In recent years, we are increasingly coping with macro, complex and large-scale system in whichinformations twist together. It is a worthwhile research to develop general computer-aided meth-od for decision-making on ...In recent years, we are increasingly coping with macro, complex and large-scale system in whichinformations twist together. It is a worthwhile research to develop general computer-aided meth-od for decision-making on the basis of processing, analysing and deducing from the informationobtained.展开更多
In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase ...In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase rate, and patent activity. These indicators were quantified into several indexes and then integrated into an evaluation score to provide promising technologies. As a result of the suggested patent analysis, four technologies out of twenty two in details classification were selected, which showed outstanding technology competitiveness, high patent share and increasing rates as well as high recent-patent-ratios and triad-patent-family-ratios. Each of the selected technologies scored more than 10 points in total, and the following four technologies were suggested as promising ones in the field of next generation mobile communication: 1) 3GPP based mobile communication, 2) beyond 4G mobile communication, 3) IEEE 802.16 based mobile communication, which are in medium classification of broadband mobile communication system, and 4) testing/certification system of mobile communication, which is in medium classification of mobile communication testing/certification system.展开更多
The structural feature shown on a remote sensing image is a synthetic result ofcombination of the deformations produced during the entire geological history of an area.Therefore, the respective tectonic stress field o...The structural feature shown on a remote sensing image is a synthetic result ofcombination of the deformations produced during the entire geological history of an area.Therefore, the respective tectonic stress field of each of the different stages in the complexdeformation of an area can be reconstructed in three steps: (1) geological structures formed atdifferent times are distinguished in remote sensing image interpretation; (2) structuraldeformation fields at different stages are determined by analyzing relationships betweenmicrostructures (joints and fractures) and the related structures (folds and faults); and (3)tectonic stress fields at different stages are respectively recovered through a study of the featuresof structural deformation fields in different periods. Circular structures and related circlular and radial joints are correlated in space to con-cealed structural rises. The authors propose a new method for establishing a natural model ofthe concealed structural rises and calculating the tectonic stress field by using quantitative dataof the remote sensing information of circular structures and related linear structures.展开更多
Wireless statistic division multiplexing (WSDM) is a multiplexing scheme that transmits multiple signals simultaneously in the same frequency band over wireless channels. Based on the Shannon capacity of band-limited ...Wireless statistic division multiplexing (WSDM) is a multiplexing scheme that transmits multiple signals simultaneously in the same frequency band over wireless channels. Based on the Shannon capacity of band-limited waveform AWGN channel with input power constraint, we obtain channel capacity of WSDM. Compared to time division multiplexing (TDM), frequency division multiplexing (FDM), and code division multiplexing (CDM), WSDM is more effective in raising spectrum efficiency. What’s more, we propose information optimization method to separate time-frequency mixed signals. Computer simulations also verify that the proposed method is feasible and performs better than traditional algorithms.展开更多
The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information a...The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks.展开更多
As wind and photovoltaic energy become more prevalent,the optimization of power systems is becoming increasingly crucial.The current state of research in renewable generation and power forecasting technology,such as w...As wind and photovoltaic energy become more prevalent,the optimization of power systems is becoming increasingly crucial.The current state of research in renewable generation and power forecasting technology,such as wind and photovoltaic power(PV),is described in this paper,with a focus on the ensemble sequential LSTMs approach with optimized hidden-layers topology for short-term multivariable wind power forecasting.The methods for forecasting wind power and PV production.The physical model,statistical learningmethod,andmachine learning approaches based on historical data are all evaluated for the forecasting of wind power and PV production.Moreover,the experiments demonstrated that cloud map identification has a significant impact on PV generation.With a focus on the impact of photovoltaic and wind power generation systems on power grid operation and its causes,this paper summarizes the classification of wind power and PV generation systems,as well as the benefits and drawbacks of PV systems and wind power forecasting methods based on various typologies and analysis methods.展开更多
