In order to compete in the global manufacturing mar ke t, agility is the only possible solution to response to the fragmented market se gments and frequently changed customer requirements. However, manufacturing agil ...In order to compete in the global manufacturing mar ke t, agility is the only possible solution to response to the fragmented market se gments and frequently changed customer requirements. However, manufacturing agil ity can only be attained through the deployment of knowledge. To embed knowledge into a CAD system to form a knowledge intensive CAD (KIC) system is one of way to enhance the design compatibility of a manufacturing company. The most difficu lt phase to develop a KIC system is to capitalize a huge amount of legacy data t o form a knowledge database. In the past, such capitalization process could only be done solely manually or semi-automatic. In this paper, a five step model fo r automatic design knowledge capitalization through the use of data mining is pr oposed whilst details of how to select, verify and performance benchmarking an a ppropriate data mining algorithm for a specific design task will also be discuss ed. A case study concerning the design of a plastic toaster casing was used as an illustration for the proposed methodology and it was found that the avera ge absolute error of the predictions for the most appropriate algorithm is withi n 17%.展开更多
This paper deals with personal data use by firms in the e-business environment from the viewpoint of business administration and information ethics. Whereas the tremendous development of information and communication ...This paper deals with personal data use by firms in the e-business environment from the viewpoint of business administration and information ethics. Whereas the tremendous development of information and communication technology (ICT) has made it easier for firms to acquire, store, share, and utilise personal data on their customers, firms that use personal data are exposed to risks related to privacy issues. Since individuals fear the invasion of their privacy, the failure of a firm to appear or remain trustworthy would make it difficult for it to maintain accurate, up-to-date databases and to construct desirable business processes, which would affect the bottom line. Therefore, modern firms should do what they can to ensure that their customers trust them. For them, one promising way to remain trustworthy is to behave as a moral agent. Although it is difficult for any firm to meet the conditions necessary to be a moral agent, competence in behaving as a moral agent is a hard-to-imitate capability af firms for which personal data use is vital for enjoying the benefits of business relationships in the e-business environment.展开更多
Progress in developing robust therapies for spinal cord injury (SCI), trau- matic brain injury (TBI) and peripheral nerve injury has been slow. A great deal has been learned over the past 30 years regarding both t...Progress in developing robust therapies for spinal cord injury (SCI), trau- matic brain injury (TBI) and peripheral nerve injury has been slow. A great deal has been learned over the past 30 years regarding both the intrinsic factors and the environmental factors that regulate axon growth, but this large body of information has not yet resulted in clinically available thera- peutics. This therapeutic bottleneck has many root causes, but a consensus is emerging that one contributing factor is a lack of standards for experi- mental design and reporting. The absence of reporting standards, and even of commonly accepted definitions of key words, also make data mining and bioinformatics analysis of neural plasticity and regeneration difficult, if not impossible. This short review will consider relevant background and poten- tial solutions to this problem in the axon regeneration domain.展开更多
Commentary Most would agree that providing comprehensive detail in scientific reporting is critical for the development of mean- ingful therapies and treatments for diseases. Such stellar practices 1) allow for repro...Commentary Most would agree that providing comprehensive detail in scientific reporting is critical for the development of mean- ingful therapies and treatments for diseases. Such stellar practices 1) allow for reproduction of experiments to con- firm results, 2) promote thorough analyses of data, and 3) foster the incremental advancement of valid approaches. Unfortunately, most would also agree we have far to go to reach this vital goal (Hackam and Redelmeier, 2006; Prinz et al., 2011; Baker et al., 2014).展开更多
