in-place recycling and thick HMA overlays have much longer service lives and greater cost-effectiveness under heavy or extra heavy traffic.展开更多
As an important type of polynomial approximation, approximation of functions by Bernstein operators is an important topic in approximation theory and computational theory. This paper gives global and pointwise estimat...As an important type of polynomial approximation, approximation of functions by Bernstein operators is an important topic in approximation theory and computational theory. This paper gives global and pointwise estimates for weighted approximation of functions with singularities by Bernstein operators. The main results are the Jackson's estimates of functions f∈ (Wwλ)2 andre Cw, which extends the result of (Della Vecchia et al., 2004).展开更多
To improve the accuracy of the calculation of a heading angle under magnetic interference,magnetometers and inertial measurement units(IMUs)were fused.The observation value of the heading angle was deduced on the basi...To improve the accuracy of the calculation of a heading angle under magnetic interference,magnetometers and inertial measurement units(IMUs)were fused.The observation value of the heading angle was deduced on the basis of the modeling of the magnetometer error and the analysis of the relation of the magnetometer triaxial output and the distribution characteristics of the magnetic field at two adjacent time periods.Meanwhile,the gyro state and angular velocity increment were used as the basis of the IMU to calculate the prediction value of the heading angle.With the changes in the heading angle and environmental interference,a random forest(RF)algorithm was used to iteratively calculate the weights to fuse the observation value of the heading angle based on the magnetometer and the prediction value of the heading angle based on the IMU.The results show that relative to the common sensor fusion method,the proposed sensor fusion method based on the RF algorithm achieved an approximate 60%improvement in heading angle accuracy.Hence,the proposed method can effectively improve the accuracy of the heading angle under magnetic interference by using an RF algorithm to calculate the output weights of the magnetometer and IMU.展开更多
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing....The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.展开更多
基金The Science and Technology Project of Jiangsu Provincial Communications Department(No.7621000078)
文摘To investigate the cost-effectiveness of different maintenance treatments of highways in Jiangsu Province, the historical pavement maintenance records, traffic load information and pavement performance data in the pavement management system (PMS) are recorded and analyzed. Compared with the growth model, the linear model, the logarithm model and the exponential model, the cubic model has higher regression accuracy R2 and it can capture the sigmoid shape of the deterioration curve. So it is selected to simulate the pavement rotting development. The benefit over cost ratio is calculated to quantify the treatment cost- effectiveness. The analysis results show that thin hot mix asphalt (HMA) overlays and micro surfacing are more cost- effective than the. other two treatments on light and moderate traffic roads. Hot in-place recycling and thick HMA overlays have much longer service lives and greater cost-effectiveness under heavy or extra heavy traffic.
文摘As an important type of polynomial approximation, approximation of functions by Bernstein operators is an important topic in approximation theory and computational theory. This paper gives global and pointwise estimates for weighted approximation of functions with singularities by Bernstein operators. The main results are the Jackson's estimates of functions f∈ (Wwλ)2 andre Cw, which extends the result of (Della Vecchia et al., 2004).
基金The National Natural Science Foundation of China(No.51708299).
文摘To improve the accuracy of the calculation of a heading angle under magnetic interference,magnetometers and inertial measurement units(IMUs)were fused.The observation value of the heading angle was deduced on the basis of the modeling of the magnetometer error and the analysis of the relation of the magnetometer triaxial output and the distribution characteristics of the magnetic field at two adjacent time periods.Meanwhile,the gyro state and angular velocity increment were used as the basis of the IMU to calculate the prediction value of the heading angle.With the changes in the heading angle and environmental interference,a random forest(RF)algorithm was used to iteratively calculate the weights to fuse the observation value of the heading angle based on the magnetometer and the prediction value of the heading angle based on the IMU.The results show that relative to the common sensor fusion method,the proposed sensor fusion method based on the RF algorithm achieved an approximate 60%improvement in heading angle accuracy.Hence,the proposed method can effectively improve the accuracy of the heading angle under magnetic interference by using an RF algorithm to calculate the output weights of the magnetometer and IMU.
基金supported by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386)the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004)+2 种基金the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008)Major State Basic Research Development Program of China(973 Program)(No.2014CB340600)the Hubei Natural Science Foundation of China(Grant No.2011CDB453,2014CFB440)
文摘The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.