This study proposes the use of the MERISE conceptual data model to create indicators for monitoring and evaluating the effectiveness of vocational training in the Republic of Congo. The importance of MERISE for struct...This study proposes the use of the MERISE conceptual data model to create indicators for monitoring and evaluating the effectiveness of vocational training in the Republic of Congo. The importance of MERISE for structuring and analyzing data is underlined, as it enables the measurement of the adequacy between training and the needs of the labor market. The innovation of the study lies in the adaptation of the MERISE model to the local context, the development of innovative indicators, and the integration of a participatory approach including all relevant stakeholders. Contextual adaptation and local innovation: The study suggests adapting MERISE to the specific context of the Republic of Congo, considering the local particularities of the labor market. Development of innovative indicators and new measurement tools: It proposes creating indicators to assess skills matching and employer satisfaction, which are crucial for evaluating the effectiveness of vocational training. Participatory approach and inclusion of stakeholders: The study emphasizes actively involving training centers, employers, and recruitment agencies in the evaluation process. This participatory approach ensures that the perspectives of all stakeholders are considered, leading to more relevant and practical outcomes. Using the MERISE model allows for: • Rigorous data structuring, organization, and standardization: Clearly defining entities and relationships facilitates data organization and standardization, crucial for effective data analysis. • Facilitation of monitoring, analysis, and relevant indicators: Developing both quantitative and qualitative indicators helps measure the effectiveness of training in relation to the labor market, allowing for a comprehensive evaluation. • Improved communication and common language: By providing a common language for different stakeholders, MERISE enhances communication and collaboration, ensuring that all parties have a shared understanding. The study’s approach and contribution to existing research lie in: • Structured theoretical and practical framework and holistic approach: The study offers a structured framework for data collection and analysis, covering both quantitative and qualitative aspects, thus providing a comprehensive view of the training system. • Reproducible methodology and international comparison: The proposed methodology can be replicated in other contexts, facilitating international comparison and the adoption of best practices. • Extension of knowledge and new perspective: By integrating a participatory approach and developing indicators adapted to local needs, the study extends existing research and offers new perspectives on vocational training evaluation.展开更多
Pipeline network of oil fi eld water is established on the basis of GIS geographic information and SCADA platform, and monitorthe running state of water supply system in oil fi eld mining area in real time through dat...Pipeline network of oil fi eld water is established on the basis of GIS geographic information and SCADA platform, and monitorthe running state of water supply system in oil fi eld mining area in real time through data acquisition, instrument measurement and control,wireless network, water quantity, water pressure and other on-line monitoring equipment. The water supply system is formed, and the informationof mass water supply system is analyzed and processed in a timely manner. The system manages the entire production, management and serviceprocesses of the water supply system in a dynamic manner in order to ensure water supply safety management, and realize the modernization,intelligence and information mode operation of the water supply system in the mining area.展开更多
Information has two aspects. One aspect is the objective one; another aspect is the subjective one. Shannon has discussed the objective aspect of information in information theory. But the subjective aspect of informa...Information has two aspects. One aspect is the objective one; another aspect is the subjective one. Shannon has discussed the objective aspect of information in information theory. But the subjective aspect of information has not been fully discussed. Someone use “Bayesian approaches” to evaluate the value of information. But in some cases it does not meet the information user's need. This paper is focus on the subjective aspect of objectively measurable information and gives formal definitions for information, information utility, and marginal information utility, normalized calculation of information utility. The information discussed in the paper has interdisciplinary nature. This work can be the foundation of many application areas.展开更多
Cut flower industry is an important branch of floral industry, characterized by less occupation of lands, high output values per unit area and export capacity.Therefore, it enjoys promising economic profits and develo...Cut flower industry is an important branch of floral industry, characterized by less occupation of lands, high output values per unit area and export capacity.Therefore, it enjoys promising economic profits and development potential. The research conducted relevant analysis on patents of cut flowers at home and abroad,including development trend, regional distribution, applicants, and technology classification. Besides, the research discussed status quo, characteristics, and development trend of cut flower industry, providing references for policy formulation for governments.展开更多
Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and...Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity.展开更多
