A new method for solving the tiling problem of surface reconstruction is proposed. The proposed method uses a snake algorithm to segment the original images, the contours are then transformed into strings by Freeman'...A new method for solving the tiling problem of surface reconstruction is proposed. The proposed method uses a snake algorithm to segment the original images, the contours are then transformed into strings by Freeman' s code. Symbolic string matching technique is applied to establish a correspondence between the two consecutive contours. The surface is composed of the pieces reconstructed from the correspondence points. Experimental results show that the proposed method exhibits a good behavior for the quality of surface reconstruction and its time complexity is proportional to mn where m and n are the numbers of vertices of the two consecutive slices, respectively.展开更多
It is important to achieve continuous, stable and efficient pumping well operation in actual oilfield operation. Down-hole pumping well working conditions can be monitored in real-time and a reasonable production sche...It is important to achieve continuous, stable and efficient pumping well operation in actual oilfield operation. Down-hole pumping well working conditions can be monitored in real-time and a reasonable production scheme can be designed when computer diagnosis is used. However, it is difficult to make a comprehensive analysis to supply efficient technical guidance for operation of the pumping well with multiple faults of down-hole conditions, which cannot be effectively dealt with by the common methods. To solve this problem, a method based on designated component analysis (DCA) is used in this paper. Freeman chain code is used to represent the down-hole dynamometer card whose important characteristics are extracted to construct a designated mode set. A control chart is used as a basis for fault detection. The upper and lower control lines on the control chart are determined from standard samples in normal working conditions. In an incompletely orthogonal mode, the designated mode set could be divided into some subsets in which the modes are completely orthogonal. The observed data is projected into each designated mode to realize fault detection according to the upper and lower control lines. The examples show that the proposed method can effectively diagnose multiple faults of down-hole conditions.展开更多
Permutation codes over finite chain rings are introduced; by using the character of the finite chain rings and the knowledge of representation of group, some conditions for existence or non-existence of self-dual perm...Permutation codes over finite chain rings are introduced; by using the character of the finite chain rings and the knowledge of representation of group, some conditions for existence or non-existence of self-dual permutation codes over finite chain rings are obtained. Specially, when the group is a direct product of a 2-group and a T-group, and the group action is transitive, the sufficient and necessary condition of the existence of permutation codes is given.展开更多
Aiming at the problem of reverse-design of mechanism, a method based on the matching of trajectory code-chains is presented. The motion trajectory of mechanism is described with code-chain, which is normalized to simp...Aiming at the problem of reverse-design of mechanism, a method based on the matching of trajectory code-chains is presented. The motion trajectory of mechanism is described with code-chain, which is normalized to simplify the operation of geometric transformation. The geometric transforma-tion formulas of scale, mirror and rotation for trajectory code-chain are defined, and the reverse de-sign for mechanism trajectory is realized through the analysis and solution of similarity matching between the desired trajectory and the predefined trajectory. The algorithm program and prototype system of reverse design for mechanism trajectory are developed. Application samples show that the method can break the restriction of trajectory patterns in matching, meet the demand of partial match-ing, and overcome the influence of geometric transformation of trajectory on the reverse design for mechanism.展开更多
Face recognition is an active area of biometrics. This study investigates the use of Chain Codes as features for recognition purpose. Firstly a segmentation method, based on skin color model was applied, followed by c...Face recognition is an active area of biometrics. This study investigates the use of Chain Codes as features for recognition purpose. Firstly a segmentation method, based on skin color model was applied, followed by contour detection, then the chain codes of the contours were determined. The first difference of chain codes were calculated since the latter is invariant to rotation. The features were calculated and stored in a matrix. Experiments were performed using the University of Essex Face database, and results show a recognition rate of 95% with this method, when compared with Principal Components Analysis (PCA) giving 87.5% recognition rate.展开更多
Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher ...Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher order Markov chain model and how to automatically select the proper order are given in this paper. The chi square test is first run on synthetic data sets to show that it can efficiently find the proper order of Markov chain. Using chi square test, distinct higher order context dependences inherent in ten sets of sequences of yeast S.cerevisiae from other literature have been found. So the Markov chain with higher order would be more suitable for modeling the non coding background sequences than an independent model.展开更多
In this article, we focus on cyclic and negacyclic codes of length 2p^s over the ring R = Fp^m + uFp^m, where p is an odd prime. On the basis of the works of Dinh (in J.Algebra 324,940-950,2010), we use the Chinese...In this article, we focus on cyclic and negacyclic codes of length 2p^s over the ring R = Fp^m + uFp^m, where p is an odd prime. On the basis of the works of Dinh (in J.Algebra 324,940-950,2010), we use the Chinese Remainder Theorem to establish the algebraic structure of cyclic and negacyclic codes of length 2p^s over the ring Fp^m + uFp^m in terms of polynomial generators. Furthermore, we obtain the number of codewords in each of those cyclic and negacyclic codes.展开更多
In this article, cyclic codes and negacyclic codes over formal power series rings are studied. The structure of cyclic codes over this class of rings is given, and the relationship between these codes and cyclic codes...In this article, cyclic codes and negacyclic codes over formal power series rings are studied. The structure of cyclic codes over this class of rings is given, and the relationship between these codes and cyclic codes over finite chain rings is obtained. Using an isomorphism between cyclic and negacyclic codes over formal power series rings, the structure of negacyclic codes over the formal power series rings is obtained.展开更多
For at least the past five decades,structural synthesis has been used as a main means of finding better mechanisms with some predefined function.In structural synthesis,isomorphism identification is still a problem un...For at least the past five decades,structural synthesis has been used as a main means of finding better mechanisms with some predefined function.In structural synthesis,isomorphism identification is still a problem unsolved well,and to solve this problem is very significant to the design of new mechanisms.According to the given degree of freedom(DOF) and link connection property of planar closed chain mechanisms,vertex assortment is obtained.For solving the isomorphism problem,a method of the adding sub-chains is proposed with the detailed steps and algorithms in the synthesizing process.Employing this method,the identification code and formation code of every topological structure are achieved,therefore many isomorphic structures could be eliminated in time during structural synthesis by comparing those codes among different topological graphs,resulting in the improvement of synthesizing efficiency and accuracy,and the approach for eliminating rigid sub-chains in and after the synthesizing process is also presented.Some examples are given,including how to add sub-chains,how to detect simple rigid sub-chains and how to obtain identification codes and formulation codes et al.Using the adding sub-chain method,the relative information of some common topological graphs is given in the form of table.The comparison result is coincident with many literatures,so the correctness of the adding sub-chain method is convinced.This method will greatly improve the synthesizing efficiency and accuracy,and has a good potential for application.展开更多
Let R be a finite chain ring with maximal ideal (7) and residue field F,and letγ be of nilpotency index t. To every code C of length n over R, a tower of codes C = (C : γ0) C_ (C: 7) C ... C_ (C: γ2) C_ ...Let R be a finite chain ring with maximal ideal (7) and residue field F,and letγ be of nilpotency index t. To every code C of length n over R, a tower of codes C = (C : γ0) C_ (C: 7) C ... C_ (C: γ2) C_ .-. C_ (C:γ^t-1) can be associated with C, where for any r C R, (C : r) = {e C Rn I re E C}. Using generator elements of the projection of such a tower of codes to the residue field F, we characterize cyclic codes over R. This characterization turns the condition for codes over R to be cyclic into one for codes over the residue field F. Furthermore, we obtain a characterization of cyclic codes over the formal power series ring of a finite chain ring.展开更多