Hyperspectral remote sensing is now a frontier of the remote sensing technology. Airborne hyperspectral remote sensing data have hundreds of narrow bands to obtain complete and continuous ground-object spectra. Theref...Hyperspectral remote sensing is now a frontier of the remote sensing technology. Airborne hyperspectral remote sensing data have hundreds of narrow bands to obtain complete and continuous ground-object spectra. Therefore, they can be effectively used to identify these grotmd objects which are difficult to discriminate by using wide-band data, and show much promise in geological survey. At the height of 1500 m, have 36 bands in visible to the CASI hyperspectral data near-infrared spectral range, with a spectral resolution of 19 nm and a space resolution of 0.9 m. The SASI data have 101 bands in the shortwave infrared spectral range, with a spectral resolution of 15 nm and a space resolution of 2.25 m. In 2010, China Geological Survey deployed an airborne CASI/SASI hyperspectral measurement project, and selected the Liuyuan and Fangshankou areas in the Beishan metallogenic belt of Gansu Province, and the Nachitai area of East Kunlun metallogenic belt in Qinghai Province to conduct geological survey. The work period of this project was three years.展开更多
In this paper, three techniques, line run coding, quadtree DF (Depth-First) representation and H coding for compressing classified satellite cloud images with no distortion are presented. In these three codings, the f...In this paper, three techniques, line run coding, quadtree DF (Depth-First) representation and H coding for compressing classified satellite cloud images with no distortion are presented. In these three codings, the first two were invented by other persons and the third one, by ourselves. As a result, the comparison among their compression rates is. given at the end of this paper. Further application of these image compression technique to satellite data and other meteorological data looks promising.展开更多
ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the ...ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the performances of these methods in detecting oceanic features for both noise free and noise contaminated AVHRR (Advanced Very High Resolution Radiometer) IR image with Kuroshio. Also, practical experiments in detecting the eddy of Kuroshio with these methods are carried out for comparison. Results show that the ICSED algorithm has more advantages than other methods in detecting mesoscale features of ocean. Finally, the effectiveness of window size of ICSED method to oceanic features detection is quantitatively discussed.展开更多
The study area is located between the cities of Comitan (16°10'43"N and 92°04'20''W) a city with 150,000 inhabitants and La Esperanza (16°9'15''N and 91°...The study area is located between the cities of Comitan (16°10'43"N and 92°04'20''W) a city with 150,000 inhabitants and La Esperanza (16°9'15''N and 91°52'5''W) a town with 3000 inhabitants. Both weather stations are 30 km from each other in the Chiapas State, México. 54 years of daily records of the series of maximum (<em>t</em><sub>max</sub>) and minimum temperatures (<em>t</em><sub>min</sub>) of the weather station 07205 Comitan that is on top of a house and 30 years of daily records of the weather station 07374 La Esperanza were analyzed. The objective is to analyze the evidence of climate change in the Comitan valley. 2.07% and 19.04% of missing data were filled, respectively, with the WS method. In order to verify homogeneity three methods were used: Standard Normal Homogeneity Test (SNHT), the Von Neumann method and the Buishand method. The heterogeneous series were homogenized using climatol. The trends of <em>t</em><sub>max</sub> and <em>t</em><sub>min</sub> for both weather stations were analyzed by simple linear regression, Sperman’s rho and Mann-Kendall tests. The Mann-Kendal test method confirmed the warming trend at the Comitan station for both variables with <em>Z<sub>MK</sub></em> statistic values equal to 1.57 (statistically not significant) and 4.64 (statistically significant). However, for the Esperanza station, it determined a cooling trend for tmin and a slight non-significant warming for <em>t</em><sub>max</sub> with a <em>Z</em><sub><em>MK</em></sub> statistic of -2.27 (statistically significant) and 1.16 (statistically not significant), for a significance level <em>α</em> = 0.05.展开更多
The main aim of this work is to improve the security of data hiding forsecret image sharing. The privacy and security of digital information have becomea primary concern nowadays due to the enormous usage of digital t...The main aim of this work is to improve the security of data hiding forsecret image sharing. The privacy and security of digital information have becomea primary concern nowadays due to the enormous usage of digital technology.The security and the privacy of users’ images are ensured through reversible datahiding techniques. The efficiency of the existing data hiding techniques did notprovide optimum performance with multiple end nodes. These issues are solvedby using Separable Data Hiding and Adaptive Particle Swarm Optimization(SDHAPSO) algorithm to attain optimal performance. Image encryption, dataembedding, data extraction/image recovery are the main phases of the proposedapproach. DFT is generally used to extract the transform coefficient matrix fromthe original image. DFT coefficients are in float format, which assists in transforming the image to integral format using the round function. After obtainingthe encrypted image by data-hider, additional data embedding is formulated intohigh-frequency coefficients. The proposed SDHAPSO is mainly utilized for performance improvement through optimal pixel location selection within the imagefor secret bits concealment. In addition, the secret data embedding capacityenhancement is focused on image visual quality maintenance. Hence, it isobserved from the simulation results that the proposed SDHAPSO techniqueoffers high-level security outcomes with respect to higher PSNR, security level,lesser MSE and higher correlation than existing techniques. Hence, enhancedsensitive information protection is attained, which improves the overall systemperformance.展开更多
