To improve the performance of the short interleaved serial concatenated convolutional code(SCCC) with low decoding iterative times, the structure of Log MAP algorithm is introduced into the conventional SOVA decoder...To improve the performance of the short interleaved serial concatenated convolutional code(SCCC) with low decoding iterative times, the structure of Log MAP algorithm is introduced into the conventional SOVA decoder to improve its performance at short interleaving delay. The combination of Log MAP and SOVA avoids updating the matrices of the maximum path, and also makes a contribution to the requirement of short delay. The simulation results of several SCCCs show that the improved decoder can obtain satisfied performance with short frame interleaver and it is suitable to the high bit rate low delay communication systems.展开更多
A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communic...A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communication and migration of software components, a power consumption model of component assignments between a mobile device and a server is set up. Also, the mobility of components and the mobility relationships between components are taken into account in software allocation. By using network flow theory, the optimization problem of power conservation is transformed into the optimal bipartition problem of a flow network which can be partitioned by the max-flow rain-cut algorithm. Simulation results show that the proposed algorithm can save si^nificantlv more energy than existing algorithms.展开更多
Due to not requiring channel state information (CSI) at both the transmitter and the receiver, noncoherent ultra-wideband (UWB) incurs a performance penalty of approximately 3 dB in the required signal to noise ra...Due to not requiring channel state information (CSI) at both the transmitter and the receiver, noncoherent ultra-wideband (UWB) incurs a performance penalty of approximately 3 dB in the required signal to noise ratio (SNR) compared to the coherent case. To overcome the gap, an effective differential encoding and decoding scheme for multiband UWB systems is proposed. The proposed scheme employs the parallel concatenation of two recursive differential unitary space-frequency encoders at the transmitter. At the receiver, two component decoders iteratively decode information bits by interchanging soft metric values between each other. To reduce the computation complexity, a decoding algorithm which only uses transition probability to calculate the log likelihood ratios (LLRs) for the decoded bits is given. Simulation results show that the proposed scheme can dramatically outperform the conventional differential and even coherent detection at high SNR with a few iterations.展开更多
A new method of constructing regular low-density parity-check (LDPC) codes was proposed. And the novel class of LDPC codes was applied in a coded orthogonal frequency division multiplexing (OFDM) system. This method e...A new method of constructing regular low-density parity-check (LDPC) codes was proposed. And the novel class of LDPC codes was applied in a coded orthogonal frequency division multiplexing (OFDM) system. This method extended the class of LDPC codes which could be constructed from shifted identity matrices. The method could avoid short cycles in Tanner graphs with simple inequation in the construction of shifting identity matrices, which made the girth of Tanner graphs 8. Because of the quasicyclic structure and the inherent block configuration of parity-check matrices, the encoders and the decoders were practically feasible. They were linear-time encodable and decodable. The LDPC codes proposed had various code rates, ranging from low to high. They performed excellently with iterative decoding and demonstrate better performance than other regular LDPC codes in OFDM systems.展开更多
In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-...In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-hunter. First, a large set of malicious function samples normally used in web shells are collected from various sources on the Internet and security forums. Secondly, according to the danger level and the frequency of using these malicious functions in the web shells as well as in legal web applications, an assigning score strategy for each malicious sample is devised. Then, the appropriate score threshold value for each sample is obtained from the results of a statistical analysis. Finally, based on the threshold value, a simple algorithm is presented to identify files that contain web shells in web applications. The experimental results show that compared with other approaches, Evil-hunter can identify web shells more efficiently and accurately.展开更多
