This paper presents a twice-gathering information interactive system prototype of e-government based on the condition that the Intranet and the Extranet are physical isolated.Users in the Extranet can gather links of ...This paper presents a twice-gathering information interactive system prototype of e-government based on the condition that the Intranet and the Extranet are physical isolated.Users in the Extranet can gather links of the latest related information from client software which is previously collected by web alert in the Internet.Finally,through ferry-type transport devices,information is browsed by users in the Intranet,and it is transported to a storage device and synchronized with the web platform in the Intranet.During information gathering in the Extranet and data synchronization in the Intranet,it is essential to avoid repeated gathering and copying by means of comparing the extracted information fingerprints gathered from the web pages.This prototype uses HashTrie to store information fingerprints.During testing,the structure based on HashTrie is 2.28 times faster than the Darts(double array Trie)which is the fastest structure in the existing applied patent.The existing 12 types of high speed Hash functions serving for HashTrie are also implemented.When the dictionary content is larger than 5×105 words,the PJWHash or the SuperFastHush function can be adopted;when the dictionary content is 105 words, CalcStrCR32 and ELFHash functions can be adopted.展开更多
To improve China's residential environment evaluation system and enhance its guiding role, current research results are analyzed and summarized from three aspects including research scales, evaluation methods and app...To improve China's residential environment evaluation system and enhance its guiding role, current research results are analyzed and summarized from three aspects including research scales, evaluation methods and applied technology by means of comparison, induction and empirical application. The guiding role of the current macro-scale evaluation system of urban planning and construction is generally not obvious, whereas the guiding role of medium and micro-scale systems to the improvement of residential environments is improving. There are diversified methods for determining the threshold values and the weights of indices in China's evaluation system. For instance, the analytic hierarchy process(AHP) method is adopted to determine the weights of indices. The advantages and disadvantages of the method are analyzed on the basis of empirical calculation. In the course of comprehensive analyses, a nonlinear model can reflect interactions among indices more than a linear model; the evaluation model under the ARCGIS platform prevails since it combines space and attribute, and it has intuitive results. So far, the methodological system of China's residential environment evaluation has not been established; its subject coverage and research category should be expanded, and its guiding role should be enhanced.展开更多
An adaptive topology learning approach is proposed to learn the topology of a practical camera network in an unsupervised way. The nodes are modeled by the Gaussian mixture model. The connectivity between nodes is jud...An adaptive topology learning approach is proposed to learn the topology of a practical camera network in an unsupervised way. The nodes are modeled by the Gaussian mixture model. The connectivity between nodes is judged by their cross-correlation function, which is also used to calculate their transition time distribution. The mutual information of the connected node pair is employed for transition probability calculation. A false link eliminating approach is proposed, along with a topology updating strategy to improve the learned topology. A real monitoring system with five disjoint cameras is built for experiments. Comparative results with traditional methods show that the proposed method is more accurate in topology learning and is more robust to environmental changes.展开更多
This paper takes refraining narratives and translators' invisibility as the theoretical base for discussing the translators' position. Translating is to reconstruct the original text, which leads to information chan...This paper takes refraining narratives and translators' invisibility as the theoretical base for discussing the translators' position. Translating is to reconstruct the original text, which leads to information changes. This change is attributed to translator's idiolect and thinking pattern as well as different languages. The translator's role is obvious in the text translation. How to be invisible? Even if invisibility is possible, the invisibility is like a moon in water, flower in fog. That is vague but invisible.展开更多
This paper presents a pure vision based technique for 3D reconstruction of planet terrain. The reconstruction accuracy depends ultimately on an optimization technique known as 'bundle adjustment'. In vision te...This paper presents a pure vision based technique for 3D reconstruction of planet terrain. The reconstruction accuracy depends ultimately on an optimization technique known as 'bundle adjustment'. In vision techniques, the translation is only known up to a scale factor, and a single scale factor is assumed for the whole sequence of images if only one camera is used. If an extra camera is available, stereo vision based reconstruction can be obtained by binocular views. If the baseline of the stereo setup is known, the scale factor problem is solved. We found that direct application of classical bundle adjustment on the constraints inherent between the binocular views has not been tested. Our method incorporated this constraint into the conventional bundle adjustment method. This special binocular bundle adjustment has been performed on image sequences similar to planet terrain circumstances. Experimental results show that our special method enhances not only the localization accuracy, but also the terrain mapping quality.展开更多
