This paper investigated the existence of splitting balanced incomplete block designs with blck size 2× k .The necessary conditions for such a design are λ(v-1) ≡0(mod k ),and λv(v- 1)≡0(mod 2 k 2).It will sho...This paper investigated the existence of splitting balanced incomplete block designs with blck size 2× k .The necessary conditions for such a design are λ(v-1) ≡0(mod k ),and λv(v- 1)≡0(mod 2 k 2).It will show that the above necessary conditions are also sufficient for k =3 with the definite exception( v,λ )=(10,1) and with several possible exceptions.展开更多
This paper studies the nonsystematic Low-Density Parity-Check(LDPC)codes based onSymmetric Balanced Incomplete Block Design(SBIBD).First,it is concluded that the performancedegradation of nonsystematic linear block co...This paper studies the nonsystematic Low-Density Parity-Check(LDPC)codes based onSymmetric Balanced Incomplete Block Design(SBIBD).First,it is concluded that the performancedegradation of nonsystematic linear block codes is bounded by the average row weight of generalizedinverses of their generator matrices and code rate.Then a class of nonsystematic LDPC codes con-structed based on SBIBD is presented.Their characteristics include:both generator matrices andparity-check matrices are sparse and cyclic,which are simple to encode and decode;and almost arbi-trary rate codes can be easily constructed,so they are rate-compatible codes.Because there aresparse generalized inverses of generator matrices,the performance of the proposed codes is only0.15dB away from that of the traditional systematic LDPC codes.展开更多
Methods of constructing the optimum chemical balance weighing designs from symmetric balanced incomplete block designs are proposed with illustration. As a by-product pairwise efficiency and variance balanced designs ...Methods of constructing the optimum chemical balance weighing designs from symmetric balanced incomplete block designs are proposed with illustration. As a by-product pairwise efficiency and variance balanced designs are also obtained.展开更多
General solution of normal equations in the general intra-block analysis of partially balanced incomplete block designs involving four associates is presented in this talk as they are quite useful in practice. Only in...General solution of normal equations in the general intra-block analysis of partially balanced incomplete block designs involving four associates is presented in this talk as they are quite useful in practice. Only intra-block estimates are given as the necessary formulae for inter-block estimates can be derived from them by changing the parameters as discussed in Rao[5]. We have obtained the general formulae for computation of four types of efficiencies, the average efficiency factor and the variance of the estimated elementary treatment contrast of the four types of comparisons irrespective of the type of association scheme a PBIB Design follows.展开更多
In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of ...In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of getting the optimal slot-count parameter is studied and an optimal Q algorithm is proposed. The theoretical and simulation results show that the proposed algorithm can improve reading efficiency by 100% more than the conventional Q algorithm. Moreover,the proposed scheme changes little to the existing standard. Thus,it is easy to implement and compatible with ISO 18000-6C.展开更多
Combined with a digital bored photography system and in-situ statistics concerning the joints and fissures of both ore-body and surrounding rock,a 2D discrete model was constructed using UDEC.The stress field and disp...Combined with a digital bored photography system and in-situ statistics concerning the joints and fissures of both ore-body and surrounding rock,a 2D discrete model was constructed using UDEC.The stress field and displacement field changes of different sublevel stoping systems were also studied.Changes in the overlying rock strata settlement pattern has been analyzed and validated by in-situ monitoring data.The results show that:in the caving process,there exists an obvious delay and jump for the overlying rock strata displacement over time,and a stable arch can be formed in the process of caving,which leads to hidden goafs.Disturbed by the mining activity,a stress increase occurred in both the hanging wall and the foot wall,demonstrating a hump-shaped distribution pattern.From the comparison between simulation results and in-situ monitoring results,land subsidence shows a slow-development,suddenfailure,slow-development cycle pattern,which leads eventually to a stable state.This pattern validates the existence of balanced arch and hidden goafs.展开更多