Over-shadowed by eye-catching vocal and visual signals, chemical communication has long been overlooked in birds. This study aimed at exploring whether volatile composition of the uropygial gland secretion (UGS) of ...Over-shadowed by eye-catching vocal and visual signals, chemical communication has long been overlooked in birds. This study aimed at exploring whether volatile composition of the uropygial gland secretion (UGS) of birds was associated with the information about sex, individual and species. By using dichloromethane extraction and gas chromatography-mass spectrometry (GC-MS), we analyzed the UGS volatiles of domesticated Bengalese finches ( Lonchura striata, Estrildiea) which is also known as white-rumped munias. We characterized 16 volatile molecules from the UGS, including eight n-alkanols, five diesters, an ester, an aldehyde and a fatty acid, and quantified them in terms of GC peak area percentages (relative abundances) . Among these compounds, hexadecanol and octadecanol were major components in both sexes. The former was richer in males than in females and the latter richer in females than in males, suggesting that they might be male and female pheromone candidates, respectively. The high inter-individual variations, in relative abundance, of the UGS volatiles implied that these compounds might carry information about individuality. The similarity between GC profiles of the UGS and wing feather from same individuals indicates that the birds might preen the secretion to their feathers to transmit chemical cues. Additionally, by comparing with three sympatric passerine species, i. e., zebra finches Taeniopygia guttata, yellow-bowed buntings Emberiza chrysophrys and rooks Corvus frugilegus, we found that the composition of C13 - C18 alkanols in the UGS might code for information about species. Our study also showed that quantitative differences (degree) of same UGS volatiles might be the key for the Bengalese finch to code for information about sex and individuality whereas both the kind and degree of UGS constituents could be utilized to code for information about species [ Current Zoology 55 (5): 357-365, 2009].展开更多
To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o...To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem.展开更多
Permeability is a vital property of rock mass, which is highly affected by tectonic stress and human engineering activities. A comprehensive monitoring of pore pressure and flow rate distributions inside the rock mass...Permeability is a vital property of rock mass, which is highly affected by tectonic stress and human engineering activities. A comprehensive monitoring of pore pressure and flow rate distributions inside the rock mass is very important to elucidate the permeability evolution mechanisms, which is difficult to realize in laboratory, but easy to be achieved in numerical simulations. Therefore, the particle flow code (PFC), a discrete element method, is used to simulate permeability behaviors of rock materials in this study. Owe to the limitation of the existed solid-fluid coupling algorithm in PFC, an improved flow-coupling algorithm is presented to better reflect the preferential flow in rock fractures. The comparative analysis is conducted between original and improved algorithm when simulating rock permeability evolution during triaxial compression, showing that the improved algorithm can better describe the experimental phenomenon. Furthermore, the evolution of pore pressure and flow rate distribution during the flow process are analyzed by using the improved algorithm. It is concluded that during the steady flow process in the fractured specimen, the pore pressure and flow rate both prefer transmitting through the fractures rather than rock matrix. Based on the results, fractures are divided into the following three types: I) fractures link to both the inlet and outlet, II) fractures only link to the inlet, and III) fractures only link to the outlet. The type I fracture is always the preferential propagating path for both the pore pressure and flow rate. For type II fractures, the pore pressure increases and then becomes steady. However, the flow rate increases first and begins to decrease after the flow reaches the stop end of the fracture and finally vanishes. There is no obvious pore pressure or flow rate concentration within type III fractures.展开更多
Code review is an important process to reduce code defects and improve software quality. In social coding communities like GitHub, as everyone can submit Pull-Requests, code review plays a more important role than eve...Code review is an important process to reduce code defects and improve software quality. In social coding communities like GitHub, as everyone can submit Pull-Requests, code review plays a more important role than ever before, and the process is quite time-consuming. Therefore, finding and recommending proper reviewers for the emerging Pull-Requests becomes a vital task. However, most of the current studies mainly focus on recommending reviewers by checking whether they will participate or not without differentiating the participation types. In this paper, we develop a two-layer reviewer recommendation model to recommend reviewers for Pull-Requests (PRs) in GitHub projects from the technical and managerial perspectives. For the first layer, we recommend suitable developers to review the target PRs based on a hybrid recommendation method. For the second layer, after getting the recommendation results from the first layer, we specify whether the target developer will technically or managerially participate in the reviewing process. We conducted experiments on two popular projects in GitHub, and tested the approach using PRs created between February 2016 and February 2017. The results show that the first layer of our recommendation model performs better than the previous work, and the second layer can effectively differentiate the types of participation.展开更多
