Aiming at the optimum path excluding characteristics and the full constellation searching characteristics of the K-best detection algorithm, an improved-performance K-best detection algorithm and several reduced-compl...Aiming at the optimum path excluding characteristics and the full constellation searching characteristics of the K-best detection algorithm, an improved-performance K-best detection algorithm and several reduced-complexity K-best detection algorithms are proposed. The improved-performance K-best detection algorithm deploys minimum mean square error (MMSE) filtering of a channel matrix before QR decomposition. This algorithm can decrease the probability of excluding the optimum path and achieve better performance. The reducedcomplexity K-best detection algorithms utilize a sphere decoding method to reduce searching constellation points. Simulation results show that the improved performance K-best detection algorithm obtains a 1 dB performance gain compared to the K- best detection algorithm based on sorted QR decomposition (SQRD). Performance loss occurs when K = 4 in reduced complexity K-best detection algorithms. When K = 8, the reduced complexity K-best detection algorithms require less computational effort compared with traditional K-best detection algorithms and achieve the same performance.展开更多
To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical couplin...To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical coupling relationship between routes and sectors is analyzed,an air traffic CPS network model is constructed,and the indicators of node influence and invulnerability are established.The K-shell algorithm is improved to identify node influence,and the invulnerability is analyzed under random and selective attacks.Taking Airspace in Eastern China as an example,its influential nodes are sorted by degree,namely,K-shell,the improved K-shell(IKS)and betweenness centrality.The invulnerability of air traffic CPS under different attacks is analyzed.Results show that IKS can effectively identify the influential nodes in the air traffic CPS network,and IKS and betweenness centrality are the two key indicators that affect the invulnerability of air traffic CPS.展开更多
Taxi drivers' cruising patterns are learnt with GPS trajectory data collected in Shenzhen, China. By employing Ripley's K function, the impacts of land use and pick-up experience on taxis' cruising behavio...Taxi drivers' cruising patterns are learnt with GPS trajectory data collected in Shenzhen, China. By employing Ripley's K function, the impacts of land use and pick-up experience on taxis' cruising behavior are investigated concerning about both intensity of influence and radius of influence. The results indicate that, in general, taxi drivers tend to learn more from land use characteristics than from pick-up experience. The optimal radius of influence of land use points and previous pick-up points is 14.18 km and 9.93 km, respectively. The findings also show that the high-earning drivers or thorough drivers pay more attention to land use characteristics and tend to cruise in high-density area, while the low-earning drivers or focus drivers prefer to learn more from previous pick-up experience and select the area which is far away from the high-density area. These findings facilitate the development of measures of managing taxi's travel behavior by providing useful insights into taxis' cruising patterns. The results also provide useful advice for taxi drivers to make efficient cruising decision, which will contribute to the improvement of cruising efficiency and the reduction of negative effects.展开更多
Linear complexity and k-error linear complexity of the stream cipher are two important standards to scale the randomicity of keystreams. For the 2n -periodicperiodic binary sequence with linear complexity 2n 1and k = ...Linear complexity and k-error linear complexity of the stream cipher are two important standards to scale the randomicity of keystreams. For the 2n -periodicperiodic binary sequence with linear complexity 2n 1and k = 2,3,the number of sequences with given k-error linear complexity and the expected k-error linear complexity are provided. Moreover,the proportion of the sequences whose k-error linear complexity is bigger than the expected value is analyzed.展开更多
At the moment,little is found on the whole genomes of spiders in public databases.To this end,this study aimed to analyze the morphology,biological characteristics,and genome of Pardosa pseudoannulata,which was expect...At the moment,little is found on the whole genomes of spiders in public databases.To this end,this study aimed to analyze the morphology,biological characteristics,and genome of Pardosa pseudoannulata,which was expected to add genome information of spiders.To be specific,Illumina sequencing was used to sequence the genome of this spider species,and K-mer(K=17)analysis to estimate the size,heterozygosity,and repetitiveness of the genome.More than 142.11 Gb high-quality reads were obtained,which were assembled into 3508.13 Mb contigs(N50=1035 bp)and 3542.56 Mb scaffolds(N50=1258 bp).Two peaks were found in the 17-mer distribution map.The genome of P.pseudoannulata was 4696.86 Mb,with the heterozygosity of 0.21%and 84.32%of repetitive sequences.This indicated that repetitive sequences were highly abundant in the genome of P.pseudoannulata and multi-generation selfing before genome sequencing can reduce the repetitiveness.In addition,NOVOheter can be used for genome assembly.This study layed a basis for the publication of spider genome data and provided a reference for the research on spider genomics.展开更多