The image contour is segmented into lines, arcs and smooth curves by median filtering of extended direction code. Based on this segmentation, a set of new local invariant features are proposed to recognize partially o...The image contour is segmented into lines, arcs and smooth curves by median filtering of extended direction code. Based on this segmentation, a set of new local invariant features are proposed to recognize partially occluded objects, which is more reasonable compared with conventional corner features. The matching results of some typical examples shows that these features are robust ,effective in recognition.展开更多
Network Coding (NC) is confirmed to be power and bandwidth efficient technique, because of the less number of transmitted packets over the network. Wireless Sensor Network (WSN) is usually power limited network applic...Network Coding (NC) is confirmed to be power and bandwidth efficient technique, because of the less number of transmitted packets over the network. Wireless Sensor Network (WSN) is usually power limited network application, and in many scenarios it is power and bandwidth limited application. The proposed scenario in this paper applies the advantages of NC over WSN to obtain such power and bandwidth efficient WSN. To take the advantages of NC over the one of the most needed applications i.e., WSN, we come up to what this paper is discussing. We consider a WSN (or its cluster) that consists of M nodes that transmit equal-length information packets to a common destination node D over wireless Rayleigh block-fading channel where the instantaneous SNR is assumed to be constant over a single packet transmission period. Finite-State packet level Markov chain (FSMC) model is applied to give the channel more practical aspect. The simulation results showed that applying NC over the WSN cluster improved the channel bandwidth significantly by decreasing the number of the Automatic Repeat Request (ARQ), resulting in improving the power consumption significantly. The results are collected for different transmission distances to evaluate the behavior to the proposed scenario with regard to the bath losses effect.展开更多
Objective:Long non coding RNA (lncrna) is a kind of RNA with a length of more than 200 bp but not directly encoding protein. It is found that lncrna involves many important biological processes, such as cell prolifera...Objective:Long non coding RNA (lncrna) is a kind of RNA with a length of more than 200 bp but not directly encoding protein. It is found that lncrna involves many important biological processes, such as cell proliferation, cell survival, cell differentiation, organogenesis, genomic imprinting, and chromatin remodeling. The metastasis associated lung cancer transcript 1 (malat1) is an important member of the lncrna family. It is located on human chromosome 11 (11p13.1), with a length of 8000 BP. It is an intergenic transcript. Malat1 is highly expressed in cervical cancer, which may be closely related to the occurrence and development of cervical cancer, and may become a new target for diagnosis and treatment of cervical cancer. This article reviews the research status of the relationship between lncrna malat1 and cervical cancer.展开更多
In this paper, we give an explicit construction for self-dual codes over F_p+vF_p(v^2= v) and determine all the self-dual codes over F_p+ vF_p by using self-dual codes over finite field F_p, where p is a prime.
目的研究缺血性脑卒中患者血清差异基因的筛选及生物信息学。方法以2023年3月-2024年3月在新疆医科大学第二附属医院神经内科确诊的80例缺血性脑卒中患者为病例组,选择同期80例健康体检者为对照组。分别挑选两组各10例受试者的外周血清...目的研究缺血性脑卒中患者血清差异基因的筛选及生物信息学。方法以2023年3月-2024年3月在新疆医科大学第二附属医院神经内科确诊的80例缺血性脑卒中患者为病例组,选择同期80例健康体检者为对照组。分别挑选两组各10例受试者的外周血清采用芯片差异性基因鉴定法筛选缺血性脑卒中差异表达的长链非编码RNA(lncRNA),并采用KEGG通路富集和基因本体论(GO)分析鉴定差异表达基因发挥的生物学功能。挑选2个上调和2个下调的lncR-NAs,在两组患者外周血中采用实时荧光定量PCR(qRT-PCR)法检测表达量,采用受试者工作特征曲线(Receiver operating characteristic,ROC)计算差异性表达lncRNAs诊断缺血性脑卒中的曲线下面积(Area under the curve,AUC)。结果共检测到34个高表达和16个低表达的lncR-NAs。KEGG通道分析显示,差异表达的lncRNAs涉及肿瘤坏死因子(TNF)信号通路、类风湿性关节炎、细胞因子与细胞因子受体相互作用,病毒蛋白与细胞因子和细胞因子受体的相互作用、癌症的转录失调、沙门氏菌感染、白细胞介素(IL)-17信号通路、趋化因子信号通路。GO分析显示,差异表达的lncRNAs涉及白细胞黏附调控、细胞黏附调节、白细胞与其他细胞黏附、细胞趋化性、T细胞活化、骨髓细胞分化、止血和凝血。qRT-PCR检测显示,与对照组比较,病例组患者A1BG-AS1和BRWD1-AS2表达量升高,BVES-AS1和C10ORF71-AS1表达量降低,差异有统计学意义(P<0.05)。ROC分析显示,A1BG-AS1、BRWD1-AS2、BVES-AS1和C10ORF71-AS1表达量诊断缺血性脑卒中的AUC分别为0.803、0.856、0.897和0.798(P<0.001)。结论缺血性脑卒中患者外周血中A1BG-AS1、BRWD1-AS2、BVES-AS1和C10ORF71-AS1基因差异性表达,可以辅助缺血性脑卒中的疾病诊断。展开更多
文摘A new method for solving the tiling problem of surface reconstruction is proposed. The proposed method uses a snake algorithm to segment the original images, the contours are then transformed into strings by Freeman' s code. Symbolic string matching technique is applied to establish a correspondence between the two consecutive contours. The surface is composed of the pieces reconstructed from the correspondence points. Experimental results show that the proposed method exhibits a good behavior for the quality of surface reconstruction and its time complexity is proportional to mn where m and n are the numbers of vertices of the two consecutive slices, respectively.
