We derived an equation for saturation in carbonate reservoirs based on the electrical efficiency model in the case of lacking core data. Owing to the complex pore structure and strong heterogeneity in carbonate reserv...We derived an equation for saturation in carbonate reservoirs based on the electrical efficiency model in the case of lacking core data. Owing to the complex pore structure and strong heterogeneity in carbonate reservoirs, the relation between electrical efficiency and water porosity is either complex or linear. We proposed an electrical efficiency equation that accounts for the relation between electrical efficiency and water porosity. We also proposed a power-law relation between electrical efficiency and deep-formation resistivity and analyzed the factors controlling the error in the water saturation computations. We concluded that the calculation accuracy of the electrical efficiency is critical to the application of the saturation equation. The saturation equation was applied to the carbonate reservoirs of three wells in Iraq and Indonesia. For relative rock electrical efficiency error below 0.1, the water saturation absolute error is also below 0.1. Therefore, we infer that the proposed saturation equation generally satisfies the evaluation criteria for carbonate reservoirs.展开更多
Based on the output-voltage error function, a novel time discrete modulation technique is proposed for matrix converters (MCs) and time-discrete difference equations of a MC circuit are derived. Switch states of MC ...Based on the output-voltage error function, a novel time discrete modulation technique is proposed for matrix converters (MCs) and time-discrete difference equations of a MC circuit are derived. Switch states of MC are obtained when the output voltage error function is minimized, thus the optimum combination of switch states is derived for the closed-loop control of MC. Meanwhile, advantages of the least calculation workload, the simple process, and the convenient for implementation are brought while switch states are described as space vectors in the α-β coordination system. Simulation and experimental results demonstrate the validity of the time-discrete modulation technique and the feasibility of the control approach.展开更多
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight...Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed.展开更多
Sacroiliac joint malposition is one of the main causes evoking lumbocrural pain. Because its clinical symptoms are similar to those induced either by lumbar intervertebral disc protrusion or by ankylosing spondylitis ...Sacroiliac joint malposition is one of the main causes evoking lumbocrural pain. Because its clinical symptoms are similar to those induced either by lumbar intervertebral disc protrusion or by ankylosing spondylitis (AS) at the early stage, and because X-ray results taken at its early stage were not evident for differentiating the diseases,展开更多
A 13bit,pipelined analog-to-digital converter (ADC) designed to achieve high linearity is described. The high linearity is realized by using the passive capacitor error-averaging technique to calibrate the capacitor...A 13bit,pipelined analog-to-digital converter (ADC) designed to achieve high linearity is described. The high linearity is realized by using the passive capacitor error-averaging technique to calibrate the capacitor mismatch error, a gain-boosting opamp to minimize the finite gain error and gain nonlinearity,a bootstrapping switch to reduce the switch on-resistor nonlinearity, and an anti-disturb design to reduce the noise from the digital supply. This ADC is implemented in 0.18μm CMOS technology and occupies a die area of 3.2mm^2 , including pads. Measured performance includes - 0.18/ 0.15LSB of differential nonlinearity, -0.35/0.5LSB of integral nonlinearity, 75.7dB of signal-to-noise plus distortion ratio (SNDR) and 90. 5 dBc of spurious-free dynamic range (SFDR) for 2.4MHz input at 2.5MS/s. At full speed conversion (5MS/s) and for the same 2.4MHz input, the measured SNDR and SFDR are 73.7dB and 83.9 dBc, respectively. The power dissipation including output pad drivers is 21mW at 2.5MS/s and 34mW at 5MS/s,both at 2.7V supply.展开更多
Noise interfereuce and multiple access interference are the main impairment to the performance of DS/CDMA communication system. This letter presents that OverSampled Chaotic Map (OSCM) binary sequences are secure as s...Noise interfereuce and multiple access interference are the main impairment to the performance of DS/CDMA communication system. This letter presents that OverSampled Chaotic Map (OSCM) binary sequences are secure as spreading sequences, and based on the optimal quantizing method, the BER performance of the system has been derived in detail. the internal relationships among the number of users, the power of noise and the length of code chips are revealed in mathematical formulae. The performance of the system can be improved by employing these formulae. Numerical results conform the efficiency of discussion in this letter.展开更多
This paper describes the geometric and statistical properties of areal object under randomness. In order to describe formally such a uncertain topological relation, a new formal model (i.e. 4ID model) is proposed. On ...This paper describes the geometric and statistical properties of areal object under randomness. In order to describe formally such a uncertain topological relation, a new formal model (i.e. 4ID model) is proposed. On the basis of this, the effects of positional uncertainty on topological relations between areal objects are investigated in detail. Some possibility functions for the determination of relations are constructed based on the assumption that randomness of point location complies with a normal distribution, and the concept of uncertain sets of topological relations under randomness is introduced.展开更多
The relation between diffractive beam parameters and normalized frequency is analyzed that leads to two improved Tormulas for two kinds of mode-field halT-widths and several formulas for divergence angle as well as be...The relation between diffractive beam parameters and normalized frequency is analyzed that leads to two improved Tormulas for two kinds of mode-field halT-widths and several formulas for divergence angle as well as beam propagation factor. The numerical calculation indicates that the maximal relative error is less than 0.5% within a reasonable parameter range.展开更多