Objectives" To deepen our understanding of the status quo and to identify the hot topics and develop- mental trends of research on nursing models in countries other than China in the most recent decade. Methods: The...Objectives" To deepen our understanding of the status quo and to identify the hot topics and develop- mental trends of research on nursing models in countries other than China in the most recent decade. Methods: The study subjects were the publications retrieved from the PubMed database using the MeSH terms of "Models, Nursing". Bibliographic item co-occurrence mining system (BICOMS) software was used for conventional bibliometric analysis of publications during two time periods, 2005-2009 and 2010-2014. The number of published journal articles, journal distribution, authors of publications, country of origin of journals, and language of publications were analyzed to establish a high-frequency keyword profile and co-occurrence matrix. Graphical clustering toolkit (gCLUTO) software was applied for two-way clustering analysis and visualized analysis. Results: A total of 1472 journal articles with a key theme of nursing models were retrieved for final analysis, including 771 published during 2005-2009 and 701 during 2010-2014. The bibliometric analysis revealed that publications other than China concerning nursing models were mostly concentrated in the United States and the United Kingdom and that the number of relevant publications has been continuously decreasing. The two-way clustering analysis showed that there were mainly four types of research themes in the relevant publications in countries other than China during 2005-2009, i.e., nursing education and theoretical research, clinical nursing and psychological care, nursing administration, and models of nursing education, whereas there were five types during 2010-2014, i.e., nursing theories and clinical nursing practice, nursing administration models and assessments of nurses' knowledge and skills, community nursing administration models, nursing human resource management, and nursing education models and approaches. Conclusions: Research on nursing models in countries other than China is relatively mature and stable with a broader view, but it has shown a declining trend in recent years. It emphasizes both theory and practice, with research content tending to be structured into four modules, i.e., nursing education, administration, clinical practice, and theoretical research. Community nursing models may become a key research direction in the international research on nursing models in the future.展开更多
Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large num...Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large number of antenna elements in limited space. However, current CSI(channel state information) feedback schemes developed in LTE for conventional MIMO systems are not efficient enough for massive MIMO systems since the overhead increases almost linearly with the number of antenna. Moreover, the codebook for massive MIMO will be huge and difficult to design with the LTE methodology. This paper proposes a novel CSI feedback scheme named layered Multi-paths Information based CSI Feedback (LMPIF), which can achieve higher spectrum efficiency for dual-polarized antenna system with low feedback overhead. The MIMO channel is decomposed into long term components (multipath directions and amplitudes) and short term components (multipath phases). The relationship between the two components and the optimal precoder is derived in closed form. To reduce the overhead, different granularities in feedback time have been applied for the long term components and short term components Link and system level simulation results prove that LMPIF can improve performance considerably with low CSI feedback overhead.展开更多
Purpose: The aim of this paper is to discuss how the keyword concentration change ratio(KCCR) is used while identifying the stability-mutation feature of Web search keywords during information analyses and predictions...Purpose: The aim of this paper is to discuss how the keyword concentration change ratio(KCCR) is used while identifying the stability-mutation feature of Web search keywords during information analyses and predictions.Design/methodology/approach: By introducing the stability-mutation feature of keywords and its significance, the paper describes the function of the KCCR in identifying keyword stability-mutation features. By using Ginsberg's influenza keywords, the paper shows how the KCCR can be used to identify the keyword stability-mutation feature effectively.Findings: Keyword concentration ratio has close positive correlation with the change rate of research objects retrieved by users, so from the characteristic of the 'stability-mutation' of keywords, we can understand the relationship between these keywords and certain information. In general, keywords representing for mutation fit for the objects changing in short-term, while those representing for stability are suitable for long-term changing objects. Research limitations: It is difficult to acquire the frequency of keywords, so indexes or parameters which are closely related to the true search volume are chosen for this study.Practical implications: The stability-mutation feature identification of Web search keywords can be applied to predict and analyze the information of unknown public events through observing trends of keyword concentration ratio.Originality/value: The stability-mutation feature of Web search could be quantitatively described by the keyword concentration change ratio(KCCR). Through KCCR, the authors took advantage of Ginsberg's influenza epidemic data accordingly and demonstrated how accurate and effective the method proposed in this paper was while it was used in information analyses and predictions.展开更多
Information leak,which can undermine the compliance of web-service-composition business processes for some policies,is one of the major concerns in web service composition.We present an automated and effective approac...Information leak,which can undermine the compliance of web-service-composition business processes for some policies,is one of the major concerns in web service composition.We present an automated and effective approach for the detection of implicit information leaks in business process execution language(BPEL)based on information flow analysis.We introduce an adequate meta-model for BPEL representation based on a Petri net for transformation and analysis.Building on the concept of Petri net place-based noninterference,the core contribution of this paper is the application of a Petri net reachability graph to estimate Petri net interference and thereby to detect implicit information leaks in web service composition.In addition,a case study illustrates the application of the approach on a concrete workflow in BPEL notation.展开更多