Based on the research on the diffusion of suspended sediments discharged outside of Yangtze River estuary and the landuse of Shanghai using Landsat MSS images in several years, the authors analysed the characteristics...Based on the research on the diffusion of suspended sediments discharged outside of Yangtze River estuary and the landuse of Shanghai using Landsat MSS images in several years, the authors analysed the characteristics of TM CCT data of Shanghai scene, pointed out concrete range of maximum turbidity and growth of urban boundary of Shanghai through the information extraction.The feature vector combination method is used in the research process. The result is getting nice.展开更多
In this paper, on the basis of experimental data of two kinds of chemical explosions, the piston-pushing model of spherical blast-waves and the second-order Godunov-type scheme of finite difference methods with high i...In this paper, on the basis of experimental data of two kinds of chemical explosions, the piston-pushing model of spherical blast-waves and the second-order Godunov-type scheme of finite difference methods with high identification to discontinuity are used to the numerical reconstruction of part of an actual hemispherical blast-wave flow field by properly adjusting the moving bounary conditions of a piston. This method is simple and reliable. It is suitable to the evaluation of effects of the blast-wave flow field away from the explosion center.展开更多
This paper selects some representative regions to obtain their G-R relation curves according to their seismicity characteristics,by using ML≥2.0 microseismicity data(1970~1993)in North China.The annual occurrence rat...This paper selects some representative regions to obtain their G-R relation curves according to their seismicity characteristics,by using ML≥2.0 microseismicity data(1970~1993)in North China.The annual occurrence rate of events of each magnitude can be inferred from the G-R relation.At the same tune,the actual annual occurrence rate of earthquakes of higher magnitudes can be calculated from historical earthquakes(1300-1993)recorded in the same region.It seems that both results are almost the same.Therefore,the rate of events of higher magnitudes can be obtained by using microseismicity data when the proper region is selected.However,two points should be noticed:(1)The method can only give the annual occurrence rate in a seismicity system and estimate the whole situation of the system.(2)When there is a very large earthquake in and near the period in which the microseismicity data are applied,the actual occurrence rate of the system,including this larger earthquake,cannot be obtained by this method.展开更多
Three recent breakthroughs due to AI in arts and science serve as motivation:An award winning digital image,protein folding,fast matrix multiplication.Many recent developments in artificial neural networks,particularl...Three recent breakthroughs due to AI in arts and science serve as motivation:An award winning digital image,protein folding,fast matrix multiplication.Many recent developments in artificial neural networks,particularly deep learning(DL),applied and relevant to computational mechanics(solid,fluids,finite-element technology)are reviewed in detail.Both hybrid and pure machine learning(ML)methods are discussed.Hybrid methods combine traditional PDE discretizations with ML methods either(1)to help model complex nonlinear constitutive relations,(2)to nonlinearly reduce the model order for efficient simulation(turbulence),or(3)to accelerate the simulation by predicting certain components in the traditional integration methods.Here,methods(1)and(2)relied on Long-Short-Term Memory(LSTM)architecture,with method(3)relying on convolutional neural networks.Pure ML methods to solve(nonlinear)PDEs are represented by Physics-Informed Neural network(PINN)methods,which could be combined with attention mechanism to address discontinuous solutions.Both LSTM and attention architectures,together with modern and generalized classic optimizers to include stochasticity for DL networks,are extensively reviewed.Kernel machines,including Gaussian processes,are provided to sufficient depth for more advanced works such as shallow networks with infinite width.Not only addressing experts,readers are assumed familiar with computational mechanics,but not with DL,whose concepts and applications are built up from the basics,aiming at bringing first-time learners quickly to the forefront of research.History and limitations of AI are recounted and discussed,with particular attention at pointing out misstatements or misconceptions of the classics,even in well-known references.Positioning and pointing control of a large-deformable beam is given as an example.展开更多