The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and ...The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and surface tensions of the mixtures decreased monotonously with increasing temperatures and increasing ionic liquid (IL) molar fraction. IL with longer alkyl side-chain length brings a lower density and a smaller surface tension to the ILs/H2SO4 binary mixtures. The densities and surface tensions of the mixtures are fitted well by Jouyban-Acree (JAM) model and LWW model respectively. Redlich-Kister (R-K)equation and modified Redlich-Kister (R-K) equation describe the excess molar volumes and excess surface tensions of the mixtures well respectively. Adding a small amount of ILs (XIL 〈 0.1 ) into sulfuric acid brings an obvious decrease to the density and the surface tension. The results imply that the densities and surface tensions of IL5/H2SO4 binary mixtures can be modulated by changing the IL dosage or tailoring the IL structure.展开更多
Use of compressed mesh in parallel rendering architecture is still an unexplored area, the main challenge of which is to partition and sort the encoded mesh in compression-domain. This paper presents a mesh compressio...Use of compressed mesh in parallel rendering architecture is still an unexplored area, the main challenge of which is to partition and sort the encoded mesh in compression-domain. This paper presents a mesh compression scheme PRMC (Parallel Rendering based Mesh Compression) supplying encoded meshes that can be partitioned and sorted in parallel rendering system even in encoded-domain. First, we segment the mesh into submeshes and clip the submeshes’ boundary into Runs, and then piecewise compress the submeshes and Runs respectively. With the help of several auxiliary index tables, compressed submeshes and Runs can serve as rendering primitives in parallel rendering system. Based on PRMC, we design and implement a parallel rendering architecture. Compared with uncompressed representation, experimental results showed that PRMC meshes applied in cluster parallel rendering system can dramatically reduce the communication requirement.展开更多
Liquid sloshing is a type of free surface flow inside a partially filled water tank.Sloshing exerts a significant effect on the safety of liquid transport systems;in particular,it may cause large hydrodynamic loads wh...Liquid sloshing is a type of free surface flow inside a partially filled water tank.Sloshing exerts a significant effect on the safety of liquid transport systems;in particular,it may cause large hydrodynamic loads when the frequency of the tank motion is close to the natural frequency of the tank.Perforated plates have recently been used to suppress the violent movement of liquids in a sloshing tank at resonant conditions.In this study,a numerical model based on OpenF OAM(Open Source Field Operation and Manipulation),an open source computed fluid dynamic code,is used to investigate resonant sloshing in a swaying tank with a submerged horizontal perforated plate.The numerical results of the free surface elevations are first verified using experimental data,and then the flow characteristics around the perforated plate and the fluid velocity distribution in the entire tank are examined using numerical examples.The results clearly show differences in sloshing motions under first-order and third-order resonant frequencies.This study provides a better understanding of the energy dissipation mechanism of a horizontal perforated plate in a swaying tank.展开更多
Polar codes have become increasingly popular recently because of their capacity achieving property.In this paper,a memory efficient stage-combined belief propagation(BP) decoder design for polar codes is presented.Fir...Polar codes have become increasingly popular recently because of their capacity achieving property.In this paper,a memory efficient stage-combined belief propagation(BP) decoder design for polar codes is presented.Firstly,we briefly reviewed the conventional BP decoding algorithm.Then a stage-combined BP decoding algorithm which combines two adjacent stages into one stage and the corresponding belief message updating rules are introduced.Based on this stage-combined decoding algorithm,a memory-efficient polar BP decoder is designed.The demonstrated decoder design achieves 50%memory and decoding latency reduction in the cost of some combinational logic complexity overhead.The proposed decoder is synthesized under TSMC 45 nm Low Power CMOS technology.It achieves 0.96 Gb/s throughput with 14.2mm^2 area when code length N=2^(16)which reduces 51.5%decoder area compared with the conventional decoder design.展开更多