基金supported by the Key Program of National Natural Science Foundation of China (61034005)Postgraduate Scientific Research and Innovation Projects of Basic Scientific Research Operating Expensesof Ministry of Education (N100604001)Excellent Doctoral Dissertations Cultivation Project of Northeastern University
文摘It is important to achieve continuous, stable and efficient pumping well operation in actual oilfield operation. Down-hole pumping well working conditions can be monitored in real-time and a reasonable production scheme can be designed when computer diagnosis is used. However, it is difficult to make a comprehensive analysis to supply efficient technical guidance for operation of the pumping well with multiple faults of down-hole conditions, which cannot be effectively dealt with by the common methods. To solve this problem, a method based on designated component analysis (DCA) is used in this paper. Freeman chain code is used to represent the down-hole dynamometer card whose important characteristics are extracted to construct a designated mode set. A control chart is used as a basis for fault detection. The upper and lower control lines on the control chart are determined from standard samples in normal working conditions. In an incompletely orthogonal mode, the designated mode set could be divided into some subsets in which the modes are completely orthogonal. The observed data is projected into each designated mode to realize fault detection according to the upper and lower control lines. The examples show that the proposed method can effectively diagnose multiple faults of down-hole conditions.
基金Supported by the National Natural Science Foundation of China (60373087, 60473023, 90104005, 60673071)
文摘Permutation codes over finite chain rings are introduced; by using the character of the finite chain rings and the knowledge of representation of group, some conditions for existence or non-existence of self-dual permutation codes over finite chain rings are obtained. Specially, when the group is a direct product of a 2-group and a T-group, and the group action is transitive, the sufficient and necessary condition of the existence of permutation codes is given.
基金This project is supported by National Hi-tech Research and Development Program of China (863 Program, No. 2006AA04Z114)Research Fund for the Doctoral Program of Higher Education, China (No. 20040335060)Provincial Scientific Personnel Educational Foundation of Zhejiang, China (No. R603240).
文摘Aiming at the problem of reverse-design of mechanism, a method based on the matching of trajectory code-chains is presented. The motion trajectory of mechanism is described with code-chain, which is normalized to simplify the operation of geometric transformation. The geometric transforma-tion formulas of scale, mirror and rotation for trajectory code-chain are defined, and the reverse de-sign for mechanism trajectory is realized through the analysis and solution of similarity matching between the desired trajectory and the predefined trajectory. The algorithm program and prototype system of reverse design for mechanism trajectory are developed. Application samples show that the method can break the restriction of trajectory patterns in matching, meet the demand of partial match-ing, and overcome the influence of geometric transformation of trajectory on the reverse design for mechanism.
文摘Face recognition is an active area of biometrics. This study investigates the use of Chain Codes as features for recognition purpose. Firstly a segmentation method, based on skin color model was applied, followed by contour detection, then the chain codes of the contours were determined. The first difference of chain codes were calculated since the latter is invariant to rotation. The features were calculated and stored in a matrix. Experiments were performed using the University of Essex Face database, and results show a recognition rate of 95% with this method, when compared with Principal Components Analysis (PCA) giving 87.5% recognition rate.