It is crucial to maintain the balance of economic development and ecosystem protection. The value of ecosystem services is an indicator to help people understand the importance of ecosystem protection. Traditional mod...It is crucial to maintain the balance of economic development and ecosystem protection. The value of ecosystem services is an indicator to help people understand the importance of ecosystem protection. Traditional models estimate ecosystem service values only according to land use/cover data while ignoring vegetation status differences in the same land use/cover. This study uses the normalized difference vegetation index(NDVI), the leaf area index(LAI),and net primary productivity(NPP) as vegetation status data to describe the differences in the same land use/cover type. The principal component analysis(PCA) approach is used to reduce the correlations among the three types of vegetation status data. Then, the calculated vegetation status index after PCA is input into the estimation model. The case study in China shows that the improved model has two major advantages. First, it can clearly distinguish the differences in ecosystem service values even for the same land use/cover type. Second, it can clearly describe the transitional zones between different land use/cover types through continuous changes in ecosystem service values. This improved model can provide a more detailed description of the distribution characteristics of ecosystem service values in China and help policymakers balance economic development and ecosystem protection.展开更多
We report on the properties of strong pulses from PSR B0656+14 by analyzing the data obtained using the Urumqi 25-m radio telescope at 1540 MHz from August 2007 to September 2010.In 44 h of observational data,a total...We report on the properties of strong pulses from PSR B0656+14 by analyzing the data obtained using the Urumqi 25-m radio telescope at 1540 MHz from August 2007 to September 2010.In 44 h of observational data,a total of 67 pulses with signal-to-noise ratios above a 5σthreshold were detected.The peak flux densities of these pulses are 58 to 194 times that of the average profile,and their pulse energies are 3 to 68 times that of the average pulse.These pulses are clustered around phases about 5-ahead of the peak of the average profile.Compared with the width of the average profile,they are relatively narrow,with the full widths at half-maximum ranging from 0.28 ° to 1.78 °.The distribution of pulse-energies follows a lognormal distribution.These sporadic strong pulses detected from PSR B0656+14 have different characteristics from both typical giant pulses and its regular pulses.展开更多
In this paper, an attempt has been made to find out the vertical distribution of RH at levels of 850, 700 and 500 hPa by using satellite-derived radiation parameters (i.e., albedo, outgoing longwave fluxes, absorb- ed...In this paper, an attempt has been made to find out the vertical distribution of RH at levels of 850, 700 and 500 hPa by using satellite-derived radiation parameters (i.e., albedo, outgoing longwave fluxes, absorb- ed solar radiation and net radiation). For this purpose, multiple regression equations are derived from MONEX-79 upsonde and dropsonde data over the Arabian Sea for the period 11--20 June 1979. Satellite- estimated RH fields have been compared with ECMWF RH fields obtained from FGGE level ⅢB data. The RMS error and error variance for satellite-estimated RH fields have been found to be less than for those of ECMWF. Satellite-estimated isohygric patterns show good agreement with the cloudiness patterns of GOES satellite, whereas ECMWF isohygric patterns do not show much resemblance with the cloudiness patterns. The results of the study suggest that satellite-estimated RH fields could be more useful than ECMWF RH fields and they can be used with some confidence in NWP models.展开更多
With the support by the National Natural Science Foundation of China,the research team led by Prof.Wei Chu(魏楚)and Prof.Zheng Xinye(郑新业)at the Department of Energy Economics,School of Economics,Renmin University o...With the support by the National Natural Science Foundation of China,the research team led by Prof.Wei Chu(魏楚)and Prof.Zheng Xinye(郑新业)at the Department of Energy Economics,School of Economics,Renmin University of China,measures the inequality using the household energy展开更多
All optical clock recovery from non return-to-zero (NRZ) data using an semiconductor optical amplifier (SOA) loop mirror and a mode-locked SOA fibcr lascr is firstly schematically explained and experimentally demo...All optical clock recovery from non return-to-zero (NRZ) data using an semiconductor optical amplifier (SOA) loop mirror and a mode-locked SOA fibcr lascr is firstly schematically explained and experimentally demonstrated at 10 Gb/s. Furthermore, the pulse quality of tile recovered cluck is cffcctivcly improved by using a continuous-wave (CW) assist light in the gain region of SOA, through which the amplitude modulation is reduced from 57.2% to 8.47%. This scheme is a promising method for clock recovery from NRZ data in the future all-optical communication networks.展开更多