To improve prediction accuracy of strip thickness in hot rolling, a kind of Dempster/Shafer(D_S) information reconstitution prediction method(DSIRPM) was presented. DSIRPM basically consisted of three steps to impleme...To improve prediction accuracy of strip thickness in hot rolling, a kind of Dempster/Shafer(D_S) information reconstitution prediction method(DSIRPM) was presented. DSIRPM basically consisted of three steps to implement the prediction of strip thickness. Firstly, iba Analyzer was employed to analyze the periodicity of hot rolling and find three sensitive parameters to strip thickness, which were used to undertake polynomial curve fitting prediction based on least square respectively, and preliminary prediction results were obtained. Then, D_S evidence theory was used to reconstruct the prediction results under different parameters, in which basic probability assignment(BPA) was the key and the proposed contribution rate calculated using grey relational degree was regarded as BPA, which realizes BPA selection objectively. Finally, from this distribution, future strip thickness trend was inferred. Experimental results clearly show the improved prediction accuracy and stability compared with other prediction models, such as GM(1,1) and the weighted average prediction model.展开更多
A variable weight approach was proposed to handle the probability deficiency problem in the evidential reasoning (ER) approach. The probability deficiency problem indicated that the inadequate information in the ass...A variable weight approach was proposed to handle the probability deficiency problem in the evidential reasoning (ER) approach. The probability deficiency problem indicated that the inadequate information in the assessment result should be less than that in the input. However, it was proved that under certain circumstances, the ER approach could not solve the probability deficiency problem. The variable weight approach was based on two assumptions: 1) the greater weight should be given to the rule with more adequate information; 2) the greater weight should be given to the rules with less disparate information. Assessment results of two notional case studies show that 1) the probability deficiency problem is solved using the proposed variable weight approach, and 2) the information with less inadequacy and more disparity is provided for the decision makers to help reach a consensus.展开更多
In order to investigate the restoration of low resolution images, the linear and nonlinear interpolation methods were applied for the interpolation of the com- mon information matrix obtained from a series of pictures...In order to investigate the restoration of low resolution images, the linear and nonlinear interpolation methods were applied for the interpolation of the com- mon information matrix obtained from a series of pictures, getting the restructuring matrix. The characteristic block with the best restoration effect was determined by analyzing the pixel difference of the common information of each image at the same position. Then the characteristic blocks and their original blocks were used to build and train neural network. Finally, images were restored by the neural network and the differences between pictures were reduced. Experimental results showed that this method could significantly improve the efficiency and precision of algorithm.展开更多
A multiple-access networking scheme based on the new dynamic spectrum anti-jamming system is proposed in this paper. The network consists of a center node and multiple user nodes. The center node detects spectrum hole...A multiple-access networking scheme based on the new dynamic spectrum anti-jamming system is proposed in this paper. The network consists of a center node and multiple user nodes. The center node detects spectrum holes in the operation band periodically according to the user performance target. Detected spectrum holes are allocated to users who request communication. Throughput of this networking scheme is analyzed over a high-frequency(HF) interference channel. The effect of error correction coding and spectrum hole information transmission error is discussed. Throughput of this scheme and conventional frequency-hopping multiple-access(FHMA) scheme are compared. Results show that user performance increase leads to throughput decrease, which can be offset by error correction coding. If spectrum hole information transmission is in error, the throughput is not affected much as long as the bit error rate is below 10-2. Furthermore, throughput of this scheme is obviously superior to the throughput of FHMA scheme.展开更多
Aimed at solving the problems of road network object selection at any unknown scale, the existing methods on object selection are integrated and extended in this paper, and a new object interpolation method is propose...Aimed at solving the problems of road network object selection at any unknown scale, the existing methods on object selection are integrated and extended in this paper, and a new object interpolation method is proposed, which reflects the inheritable and transferable characteristics of related information among multi-scale representation objects, and takes the attribute effects into account. Then the basic idea, the overall framework and the technical flow of the interpolation are put forward, at the samet:me synthetical weight function of the interpolation method is defined and described. The method and technical strategies of object selection are extended, and the key problems are solved, including the dejign of the objective quantitative and structural selections based on the weight values, the interpolation experiment strategies and technical flows, the result of the test shows that the object interpolation method not only inherits the objects at smaller scales, but also takes the attribute effect into account when deriving objects from larger scales according to the road importance, which is a guarantee to objective selection of the road objects at middle scales.展开更多
In the paper, we apply the weak gravity conjecture to the holographic quintessence model of dark energy. Three different holographic dark energy models are considered: without the interaction in the non-fiat universe...In the paper, we apply the weak gravity conjecture to the holographic quintessence model of dark energy. Three different holographic dark energy models are considered: without the interaction in the non-fiat universe; with interaction in the fiat universe; with interaction in the non-fiat universe. We tlnd that only in the models with the spatial curvature and interaction term proportional to the energy density of matter, it is possible for the weak gravity conjecture to be satisfied. And it seems that the weak gravity conjecture favors an open universe and the decaying of matter into dark energy.展开更多