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ...with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.展开更多
A novel method is proposed to analyze the capacity of future Code Division Multiple Access (CDMA) systems carrying multimedia services. The power level allocation is firstly investigated to meet each call's Bit Err...A novel method is proposed to analyze the capacity of future Code Division Multiple Access (CDMA) systems carrying multimedia services. The power level allocation is firstly investigated to meet each call's Bit Error Rate (BER) requirement, then the system capacity is defined from the conditions lbr the existence of the physical meaning of these power levels. Simulation results have shown that the capacity analyzing methods can be well used in the performance evaluation of the system accommodating heterogeneous services and the spectral efficiency of this scheme is higher than the existing ones.展开更多
A panel method is described for calculating potential flow around near-surface submarines. The method uses Havelock sources which automatically satisfy the linearized free-surface boundary condition. Outputs from the ...A panel method is described for calculating potential flow around near-surface submarines. The method uses Havelock sources which automatically satisfy the linearized free-surface boundary condition. Outputs from the method include pressure field, pressure drag, wave resistance, vertical force, trim moment and wave pattern. Comparisons are made with model tests for wave resistance of Series 58 and DARPA SUBOFF hulls, as well as with wave resistance, lift force and trim moment of three length-to-diameter variants of the DSTO Joubert submarine hull. It is found that the Havelock source panel method is capable of determining with reasonable accuracy wave resistance, vertical force and trim moment for submarine hulls. Further experimental data are required in order to assess the accuracy of the method for pressure field and wave pattern prediction. The method is implemented in the computer code“HullWave”and offers potential advantages over RANS-CFD codes in terms of speed, simplicity and robustness.展开更多
文摘To improve the performance of the short interleaved serial concatenated convolutional code(SCCC) with low decoding iterative times, the structure of Log MAP algorithm is introduced into the conventional SOVA decoder to improve its performance at short interleaving delay. The combination of Log MAP and SOVA avoids updating the matrices of the maximum path, and also makes a contribution to the requirement of short delay. The simulation results of several SCCCs show that the improved decoder can obtain satisfied performance with short frame interleaver and it is suitable to the high bit rate low delay communication systems.
基金The National Natural Science Foundation of China(No60503041)the Science and Technology Commission of ShanghaiInternational Cooperation Project (No05SN07114)
文摘A novel dynamic software allocation algorithm suitable for pervasive computing environments is proposed to minimize power consumption of mobile devices. Considering the power cost incurred by the computation, communication and migration of software components, a power consumption model of component assignments between a mobile device and a server is set up. Also, the mobility of components and the mobility relationships between components are taken into account in software allocation. By using network flow theory, the optimization problem of power conservation is transformed into the optimal bipartition problem of a flow network which can be partitioned by the max-flow rain-cut algorithm. Simulation results show that the proposed algorithm can save si^nificantlv more energy than existing algorithms.
基金The Higher Education Technology Foundation of Huawei Technologies Co, Ltd (NoYJCB2005016WL)
文摘Due to not requiring channel state information (CSI) at both the transmitter and the receiver, noncoherent ultra-wideband (UWB) incurs a performance penalty of approximately 3 dB in the required signal to noise ratio (SNR) compared to the coherent case. To overcome the gap, an effective differential encoding and decoding scheme for multiband UWB systems is proposed. The proposed scheme employs the parallel concatenation of two recursive differential unitary space-frequency encoders at the transmitter. At the receiver, two component decoders iteratively decode information bits by interchanging soft metric values between each other. To reduce the computation complexity, a decoding algorithm which only uses transition probability to calculate the log likelihood ratios (LLRs) for the decoded bits is given. Simulation results show that the proposed scheme can dramatically outperform the conventional differential and even coherent detection at high SNR with a few iterations.