We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fi...We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme.展开更多
We investigate the nonlinear behaviors of light recognized as chaos during the propagation of Gaussian laser beam inside a nonlinear polarization maintaining and absorption reducing (PANDA) ring resonator system. It...We investigate the nonlinear behaviors of light recognized as chaos during the propagation of Gaussian laser beam inside a nonlinear polarization maintaining and absorption reducing (PANDA) ring resonator system. It aims to generate the nonlinear behavior of light to obtain data in binary logic codes for transmission in fiber optics communication. Effective parameters, such as refractive indices of a silicon waveguide, coupling coefficients (~), and ring radius ring (R), can be properly selected to operate the nonlinear behavior. Therefore, the binary coded data generated by the PANDA ring resonator system can be decoded and converted to Manchester codes, where the decoding process of the transmitted codes occurs at the end of the transmission link. The simulation results show that the original codes can be recovered with a high security of signal transmission using the Manchester method.展开更多
文摘In order to compete in the global manufacturing mar ke t, agility is the only possible solution to response to the fragmented market se gments and frequently changed customer requirements. However, manufacturing agil ity can only be attained through the deployment of knowledge. To embed knowledge into a CAD system to form a knowledge intensive CAD (KIC) system is one of way to enhance the design compatibility of a manufacturing company. The most difficu lt phase to develop a KIC system is to capitalize a huge amount of legacy data t o form a knowledge database. In the past, such capitalization process could only be done solely manually or semi-automatic. In this paper, a five step model fo r automatic design knowledge capitalization through the use of data mining is pr oposed whilst details of how to select, verify and performance benchmarking an a ppropriate data mining algorithm for a specific design task will also be discuss ed. A case study concerning the design of a plastic toaster casing was used as an illustration for the proposed methodology and it was found that the avera ge absolute error of the predictions for the most appropriate algorithm is withi n 17%.
基金Supported by the MEXT Research Project "Global Business and IT Management: Global eSCM" at the Research Institute of Commerce, Meiji University.
文摘This paper deals with personal data use by firms in the e-business environment from the viewpoint of business administration and information ethics. Whereas the tremendous development of information and communication technology (ICT) has made it easier for firms to acquire, store, share, and utilise personal data on their customers, firms that use personal data are exposed to risks related to privacy issues. Since individuals fear the invasion of their privacy, the failure of a firm to appear or remain trustworthy would make it difficult for it to maintain accurate, up-to-date databases and to construct desirable business processes, which would affect the bottom line. Therefore, modern firms should do what they can to ensure that their customers trust them. For them, one promising way to remain trustworthy is to behave as a moral agent. Although it is difficult for any firm to meet the conditions necessary to be a moral agent, competence in behaving as a moral agent is a hard-to-imitate capability af firms for which personal data use is vital for enjoying the benefits of business relationships in the e-business environment.
基金Research in the Lemmon/Bixby lab is supported by NIH grants NS080145 and NS059866by the Miami Project to Cure Paralysis
文摘Progress in developing robust therapies for spinal cord injury (SCI), trau- matic brain injury (TBI) and peripheral nerve injury has been slow. A great deal has been learned over the past 30 years regarding both the intrinsic factors and the environmental factors that regulate axon growth, but this large body of information has not yet resulted in clinically available thera- peutics. This therapeutic bottleneck has many root causes, but a consensus is emerging that one contributing factor is a lack of standards for experi- mental design and reporting. The absence of reporting standards, and even of commonly accepted definitions of key words, also make data mining and bioinformatics analysis of neural plasticity and regeneration difficult, if not impossible. This short review will consider relevant background and poten- tial solutions to this problem in the axon regeneration domain.
文摘Commentary Most would agree that providing comprehensive detail in scientific reporting is critical for the development of mean- ingful therapies and treatments for diseases. Such stellar practices 1) allow for reproduction of experiments to con- firm results, 2) promote thorough analyses of data, and 3) foster the incremental advancement of valid approaches. Unfortunately, most would also agree we have far to go to reach this vital goal (Hackam and Redelmeier, 2006; Prinz et al., 2011; Baker et al., 2014).
