Multi-label text categorization refers to the problem of categorizing text througha multi-label learning algorithm. Text classification for Asian languages such as Chinese isdifferent from work for other languages suc...Multi-label text categorization refers to the problem of categorizing text througha multi-label learning algorithm. Text classification for Asian languages such as Chinese isdifferent from work for other languages such as English which use spaces to separate words.Before classifying text, it is necessary to perform a word segmentation operation to converta continuous language into a list of separate words and then convert it into a vector of acertain dimension. Generally, multi-label learning algorithms can be divided into twocategories, problem transformation methods and adapted algorithms. This work will usecustomer's comments about some hotels as a training data set, which contains labels for allaspects of the hotel evaluation, aiming to analyze and compare the performance of variousmulti-label learning algorithms on Chinese text classification. The experiment involves threebasic methods of problem transformation methods: Support Vector Machine, Random Forest,k-Nearest-Neighbor;and one adapted algorithm of Convolutional Neural Network. Theexperimental results show that the Support Vector Machine has better performance.展开更多
Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s...Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system.展开更多
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s...Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.展开更多
Morlet wavelet is suitable to extract the impulse components of mechanical fault signals. And thus its continuous wavelet transform (CWT) has been successfully used in the field of fault diagnosis. The principle of ...Morlet wavelet is suitable to extract the impulse components of mechanical fault signals. And thus its continuous wavelet transform (CWT) has been successfully used in the field of fault diagnosis. The principle of scale selection in CWT is discussed. Based on genetic algorithm, an optimization strategy for the waveform parameters of the mother wavelet is proposed with wavelet entropy as the optimization target. Based on the optimized waveform parameters, the wavelet scalogram is used to analyze the simulated acoustic emission (AE) signal and real AE signal of rolling bearing. The results indicate that the proposed method is useful and efficient to improve the quality of CWT.展开更多
Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classic...Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classical algorithms based on one-way quantum computation were proposed. In this work, we propose a method to implement the classical Hadamard transform algorithm utilizing the CV cluster state. Compared with classical computation, only half operations are required when it is operated in the one-way CV quantum computer. As an example, we present a concrete scheme of four-mode classical Hadamard transform algorithm with a four-partite CV cluster state. This method connects the quantum computer and the classical algorithms, which shows the feasibility of running classical algorithms in a quantum computer efficiently.展开更多
In this paper,a time-frequency associated multiple signal classification(MUSIC)al-gorithm which is suitable for through-wall detection is proposed.The technology of detecting hu-man targets by through-wall radar can b...In this paper,a time-frequency associated multiple signal classification(MUSIC)al-gorithm which is suitable for through-wall detection is proposed.The technology of detecting hu-man targets by through-wall radar can be used to monitor the status and the location information of human targets behind the wall.However,the detection is out of order when classical MUSIC al-gorithm is applied to estimate the direction of arrival.In order to solve the problem,a time-fre-quency associated MUSIC algorithm suitable for through-wall detection and based on S-band stepped frequency continuous wave(SFCW)radar is researched.By associating inverse fast Fouri-er transform(IFFT)algorithm with MUSIC algorithm,the power enhancement of the target sig-nal is completed according to the distance calculation results in the time domain.Then convert the signal to the frequency domain for direction of arrival(DOA)estimation.The simulations of two-dimensional human target detection in free space and the processing of measured data are com-pleted.By comparing the processing results of the two algorithms on the measured data,accuracy of DOA estimation of proposed algorithm is more than 75%,which is 50%higher than classical MUSIC algorithm.It is verified that the distance and angle of human target can be effectively de-tected via proposed algorithm.展开更多