There are nearly 1 000 rice landrace varieties in the Taihu basin, China. To assess the genetic diversity of the rice, 24 intragenic molecular markers(representing 17 starch synthesis-related genes) were investigate...There are nearly 1 000 rice landrace varieties in the Taihu basin, China. To assess the genetic diversity of the rice, 24 intragenic molecular markers(representing 17 starch synthesis-related genes) were investigated in 115 Taihu basin rice landraces and 87 improved cultivars simultaneously. The results show that the average genetic diversity and polymorphism information content values of the landraces were higher than those of improved cultivars. In total, 41 and 39 allele combinations(of the 17 genes) were derived from the landraces and improved cultivars, respectively; only two identical allele combinations were found bet ween the two rice variety sources. Cluster analysis, based on the molecular markers, revealed that the rice varieties could be subdivided into five groups and, within these, the japonica improved rice and japonica landrace rice varieties were in two separate groups. According to the quality reference criteria to classify the rice into grades, some of the landraces were found to perform we ll, in terms of starch quality. For example, according to NY /T595-2002 criteria from the Ministry of Agriculture of China, 25 and 33 landraces reached grade 1, in terms of their apparent amylose content and gel consistency. Th e varieties that had outstanding quality could be used as breeding materials for rice quality breeding programs in the future. Our study is useful for future applications, such as genetic diversity studies, the protection of rice variety and improvment of rice quality in breeding programs.展开更多
Conventional principal component analysis(PCA) can obtain low-dimensional representations of original data space, but the selection of principal components(PCs) based on variance is subjective, which may lead to infor...Conventional principal component analysis(PCA) can obtain low-dimensional representations of original data space, but the selection of principal components(PCs) based on variance is subjective, which may lead to information loss and poor monitoring performance. To address dimension reduction and information preservation simultaneously, this paper proposes a novel PC selection scheme named full variable expression. On the basis of the proposed relevance of variables with each principal component, key principal components can be determined.All the key principal components serve as a low-dimensional representation of the entire original variables, preserving the information of original data space without information loss. A squared Mahalanobis distance, which is introduced as the monitoring statistic, is calculated directly in the key principal component space for fault detection. To test the modeling and monitoring performance of the proposed method, a numerical example and the Tennessee Eastman benchmark are used.展开更多
The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum...The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum policy in the corresponding security level. Through the random survey on the information assets of multiple departments, this paper proposes the relative deviation distance of security policy configuration as risk measure parameter based on the distance of information-state transition(DIT) theory. By quantitatively analyzing the information asset weight, deviation degree and DIT, we establish the evaluation model for information system. With example analysis, the results prove that this method conducts effective risk evaluation on the information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system.展开更多
Mungbean (Vigna radiata (L.) Wilczek) is a unique species in its ability to fix atmospheric nitrogen, with early maturity, and relatively good drought resistance. We used 454 sequencing technology for transcriptom...Mungbean (Vigna radiata (L.) Wilczek) is a unique species in its ability to fix atmospheric nitrogen, with early maturity, and relatively good drought resistance. We used 454 sequencing technology for transcriptome sequencing. A total of 150 159 and 142 993 reads produced 5 254 and 6 374 large contigs (〉_500 bp) with an average length of 833 and 853 for Sunhwa and Jangan, respectively. Functional annotation to known sequences yielded 41.34% and 41.74% unigenes for Jangan and Sunhwa. A higher number of simple sequence repeat (SSR) motifs was identified in Jangan (1 630) compared with that of Sunhwa (1 334). A similar SSR distribution pattern was observed in both varieties. A total of 8 249 single nucleotide polymorphisms (SNPs) and indels with 2 098 high-confidence candidates were identified in the two mungbean varieties. The average distance between individual SNPs was -860 bp. Our report demonstrates the utility of transcriptomic data for implementing a functional annotation and development of genetic markers. We also provide large resource sequence data for mungbean improvement programs.展开更多
文摘In recent years, we are increasingly coping with macro, complex and large-scale system in whichinformations twist together. It is a worthwhile research to develop general computer-aided meth-od for decision-making on the basis of processing, analysing and deducing from the informationobtained.