This paper describes a broad perspective of the application of graph theory to establishment of GPS control networks whereby the GPS network is considered as a connected and directed graph with three components.In thi...This paper describes a broad perspective of the application of graph theory to establishment of GPS control networks whereby the GPS network is considered as a connected and directed graph with three components.In this algorithm the gross error detection is undertaken through loops of different spanning trees using the "Loop Law" in which the individual components Δ X, Δ Y and Δ Z sum up to zero.If the sum of the respective vector components ∑X,∑Y and ∑Z in a loop is not zero and if the error is beyond the tolerable limit (ε>w),it indicates the existence of gross errors in one of the baselines in the loop and therefore the baseline must be removed or re_observed.After successful screening of errors by graph theory,network adjustment can be carried out.In this paper,the GPS data from the control network established as reference system for the HP Dam at Baishan county in Liaoning province is presented to illustrate the algorithm.展开更多
In order to suppress the multiple access interference (MAI) in 3G, which limits the capacity of a CDMA communication system, a fast relevance vector machine (FRVM) is employed in the multiuser detection (MUD) scheme. ...In order to suppress the multiple access interference (MAI) in 3G, which limits the capacity of a CDMA communication system, a fast relevance vector machine (FRVM) is employed in the multiuser detection (MUD) scheme. This method aims to overcome the shortcomings of many ordinary support vector machine (SVM) based MUD schemes, such as the long training time and the inaccuracy of the decision data, and enhance the performance of a CDMA communication system. Computer simulation results demonstrate that the proposed FRVM based multiuser detection has lower bit error rate, costs short training time, needs fewer kernel functions and possesses better near-far resistance.展开更多
Delay to large scale projects, which is as a result of actions or inactions of some project stakeholders, is becoming a global phenomena and Ghana is no exception. The objective of the research is to identify, rate an...Delay to large scale projects, which is as a result of actions or inactions of some project stakeholders, is becoming a global phenomena and Ghana is no exception. The objective of the research is to identify, rate and rank the most significant risk factors that causes delay on projects and examine the social impact of these delays to recommend modalities to help mitigate these risk factors. The study adopted quantitative methods with the distribution of 144 questionnaires to built environment professionals receiving a response rate of 75.7%. The instrument listed 58 common factors under eight categories that contribute to the causes of delay for respondents to rate. Analysis of data non-parametric test revealed that client, contractor, material and finance category factors significantly resulted in the schedule delay of large infrastructural projects. The survey analysis revealed that micro-factors that result in delays to large construction projects are time constraint, cost overrun, payment problems, dispute and litigation. The research recommended the following modalities to minimize such delays: availability of resources, improved communication and coordination, proper scope definition and feasibilities, utilization of modern technology, appropriate application of technologically based systems and competent project management's structures.展开更多
In order to effectively decrease the safety accidents caused by coal miners’human errors,this paper probes into the causality between human errors and life events,coping,psychological stress,psychological function,ph...In order to effectively decrease the safety accidents caused by coal miners’human errors,this paper probes into the causality between human errors and life events,coping,psychological stress,psychological function,physiological function based on life events’vital influence on human errors,establishing causation mechanism model of coal miners’human errors in the perspective of life events by the researching method of structural equation.The research findings show that life events have significantly positive influence on human errors,with a influential effect value of 0.7945 and a influential effect path of‘‘life events—psychological stress—psychological function—physiological function—human errors’’and‘‘life events—psychological stress—physiological function—human errors’’.展开更多
In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properti...In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity.展开更多
基金supported by the National Science and Technology Major Project(2011ZX05030)
文摘We derived an equation for saturation in carbonate reservoirs based on the electrical efficiency model in the case of lacking core data. Owing to the complex pore structure and strong heterogeneity in carbonate reservoirs, the relation between electrical efficiency and water porosity is either complex or linear. We proposed an electrical efficiency equation that accounts for the relation between electrical efficiency and water porosity. We also proposed a power-law relation between electrical efficiency and deep-formation resistivity and analyzed the factors controlling the error in the water saturation computations. We concluded that the calculation accuracy of the electrical efficiency is critical to the application of the saturation equation. The saturation equation was applied to the carbonate reservoirs of three wells in Iraq and Indonesia. For relative rock electrical efficiency error below 0.1, the water saturation absolute error is also below 0.1. Therefore, we infer that the proposed saturation equation generally satisfies the evaluation criteria for carbonate reservoirs.