Ringing artifact degradations always appear in the deconvolution of geophysical data. To address this problem, we propose a postprocessing approach to suppress ringing artifacts that uses a novel anisotropic diffusion...Ringing artifact degradations always appear in the deconvolution of geophysical data. To address this problem, we propose a postprocessing approach to suppress ringing artifacts that uses a novel anisotropic diffusion based on a stationary wavelet transform (SWT) algorithm. In this paper, we discuss the ringing artifact suppression problem and analyze the characteristics of the deconvolu- tion ringing artifact. The deconvolution data containing ringing artifacts are decomposed into different SWT sub- bands for analysis, and a new multiscale adaptive aniso- tropic filter is developed to suppress these degradations. Finally, we demonstrate the performance of the proposed method and describe the experiments in detail.展开更多
The purpose of the Combined Economic Emission Dispatch(CEED)of electric power is to offer the most exceptional schedule for production units,which must run with both low fuel costs and emission levels concurrently,the...The purpose of the Combined Economic Emission Dispatch(CEED)of electric power is to offer the most exceptional schedule for production units,which must run with both low fuel costs and emission levels concurrently,thereby meeting the lack of system equality and inequality constraints.Economic and emissions dispatching has become a primary and significant concern in power system networks.Consequences of using non-renewable fuels as input to exhaust power systems with toxic gas emissions and depleted resources for future generations.The optimal power allocation to generators serves as a solution to this problem.Emission dispatch reduces emissions while ignoring economic considerations.A collective strategy known as Combined Economic and Emission Dispatch is utilized to resolve the above-mentioned problems and investigate the trade-off relationship between fuel cost and emissions.Consequently,this work manages the Substantial Augmented Transformative Algorithm(SATA)to take care of the Combined Economic Emission Dispatch Problem(CEEDP)of warm units while fulfilling imperatives,for example,confines on generator limit,diminish the fuel cost,lessen the emission and decrease the force misfortune.SATA is a stochastic streamlining process that relies upon the development and knowledge of swarms.The goal is to minimize the total fuel cost of fossil-based thermal power generation units that generate and cause environmental pollution.The algorithm searches for solutions in the search space from the smallest to the largest in the case of forwarding search.The simulation of the proposed system is developed using MATLAB Simulink software.Simulation results show the effectiveness and practicability of this method in terms of economic and emission dispatching issues.The performance of the proposed system is compared with existing Artificial Bee Colony-Particle Swarm Optimization(ABC-PSO),Simulated Annealing(SA),and Differential Evolution(DE)methods.The fuel cost and gas emission of the proposed system are 128904$/hr and 138094.4652$/hr.展开更多
The aim is to study the set of subsets of grids of the Waterloo language from the point of view of abstract algebra and graph theory. The study was conducted using the library for working with transition graphs of non...The aim is to study the set of subsets of grids of the Waterloo language from the point of view of abstract algebra and graph theory. The study was conducted using the library for working with transition graphs of nondeterministic finite automata NFALib implemented by one of the authors in C#, as well as statistical methods for analyzing algorithms. The results are regularities obtained when considering semilattices on a set of subsets of grids of the Waterloo language. It follows from the results obtained that the minimum covering automaton equivalent to the Waterloo automaton can be obtained by adding one additional to the minimum covering set of grids. .展开更多
In order to study the strength of the composite material plate problems, need to adopt a nondestructive testing method to obtain the specimen surface under the effect of high-speed impact regularity of shape. The proj...In order to study the strength of the composite material plate problems, need to adopt a nondestructive testing method to obtain the specimen surface under the effect of high-speed impact regularity of shape. The projection profilometry was used to measure the surface profile or the full field deformation. Furtherly, by using the Fourier transform algorithm, there is only one frame of captured image</span><span style="font-family:Verdana;"> which</span><span style="font-family:Verdana;"> is needed in the measurement, so that it can be introduced into the high speed impaction procedure measurement. An experimental system, which was contained