文摘In order to forecast promising technologies in the field of next generation mobile communication, various patent indicators were analyzed such as citation per patent, patent family information, patent share, increase rate, and patent activity. These indicators were quantified into several indexes and then integrated into an evaluation score to provide promising technologies. As a result of the suggested patent analysis, four technologies out of twenty two in details classification were selected, which showed outstanding technology competitiveness, high patent share and increasing rates as well as high recent-patent-ratios and triad-patent-family-ratios. Each of the selected technologies scored more than 10 points in total, and the following four technologies were suggested as promising ones in the field of next generation mobile communication: 1) 3GPP based mobile communication, 2) beyond 4G mobile communication, 3) IEEE 802.16 based mobile communication, which are in medium classification of broadband mobile communication system, and 4) testing/certification system of mobile communication, which is in medium classification of mobile communication testing/certification system.
基金This study was sponsored by The Open Research Laboratory of Quantitative Prediction,Exploration and Assessment of Mineral Resources,MGMR,China.
文摘The structural feature shown on a remote sensing image is a synthetic result ofcombination of the deformations produced during the entire geological history of an area.Therefore, the respective tectonic stress field of each of the different stages in the complexdeformation of an area can be reconstructed in three steps: (1) geological structures formed atdifferent times are distinguished in remote sensing image interpretation; (2) structuraldeformation fields at different stages are determined by analyzing relationships betweenmicrostructures (joints and fractures) and the related structures (folds and faults); and (3)tectonic stress fields at different stages are respectively recovered through a study of the featuresof structural deformation fields in different periods. Circular structures and related circlular and radial joints are correlated in space to con-cealed structural rises. The authors propose a new method for establishing a natural model ofthe concealed structural rises and calculating the tectonic stress field by using quantitative dataof the remote sensing information of circular structures and related linear structures.
文摘Wireless statistic division multiplexing (WSDM) is a multiplexing scheme that transmits multiple signals simultaneously in the same frequency band over wireless channels. Based on the Shannon capacity of band-limited waveform AWGN channel with input power constraint, we obtain channel capacity of WSDM. Compared to time division multiplexing (TDM), frequency division multiplexing (FDM), and code division multiplexing (CDM), WSDM is more effective in raising spectrum efficiency. What’s more, we propose information optimization method to separate time-frequency mixed signals. Computer simulations also verify that the proposed method is feasible and performs better than traditional algorithms.
文摘The development and appli- cation of modern computer information and network technology is a double- edged sword. On the one hand, thanks to the rapid and convenient spread and exchange of computer- ized information and the compressed time and space on the Internet, computerized information plays a positive role in many areas like the economy, culture, education, sci- ence and technology, and politics. On the other hand, it also leads to various online rights infringements: citizens' individual information is revealed online; personal comput- ers are hacked; and online shopping lists are copied. Many Internet users worry about these problems to some extent. Especially in recent years, as information technology has devel- oped rapidly, people's online privacy rights have faced unprecedented challenges. How to strengthen pro- tection of online individual privacy has become an important challenge to the healthy development of informa- tion networks.
基金This project is supported by the National Natural Science Foundation of China(NSFC)(Nos.61806087,61902158).
文摘As wind and photovoltaic energy become more prevalent,the optimization of power systems is becoming increasingly crucial.The current state of research in renewable generation and power forecasting technology,such as wind and photovoltaic power(PV),is described in this paper,with a focus on the ensemble sequential LSTMs approach with optimized hidden-layers topology for short-term multivariable wind power forecasting.The methods for forecasting wind power and PV production.The physical model,statistical learningmethod,andmachine learning approaches based on historical data are all evaluated for the forecasting of wind power and PV production.Moreover,the experiments demonstrated that cloud map identification has a significant impact on PV generation.With a focus on the impact of photovoltaic and wind power generation systems on power grid operation and its causes,this paper summarizes the classification of wind power and PV generation systems,as well as the benefits and drawbacks of PV systems and wind power forecasting methods based on various typologies and analysis methods.