文摘Modeling non coding background sequences appropriately is important for the detection of regulatory elements from DNA sequences. Based on the chi square statistic test, some explanations about why to choose higher order Markov chain model and how to automatically select the proper order are given in this paper. The chi square test is first run on synthetic data sets to show that it can efficiently find the proper order of Markov chain. Using chi square test, distinct higher order context dependences inherent in ten sets of sequences of yeast S.cerevisiae from other literature have been found. So the Markov chain with higher order would be more suitable for modeling the non coding background sequences than an independent model.
基金supported by the Natural ScienceFoundation of Hubei Province(D2014401)the Natural Science Foundation of Hubei Polytechnic University(12xjz14A)
文摘In this article, we focus on cyclic and negacyclic codes of length 2p^s over the ring R = Fp^m + uFp^m, where p is an odd prime. On the basis of the works of Dinh (in J.Algebra 324,940-950,2010), we use the Chinese Remainder Theorem to establish the algebraic structure of cyclic and negacyclic codes of length 2p^s over the ring Fp^m + uFp^m in terms of polynomial generators. Furthermore, we obtain the number of codewords in each of those cyclic and negacyclic codes.
基金supported by SRF for ROCS,SEM,the Key Project of Chinese Ministry of Education (108099)CCNU Project (CCNU09Y01003)
文摘In this article, cyclic codes and negacyclic codes over formal power series rings are studied. The structure of cyclic codes over this class of rings is given, and the relationship between these codes and cyclic codes over finite chain rings is obtained. Using an isomorphism between cyclic and negacyclic codes over formal power series rings, the structure of negacyclic codes over the formal power series rings is obtained.
基金supported by National Natural Science Foundation of China (Grant No. 51075079)National Hi-tech Research and Development Program of China(863 Program,Grant No. 2008AA04Z202)
文摘For at least the past five decades,structural synthesis has been used as a main means of finding better mechanisms with some predefined function.In structural synthesis,isomorphism identification is still a problem unsolved well,and to solve this problem is very significant to the design of new mechanisms.According to the given degree of freedom(DOF) and link connection property of planar closed chain mechanisms,vertex assortment is obtained.For solving the isomorphism problem,a method of the adding sub-chains is proposed with the detailed steps and algorithms in the synthesizing process.Employing this method,the identification code and formation code of every topological structure are achieved,therefore many isomorphic structures could be eliminated in time during structural synthesis by comparing those codes among different topological graphs,resulting in the improvement of synthesizing efficiency and accuracy,and the approach for eliminating rigid sub-chains in and after the synthesizing process is also presented.Some examples are given,including how to add sub-chains,how to detect simple rigid sub-chains and how to obtain identification codes and formulation codes et al.Using the adding sub-chain method,the relative information of some common topological graphs is given in the form of table.The comparison result is coincident with many literatures,so the correctness of the adding sub-chain method is convinced.This method will greatly improve the synthesizing efficiency and accuracy,and has a good potential for application.
基金supported by the Natural Science Foundation of Hubei Province (B20114410)the Natural Science Foundation of Hubei Polytechnic University (12xjz14A)
文摘Let R be a finite chain ring with maximal ideal (7) and residue field F,and letγ be of nilpotency index t. To every code C of length n over R, a tower of codes C = (C : γ0) C_ (C: 7) C ... C_ (C: γ2) C_ .-. C_ (C:γ^t-1) can be associated with C, where for any r C R, (C : r) = {e C Rn I re E C}. Using generator elements of the projection of such a tower of codes to the residue field F, we characterize cyclic codes over R. This characterization turns the condition for codes over R to be cyclic into one for codes over the residue field F. Furthermore, we obtain a characterization of cyclic codes over the formal power series ring of a finite chain ring.
文摘The image contour is segmented into lines, arcs and smooth curves by median filtering of extended direction code. Based on this segmentation, a set of new local invariant features are proposed to recognize partially occluded objects, which is more reasonable compared with conventional corner features. The matching results of some typical examples shows that these features are robust ,effective in recognition.