with an impact setup and the projection profilometry measurement part, was constructed for the impaction action characteristic research. The metallic impact object can be launched by a gas gun or a spin fan, respectively. The detected object </span><span style="font-family:Verdana;">is</span><span style="font-family:Verdana;"> manufactured by composite materials. In order to increase the surface deformation measurement accuracy, the calibration method and the error was discussed with different calibration specimen. And then, the proposed profilometry measurement method is proved by the gas gun and spin fan projectile test. The surface deformation of the manufactured composite plates and fan case are measured in the impaction procedure. So that the impact action details can be described much more clearly than the traditional video monitoring method.展开更多
Vehicle electrification has emerged as a global strategy to address climate change and emissions externalities from the transportation sector.Deployment of charging infrastructure is needed to accelerate technology ad...Vehicle electrification has emerged as a global strategy to address climate change and emissions externalities from the transportation sector.Deployment of charging infrastructure is needed to accelerate technology adoption;however,managers and policymakers have had limited evidence on the use of public charging stations due to poor data sharing and decentralized ownership across regions.In this article,we use machine learning based classifiers to reveal insights about consumer charging behavior in 72 detected languages including Chinese.We investigate 10 years of consumer reviews in East and Southeast Asia from 2011 to 2021 to enable infrastructure evaluation at a larger geographic scale than previously available.We find evidence that charging stations at government locations result in higher failure rates with consumers compared to charging stations at private points of interest.This evidence contrasts with predictions in the U.S.and European markets,where the performance is closer to parity.We also find that networked stations with communication protocols provide a relatively higher quality of charging services,which favors policy support for connectivity,particularly for underserved or remote areas.展开更多
A novel image fusion algorithm based on bandelet transform is proposed. Bandelet transform can take advantage of the geometrical regularity of image structure and represent sharp image transitions such as edges effici...A novel image fusion algorithm based on bandelet transform is proposed. Bandelet transform can take advantage of the geometrical regularity of image structure and represent sharp image transitions such as edges efficiently in image fusion. For reconstructing the fused image, the maximum rule is used to select source images' geometric flow and bandelet coefficients. Experimental results indicate that the bandelet-based fusion algorithm represents the edge and detailed information well and outperforms the wavelet-based and Laplacian pyramid-based fusion algorithms, especially when the abundant texture and edges are contained in the source images.展开更多
The 3780-point FFT is a main component of the time domain synchronous OFDM (TDS-OFDM) system and the key technology in the Chinese Digital Multimedia/TV Broadcasting-Terrestrial (DMB-T) national standard. Sinc, e ...The 3780-point FFT is a main component of the time domain synchronous OFDM (TDS-OFDM) system and the key technology in the Chinese Digital Multimedia/TV Broadcasting-Terrestrial (DMB-T) national standard. Sinc, e 3780 is not a power of 2, the classical radix-2 or radix-4 FFT algorithm cannot be applied directly. Hence, the Winograd Fourier transform algorithm (WFTA) and the Good-Thomas prime factor algorithm (PFA) are used to implement the 3780-point FFT processor. However, the structure based on WFTA and PFA has a large computational complexity and requires many DSPs in hardware implementation. In this paper, a novel 3780-point FFT processor scheme is proposed, in which a 60x63 iterative WFTA architecture with different mapping methods is imported to replace the PFA architecture, and an optimized CoOrdinate Rotation Digital Computer (CORDIC) module is used for the twiddle factor multiplications. Compared to the traditional scheme, our proposed 3780-point FFT processor scheme reduces the number of multiplications by 45% at the cost of 1% increase in the number of additions. All DSPs are replaced by the optimized CORDIC module and ROM. Simulation results show that the proposed 3780-point FFT processing scheme satisfies the requirement of the DMB-T standard, and is an efficient architecture for the TDS-OFDM system.展开更多