文摘Based on the output-voltage error function, a novel time discrete modulation technique is proposed for matrix converters (MCs) and time-discrete difference equations of a MC circuit are derived. Switch states of MC are obtained when the output voltage error function is minimized, thus the optimum combination of switch states is derived for the closed-loop control of MC. Meanwhile, advantages of the least calculation workload, the simple process, and the convenient for implementation are brought while switch states are described as space vectors in the α-β coordination system. Simulation and experimental results demonstrate the validity of the time-discrete modulation technique and the feasibility of the control approach.
文摘Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed.
文摘Sacroiliac joint malposition is one of the main causes evoking lumbocrural pain. Because its clinical symptoms are similar to those induced either by lumbar intervertebral disc protrusion or by ankylosing spondylitis (AS) at the early stage, and because X-ray results taken at its early stage were not evident for differentiating the diseases,
文摘A 13bit,pipelined analog-to-digital converter (ADC) designed to achieve high linearity is described. The high linearity is realized by using the passive capacitor error-averaging technique to calibrate the capacitor mismatch error, a gain-boosting opamp to minimize the finite gain error and gain nonlinearity,a bootstrapping switch to reduce the switch on-resistor nonlinearity, and an anti-disturb design to reduce the noise from the digital supply. This ADC is implemented in 0.18μm CMOS technology and occupies a die area of 3.2mm^2 , including pads. Measured performance includes - 0.18/ 0.15LSB of differential nonlinearity, -0.35/0.5LSB of integral nonlinearity, 75.7dB of signal-to-noise plus distortion ratio (SNDR) and 90. 5 dBc of spurious-free dynamic range (SFDR) for 2.4MHz input at 2.5MS/s. At full speed conversion (5MS/s) and for the same 2.4MHz input, the measured SNDR and SFDR are 73.7dB and 83.9 dBc, respectively. The power dissipation including output pad drivers is 21mW at 2.5MS/s and 34mW at 5MS/s,both at 2.7V supply.
文摘Noise interfereuce and multiple access interference are the main impairment to the performance of DS/CDMA communication system. This letter presents that OverSampled Chaotic Map (OSCM) binary sequences are secure as spreading sequences, and based on the optimal quantizing method, the BER performance of the system has been derived in detail. the internal relationships among the number of users, the power of noise and the length of code chips are revealed in mathematical formulae. The performance of the system can be improved by employing these formulae. Numerical results conform the efficiency of discussion in this letter.
文摘This paper describes the geometric and statistical properties of areal object under randomness. In order to describe formally such a uncertain topological relation, a new formal model (i.e. 4ID model) is proposed. On the basis of this, the effects of positional uncertainty on topological relations between areal objects are investigated in detail. Some possibility functions for the determination of relations are constructed based on the assumption that randomness of point location complies with a normal distribution, and the concept of uncertain sets of topological relations under randomness is introduced.