文摘This study proposes the use of the MERISE conceptual data model to create indicators for monitoring and evaluating the effectiveness of vocational training in the Republic of Congo. The importance of MERISE for structuring and analyzing data is underlined, as it enables the measurement of the adequacy between training and the needs of the labor market. The innovation of the study lies in the adaptation of the MERISE model to the local context, the development of innovative indicators, and the integration of a participatory approach including all relevant stakeholders. Contextual adaptation and local innovation: The study suggests adapting MERISE to the specific context of the Republic of Congo, considering the local particularities of the labor market. Development of innovative indicators and new measurement tools: It proposes creating indicators to assess skills matching and employer satisfaction, which are crucial for evaluating the effectiveness of vocational training. Participatory approach and inclusion of stakeholders: The study emphasizes actively involving training centers, employers, and recruitment agencies in the evaluation process. This participatory approach ensures that the perspectives of all stakeholders are considered, leading to more relevant and practical outcomes. Using the MERISE model allows for: • Rigorous data structuring, organization, and standardization: Clearly defining entities and relationships facilitates data organization and standardization, crucial for effective data analysis. • Facilitation of monitoring, analysis, and relevant indicators: Developing both quantitative and qualitative indicators helps measure the effectiveness of training in relation to the labor market, allowing for a comprehensive evaluation. • Improved communication and common language: By providing a common language for different stakeholders, MERISE enhances communication and collaboration, ensuring that all parties have a shared understanding. The study’s approach and contribution to existing research lie in: • Structured theoretical and practical framework and holistic approach: The study offers a structured framework for data collection and analysis, covering both quantitative and qualitative aspects, thus providing a comprehensive view of the training system. • Reproducible methodology and international comparison: The proposed methodology can be replicated in other contexts, facilitating international comparison and the adoption of best practices. • Extension of knowledge and new perspective: By integrating a participatory approach and developing indicators adapted to local needs, the study extends existing research and offers new perspectives on vocational training evaluation.
文摘Pipeline network of oil fi eld water is established on the basis of GIS geographic information and SCADA platform, and monitorthe running state of water supply system in oil fi eld mining area in real time through data acquisition, instrument measurement and control,wireless network, water quantity, water pressure and other on-line monitoring equipment. The water supply system is formed, and the informationof mass water supply system is analyzed and processed in a timely manner. The system manages the entire production, management and serviceprocesses of the water supply system in a dynamic manner in order to ensure water supply safety management, and realize the modernization,intelligence and information mode operation of the water supply system in the mining area.
文摘Information has two aspects. One aspect is the objective one; another aspect is the subjective one. Shannon has discussed the objective aspect of information in information theory. But the subjective aspect of information has not been fully discussed. Someone use “Bayesian approaches” to evaluate the value of information. But in some cases it does not meet the information user's need. This paper is focus on the subjective aspect of objectively measurable information and gives formal definitions for information, information utility, and marginal information utility, normalized calculation of information utility. The information discussed in the paper has interdisciplinary nature. This work can be the foundation of many application areas.
基金Supported by Yunnan Talent Training Program(KKSY201457034)~~
文摘Cut flower industry is an important branch of floral industry, characterized by less occupation of lands, high output values per unit area and export capacity.Therefore, it enjoys promising economic profits and development potential. The research conducted relevant analysis on patents of cut flowers at home and abroad,including development trend, regional distribution, applicants, and technology classification. Besides, the research discussed status quo, characteristics, and development trend of cut flower industry, providing references for policy formulation for governments.
基金supported by the National High Technology Research and Development Program(863)of China(No.2015AA016101)the National Natural Science Fund(No.61300184)Beijing Nova Program(No.Z151100000315078)
文摘Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity.