The quadratic transformation method is proposed to estimate the trabecular spac- ing (Tb.Sp), an important index for osteoporosis diagnosis. The performance of this algorithm was investigated by scatter model, two-d...The quadratic transformation method is proposed to estimate the trabecular spac- ing (Tb.Sp), an important index for osteoporosis diagnosis. The performance of this algorithm was investigated by scatter model, two-dimension finite difference time domain (2D-FDTD) simulation and in vitro experiments of bovine cancellous bone specimens. Comparing with the other four methods autoregressive cepstrum (AR), adaptive filter- autoregressive cepstral (AFAR), inverse filter-autoregressive eepstrum (InvAR), and simplified inverse filter tracking (SIFT), quadratic transformation is much more stable and accurate. The results demonstrated that quadratic transformation is a great algorithm for Tb.SD estimation.展开更多
The Hankel transform is widely used to solve various engineering and physics problems,such as the representation of electromagnetic field components in the medium,the representation of dynamic stress intensity factors...The Hankel transform is widely used to solve various engineering and physics problems,such as the representation of electromagnetic field components in the medium,the representation of dynamic stress intensity factors,vibration of axisymmetric infinite membrane and displacement intensity factors which all involve this type of integration.However,traditional numerical integration algorithms cannot be used due to the high oscillation characteristics of the Bessel function,so it is particularly important to propose a high precision and efficient numerical algorithm for calculating the integral of high oscillation.In this paper,the improved Gaver-Stehfest(G-S)inverse Laplace transform method for arbitrary real-order Bessel function integration is presented by using the asymptotic characteristics of the Bessel function and the accumulation of integration,and the optimized G-S coefficients are given.The effectiveness of the algorithm is verified by numerical examples.Compared with the linear transformation accelerated convergence algorithm,it shows that the G-S inverse Laplace transform method is suitable for arbitrary real order Hankel transform,and the time consumption is relatively stable and short,which provides a reliable calculation method for the study of electromagnetic mechanics,wave propagation,and fracture dynamics.展开更多
In this paper, we have proved that the lower bound of the number of real multiplications for computing a length 2(t) real GFT(a,b) (a = +/-1/2, b = 0 or b = +/-1/2, a = 0) is 2(t+1) - 2t - 2 and that for computing a l...In this paper, we have proved that the lower bound of the number of real multiplications for computing a length 2(t) real GFT(a,b) (a = +/-1/2, b = 0 or b = +/-1/2, a = 0) is 2(t+1) - 2t - 2 and that for computing a length 2t real GFT(a,b)(a = +/-1/2, b = +/-1/2) is 2(t+1) - 2. Practical algorithms which meet the lower bounds of multiplications are given.展开更多
基金supported by the NSFC (Grant Nos. 61772281,61703212, 61602254)Jiangsu Province Natural Science Foundation [grant numberBK2160968]the Priority Academic Program Development of Jiangsu Higher Edu-cationInstitutions (PAPD) and Jiangsu Collaborative Innovation Center on AtmosphericEnvironment and Equipment Technology (CICAEET).
文摘Multi-label text categorization refers to the problem of categorizing text througha multi-label learning algorithm. Text classification for Asian languages such as Chinese isdifferent from work for other languages such as English which use spaces to separate words.Before classifying text, it is necessary to perform a word segmentation operation to converta continuous language into a list of separate words and then convert it into a vector of acertain dimension. Generally, multi-label learning algorithms can be divided into twocategories, problem transformation methods and adapted algorithms. This work will usecustomer's comments about some hotels as a training data set, which contains labels for allaspects of the hotel evaluation, aiming to analyze and compare the performance of variousmulti-label learning algorithms on Chinese text classification. The experiment involves threebasic methods of problem transformation methods: Support Vector Machine, Random Forest,k-Nearest-Neighbor;and one adapted algorithm of Convolutional Neural Network. Theexperimental results show that the Support Vector Machine has better performance.
基金The work is partially supported by Natural Science Foundation of Ningxia(Grant No.AAC03300)National Natural Science Foundation of China(Grant No.61962001)Graduate Innovation Project of North Minzu University(Grant No.YCX23152).
文摘Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system.
文摘Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
基金This project is supported by National Natural Science Foundation of China (No. 50105007)Program for New Century Excellent Talents in University, China.