Spatial objects have two types of attributes: geometrical attributes and non-geometrical attributes, which belong to two different attribute domains (geometrical and non-geometrical domains). Although geometrically...Spatial objects have two types of attributes: geometrical attributes and non-geometrical attributes, which belong to two different attribute domains (geometrical and non-geometrical domains). Although geometrically scattered in a geometrical domain, spatial objects may be similar to each other in a non-geometrical domain. Most existing clustering algorithms group spatial datasets into different compact regions in a geometrical domain without considering the aspect of a non-geometrical domain. However, many application scenarios require clustering results in which a cluster has not only high proximity in a geometrical domain, but also high similarity in a non-geometrical domain. This means constraints are imposed on the clustering goal from both geometrical and non-geometrical domains simultaneously. Such a clustering problem is called dual clustering. As distributed clustering applications become more and more popular, it is necessary to tackle the dual clustering problem in distributed databases. The DCAD algorithm is proposed to solve this problem. DCAD consists of two levels of clustering: local clustering and global clustering. First, clustering is conducted at each local site with a local clustering algorithm, and the features of local clusters are extracted clustering is obtained based on those features fective and efficient. Second, local features from each site are sent to a central site where global Experiments on both artificial and real spatial datasets show that DCAD is effective and efficient.展开更多
It is well known that optical tomography can accurately and quantitatively reconstruct the refractive index field of a transparent medium and display the three dimensional image of other physical quantities relevant t...It is well known that optical tomography can accurately and quantitatively reconstruct the refractive index field of a transparent medium and display the three dimensional image of other physical quantities relevant to temperature or density. In this paper, a new multidirectional holographic interferometric system is built, and two kinds of image reconstruction algorithms are introduced and an automatic image processing system of interferogram is designed. A three dimentsional asymmetric gas flow field above a combustor is expertmentally investigated with holographic interferometry. The reconstructed temperatures are similar to those measured with a thermocouple.展开更多
Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documen...Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documentation information sharing. It integrated not only information resources, but also systems, technologies and funds. High quality services and effective resources sharing are the main goals of the platform construction. The paper describes briefly the principles and aims of the integration of the scitech information resources and networks. The services of the sharing platforms have been also introduced.展开更多
In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in ...In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.展开更多
基金The National Basic Research Program of China(973 Program)(No.2007CB310806)
文摘This paper presents a twice-gathering information interactive system prototype of e-government based on the condition that the Intranet and the Extranet are physical isolated.Users in the Extranet can gather links of the latest related information from client software which is previously collected by web alert in the Internet.Finally,through ferry-type transport devices,information is browsed by users in the Intranet,and it is transported to a storage device and synchronized with the web platform in the Intranet.During information gathering in the Extranet and data synchronization in the Intranet,it is essential to avoid repeated gathering and copying by means of comparing the extracted information fingerprints gathered from the web pages.This prototype uses HashTrie to store information fingerprints.During testing,the structure based on HashTrie is 2.28 times faster than the Darts(double array Trie)which is the fastest structure in the existing applied patent.The existing 12 types of high speed Hash functions serving for HashTrie are also implemented.When the dictionary content is larger than 5×105 words,the PJWHash or the SuperFastHush function can be adopted;when the dictionary content is 105 words, CalcStrCR32 and ELFHash functions can be adopted.
基金The National Key Technology R&D Program during the 11th Five-Year Plan(No.2006BAJ11B04-2)the Soft Science Project of the Ministry of Construction of China(No.2008-R2-25)
文摘To improve China's residential environment evaluation system and enhance its guiding role, current research results are analyzed and summarized from three aspects including research scales, evaluation methods and applied technology by means of comparison, induction and empirical application. The guiding role of the current macro-scale evaluation system of urban planning and construction is generally not obvious, whereas the guiding role of medium and micro-scale systems to the improvement of residential environments is improving. There are diversified methods for determining the threshold values and the weights of indices in China's evaluation system. For instance, the analytic hierarchy process(AHP) method is adopted to determine the weights of indices. The advantages and disadvantages of the method are analyzed on the basis of empirical calculation. In the course of comprehensive analyses, a nonlinear model can reflect interactions among indices more than a linear model; the evaluation model under the ARCGIS platform prevails since it combines space and attribute, and it has intuitive results. So far, the methodological system of China's residential environment evaluation has not been established; its subject coverage and research category should be expanded, and its guiding role should be enhanced.
