Although the genetic algorithm (GA) has very powerful robustness and fitness, it needs a large size of population and a large number of iterations to reach the optimum result. Especially when GA is used in complex str...Although the genetic algorithm (GA) has very powerful robustness and fitness, it needs a large size of population and a large number of iterations to reach the optimum result. Especially when GA is used in complex structural optimization problems, if the structural reanalysis technique is not adopted, the more the number of finite element analysis (FEA) is, the more the consuming time is. In the conventional structural optimization the number of FEA can be reduced by the structural reanalysis technique based on the approximation techniques and sensitivity analysis. With these techniques, this paper provides a new approximation model-segment approximation model, adopted for the GA application. This segment approximation model can decrease the number of FEA and increase the convergence rate of GA. So it can apparently decrease the computation time of GA. Two examples demonstrate the availability of the new segment approximation model.展开更多
From a perspective of theoretical study, there are some faults in the models of the existing object-oriented programming languages. For example, C# does not support metaclasses, the primitive types of Java and C# are ...From a perspective of theoretical study, there are some faults in the models of the existing object-oriented programming languages. For example, C# does not support metaclasses, the primitive types of Java and C# are not objects, etc. So, this paper designs a programming language, Shrek, which integrates many language features and constructions in a compact and consistent model. The Shrek language is a class-based purely object-oriented language. It has a dynamical strong type system, and adopts a single-inheritance mechanism with Mixin as its complement. It has a consistent class instantiation and inheritance structure, and the ability of intercessive structural computational reflection, which enables it to support safe metaclass programming. It also supports multi-thread programming and automatic garbage collection, and enforces its expressive power by adopting a native method mechanism. The prototype system of the Shrek language is implemented and anticipated design goals are achieved.展开更多
This letter introduces color constancy and Retinex theory for image enhancement.It clas- sifies Retinex algorithms into four categories and provides their principles and implementations in general.The experimental res...This letter introduces color constancy and Retinex theory for image enhancement.It clas- sifies Retinex algorithms into four categories and provides their principles and implementations in general.The experimental results of Frankle-McCann,MSR (Multi-Scale Retinex) and PNSD (Pro- jected Normalized Steepest Descent) Retinex algorithms are presented and compared.Moreover, variance and average gradient are proposed to evaluate the performance of the different algorithms.展开更多
As the idea of simulated annealing (SA) is introduced into the fitness function, an improved genetic algorithm (GA) is proposed to perform the optimal design of a pressure vessel which aims to attain the minimum weigh...As the idea of simulated annealing (SA) is introduced into the fitness function, an improved genetic algorithm (GA) is proposed to perform the optimal design of a pressure vessel which aims to attain the minimum weight under burst pressure con- straint. The actual burst pressure is calculated using the arc-length and restart analysis in finite element analysis (FEA). A penalty function in the fitness function is proposed to deal with the constrained problem. The effects of the population size and the number of generations in the GA on the weight and burst pressure of the vessel are explored. The optimization results using the proposed GA are also compared with those using the simple GA and the conventional Monte Carlo method.展开更多
Abstract: In order to gain a better performance and reduce the computational complexity of the filter design in the underwater acoustic single car rier system, a new Iterative Block DFE (IBDFE) is proposed, which o...Abstract: In order to gain a better performance and reduce the computational complexity of the filter design in the underwater acoustic single car rier system, a new Iterative Block DFE (IBDFE) is proposed, which operates iteratively on blocks of the received signal, and fully implements its filtering operations by Discrete Fourier Trans forms (DFTs). Two design methods are consid ered for IBDFE: one is HDIBDFE, and the oth er is SDIBDFE. In this paper, the first one is a dopted. In this scheme,展开更多
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa...The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.展开更多
This letter proposes a method for designing a specific formation of satellites where the flying motion only exists in a circle orbit plane of the reference satellite, which means that the orbit eccentricity is zero. T...This letter proposes a method for designing a specific formation of satellites where the flying motion only exists in a circle orbit plane of the reference satellite, which means that the orbit eccentricity is zero. This method combines the Hill equation, the Kepler equation, and the geometrical inea^ing of orbit elements. It creates the redundancy condition to simplify the deducing process, utilizes multiple conditions to solve the orbit elements for the satellite formation, and obtains the analytical relationship of the orbit elements for the formation satellites with the formation parameters and the orbit elements of the reference satellite. Using these formulations, the orbit elements and formation parameters for the formation satellites can be solved for the given orbit elements of the reference satellite. The letter describes the proposed double-ellipse formation for both GMTI and InSAR, and the validity of the formation is demonstrated via simulation.展开更多