基金funded by China Geological Survey (grant no.1212011120899)the Department of Geology & Mining, China National Nuclear Corporation (grant no.201498)
文摘Hyperspectral remote sensing is now a frontier of the remote sensing technology. Airborne hyperspectral remote sensing data have hundreds of narrow bands to obtain complete and continuous ground-object spectra. Therefore, they can be effectively used to identify these grotmd objects which are difficult to discriminate by using wide-band data, and show much promise in geological survey. At the height of 1500 m, have 36 bands in visible to the CASI hyperspectral data near-infrared spectral range, with a spectral resolution of 19 nm and a space resolution of 0.9 m. The SASI data have 101 bands in the shortwave infrared spectral range, with a spectral resolution of 15 nm and a space resolution of 2.25 m. In 2010, China Geological Survey deployed an airborne CASI/SASI hyperspectral measurement project, and selected the Liuyuan and Fangshankou areas in the Beishan metallogenic belt of Gansu Province, and the Nachitai area of East Kunlun metallogenic belt in Qinghai Province to conduct geological survey. The work period of this project was three years.
文摘In this paper, three techniques, line run coding, quadtree DF (Depth-First) representation and H coding for compressing classified satellite cloud images with no distortion are presented. In these three codings, the first two were invented by other persons and the third one, by ourselves. As a result, the comparison among their compression rates is. given at the end of this paper. Further application of these image compression technique to satellite data and other meteorological data looks promising.
文摘ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the performances of these methods in detecting oceanic features for both noise free and noise contaminated AVHRR (Advanced Very High Resolution Radiometer) IR image with Kuroshio. Also, practical experiments in detecting the eddy of Kuroshio with these methods are carried out for comparison. Results show that the ICSED algorithm has more advantages than other methods in detecting mesoscale features of ocean. Finally, the effectiveness of window size of ICSED method to oceanic features detection is quantitatively discussed.
文摘The study area is located between the cities of Comitan (16°10'43"N and 92°04'20''W) a city with 150,000 inhabitants and La Esperanza (16°9'15''N and 91°52'5''W) a town with 3000 inhabitants. Both weather stations are 30 km from each other in the Chiapas State, México. 54 years of daily records of the series of maximum (<em>t</em><sub>max</sub>) and minimum temperatures (<em>t</em><sub>min</sub>) of the weather station 07205 Comitan that is on top of a house and 30 years of daily records of the weather station 07374 La Esperanza were analyzed. The objective is to analyze the evidence of climate change in the Comitan valley. 2.07% and 19.04% of missing data were filled, respectively, with the WS method. In order to verify homogeneity three methods were used: Standard Normal Homogeneity Test (SNHT), the Von Neumann method and the Buishand method. The heterogeneous series were homogenized using climatol. The trends of <em>t</em><sub>max</sub> and <em>t</em><sub>min</sub> for both weather stations were analyzed by simple linear regression, Sperman’s rho and Mann-Kendall tests. The Mann-Kendal test method confirmed the warming trend at the Comitan station for both variables with <em>Z<sub>MK</sub></em> statistic values equal to 1.57 (statistically not significant) and 4.64 (statistically significant). However, for the Esperanza station, it determined a cooling trend for tmin and a slight non-significant warming for <em>t</em><sub>max</sub> with a <em>Z</em><sub><em>MK</em></sub> statistic of -2.27 (statistically significant) and 1.16 (statistically not significant), for a significance level <em>α</em> = 0.05.
文摘The main aim of this work is to improve the security of data hiding forsecret image sharing. The privacy and security of digital information have becomea primary concern nowadays due to the enormous usage of digital technology.The security and the privacy of users’ images are ensured through reversible datahiding techniques. The efficiency of the existing data hiding techniques did notprovide optimum performance with multiple end nodes. These issues are solvedby using Separable Data Hiding and Adaptive Particle Swarm Optimization(SDHAPSO) algorithm to attain optimal performance. Image encryption, dataembedding, data extraction/image recovery are the main phases of the proposedapproach. DFT is generally used to extract the transform coefficient matrix fromthe original image. DFT coefficients are in float format, which assists in transforming the image to integral format using the round function. After obtainingthe encrypted image by data-hider, additional data embedding is formulated intohigh-frequency coefficients. The proposed SDHAPSO is mainly utilized for performance improvement through optimal pixel location selection within the imagefor secret bits concealment. In addition, the secret data embedding capacityenhancement is focused on image visual quality maintenance. Hence, it isobserved from the simulation results that the proposed SDHAPSO techniqueoffers high-level security outcomes with respect to higher PSNR, security level,lesser MSE and higher correlation than existing techniques. Hence, enhancedsensitive information protection is attained, which improves the overall systemperformance.