文摘Morlet wavelet is suitable to extract the impulse components of mechanical fault signals. And thus its continuous wavelet transform (CWT) has been successfully used in the field of fault diagnosis. The principle of scale selection in CWT is discussed. Based on genetic algorithm, an optimization strategy for the waveform parameters of the mother wavelet is proposed with wavelet entropy as the optimization target. Based on the optimized waveform parameters, the wavelet scalogram is used to analyze the simulated acoustic emission (AE) signal and real AE signal of rolling bearing. The results indicate that the proposed method is useful and efficient to improve the quality of CWT.
基金Supported by the National Natural Science Foundation of China under Grant Nos 11504024,61502041,61602045 and 61602046the National Key Research and Development Program of China under Grant No 2016YFA0302600
文摘Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classical algorithms based on one-way quantum computation were proposed. In this work, we propose a method to implement the classical Hadamard transform algorithm utilizing the CV cluster state. Compared with classical computation, only half operations are required when it is operated in the one-way CV quantum computer. As an example, we present a concrete scheme of four-mode classical Hadamard transform algorithm with a four-partite CV cluster state. This method connects the quantum computer and the classical algorithms, which shows the feasibility of running classical algorithms in a quantum computer efficiently.
文摘In this paper,a time-frequency associated multiple signal classification(MUSIC)al-gorithm which is suitable for through-wall detection is proposed.The technology of detecting hu-man targets by through-wall radar can be used to monitor the status and the location information of human targets behind the wall.However,the detection is out of order when classical MUSIC al-gorithm is applied to estimate the direction of arrival.In order to solve the problem,a time-fre-quency associated MUSIC algorithm suitable for through-wall detection and based on S-band stepped frequency continuous wave(SFCW)radar is researched.By associating inverse fast Fouri-er transform(IFFT)algorithm with MUSIC algorithm,the power enhancement of the target sig-nal is completed according to the distance calculation results in the time domain.Then convert the signal to the frequency domain for direction of arrival(DOA)estimation.The simulations of two-dimensional human target detection in free space and the processing of measured data are com-pleted.By comparing the processing results of the two algorithms on the measured data,accuracy of DOA estimation of proposed algorithm is more than 75%,which is 50%higher than classical MUSIC algorithm.It is verified that the distance and angle of human target can be effectively de-tected via proposed algorithm.
文摘Ringing artifact degradations always appear in the deconvolution of geophysical data. To address this problem, we propose a postprocessing approach to suppress ringing artifacts that uses a novel anisotropic diffusion based on a stationary wavelet transform (SWT) algorithm. In this paper, we discuss the ringing artifact suppression problem and analyze the characteristics of the deconvolu- tion ringing artifact. The deconvolution data containing ringing artifacts are decomposed into different SWT sub- bands for analysis, and a new multiscale adaptive aniso- tropic filter is developed to suppress these degradations. Finally, we demonstrate the performance of the proposed method and describe the experiments in detail.
文摘The purpose of the Combined Economic Emission Dispatch(CEED)of electric power is to offer the most exceptional schedule for production units,which must run with both low fuel costs and emission levels concurrently,thereby meeting the lack of system equality and inequality constraints.Economic and emissions dispatching has become a primary and significant concern in power system networks.Consequences of using non-renewable fuels as input to exhaust power systems with toxic gas emissions and depleted resources for future generations.The optimal power allocation to generators serves as a solution to this problem.Emission dispatch reduces emissions while ignoring economic considerations.A collective strategy known as Combined Economic and Emission Dispatch is utilized to resolve the above-mentioned problems and investigate the trade-off relationship between fuel cost and emissions.Consequently,this work manages the Substantial Augmented Transformative Algorithm(SATA)to take care of the Combined Economic Emission Dispatch Problem(CEEDP)of warm units while fulfilling imperatives,for example,confines on generator limit,diminish the fuel cost,lessen the emission and decrease the force misfortune.SATA is a stochastic streamlining process that relies upon the development and knowledge of swarms.The goal is to minimize the total fuel cost of fossil-based thermal power generation units that generate and cause environmental pollution.The algorithm searches for solutions in the search space from the smallest to the largest in the case of forwarding search.The simulation of the proposed system is developed using MATLAB Simulink software.Simulation results show the effectiveness and practicability of this method in terms of economic and emission dispatching issues.The performance of the proposed system is compared with existing Artificial Bee Colony-Particle Swarm Optimization(ABC-PSO),Simulated Annealing(SA),and Differential Evolution(DE)methods.The fuel cost and gas emission of the proposed system are 128904$/hr and 138094.4652$/hr.