This paper presents some techniques for synthesizing novel view for a virtual viewpoint from two given views cap-tured at different viewpoints to achieve both high quality and high efficiency. The whole process consis...This paper presents some techniques for synthesizing novel view for a virtual viewpoint from two given views cap-tured at different viewpoints to achieve both high quality and high efficiency. The whole process consists of three passes. The first pass recovers depth map. We formulate it as pixel labelling and propose a bisection approach to solve it. It is accomplished in log2n(n is the number of depth levels) steps,each of which involves a single graph cut computation. The second pass detects occluded pixels and reasons about their depth. It fits a foreground depth curve and a background depth curve using depth of nearby fore-ground and background pixels,and then distinguishes foreground and background pixels by minimizing a global energy,which involves only one graph cut computation. The third pass finds for each pixel in the novel view the corresponding pixels in the input views and computes its color. The whole process involves only a small number of graph cut computations,therefore it is efficient. And,visual artifacts in the synthesized view can be removed successfully by correcting depth of the occluded pixels. Experimental results demonstrate that both high quality and high efficiency are achieved by the proposed techniques.展开更多
Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained poli...Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.展开更多
In this work, the extractive distillation with heat integration process is extended to separate the pressure-insensitive benzene-cyclohexane azeotrope by using furfural as the entrainer. The optimal design of extracti...In this work, the extractive distillation with heat integration process is extended to separate the pressure-insensitive benzene-cyclohexane azeotrope by using furfural as the entrainer. The optimal design of extractive distillation process is established to achieve minimum energy requirement using the multi-objective genetic algorithm, and the results show that energy saving for this heat integration process is 15.7%. Finally, the control design is performed to investigate the system's dynamic performance, and three control structures are studied. The pressure-compensated temperature control scheme is proposed based on the first two control structures, and the dynamic responses reveal that the feed disturbances in both flow rate and benzene composition can be mitigated well.展开更多
Gas extraction is one of the main measures of control and use of gas of coal mines. At present, the design method is under the experimental period and do not satisfy the need of practice. In this paper, the theory of ...Gas extraction is one of the main measures of control and use of gas of coal mines. At present, the design method is under the experimental period and do not satisfy the need of practice. In this paper, the theory of gas extraction of coal seams based upon Darcy law was studied. Mathematical model of gas extraction of coal seams was established and two kinds of solv- ing approaches based on computer software and linear approximation were given. The rightness and the validities of the model were examined with a practical example. Results obtained can be used to determine and optimize the parameters related etc.展开更多
The configuration space is a fundamental concept that is widely used in algorithmic robotics. Many applications in robotics, computer-aided design, and related areas can be reduced to computational problems in terms o...The configuration space is a fundamental concept that is widely used in algorithmic robotics. Many applications in robotics, computer-aided design, and related areas can be reduced to computational problems in terms of configuration spaces. In this paper, we survey some of our recent work on solving two important challenges related to configuration spaces: ~ how to efficiently compute an approximate representation of high-dimensional configuration spaces; and how to efficiently perform geometric proximity and motion planning queries (n high-dimensional configuration spaces. We present new configuration space construction algorithms based on machine learning and geometric approximation techniques. These algorithms perform collision queries on many configuration samples. The collision query results are used to compute an approximate representation for the configuration space, which quickly converges to the exact configuration space. We also present parallel GPU-based algorithms to accelerate the performance of optimization and search computations in configuration spaces. In particular, we design efficient GPU-based parallel k-nearest neighbor and parallel collision detection algorithms and use these algorithms to accelerate motion planning.展开更多
文摘Although the genetic algorithm (GA) has very powerful robustness and fitness, it needs a large size of population and a large number of iterations to reach the optimum result. Especially when GA is used in complex structural optimization problems, if the structural reanalysis technique is not adopted, the more the number of finite element analysis (FEA) is, the more the consuming time is. In the conventional structural optimization the number of FEA can be reduced by the structural reanalysis technique based on the approximation techniques and sensitivity analysis. With these techniques, this paper provides a new approximation model-segment approximation model, adopted for the GA application. This segment approximation model can decrease the number of FEA and increase the convergence rate of GA. So it can apparently decrease the computation time of GA. Two examples demonstrate the availability of the new segment approximation model.