基金The National Natural Science Foundation of China(No.60972001)the Science and Technology Plan of Suzhou City(No.SS201223)
文摘An adaptive topology learning approach is proposed to learn the topology of a practical camera network in an unsupervised way. The nodes are modeled by the Gaussian mixture model. The connectivity between nodes is judged by their cross-correlation function, which is also used to calculate their transition time distribution. The mutual information of the connected node pair is employed for transition probability calculation. A false link eliminating approach is proposed, along with a topology updating strategy to improve the learned topology. A real monitoring system with five disjoint cameras is built for experiments. Comparative results with traditional methods show that the proposed method is more accurate in topology learning and is more robust to environmental changes.
文摘This paper takes refraining narratives and translators' invisibility as the theoretical base for discussing the translators' position. Translating is to reconstruct the original text, which leads to information changes. This change is attributed to translator's idiolect and thinking pattern as well as different languages. The translator's role is obvious in the text translation. How to be invisible? Even if invisibility is possible, the invisibility is like a moon in water, flower in fog. That is vague but invisible.
基金the National Natural Science Foundation of China (Nos. 60505017 and 60534070)the Science Planning Project of Zhejiang Province, China (No. 2005C14008)
文摘This paper presents a pure vision based technique for 3D reconstruction of planet terrain. The reconstruction accuracy depends ultimately on an optimization technique known as 'bundle adjustment'. In vision techniques, the translation is only known up to a scale factor, and a single scale factor is assumed for the whole sequence of images if only one camera is used. If an extra camera is available, stereo vision based reconstruction can be obtained by binocular views. If the baseline of the stereo setup is known, the scale factor problem is solved. We found that direct application of classical bundle adjustment on the constraints inherent between the binocular views has not been tested. Our method incorporated this constraint into the conventional bundle adjustment method. This special binocular bundle adjustment has been performed on image sequences similar to planet terrain circumstances. Experimental results show that our special method enhances not only the localization accuracy, but also the terrain mapping quality.
基金Projects(61174115,51104044)supported by the National Natural Science Foundation of ChinaProject(L2010153)supported by Scientific Research Project of Liaoning Provincial Education Department,China
文摘To improve prediction accuracy of strip thickness in hot rolling, a kind of Dempster/Shafer(D_S) information reconstitution prediction method(DSIRPM) was presented. DSIRPM basically consisted of three steps to implement the prediction of strip thickness. Firstly, iba Analyzer was employed to analyze the periodicity of hot rolling and find three sensitive parameters to strip thickness, which were used to undertake polynomial curve fitting prediction based on least square respectively, and preliminary prediction results were obtained. Then, D_S evidence theory was used to reconstruct the prediction results under different parameters, in which basic probability assignment(BPA) was the key and the proposed contribution rate calculated using grey relational degree was regarded as BPA, which realizes BPA selection objectively. Finally, from this distribution, future strip thickness trend was inferred. Experimental results clearly show the improved prediction accuracy and stability compared with other prediction models, such as GM(1,1) and the weighted average prediction model.
基金Foundation item: Projects(70901074, 71001104, 71201168) supported by the National Natural Science Foundation of China
文摘A variable weight approach was proposed to handle the probability deficiency problem in the evidential reasoning (ER) approach. The probability deficiency problem indicated that the inadequate information in the assessment result should be less than that in the input. However, it was proved that under certain circumstances, the ER approach could not solve the probability deficiency problem. The variable weight approach was based on two assumptions: 1) the greater weight should be given to the rule with more adequate information; 2) the greater weight should be given to the rules with less disparate information. Assessment results of two notional case studies show that 1) the probability deficiency problem is solved using the proposed variable weight approach, and 2) the information with less inadequacy and more disparity is provided for the decision makers to help reach a consensus.
基金Supported by the Youth Fund for Science and Technology Research of Institution of Higher Education in Hebei Province in 2016(QN2016243)~~
文摘In order to investigate the restoration of low resolution images, the linear and nonlinear interpolation methods were applied for the interpolation of the com- mon information matrix obtained from a series of pictures, getting the restructuring matrix. The characteristic block with the best restoration effect was determined by analyzing the pixel difference of the common information of each image at the same position. Then the characteristic blocks and their original blocks were used to build and train neural network. Finally, images were restored by the neural network and the differences between pictures were reduced. Experimental results showed that this method could significantly improve the efficiency and precision of algorithm.