文摘The aim is to study the set of subsets of grids of the Waterloo language from the point of view of abstract algebra and graph theory. The study was conducted using the library for working with transition graphs of nondeterministic finite automata NFALib implemented by one of the authors in C#, as well as statistical methods for analyzing algorithms. The results are regularities obtained when considering semilattices on a set of subsets of grids of the Waterloo language. It follows from the results obtained that the minimum covering automaton equivalent to the Waterloo automaton can be obtained by adding one additional to the minimum covering set of grids. .
文摘In order to study the strength of the composite material plate problems, need to adopt a nondestructive testing method to obtain the specimen surface under the effect of high-speed impact regularity of shape. The projection profilometry was used to measure the surface profile or the full field deformation. Furtherly, by using the Fourier transform algorithm, there is only one frame of captured image</span><span style="font-family:Verdana;"> which</span><span style="font-family:Verdana;"> is needed in the measurement, so that it can be introduced into the high speed impaction procedure measurement. An experimental system, which was contained with an impact setup and the projection profilometry measurement part, was constructed for the impaction action characteristic research. The metallic impact object can be launched by a gas gun or a spin fan, respectively. The detected object </span><span style="font-family:Verdana;">is</span><span style="font-family:Verdana;"> manufactured by composite materials. In order to increase the surface deformation measurement accuracy, the calibration method and the error was discussed with different calibration specimen. And then, the proposed profilometry measurement method is proved by the gas gun and spin fan projectile test. The surface deformation of the manufactured composite plates and fan case are measured in the impaction procedure. So that the impact action details can be described much more clearly than the traditional video monitoring method.
基金supported by funding from the National Science Foundation(Nos.1931980 and 1945332)Microsoft Azure for researchand the U.S.State Department Diplomacy Lab.
文摘Vehicle electrification has emerged as a global strategy to address climate change and emissions externalities from the transportation sector.Deployment of charging infrastructure is needed to accelerate technology adoption;however,managers and policymakers have had limited evidence on the use of public charging stations due to poor data sharing and decentralized ownership across regions.In this article,we use machine learning based classifiers to reveal insights about consumer charging behavior in 72 detected languages including Chinese.We investigate 10 years of consumer reviews in East and Southeast Asia from 2011 to 2021 to enable infrastructure evaluation at a larger geographic scale than previously available.We find evidence that charging stations at government locations result in higher failure rates with consumers compared to charging stations at private points of interest.This evidence contrasts with predictions in the U.S.and European markets,where the performance is closer to parity.We also find that networked stations with communication protocols provide a relatively higher quality of charging services,which favors policy support for connectivity,particularly for underserved or remote areas.
基金This work was supported by the Navigation Science Foundation (No.05F07001)the National Natural Science Foundation of China (No.60472081).
文摘A novel image fusion algorithm based on bandelet transform is proposed. Bandelet transform can take advantage of the geometrical regularity of image structure and represent sharp image transitions such as edges efficiently in image fusion. For reconstructing the fused image, the maximum rule is used to select source images' geometric flow and bandelet coefficients. Experimental results indicate that the bandelet-based fusion algorithm represents the edge and detailed information well and outperforms the wavelet-based and Laplacian pyramid-based fusion algorithms, especially when the abundant texture and edges are contained in the source images.