文摘A new method of constructing regular low-density parity-check (LDPC) codes was proposed. And the novel class of LDPC codes was applied in a coded orthogonal frequency division multiplexing (OFDM) system. This method extended the class of LDPC codes which could be constructed from shifted identity matrices. The method could avoid short cycles in Tanner graphs with simple inequation in the construction of shifting identity matrices, which made the girth of Tanner graphs 8. Because of the quasicyclic structure and the inherent block configuration of parity-check matrices, the encoders and the decoders were practically feasible. They were linear-time encodable and decodable. The LDPC codes proposed had various code rates, ranging from low to high. They performed excellently with iterative decoding and demonstrate better performance than other regular LDPC codes in OFDM systems.
基金The Science and Technology Support Program of Jiangsu Province(No.BE2011173)the Future Network Proactive Program of Jiangsu Province(No.BY2013095-5-03)the Program for Special Talent in Six Fields of Jiangsu Province(No.2011-DZ024)
文摘In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-hunter. First, a large set of malicious function samples normally used in web shells are collected from various sources on the Internet and security forums. Secondly, according to the danger level and the frequency of using these malicious functions in the web shells as well as in legal web applications, an assigning score strategy for each malicious sample is devised. Then, the appropriate score threshold value for each sample is obtained from the results of a statistical analysis. Finally, based on the threshold value, a simple algorithm is presented to identify files that contain web shells in web applications. The experimental results show that compared with other approaches, Evil-hunter can identify web shells more efficiently and accurately.
基金supported by grants from Chinese NSF(No.30870297to J.X.ZNo.30370196to M.X.Z.)International Partnership Project of CAS(CXTD2005-4to L.S and J.X.Z)
文摘Over-shadowed by eye-catching vocal and visual signals, chemical communication has long been overlooked in birds. This study aimed at exploring whether volatile composition of the uropygial gland secretion (UGS) of birds was associated with the information about sex, individual and species. By using dichloromethane extraction and gas chromatography-mass spectrometry (GC-MS), we analyzed the UGS volatiles of domesticated Bengalese finches ( Lonchura striata, Estrildiea) which is also known as white-rumped munias. We characterized 16 volatile molecules from the UGS, including eight n-alkanols, five diesters, an ester, an aldehyde and a fatty acid, and quantified them in terms of GC peak area percentages (relative abundances) . Among these compounds, hexadecanol and octadecanol were major components in both sexes. The former was richer in males than in females and the latter richer in females than in males, suggesting that they might be male and female pheromone candidates, respectively. The high inter-individual variations, in relative abundance, of the UGS volatiles implied that these compounds might carry information about individuality. The similarity between GC profiles of the UGS and wing feather from same individuals indicates that the birds might preen the secretion to their feathers to transmit chemical cues. Additionally, by comparing with three sympatric passerine species, i. e., zebra finches Taeniopygia guttata, yellow-bowed buntings Emberiza chrysophrys and rooks Corvus frugilegus, we found that the composition of C13 - C18 alkanols in the UGS might code for information about species. Our study also showed that quantitative differences (degree) of same UGS volatiles might be the key for the Bengalese finch to code for information about sex and individuality whereas both the kind and degree of UGS constituents could be utilized to code for information about species [ Current Zoology 55 (5): 357-365, 2009].
基金The National Natural Science Foundation of China(No.60473028)the Natural Science Foundation of Zhengzhou University of Light Industry(No.2006XXJ18)the Doctor Foundation of Zhengzhou University of Light Industry(No.20080014)
文摘To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem.