Aiming at the poor performance of speech signal detection at low signal-to-noise ratio(SNR),a method is proposed to detect active speech frames based on multi-window time-frequency(T-F)diagrams.First,the T-F diagram o...Aiming at the poor performance of speech signal detection at low signal-to-noise ratio(SNR),a method is proposed to detect active speech frames based on multi-window time-frequency(T-F)diagrams.First,the T-F diagram of the signal is calculated based on a multi-window T-F analysis,and a speech test statistic is constructed based on the characteristic difference between the signal and background noise.Second,the dynamic double-threshold processing is used for preliminary detection,and then the global double-threshold value is obtained using K-means clustering.Finally,the detection results are obtained by sequential decision.The experimental results show that the overall performance of the method is better than that of traditional methods under various SNR conditions and background noises.This method also has the advantages of low complexity,strong robustness,and adaptability to multi-national languages.展开更多
Sample entropy can reflect the change of level of new information in signal sequence as well as the size of the new information. Based on the sample entropy as the features of speech classification, the paper firstly ...Sample entropy can reflect the change of level of new information in signal sequence as well as the size of the new information. Based on the sample entropy as the features of speech classification, the paper firstly extract the sample entropy of mixed signal, mean and variance to calculate each signal sample entropy, finally uses the K mean clustering to recognize. The simulation results show that: the recognition rate can be increased to 89.2% based on sample entropy.展开更多
In this paper, we give some characterizations of N-spaces by mssc-images ofmetric spaces, and prove that a space X is an N-space if and only if X is a sequence-covering (sequentially quotient) mssc-image of a metric s...In this paper, we give some characterizations of N-spaces by mssc-images ofmetric spaces, and prove that a space X is an N-space if and only if X is a sequence-covering (sequentially quotient) mssc-image of a metric space, which answer a conjectureon N-spaces affirmatively.展开更多
基金The National High Technology Research and Develop-ment Program of China (863Program)(No.2006AA01Z264)the National Natural Science Foundation of China (No.60572072)
文摘Aiming at the optimum path excluding characteristics and the full constellation searching characteristics of the K-best detection algorithm, an improved-performance K-best detection algorithm and several reduced-complexity K-best detection algorithms are proposed. The improved-performance K-best detection algorithm deploys minimum mean square error (MMSE) filtering of a channel matrix before QR decomposition. This algorithm can decrease the probability of excluding the optimum path and achieve better performance. The reducedcomplexity K-best detection algorithms utilize a sphere decoding method to reduce searching constellation points. Simulation results show that the improved performance K-best detection algorithm obtains a 1 dB performance gain compared to the K- best detection algorithm based on sorted QR decomposition (SQRD). Performance loss occurs when K = 4 in reduced complexity K-best detection algorithms. When K = 8, the reduced complexity K-best detection algorithms require less computational effort compared with traditional K-best detection algorithms and achieve the same performance.
基金This work was supported by the Fundamental Research Funds for the Central Universities(No.3122019191).
文摘To ensure flight safety,the complex network method is used to study the influence and invulnerability of air traffic cyber physical system(CPS)nodes.According to the rules of air traffic management,the logical coupling relationship between routes and sectors is analyzed,an air traffic CPS network model is constructed,and the indicators of node influence and invulnerability are established.The K-shell algorithm is improved to identify node influence,and the invulnerability is analyzed under random and selective attacks.Taking Airspace in Eastern China as an example,its influential nodes are sorted by degree,namely,K-shell,the improved K-shell(IKS)and betweenness centrality.The invulnerability of air traffic CPS under different attacks is analyzed.Results show that IKS can effectively identify the influential nodes in the air traffic CPS network,and IKS and betweenness centrality are the two key indicators that affect the invulnerability of air traffic CPS.