基金supported by Shanxi Provincial Health Department(No.201201031)
文摘Objectives" To deepen our understanding of the status quo and to identify the hot topics and develop- mental trends of research on nursing models in countries other than China in the most recent decade. Methods: The study subjects were the publications retrieved from the PubMed database using the MeSH terms of "Models, Nursing". Bibliographic item co-occurrence mining system (BICOMS) software was used for conventional bibliometric analysis of publications during two time periods, 2005-2009 and 2010-2014. The number of published journal articles, journal distribution, authors of publications, country of origin of journals, and language of publications were analyzed to establish a high-frequency keyword profile and co-occurrence matrix. Graphical clustering toolkit (gCLUTO) software was applied for two-way clustering analysis and visualized analysis. Results: A total of 1472 journal articles with a key theme of nursing models were retrieved for final analysis, including 771 published during 2005-2009 and 701 during 2010-2014. The bibliometric analysis revealed that publications other than China concerning nursing models were mostly concentrated in the United States and the United Kingdom and that the number of relevant publications has been continuously decreasing. The two-way clustering analysis showed that there were mainly four types of research themes in the relevant publications in countries other than China during 2005-2009, i.e., nursing education and theoretical research, clinical nursing and psychological care, nursing administration, and models of nursing education, whereas there were five types during 2010-2014, i.e., nursing theories and clinical nursing practice, nursing administration models and assessments of nurses' knowledge and skills, community nursing administration models, nursing human resource management, and nursing education models and approaches. Conclusions: Research on nursing models in countries other than China is relatively mature and stable with a broader view, but it has shown a declining trend in recent years. It emphasizes both theory and practice, with research content tending to be structured into four modules, i.e., nursing education, administration, clinical practice, and theoretical research. Community nursing models may become a key research direction in the international research on nursing models in the future.
基金supported by the National High-Tech R&D Program(863 Program 2015AA01A705)
文摘Massive MIMO is one of tile enabling technologies tbr beyond 4G and 5G systems due to its ability to provide beamforming gain and reduce interference Dual-polarized antenna is widely adopted to accommodate a large number of antenna elements in limited space. However, current CSI(channel state information) feedback schemes developed in LTE for conventional MIMO systems are not efficient enough for massive MIMO systems since the overhead increases almost linearly with the number of antenna. Moreover, the codebook for massive MIMO will be huge and difficult to design with the LTE methodology. This paper proposes a novel CSI feedback scheme named layered Multi-paths Information based CSI Feedback (LMPIF), which can achieve higher spectrum efficiency for dual-polarized antenna system with low feedback overhead. The MIMO channel is decomposed into long term components (multipath directions and amplitudes) and short term components (multipath phases). The relationship between the two components and the optimal precoder is derived in closed form. To reduce the overhead, different granularities in feedback time have been applied for the long term components and short term components Link and system level simulation results prove that LMPIF can improve performance considerably with low CSI feedback overhead.
基金supported by National Social Science Foundation of China(Grand No.13&ZD173)
文摘Purpose: The aim of this paper is to discuss how the keyword concentration change ratio(KCCR) is used while identifying the stability-mutation feature of Web search keywords during information analyses and predictions.Design/methodology/approach: By introducing the stability-mutation feature of keywords and its significance, the paper describes the function of the KCCR in identifying keyword stability-mutation features. By using Ginsberg's influenza keywords, the paper shows how the KCCR can be used to identify the keyword stability-mutation feature effectively.Findings: Keyword concentration ratio has close positive correlation with the change rate of research objects retrieved by users, so from the characteristic of the 'stability-mutation' of keywords, we can understand the relationship between these keywords and certain information. In general, keywords representing for mutation fit for the objects changing in short-term, while those representing for stability are suitable for long-term changing objects. Research limitations: It is difficult to acquire the frequency of keywords, so indexes or parameters which are closely related to the true search volume are chosen for this study.Practical implications: The stability-mutation feature identification of Web search keywords can be applied to predict and analyze the information of unknown public events through observing trends of keyword concentration ratio.Originality/value: The stability-mutation feature of Web search could be quantitatively described by the keyword concentration change ratio(KCCR). Through KCCR, the authors took advantage of Ginsberg's influenza epidemic data accordingly and demonstrated how accurate and effective the method proposed in this paper was while it was used in information analyses and predictions.
基金Project supported by the National High-Tech R&D Program(863)of China(No.2015AA015303)the National Natural Science Foundation of China(No.61272083)
文摘Information leak,which can undermine the compliance of web-service-composition business processes for some policies,is one of the major concerns in web service composition.We present an automated and effective approach for the detection of implicit information leaks in business process execution language(BPEL)based on information flow analysis.We introduce an adequate meta-model for BPEL representation based on a Petri net for transformation and analysis.Building on the concept of Petri net place-based noninterference,the core contribution of this paper is the application of a Petri net reachability graph to estimate Petri net interference and thereby to detect implicit information leaks in web service composition.In addition,a case study illustrates the application of the approach on a concrete workflow in BPEL notation.