文摘Based on the research on the diffusion of suspended sediments discharged outside of Yangtze River estuary and the landuse of Shanghai using Landsat MSS images in several years, the authors analysed the characteristics of TM CCT data of Shanghai scene, pointed out concrete range of maximum turbidity and growth of urban boundary of Shanghai through the information extraction.The feature vector combination method is used in the research process. The result is getting nice.
文摘In this paper, on the basis of experimental data of two kinds of chemical explosions, the piston-pushing model of spherical blast-waves and the second-order Godunov-type scheme of finite difference methods with high identification to discontinuity are used to the numerical reconstruction of part of an actual hemispherical blast-wave flow field by properly adjusting the moving bounary conditions of a piston. This method is simple and reliable. It is suitable to the evaluation of effects of the blast-wave flow field away from the explosion center.
基金This project was sponsored by the National Natural Science Foundation of China under the contract of No. 49574207
文摘This paper selects some representative regions to obtain their G-R relation curves according to their seismicity characteristics,by using ML≥2.0 microseismicity data(1970~1993)in North China.The annual occurrence rate of events of each magnitude can be inferred from the G-R relation.At the same tune,the actual annual occurrence rate of earthquakes of higher magnitudes can be calculated from historical earthquakes(1300-1993)recorded in the same region.It seems that both results are almost the same.Therefore,the rate of events of higher magnitudes can be obtained by using microseismicity data when the proper region is selected.However,two points should be noticed:(1)The method can only give the annual occurrence rate in a seismicity system and estimate the whole situation of the system.(2)When there is a very large earthquake in and near the period in which the microseismicity data are applied,the actual occurrence rate of the system,including this larger earthquake,cannot be obtained by this method.
文摘Three recent breakthroughs due to AI in arts and science serve as motivation:An award winning digital image,protein folding,fast matrix multiplication.Many recent developments in artificial neural networks,particularly deep learning(DL),applied and relevant to computational mechanics(solid,fluids,finite-element technology)are reviewed in detail.Both hybrid and pure machine learning(ML)methods are discussed.Hybrid methods combine traditional PDE discretizations with ML methods either(1)to help model complex nonlinear constitutive relations,(2)to nonlinearly reduce the model order for efficient simulation(turbulence),or(3)to accelerate the simulation by predicting certain components in the traditional integration methods.Here,methods(1)and(2)relied on Long-Short-Term Memory(LSTM)architecture,with method(3)relying on convolutional neural networks.Pure ML methods to solve(nonlinear)PDEs are represented by Physics-Informed Neural network(PINN)methods,which could be combined with attention mechanism to address discontinuous solutions.Both LSTM and attention architectures,together with modern and generalized classic optimizers to include stochasticity for DL networks,are extensively reviewed.Kernel machines,including Gaussian processes,are provided to sufficient depth for more advanced works such as shallow networks with infinite width.Not only addressing experts,readers are assumed familiar with computational mechanics,but not with DL,whose concepts and applications are built up from the basics,aiming at bringing first-time learners quickly to the forefront of research.History and limitations of AI are recounted and discussed,with particular attention at pointing out misstatements or misconceptions of the classics,even in well-known references.Positioning and pointing control of a large-deformable beam is given as an example.
基金Supported by the National Key Research and Development Program of China (2018YFC1506503)Meteorological Collaborative Innovation Foundation in Huadong Area (QYHZ201815)。
文摘It is crucial to maintain the balance of economic development and ecosystem protection. The value of ecosystem services is an indicator to help people understand the importance of ecosystem protection. Traditional models estimate ecosystem service values only according to land use/cover data while ignoring vegetation status differences in the same land use/cover. This study uses the normalized difference vegetation index(NDVI), the leaf area index(LAI),and net primary productivity(NPP) as vegetation status data to describe the differences in the same land use/cover type. The principal component analysis(PCA) approach is used to reduce the correlations among the three types of vegetation status data. Then, the calculated vegetation status index after PCA is input into the estimation model. The case study in China shows that the improved model has two major advantages. First, it can clearly distinguish the differences in ecosystem service values even for the same land use/cover type. Second, it can clearly describe the transitional zones between different land use/cover types through continuous changes in ecosystem service values. This improved model can provide a more detailed description of the distribution characteristics of ecosystem service values in China and help policymakers balance economic development and ecosystem protection.