Let (v, u × c,λ)-splitting BIBD denote a (v, u × c,λ)-splitting balanced incomplete block design of order v with block size u × c and index A. The necessary conditions for the existence of a (v, ...Let (v, u × c,λ)-splitting BIBD denote a (v, u × c,λ)-splitting balanced incomplete block design of order v with block size u × c and index A. The necessary conditions for the existence of a (v, u × c,λ)-splitting BIBD are v ≥ uc, λ(v- 1) -- 0 0 mod (c(u- 1)) and Av(v- 1) - 0 mod (c^2u(u- 1)). In this paper, for 2 ≤λ≤ 9 the necessary conditions for the existence of a (v, 3 × 3, λ)-splitting BIBD are also sufficient with one possible exception for (v, λ) = (39, 9).展开更多
Due to its character of topology independency, topology-transparent medium access control (MAC) scheduling algorithm is very suitable for large-scale mobile ad hoc wireless networks. In this paper, we propose a new to...Due to its character of topology independency, topology-transparent medium access control (MAC) scheduling algorithm is very suitable for large-scale mobile ad hoc wireless networks. In this paper, we propose a new topologytransparent MAC scheduling algorithm, with parameters of the node number and the maximal nodal degree known, our scheduling algorithm is based on a special balanced incomplete block design whose block size is optimized by maximizing the guaranteed throughput. Its superiority over typical other scheduling algorithms is proven mathematically with respect to the guaranteed throughput, the maximal transmission delay, and also the minimal transmission delay. The effect of inaccuracy in the estimation of the maximal nodal degree on the guaranteed throughput is deduced mathematically, showing that the guaranteed throughput decreases almost linearly as the actual nodal degree increases. Further techniques for improving the feasibility of the algorithm, such as collision avoidance, time synchronization, etc., are also discussed.展开更多
Given any positive integers k3 and λ,let c(k,λ)denote the smallest integer such that u ∈ B(k,λ)for every integer uc(k,λ)that satisfies the congruences λv(v-1)≡0(mod k(k-1))and λ(u-1)≡0(mod k-1...Given any positive integers k3 and λ,let c(k,λ)denote the smallest integer such that u ∈ B(k,λ)for every integer uc(k,λ)that satisfies the congruences λv(v-1)≡0(mod k(k-1))and λ(u-1)≡0(mod k-1).In this article we make an improvement on the bound of c(k,λ)provided by Chang in[4]and prove that c(k,λ)exp{k<sup>3k<sup>6</sup></sup>}.In particular,c(k,1)exp{k<sup>k<sup>2</sup></sup>}.展开更多
基金National Natural Science Foundation ofChina(No.10 4710 93)
文摘This paper investigated the existence of splitting balanced incomplete block designs with blck size 2× k .The necessary conditions for such a design are λ(v-1) ≡0(mod k ),and λv(v- 1)≡0(mod 2 k 2).It will show that the above necessary conditions are also sufficient for k =3 with the definite exception( v,λ )=(10,1) and with several possible exceptions.
基金the National Natural Science Foundation of China(No.60272009,No.60472045,and No.60496313).
文摘This paper studies the nonsystematic Low-Density Parity-Check(LDPC)codes based onSymmetric Balanced Incomplete Block Design(SBIBD).First,it is concluded that the performancedegradation of nonsystematic linear block codes is bounded by the average row weight of generalizedinverses of their generator matrices and code rate.Then a class of nonsystematic LDPC codes con-structed based on SBIBD is presented.Their characteristics include:both generator matrices andparity-check matrices are sparse and cyclic,which are simple to encode and decode;and almost arbi-trary rate codes can be easily constructed,so they are rate-compatible codes.Because there aresparse generalized inverses of generator matrices,the performance of the proposed codes is only0.15dB away from that of the traditional systematic LDPC codes.
文摘Methods of constructing the optimum chemical balance weighing designs from symmetric balanced incomplete block designs are proposed with illustration. As a by-product pairwise efficiency and variance balanced designs are also obtained.
文摘General solution of normal equations in the general intra-block analysis of partially balanced incomplete block designs involving four associates is presented in this talk as they are quite useful in practice. Only intra-block estimates are given as the necessary formulae for inter-block estimates can be derived from them by changing the parameters as discussed in Rao[5]. We have obtained the general formulae for computation of four types of efficiencies, the average efficiency factor and the variance of the estimated elementary treatment contrast of the four types of comparisons irrespective of the type of association scheme a PBIB Design follows.