基金Supported by the Program of Fujian Education Department under Grant No. JB09069the Natural Science Fund of Fujian Province under Grant No. 2009J01275
文摘The relation between diffractive beam parameters and normalized frequency is analyzed that leads to two improved Tormulas for two kinds of mode-field halT-widths and several formulas for divergence angle as well as beam propagation factor. The numerical calculation indicates that the maximal relative error is less than 0.5% within a reasonable parameter range.
文摘This paper describes a broad perspective of the application of graph theory to establishment of GPS control networks whereby the GPS network is considered as a connected and directed graph with three components.In this algorithm the gross error detection is undertaken through loops of different spanning trees using the "Loop Law" in which the individual components Δ X, Δ Y and Δ Z sum up to zero.If the sum of the respective vector components ∑X,∑Y and ∑Z in a loop is not zero and if the error is beyond the tolerable limit (ε>w),it indicates the existence of gross errors in one of the baselines in the loop and therefore the baseline must be removed or re_observed.After successful screening of errors by graph theory,network adjustment can be carried out.In this paper,the GPS data from the control network established as reference system for the HP Dam at Baishan county in Liaoning province is presented to illustrate the algorithm.
文摘In order to suppress the multiple access interference (MAI) in 3G, which limits the capacity of a CDMA communication system, a fast relevance vector machine (FRVM) is employed in the multiuser detection (MUD) scheme. This method aims to overcome the shortcomings of many ordinary support vector machine (SVM) based MUD schemes, such as the long training time and the inaccuracy of the decision data, and enhance the performance of a CDMA communication system. Computer simulation results demonstrate that the proposed FRVM based multiuser detection has lower bit error rate, costs short training time, needs fewer kernel functions and possesses better near-far resistance.
文摘Delay to large scale projects, which is as a result of actions or inactions of some project stakeholders, is becoming a global phenomena and Ghana is no exception. The objective of the research is to identify, rate and rank the most significant risk factors that causes delay on projects and examine the social impact of these delays to recommend modalities to help mitigate these risk factors. The study adopted quantitative methods with the distribution of 144 questionnaires to built environment professionals receiving a response rate of 75.7%. The instrument listed 58 common factors under eight categories that contribute to the causes of delay for respondents to rate. Analysis of data non-parametric test revealed that client, contractor, material and finance category factors significantly resulted in the schedule delay of large infrastructural projects. The survey analysis revealed that micro-factors that result in delays to large construction projects are time constraint, cost overrun, payment problems, dispute and litigation. The research recommended the following modalities to minimize such delays: availability of resources, improved communication and coordination, proper scope definition and feasibilities, utilization of modern technology, appropriate application of technologically based systems and competent project management's structures.
基金supported by the National Natural Science Foundation of China (No. 71271206)
文摘In order to effectively decrease the safety accidents caused by coal miners’human errors,this paper probes into the causality between human errors and life events,coping,psychological stress,psychological function,physiological function based on life events’vital influence on human errors,establishing causation mechanism model of coal miners’human errors in the perspective of life events by the researching method of structural equation.The research findings show that life events have significantly positive influence on human errors,with a influential effect value of 0.7945 and a influential effect path of‘‘life events—psychological stress—psychological function—physiological function—human errors’’and‘‘life events—psychological stress—physiological function—human errors’’.
基金supported by the National Basic Research Program of China under Grant 2013CB329003the National Natural Science Founda-tion General Program of China under Grant 61171110
文摘In this paper, a weighted fractional Fourier transform(WFRFT) based cooperative overlay system, aiming to guarantee physical layer(PHY) security, is proposed. The paper elaborates how WFRFT and physical layer properties of the wireless medium are collaborated to guarantee the secrecy of wireless transmissions. In the proposed system, WFRFT is first preform on the secret data, such that the transmitted signal is distorted and can only be neutralized by inverse-WFRFT with the same parameter. And then two streams of the transformed sequences that bearing different messages are cooperatively and simultaneously transmitted to two legitimate receivers via a beamforming-liked method, respectively. In general, both the rapid spatial decorrelation property and the inherent security features of WFRFT are leveraged, such that only the eavesdropper's is degraded, and hence, the wireless communication secrecy is reliably guaranteed. Numerical simulations are conducted to evaluate the performance of the proposed system in terms of the average bit error rate and the secrecy capacity.