基金funded by the National Natural Science Foundation of China(Grant No.10973026)
文摘We report on the properties of strong pulses from PSR B0656+14 by analyzing the data obtained using the Urumqi 25-m radio telescope at 1540 MHz from August 2007 to September 2010.In 44 h of observational data,a total of 67 pulses with signal-to-noise ratios above a 5σthreshold were detected.The peak flux densities of these pulses are 58 to 194 times that of the average profile,and their pulse energies are 3 to 68 times that of the average pulse.These pulses are clustered around phases about 5-ahead of the peak of the average profile.Compared with the width of the average profile,they are relatively narrow,with the full widths at half-maximum ranging from 0.28 ° to 1.78 °.The distribution of pulse-energies follows a lognormal distribution.These sporadic strong pulses detected from PSR B0656+14 have different characteristics from both typical giant pulses and its regular pulses.
文摘In this paper, an attempt has been made to find out the vertical distribution of RH at levels of 850, 700 and 500 hPa by using satellite-derived radiation parameters (i.e., albedo, outgoing longwave fluxes, absorb- ed solar radiation and net radiation). For this purpose, multiple regression equations are derived from MONEX-79 upsonde and dropsonde data over the Arabian Sea for the period 11--20 June 1979. Satellite- estimated RH fields have been compared with ECMWF RH fields obtained from FGGE level ⅢB data. The RMS error and error variance for satellite-estimated RH fields have been found to be less than for those of ECMWF. Satellite-estimated isohygric patterns show good agreement with the cloudiness patterns of GOES satellite, whereas ECMWF isohygric patterns do not show much resemblance with the cloudiness patterns. The results of the study suggest that satellite-estimated RH fields could be more useful than ECMWF RH fields and they can be used with some confidence in NWP models.
文摘With the support by the National Natural Science Foundation of China,the research team led by Prof.Wei Chu(魏楚)and Prof.Zheng Xinye(郑新业)at the Department of Energy Economics,School of Economics,Renmin University of China,measures the inequality using the household energy
基金This work was supported by the National Natural Sci-ence Foundation of China (No. 90401025)the Key Project of MOE (No. 105036).
文摘All optical clock recovery from non return-to-zero (NRZ) data using an semiconductor optical amplifier (SOA) loop mirror and a mode-locked SOA fibcr lascr is firstly schematically explained and experimentally demonstrated at 10 Gb/s. Furthermore, the pulse quality of tile recovered cluck is cffcctivcly improved by using a continuous-wave (CW) assist light in the gain region of SOA, through which the amplitude modulation is reduced from 57.2% to 8.47%. This scheme is a promising method for clock recovery from NRZ data in the future all-optical communication networks.
基金supported in part by the Basic Science Research Program through the National Research Foundation of Korea Funded by the Ministry of Science,ICT & Future Planning(No.2011-0030079)the Ministry of Education(No.NRF-2013R1A1A2057549)
文摘We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme.
基金Universiti Teknolog,Malaysia(UTM),and the IDF for their financial support
文摘We investigate the nonlinear behaviors of light recognized as chaos during the propagation of Gaussian laser beam inside a nonlinear polarization maintaining and absorption reducing (PANDA) ring resonator system. It aims to generate the nonlinear behavior of light to obtain data in binary logic codes for transmission in fiber optics communication. Effective parameters, such as refractive indices of a silicon waveguide, coupling coefficients (~), and ring radius ring (R), can be properly selected to operate the nonlinear behavior. Therefore, the binary coded data generated by the PANDA ring resonator system can be decoded and converted to Manchester codes, where the decoding process of the transmitted codes occurs at the end of the transmission link. The simulation results show that the original codes can be recovered with a high security of signal transmission using the Manchester method.