基金Project(BK20150005) supported by the Natural Science Foundation of Jiangsu Province for Distinguished Young Scholars, China Project(2015XKZD05) supported by the Fundamental Research Funds for the Central Universities, China
文摘Permeability is a vital property of rock mass, which is highly affected by tectonic stress and human engineering activities. A comprehensive monitoring of pore pressure and flow rate distributions inside the rock mass is very important to elucidate the permeability evolution mechanisms, which is difficult to realize in laboratory, but easy to be achieved in numerical simulations. Therefore, the particle flow code (PFC), a discrete element method, is used to simulate permeability behaviors of rock materials in this study. Owe to the limitation of the existed solid-fluid coupling algorithm in PFC, an improved flow-coupling algorithm is presented to better reflect the preferential flow in rock fractures. The comparative analysis is conducted between original and improved algorithm when simulating rock permeability evolution during triaxial compression, showing that the improved algorithm can better describe the experimental phenomenon. Furthermore, the evolution of pore pressure and flow rate distribution during the flow process are analyzed by using the improved algorithm. It is concluded that during the steady flow process in the fractured specimen, the pore pressure and flow rate both prefer transmitting through the fractures rather than rock matrix. Based on the results, fractures are divided into the following three types: I) fractures link to both the inlet and outlet, II) fractures only link to the inlet, and III) fractures only link to the outlet. The type I fracture is always the preferential propagating path for both the pore pressure and flow rate. For type II fractures, the pore pressure increases and then becomes steady. However, the flow rate increases first and begins to decrease after the flow reaches the stop end of the fracture and finally vanishes. There is no obvious pore pressure or flow rate concentration within type III fractures.
基金Project(2016-YFB1000805)supported by the National Grand R&D Plan,ChinaProjects(61502512,61432020,61472430,61532004)supported by the National Natural Science Foundation of China
文摘Code review is an important process to reduce code defects and improve software quality. In social coding communities like GitHub, as everyone can submit Pull-Requests, code review plays a more important role than ever before, and the process is quite time-consuming. Therefore, finding and recommending proper reviewers for the emerging Pull-Requests becomes a vital task. However, most of the current studies mainly focus on recommending reviewers by checking whether they will participate or not without differentiating the participation types. In this paper, we develop a two-layer reviewer recommendation model to recommend reviewers for Pull-Requests (PRs) in GitHub projects from the technical and managerial perspectives. For the first layer, we recommend suitable developers to review the target PRs based on a hybrid recommendation method. For the second layer, after getting the recommendation results from the first layer, we specify whether the target developer will technically or managerially participate in the reviewing process. We conducted experiments on two popular projects in GitHub, and tested the approach using PRs created between February 2016 and February 2017. The results show that the first layer of our recommendation model performs better than the previous work, and the second layer can effectively differentiate the types of participation.
基金Supported by the National Natural Science Foundation of China(21576168,21276163)
文摘The densities and surface tensions of [Bmim][TFO]/H2SO4, [Hmim][TFO]/H2SO4 and [Omim][TFO]/H2SO4 binary mixtures were measured by pycnometer and Wilhelmy plate method respectively. The results show that densities and surface tensions of the mixtures decreased monotonously with increasing temperatures and increasing ionic liquid (IL) molar fraction. IL with longer alkyl side-chain length brings a lower density and a smaller surface tension to the ILs/H2SO4 binary mixtures. The densities and surface tensions of the mixtures are fitted well by Jouyban-Acree (JAM) model and LWW model respectively. Redlich-Kister (R-K)equation and modified Redlich-Kister (R-K) equation describe the excess molar volumes and excess surface tensions of the mixtures well respectively. Adding a small amount of ILs (XIL 〈 0.1 ) into sulfuric acid brings an obvious decrease to the density and the surface tension. The results imply that the densities and surface tensions of IL5/H2SO4 binary mixtures can be modulated by changing the IL dosage or tailoring the IL structure.
基金Project supported by the National Basic Research Program (973) of China (No. 2002CB312105), the National Natural Science Founda-tion of China (No. 60573074), the Natural Science Foundation of Shanxi Province, China (No. 20041040), Shanxi Foundation of Tackling Key Problem in Science and Technology (No. 051129), and Key NSFC Project of "Digital Olympic Museum" (No. 60533080), China
文摘Use of compressed mesh in parallel rendering architecture is still an unexplored area, the main challenge of which is to partition and sort the encoded mesh in compression-domain. This paper presents a mesh compression scheme PRMC (Parallel Rendering based Mesh Compression) supplying encoded meshes that can be partitioned and sorted in parallel rendering system even in encoded-domain. First, we segment the mesh into submeshes and clip the submeshes’ boundary into Runs, and then piecewise compress the submeshes and Runs respectively. With the help of several auxiliary index tables, compressed submeshes and Runs can serve as rendering primitives in parallel rendering system. Based on PRMC, we design and implement a parallel rendering architecture. Compared with uncompressed representation, experimental results showed that PRMC meshes applied in cluster parallel rendering system can dramatically reduce the communication requirement.