文摘A multiple-access networking scheme based on the new dynamic spectrum anti-jamming system is proposed in this paper. The network consists of a center node and multiple user nodes. The center node detects spectrum holes in the operation band periodically according to the user performance target. Detected spectrum holes are allocated to users who request communication. Throughput of this networking scheme is analyzed over a high-frequency(HF) interference channel. The effect of error correction coding and spectrum hole information transmission error is discussed. Throughput of this scheme and conventional frequency-hopping multiple-access(FHMA) scheme are compared. Results show that user performance increase leads to throughput decrease, which can be offset by error correction coding. If spectrum hole information transmission is in error, the throughput is not affected much as long as the bit error rate is below 10-2. Furthermore, throughput of this scheme is obviously superior to the throughput of FHMA scheme.
基金Supported by the National Natural Science Foundation of China (No. 40701147), the Natural Science Foundation of Beijing (No. 8102014), and the Posoctoral Science Foundation of China (Special Issue) (No. 200801096).
文摘Aimed at solving the problems of road network object selection at any unknown scale, the existing methods on object selection are integrated and extended in this paper, and a new object interpolation method is proposed, which reflects the inheritable and transferable characteristics of related information among multi-scale representation objects, and takes the attribute effects into account. Then the basic idea, the overall framework and the technical flow of the interpolation are put forward, at the samet:me synthetical weight function of the interpolation method is defined and described. The method and technical strategies of object selection are extended, and the key problems are solved, including the dejign of the objective quantitative and structural selections based on the weight values, the interpolation experiment strategies and technical flows, the result of the test shows that the object interpolation method not only inherits the objects at smaller scales, but also takes the attribute effect into account when deriving objects from larger scales according to the road importance, which is a guarantee to objective selection of the road objects at middle scales.
基金Supported by the Natural Science Foundation of the Northwest University of China under Grant No. NS0927
文摘In the paper, we apply the weak gravity conjecture to the holographic quintessence model of dark energy. Three different holographic dark energy models are considered: without the interaction in the non-fiat universe; with interaction in the fiat universe; with interaction in the non-fiat universe. We tlnd that only in the models with the spatial curvature and interaction term proportional to the energy density of matter, it is possible for the weak gravity conjecture to be satisfied. And it seems that the weak gravity conjecture favors an open universe and the decaying of matter into dark energy.
基金Funded by the National 973 Program of China (No.2003CB415205)the National Natural Science Foundation of China (No.40523005, No.60573183, No.60373019)the Open Research Fund Program of LIESMARS (No.WKL(04)0303).
文摘Spatial objects have two types of attributes: geometrical attributes and non-geometrical attributes, which belong to two different attribute domains (geometrical and non-geometrical domains). Although geometrically scattered in a geometrical domain, spatial objects may be similar to each other in a non-geometrical domain. Most existing clustering algorithms group spatial datasets into different compact regions in a geometrical domain without considering the aspect of a non-geometrical domain. However, many application scenarios require clustering results in which a cluster has not only high proximity in a geometrical domain, but also high similarity in a non-geometrical domain. This means constraints are imposed on the clustering goal from both geometrical and non-geometrical domains simultaneously. Such a clustering problem is called dual clustering. As distributed clustering applications become more and more popular, it is necessary to tackle the dual clustering problem in distributed databases. The DCAD algorithm is proposed to solve this problem. DCAD consists of two levels of clustering: local clustering and global clustering. First, clustering is conducted at each local site with a local clustering algorithm, and the features of local clusters are extracted clustering is obtained based on those features fective and efficient. Second, local features from each site are sent to a central site where global Experiments on both artificial and real spatial datasets show that DCAD is effective and efficient.
文摘It is well known that optical tomography can accurately and quantitatively reconstruct the refractive index field of a transparent medium and display the three dimensional image of other physical quantities relevant to temperature or density. In this paper, a new multidirectional holographic interferometric system is built, and two kinds of image reconstruction algorithms are introduced and an automatic image processing system of interferogram is designed. A three dimentsional asymmetric gas flow field above a combustor is expertmentally investigated with holographic interferometry. The reconstructed temperatures are similar to those measured with a thermocouple.
文摘Reorganization of network information resources for scientific and technical (scitech for abbreviation) documents and development of information infrastructure have brought a great change in China's scitech documentation information sharing. It integrated not only information resources, but also systems, technologies and funds. High quality services and effective resources sharing are the main goals of the platform construction. The paper describes briefly the principles and aims of the integration of the scitech information resources and networks. The services of the sharing platforms have been also introduced.
基金Supported by National Natural Science Foundation of China (No.90718023)National High-Tech Research and Development Program of China (No.2007AA01Z130)
文摘In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.