基金Project(NCET-14-0318) supported by the Humanity and Social Science Youth Foundation of Ministry of Education,ChinaProject supported by the Training Program for Outstanding Young Teachers in Jilin University,ChinaProject(2014M551191) supported by China Postdoctoral Science Foundation
文摘Taxi drivers' cruising patterns are learnt with GPS trajectory data collected in Shenzhen, China. By employing Ripley's K function, the impacts of land use and pick-up experience on taxis' cruising behavior are investigated concerning about both intensity of influence and radius of influence. The results indicate that, in general, taxi drivers tend to learn more from land use characteristics than from pick-up experience. The optimal radius of influence of land use points and previous pick-up points is 14.18 km and 9.93 km, respectively. The findings also show that the high-earning drivers or thorough drivers pay more attention to land use characteristics and tend to cruise in high-density area, while the low-earning drivers or focus drivers prefer to learn more from previous pick-up experience and select the area which is far away from the high-density area. These findings facilitate the development of measures of managing taxi's travel behavior by providing useful insights into taxis' cruising patterns. The results also provide useful advice for taxi drivers to make efficient cruising decision, which will contribute to the improvement of cruising efficiency and the reduction of negative effects.
基金the National Natural Science Foundation of China (No.60373092).
文摘Linear complexity and k-error linear complexity of the stream cipher are two important standards to scale the randomicity of keystreams. For the 2n -periodicperiodic binary sequence with linear complexity 2n 1and k = 2,3,the number of sequences with given k-error linear complexity and the expected k-error linear complexity are provided. Moreover,the proportion of the sequences whose k-error linear complexity is bigger than the expected value is analyzed.
文摘At the moment,little is found on the whole genomes of spiders in public databases.To this end,this study aimed to analyze the morphology,biological characteristics,and genome of Pardosa pseudoannulata,which was expected to add genome information of spiders.To be specific,Illumina sequencing was used to sequence the genome of this spider species,and K-mer(K=17)analysis to estimate the size,heterozygosity,and repetitiveness of the genome.More than 142.11 Gb high-quality reads were obtained,which were assembled into 3508.13 Mb contigs(N50=1035 bp)and 3542.56 Mb scaffolds(N50=1258 bp).Two peaks were found in the 17-mer distribution map.The genome of P.pseudoannulata was 4696.86 Mb,with the heterozygosity of 0.21%and 84.32%of repetitive sequences.This indicated that repetitive sequences were highly abundant in the genome of P.pseudoannulata and multi-generation selfing before genome sequencing can reduce the repetitiveness.In addition,NOVOheter can be used for genome assembly.This study layed a basis for the publication of spider genome data and provided a reference for the research on spider genomics.
基金The National Natural Science Foundation of China(No.12174053,91938203,11674057,11874109)the Fundamental Research Funds for the Central Universities(No.2242021k30019).
文摘Aiming at the poor performance of speech signal detection at low signal-to-noise ratio(SNR),a method is proposed to detect active speech frames based on multi-window time-frequency(T-F)diagrams.First,the T-F diagram of the signal is calculated based on a multi-window T-F analysis,and a speech test statistic is constructed based on the characteristic difference between the signal and background noise.Second,the dynamic double-threshold processing is used for preliminary detection,and then the global double-threshold value is obtained using K-means clustering.Finally,the detection results are obtained by sequential decision.The experimental results show that the overall performance of the method is better than that of traditional methods under various SNR conditions and background noises.This method also has the advantages of low complexity,strong robustness,and adaptability to multi-national languages.
文摘Sample entropy can reflect the change of level of new information in signal sequence as well as the size of the new information. Based on the sample entropy as the features of speech classification, the paper firstly extract the sample entropy of mixed signal, mean and variance to calculate each signal sample entropy, finally uses the K mean clustering to recognize. The simulation results show that: the recognition rate can be increased to 89.2% based on sample entropy.
基金Supported by NSF of the Education Committee of Jiangsu Province in China (02KJB110001)
文摘In this paper, we give some characterizations of N-spaces by mssc-images ofmetric spaces, and prove that a space X is an N-space if and only if X is a sequence-covering (sequentially quotient) mssc-image of a metric space, which answer a conjectureon N-spaces affirmatively.