基金The National Science Fund for Distinguished Young Scholars (No.60425206)the National Natural Science Foundation of China (No.60633010)the Natural Science Foundation of Jiangsu Province(No.BK2006094)
文摘From a perspective of theoretical study, there are some faults in the models of the existing object-oriented programming languages. For example, C# does not support metaclasses, the primitive types of Java and C# are not objects, etc. So, this paper designs a programming language, Shrek, which integrates many language features and constructions in a compact and consistent model. The Shrek language is a class-based purely object-oriented language. It has a dynamical strong type system, and adopts a single-inheritance mechanism with Mixin as its complement. It has a consistent class instantiation and inheritance structure, and the ability of intercessive structural computational reflection, which enables it to support safe metaclass programming. It also supports multi-thread programming and automatic garbage collection, and enforces its expressive power by adopting a native method mechanism. The prototype system of the Shrek language is implemented and anticipated design goals are achieved.
文摘This letter introduces color constancy and Retinex theory for image enhancement.It clas- sifies Retinex algorithms into four categories and provides their principles and implementations in general.The experimental results of Frankle-McCann,MSR (Multi-Scale Retinex) and PNSD (Pro- jected Normalized Steepest Descent) Retinex algorithms are presented and compared.Moreover, variance and average gradient are proposed to evaluate the performance of the different algorithms.
基金Project (Nos. 2006BAK04A02-02 and 2006BAK02B02-08) sup-ported by the National Key Technology R&D Program, China
文摘As the idea of simulated annealing (SA) is introduced into the fitness function, an improved genetic algorithm (GA) is proposed to perform the optimal design of a pressure vessel which aims to attain the minimum weight under burst pressure con- straint. The actual burst pressure is calculated using the arc-length and restart analysis in finite element analysis (FEA). A penalty function in the fitness function is proposed to deal with the constrained problem. The effects of the population size and the number of generations in the GA on the weight and burst pressure of the vessel are explored. The optimization results using the proposed GA are also compared with those using the simple GA and the conventional Monte Carlo method.
基金the Fundamental Research Funds for the Central Universities of China,the Natural Science Foundation of Fujian Province of China
文摘Abstract: In order to gain a better performance and reduce the computational complexity of the filter design in the underwater acoustic single car rier system, a new Iterative Block DFE (IBDFE) is proposed, which operates iteratively on blocks of the received signal, and fully implements its filtering operations by Discrete Fourier Trans forms (DFTs). Two design methods are consid ered for IBDFE: one is HDIBDFE, and the oth er is SDIBDFE. In this paper, the first one is a dopted. In this scheme,
基金The National Natural Science Foundation of China (No. 60273049, 60303026, 60473020)
文摘The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.