文摘Network Coding (NC) is confirmed to be power and bandwidth efficient technique, because of the less number of transmitted packets over the network. Wireless Sensor Network (WSN) is usually power limited network application, and in many scenarios it is power and bandwidth limited application. The proposed scenario in this paper applies the advantages of NC over WSN to obtain such power and bandwidth efficient WSN. To take the advantages of NC over the one of the most needed applications i.e., WSN, we come up to what this paper is discussing. We consider a WSN (or its cluster) that consists of M nodes that transmit equal-length information packets to a common destination node D over wireless Rayleigh block-fading channel where the instantaneous SNR is assumed to be constant over a single packet transmission period. Finite-State packet level Markov chain (FSMC) model is applied to give the channel more practical aspect. The simulation results showed that applying NC over the WSN cluster improved the channel bandwidth significantly by decreasing the number of the Automatic Repeat Request (ARQ), resulting in improving the power consumption significantly. The results are collected for different transmission distances to evaluate the behavior to the proposed scenario with regard to the bath losses effect.
基金Guangxi Natural Science Foundation(No.2016jja140536)Guangxi Medical and health appropriate technology development and promotion application project(No.s2019041)Guangxi Medical University Youth Science Foundation Project(No.gxmuysf201625).
文摘Objective:Long non coding RNA (lncrna) is a kind of RNA with a length of more than 200 bp but not directly encoding protein. It is found that lncrna involves many important biological processes, such as cell proliferation, cell survival, cell differentiation, organogenesis, genomic imprinting, and chromatin remodeling. The metastasis associated lung cancer transcript 1 (malat1) is an important member of the lncrna family. It is located on human chromosome 11 (11p13.1), with a length of 8000 BP. It is an intergenic transcript. Malat1 is highly expressed in cervical cancer, which may be closely related to the occurrence and development of cervical cancer, and may become a new target for diagnosis and treatment of cervical cancer. This article reviews the research status of the relationship between lncrna malat1 and cervical cancer.
基金supported in part by the National Science Foundation of China under Grant 11571005in part by the Key Research Project of Higher Education of the Education Department of Henan Province under Grant 19A120010
文摘In this paper, we give an explicit construction for self-dual codes over F_p+vF_p(v^2= v) and determine all the self-dual codes over F_p+ vF_p by using self-dual codes over finite field F_p, where p is a prime.
文摘目的研究缺血性脑卒中患者血清差异基因的筛选及生物信息学。方法以2023年3月-2024年3月在新疆医科大学第二附属医院神经内科确诊的80例缺血性脑卒中患者为病例组,选择同期80例健康体检者为对照组。分别挑选两组各10例受试者的外周血清采用芯片差异性基因鉴定法筛选缺血性脑卒中差异表达的长链非编码RNA(lncRNA),并采用KEGG通路富集和基因本体论(GO)分析鉴定差异表达基因发挥的生物学功能。挑选2个上调和2个下调的lncR-NAs,在两组患者外周血中采用实时荧光定量PCR(qRT-PCR)法检测表达量,采用受试者工作特征曲线(Receiver operating characteristic,ROC)计算差异性表达lncRNAs诊断缺血性脑卒中的曲线下面积(Area under the curve,AUC)。结果共检测到34个高表达和16个低表达的lncR-NAs。KEGG通道分析显示,差异表达的lncRNAs涉及肿瘤坏死因子(TNF)信号通路、类风湿性关节炎、细胞因子与细胞因子受体相互作用,病毒蛋白与细胞因子和细胞因子受体的相互作用、癌症的转录失调、沙门氏菌感染、白细胞介素(IL)-17信号通路、趋化因子信号通路。GO分析显示,差异表达的lncRNAs涉及白细胞黏附调控、细胞黏附调节、白细胞与其他细胞黏附、细胞趋化性、T细胞活化、骨髓细胞分化、止血和凝血。qRT-PCR检测显示,与对照组比较,病例组患者A1BG-AS1和BRWD1-AS2表达量升高,BVES-AS1和C10ORF71-AS1表达量降低,差异有统计学意义(P<0.05)。ROC分析显示,A1BG-AS1、BRWD1-AS2、BVES-AS1和C10ORF71-AS1表达量诊断缺血性脑卒中的AUC分别为0.803、0.856、0.897和0.798(P<0.001)。结论缺血性脑卒中患者外周血中A1BG-AS1、BRWD1-AS2、BVES-AS1和C10ORF71-AS1基因差异性表达,可以辅助缺血性脑卒中的疾病诊断。