基金supported by the National Natural Science Foundation of China(Nos.51490675,51322903,and 51279224)
文摘Liquid sloshing is a type of free surface flow inside a partially filled water tank.Sloshing exerts a significant effect on the safety of liquid transport systems;in particular,it may cause large hydrodynamic loads when the frequency of the tank motion is close to the natural frequency of the tank.Perforated plates have recently been used to suppress the violent movement of liquids in a sloshing tank at resonant conditions.In this study,a numerical model based on OpenF OAM(Open Source Field Operation and Manipulation),an open source computed fluid dynamic code,is used to investigate resonant sloshing in a swaying tank with a submerged horizontal perforated plate.The numerical results of the free surface elevations are first verified using experimental data,and then the flow characteristics around the perforated plate and the fluid velocity distribution in the entire tank are examined using numerical examples.The results clearly show differences in sloshing motions under first-order and third-order resonant frequencies.This study provides a better understanding of the energy dissipation mechanism of a horizontal perforated plate in a swaying tank.
基金jointly supported by the National Nature Science Foundation of China under Grant No.61370040 and 61006018the Fundamental Research Funds for the Central Universities+1 种基金the Priority Academic Program Development of Jiangsu Higher Education InstitutionsOpen Project of State Key Laboratory of ASIC & System(Fudan University)12KF006
文摘Polar codes have become increasingly popular recently because of their capacity achieving property.In this paper,a memory efficient stage-combined belief propagation(BP) decoder design for polar codes is presented.Firstly,we briefly reviewed the conventional BP decoding algorithm.Then a stage-combined BP decoding algorithm which combines two adjacent stages into one stage and the corresponding belief message updating rules are introduced.Based on this stage-combined decoding algorithm,a memory-efficient polar BP decoder is designed.The demonstrated decoder design achieves 50%memory and decoding latency reduction in the cost of some combinational logic complexity overhead.The proposed decoder is synthesized under TSMC 45 nm Low Power CMOS technology.It achieves 0.96 Gb/s throughput with 14.2mm^2 area when code length N=2^(16)which reduces 51.5%decoder area compared with the conventional decoder design.
文摘with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.
基金Supported by the open research fund of the National Mobile Communications Key Lab of the Southeast Uni-versity and by the Hong Kong Research Council.
文摘A novel method is proposed to analyze the capacity of future Code Division Multiple Access (CDMA) systems carrying multimedia services. The power level allocation is firstly investigated to meet each call's Bit Error Rate (BER) requirement, then the system capacity is defined from the conditions lbr the existence of the physical meaning of these power levels. Simulation results have shown that the capacity analyzing methods can be well used in the performance evaluation of the system accommodating heterogeneous services and the spectral efficiency of this scheme is higher than the existing ones.
文摘A panel method is described for calculating potential flow around near-surface submarines. The method uses Havelock sources which automatically satisfy the linearized free-surface boundary condition. Outputs from the method include pressure field, pressure drag, wave resistance, vertical force, trim moment and wave pattern. Comparisons are made with model tests for wave resistance of Series 58 and DARPA SUBOFF hulls, as well as with wave resistance, lift force and trim moment of three length-to-diameter variants of the DSTO Joubert submarine hull. It is found that the Havelock source panel method is capable of determining with reasonable accuracy wave resistance, vertical force and trim moment for submarine hulls. Further experimental data are required in order to assess the accuracy of the method for pressure field and wave pattern prediction. The method is implemented in the computer code“HullWave”and offers potential advantages over RANS-CFD codes in terms of speed, simplicity and robustness.