基金Project supported by the National Natural Science Foundation of China (No.61071129)the Science and Technology Department of Zhejiang Province,China (Nos.2008C21088,2011R10035,and 2011R09003-06)
文摘The 3780-point FFT is a main component of the time domain synchronous OFDM (TDS-OFDM) system and the key technology in the Chinese Digital Multimedia/TV Broadcasting-Terrestrial (DMB-T) national standard. Sinc, e 3780 is not a power of 2, the classical radix-2 or radix-4 FFT algorithm cannot be applied directly. Hence, the Winograd Fourier transform algorithm (WFTA) and the Good-Thomas prime factor algorithm (PFA) are used to implement the 3780-point FFT processor. However, the structure based on WFTA and PFA has a large computational complexity and requires many DSPs in hardware implementation. In this paper, a novel 3780-point FFT processor scheme is proposed, in which a 60x63 iterative WFTA architecture with different mapping methods is imported to replace the PFA architecture, and an optimized CoOrdinate Rotation Digital Computer (CORDIC) module is used for the twiddle factor multiplications. Compared to the traditional scheme, our proposed 3780-point FFT processor scheme reduces the number of multiplications by 45% at the cost of 1% increase in the number of additions. All DSPs are replaced by the optimized CORDIC module and ROM. Simulation results show that the proposed 3780-point FFT processing scheme satisfies the requirement of the DMB-T standard, and is an efficient architecture for the TDS-OFDM system.
基金supported by NSFC(11174060,11304043,11327405)the Ph.D.Programs Foundation of the Ministry of Education of China(20130071110020)the Key Science and Technology Program of Shanghai(13441901900)
文摘The quadratic transformation method is proposed to estimate the trabecular spac- ing (Tb.Sp), an important index for osteoporosis diagnosis. The performance of this algorithm was investigated by scatter model, two-dimension finite difference time domain (2D-FDTD) simulation and in vitro experiments of bovine cancellous bone specimens. Comparing with the other four methods autoregressive cepstrum (AR), adaptive filter- autoregressive cepstral (AFAR), inverse filter-autoregressive eepstrum (InvAR), and simplified inverse filter tracking (SIFT), quadratic transformation is much more stable and accurate. The results demonstrated that quadratic transformation is a great algorithm for Tb.SD estimation.
基金Supported by the National Natural Science Foundation of China(42064004,12062022,11762017,11762016)
文摘The Hankel transform is widely used to solve various engineering and physics problems,such as the representation of electromagnetic field components in the medium,the representation of dynamic stress intensity factors,vibration of axisymmetric infinite membrane and displacement intensity factors which all involve this type of integration.However,traditional numerical integration algorithms cannot be used due to the high oscillation characteristics of the Bessel function,so it is particularly important to propose a high precision and efficient numerical algorithm for calculating the integral of high oscillation.In this paper,the improved Gaver-Stehfest(G-S)inverse Laplace transform method for arbitrary real-order Bessel function integration is presented by using the asymptotic characteristics of the Bessel function and the accumulation of integration,and the optimized G-S coefficients are given.The effectiveness of the algorithm is verified by numerical examples.Compared with the linear transformation accelerated convergence algorithm,it shows that the G-S inverse Laplace transform method is suitable for arbitrary real order Hankel transform,and the time consumption is relatively stable and short,which provides a reliable calculation method for the study of electromagnetic mechanics,wave propagation,and fracture dynamics.
文摘In this paper, we have proved that the lower bound of the number of real multiplications for computing a length 2(t) real GFT(a,b) (a = +/-1/2, b = 0 or b = +/-1/2, a = 0) is 2(t+1) - 2t - 2 and that for computing a length 2t real GFT(a,b)(a = +/-1/2, b = +/-1/2) is 2(t+1) - 2. Practical algorithms which meet the lower bounds of multiplications are given.