基金financially supported by the National Natural Science Foundation of China(30800603)the Science and Technology Plan Projects of Taicang City,China(TC214YY3)the Building Program of the Science and Technology Innovation Team of Chien-Shiung Institute of Technology,China(2013CX02)
文摘There are nearly 1 000 rice landrace varieties in the Taihu basin, China. To assess the genetic diversity of the rice, 24 intragenic molecular markers(representing 17 starch synthesis-related genes) were investigated in 115 Taihu basin rice landraces and 87 improved cultivars simultaneously. The results show that the average genetic diversity and polymorphism information content values of the landraces were higher than those of improved cultivars. In total, 41 and 39 allele combinations(of the 17 genes) were derived from the landraces and improved cultivars, respectively; only two identical allele combinations were found bet ween the two rice variety sources. Cluster analysis, based on the molecular markers, revealed that the rice varieties could be subdivided into five groups and, within these, the japonica improved rice and japonica landrace rice varieties were in two separate groups. According to the quality reference criteria to classify the rice into grades, some of the landraces were found to perform we ll, in terms of starch quality. For example, according to NY /T595-2002 criteria from the Ministry of Agriculture of China, 25 and 33 landraces reached grade 1, in terms of their apparent amylose content and gel consistency. Th e varieties that had outstanding quality could be used as breeding materials for rice quality breeding programs in the future. Our study is useful for future applications, such as genetic diversity studies, the protection of rice variety and improvment of rice quality in breeding programs.
基金Supported by the National Natural Science Foundation of China(No.61374140)Shanghai Pujiang Program(Project No.12PJ1402200)
文摘Conventional principal component analysis(PCA) can obtain low-dimensional representations of original data space, but the selection of principal components(PCs) based on variance is subjective, which may lead to information loss and poor monitoring performance. To address dimension reduction and information preservation simultaneously, this paper proposes a novel PC selection scheme named full variable expression. On the basis of the proposed relevance of variables with each principal component, key principal components can be determined.All the key principal components serve as a low-dimensional representation of the entire original variables, preserving the information of original data space without information loss. A squared Mahalanobis distance, which is introduced as the monitoring statistic, is calculated directly in the key principal component space for fault detection. To test the modeling and monitoring performance of the proposed method, a numerical example and the Tennessee Eastman benchmark are used.
基金Supported by the National Natural Science Foundation of China(61662009)the Education Reform Project in Guizhou Province(SJJG201404)the Natural Science Foundation of Guizhou Province Education Department(KY(2015)367)
文摘The configuration of information system security policy is directly related to the information asset risk, and the configuration required by the classified security protection is able to ensure the optimal and minimum policy in the corresponding security level. Through the random survey on the information assets of multiple departments, this paper proposes the relative deviation distance of security policy configuration as risk measure parameter based on the distance of information-state transition(DIT) theory. By quantitatively analyzing the information asset weight, deviation degree and DIT, we establish the evaluation model for information system. With example analysis, the results prove that this method conducts effective risk evaluation on the information system intuitively and reliably, avoids the threat caused by subjective measurement, and shows performance benefits compared with existing solutions. It is not only theoretically but also practically feasible to realize the scientific analysis of security risk for the information system.
基金support of the "Cooperative Research Program for Agriculture Science & Technology Development (Project No. 200908FHT020609001)" Rural Development Administration (RDA),Republic of Korea
文摘Mungbean (Vigna radiata (L.) Wilczek) is a unique species in its ability to fix atmospheric nitrogen, with early maturity, and relatively good drought resistance. We used 454 sequencing technology for transcriptome sequencing. A total of 150 159 and 142 993 reads produced 5 254 and 6 374 large contigs (〉_500 bp) with an average length of 833 and 853 for Sunhwa and Jangan, respectively. Functional annotation to known sequences yielded 41.34% and 41.74% unigenes for Jangan and Sunhwa. A higher number of simple sequence repeat (SSR) motifs was identified in Jangan (1 630) compared with that of Sunhwa (1 334). A similar SSR distribution pattern was observed in both varieties. A total of 8 249 single nucleotide polymorphisms (SNPs) and indels with 2 098 high-confidence candidates were identified in the two mungbean varieties. The average distance between individual SNPs was -860 bp. Our report demonstrates the utility of transcriptomic data for implementing a functional annotation and development of genetic markers. We also provide large resource sequence data for mungbean improvement programs.