文摘This letter proposes a method for designing a specific formation of satellites where the flying motion only exists in a circle orbit plane of the reference satellite, which means that the orbit eccentricity is zero. This method combines the Hill equation, the Kepler equation, and the geometrical inea^ing of orbit elements. It creates the redundancy condition to simplify the deducing process, utilizes multiple conditions to solve the orbit elements for the satellite formation, and obtains the analytical relationship of the orbit elements for the formation satellites with the formation parameters and the orbit elements of the reference satellite. Using these formulations, the orbit elements and formation parameters for the formation satellites can be solved for the given orbit elements of the reference satellite. The letter describes the proposed double-ellipse formation for both GMTI and InSAR, and the validity of the formation is demonstrated via simulation.
基金Project (No. 2002CB312101) supported by the National Basic Re-search Program (973) of China
文摘This paper presents some techniques for synthesizing novel view for a virtual viewpoint from two given views cap-tured at different viewpoints to achieve both high quality and high efficiency. The whole process consists of three passes. The first pass recovers depth map. We formulate it as pixel labelling and propose a bisection approach to solve it. It is accomplished in log2n(n is the number of depth levels) steps,each of which involves a single graph cut computation. The second pass detects occluded pixels and reasons about their depth. It fits a foreground depth curve and a background depth curve using depth of nearby fore-ground and background pixels,and then distinguishes foreground and background pixels by minimizing a global energy,which involves only one graph cut computation. The third pass finds for each pixel in the novel view the corresponding pixels in the input views and computes its color. The whole process involves only a small number of graph cut computations,therefore it is efficient. And,visual artifacts in the synthesized view can be removed successfully by correcting depth of the occluded pixels. Experimental results demonstrate that both high quality and high efficiency are achieved by the proposed techniques.
基金Funded by the Natural Science Foundation of China under Grant Nos. 60503040 and 60403027.
文摘Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.
基金supported by the National Natural Science Foundation of China(grant number 21476261)the Key Research and Development Plan Project of Shandong Province(grant number 2015GGX107004)
文摘In this work, the extractive distillation with heat integration process is extended to separate the pressure-insensitive benzene-cyclohexane azeotrope by using furfural as the entrainer. The optimal design of extractive distillation process is established to achieve minimum energy requirement using the multi-objective genetic algorithm, and the results show that energy saving for this heat integration process is 15.7%. Finally, the control design is performed to investigate the system's dynamic performance, and three control structures are studied. The pressure-compensated temperature control scheme is proposed based on the first two control structures, and the dynamic responses reveal that the feed disturbances in both flow rate and benzene composition can be mitigated well.
文摘Gas extraction is one of the main measures of control and use of gas of coal mines. At present, the design method is under the experimental period and do not satisfy the need of practice. In this paper, the theory of gas extraction of coal seams based upon Darcy law was studied. Mathematical model of gas extraction of coal seams was established and two kinds of solv- ing approaches based on computer software and linear approximation were given. The rightness and the validities of the model were examined with a practical example. Results obtained can be used to determine and optimize the parameters related etc.
基金partially supported by the Army Research Office,the National Science Foundation,Willow Garagethe Seed Funding Programme for Basic Research at the University of Hong Kong
文摘The configuration space is a fundamental concept that is widely used in algorithmic robotics. Many applications in robotics, computer-aided design, and related areas can be reduced to computational problems in terms of configuration spaces. In this paper, we survey some of our recent work on solving two important challenges related to configuration spaces: ~ how to efficiently compute an approximate representation of high-dimensional configuration spaces; and how to efficiently perform geometric proximity and motion planning queries (n high-dimensional configuration spaces. We present new configuration space construction algorithms based on machine learning and geometric approximation techniques. These algorithms perform collision queries on many configuration samples. The collision query results are used to compute an approximate representation for the configuration space, which quickly converges to the exact configuration space. We also present parallel GPU-based algorithms to accelerate the performance of optimization and search computations in configuration spaces. In particular, we design efficient GPU-based parallel k-nearest neighbor and parallel collision detection algorithms and use these algorithms to accelerate motion planning.