基金Supported by the National Natural Science Foundation of China(No.61340005)Beijing Natural Science Foundation(No.4132012)+2 种基金Beijing Education Committee Science and Technology Development Plan(No.KM201411232011)Beijing Outstanding Personnel Training Project(No.2013D005007000006)Scientific Research Improving Project-Intelligent Sense and Information Processing(No.5211524100)
文摘In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of getting the optimal slot-count parameter is studied and an optimal Q algorithm is proposed. The theoretical and simulation results show that the proposed algorithm can improve reading efficiency by 100% more than the conventional Q algorithm. Moreover,the proposed scheme changes little to the existing standard. Thus,it is easy to implement and compatible with ISO 18000-6C.
基金financially supported by the National Natural Science Foundation of China(No.51374033)the Doctoral Program of Higher Education Research Fund(No.20120006110022)the Chenchao Iron Mine and the technical support of Itasca
文摘Combined with a digital bored photography system and in-situ statistics concerning the joints and fissures of both ore-body and surrounding rock,a 2D discrete model was constructed using UDEC.The stress field and displacement field changes of different sublevel stoping systems were also studied.Changes in the overlying rock strata settlement pattern has been analyzed and validated by in-situ monitoring data.The results show that:in the caving process,there exists an obvious delay and jump for the overlying rock strata displacement over time,and a stable arch can be formed in the process of caving,which leads to hidden goafs.Disturbed by the mining activity,a stress increase occurred in both the hanging wall and the foot wall,demonstrating a hump-shaped distribution pattern.From the comparison between simulation results and in-situ monitoring results,land subsidence shows a slow-development,suddenfailure,slow-development cycle pattern,which leads eventually to a stable state.This pattern validates the existence of balanced arch and hidden goafs.
基金the National Natural Science Foundation of China (No. 10771193)the Starter Foundation for the Doctors of Zhejiang Gongshang University(No. 1020XJ030517)+1 种基金the Natural Science Foundationof Universities of Jiangsu Province (No. 07KJB110090)the Starter Foundation for the Doctors of Nantong University (No. 07B12)
文摘Let (v, u × c,λ)-splitting BIBD denote a (v, u × c,λ)-splitting balanced incomplete block design of order v with block size u × c and index A. The necessary conditions for the existence of a (v, u × c,λ)-splitting BIBD are v ≥ uc, λ(v- 1) -- 0 0 mod (c(u- 1)) and Av(v- 1) - 0 mod (c^2u(u- 1)). In this paper, for 2 ≤λ≤ 9 the necessary conditions for the existence of a (v, 3 × 3, λ)-splitting BIBD are also sufficient with one possible exception for (v, λ) = (39, 9).
基金supported by the National Natural Science Foundation of China (No. 61003307, 60803159, 60873093)the Basic DisciplinesResearch Foundation of China University of Petroleum, Beijing (No. JCXK-2010-01)+1 种基金the Beijing Municipal Natural Science Foundation (No.4102059)the National High Technology Research and Development Program of China (No. 2009AA062802)
文摘Due to its character of topology independency, topology-transparent medium access control (MAC) scheduling algorithm is very suitable for large-scale mobile ad hoc wireless networks. In this paper, we propose a new topologytransparent MAC scheduling algorithm, with parameters of the node number and the maximal nodal degree known, our scheduling algorithm is based on a special balanced incomplete block design whose block size is optimized by maximizing the guaranteed throughput. Its superiority over typical other scheduling algorithms is proven mathematically with respect to the guaranteed throughput, the maximal transmission delay, and also the minimal transmission delay. The effect of inaccuracy in the estimation of the maximal nodal degree on the guaranteed throughput is deduced mathematically, showing that the guaranteed throughput decreases almost linearly as the actual nodal degree increases. Further techniques for improving the feasibility of the algorithm, such as collision avoidance, time synchronization, etc., are also discussed.
基金Supported by NSFC Grant No.19701002 and Huo Yingdong Foundation
文摘Given any positive integers k3 and λ,let c(k,λ)denote the smallest integer such that u ∈ B(k,λ)for every integer uc(k,λ)that satisfies the congruences λv(v-1)≡0(mod k(k-1))and λ(u-1)≡0(mod k-1).In this article we make an improvement on the bound of c(k,λ)provided by Chang in[4]and prove that c(k,λ)exp{k<sup>3k<sup>6</sup></sup>}.In particular,c(k,1)exp{k<sup>k<sup>2</sup></sup>}.