The paper deals with the principle of envelope of a one-parameter plane family to design developable surfaces. Three methods of designing developable surfaces are presented. They are designing a developable surface ba...The paper deals with the principle of envelope of a one-parameter plane family to design developable surfaces. Three methods of designing developable surfaces are presented. They are designing a developable surface based on one curve on it and its normal line, designing a developable surface based on two curves on it and designing a developable surface based on one curve and one surface. They meet the requirements of engineering fields.展开更多
Hilbert-Huang Transformation (HHT) is a recently-developed method for non-linear signal processing (Huang et al, 1998). By performing empirical mode decomposition (EMD) with HHT, various frequency components can...Hilbert-Huang Transformation (HHT) is a recently-developed method for non-linear signal processing (Huang et al, 1998). By performing empirical mode decomposition (EMD) with HHT, various frequency components can be effectively separated as intrinsic mode function (IMF). After Hilbert transformation to the IMF se- quence, the 3-D discrete time-frequency spectrum containing time, frequency and amplitude can be obtained, which provides very clear time-frequency characteristics with local details. The method is suitable for describing siznals with non-linear and non-stable variations.展开更多
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71...We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71 (2005) 012314]. The sender distributes the classical secret shares to his or her n agents and each agent owns a secret share in advance. The sender's secure direct communication message can be extracted by an agent subset by collaboration in such a way that at least t or more agents can obtain the secret message with the mutual assistances but any t - 1 or fewer agents cannot. In contrast to the previous multiparty quantum secret sharing protocols in which the sender's secret message can be recovered only if all the agents collaborate, our protocol is more practical and more flexible.展开更多
In this paper, a unified method based on the strong approximation(SA) of renewal process(RP) is developed for the law of the iterated logarithm(LIL) and the functional LIL(FLIL), which quantify the magnitude of the as...In this paper, a unified method based on the strong approximation(SA) of renewal process(RP) is developed for the law of the iterated logarithm(LIL) and the functional LIL(FLIL), which quantify the magnitude of the asymptotic rate of the increasing variability around the mean value of the RP in numerical and functional forms respectively. For the GI/G/1 queue, the method provides a complete analysis for both the LIL and the FLIL limits for four performance functions: The queue length, workload, busy time and idle time processes, covering three regimes divided by the traffic intensity.展开更多
In this paper,we study a centralized supply chain for a two-stage with selling price discount.This supply chain consists of a supplier and a retailer. Based on the feature that the product’s selling season is short a...In this paper,we study a centralized supply chain for a two-stage with selling price discount.This supply chain consists of a supplier and a retailer. Based on the feature that the product’s selling season is short and the supply chain faces great demand uncertainty. We consider a two-stage scenario where,at the beginning of stage 1,the supplier reserves production capacity based on historic data in advance,stage 2 comes to us after some leadtime,both the supplier and the retailer update the demand information,the retailer then places an order not exceeding the reserved capacity based on the selling-pricing discount dependent demand. We make optimal decisions on the reserved capacity in stage 1,selling price discount and order quantity in stage 2. In this supply chain,the pattern in stage2 is figured out first,and then stage 1 is cleared as well. Then we present a numerical example to give some insights. Finally we get some conclusions.展开更多
文摘The paper deals with the principle of envelope of a one-parameter plane family to design developable surfaces. Three methods of designing developable surfaces are presented. They are designing a developable surface based on one curve on it and its normal line, designing a developable surface based on two curves on it and designing a developable surface based on one curve and one surface. They meet the requirements of engineering fields.
基金Natural Science Foundation of Yunnan Province(2003D0084M)Key Technologies Research and Development Program of China(2004BA601B01-0104).
文摘Hilbert-Huang Transformation (HHT) is a recently-developed method for non-linear signal processing (Huang et al, 1998). By performing empirical mode decomposition (EMD) with HHT, various frequency components can be effectively separated as intrinsic mode function (IMF). After Hilbert transformation to the IMF se- quence, the 3-D discrete time-frequency spectrum containing time, frequency and amplitude can be obtained, which provides very clear time-frequency characteristics with local details. The method is suitable for describing siznals with non-linear and non-stable variations.
基金Supported by the National Basic Research Programme of China under Grant No 2007CB311100, the National High Technology Research and Development Programme of China under Grant No 2006AA01Z419, the National Natural Science Foundation of China under Grant No 60873191, the Major Research Plan of the National Natural Science Foundation of China under Grant No 90604023, the Scientific Research Common Programme of Beijing Municipal Commission of Education under Grant No KM200810005004, the Scientific Research Foundation for the Youth of Beijing University of Technology under Grant No 97007016200701, and the ISN Open Foundation.
文摘We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71 (2005) 012314]. The sender distributes the classical secret shares to his or her n agents and each agent owns a secret share in advance. The sender's secure direct communication message can be extracted by an agent subset by collaboration in such a way that at least t or more agents can obtain the secret message with the mutual assistances but any t - 1 or fewer agents cannot. In contrast to the previous multiparty quantum secret sharing protocols in which the sender's secret message can be recovered only if all the agents collaborate, our protocol is more practical and more flexible.
基金supported by the National Natural Science Foundation of China under Grant No.11471053
文摘In this paper, a unified method based on the strong approximation(SA) of renewal process(RP) is developed for the law of the iterated logarithm(LIL) and the functional LIL(FLIL), which quantify the magnitude of the asymptotic rate of the increasing variability around the mean value of the RP in numerical and functional forms respectively. For the GI/G/1 queue, the method provides a complete analysis for both the LIL and the FLIL limits for four performance functions: The queue length, workload, busy time and idle time processes, covering three regimes divided by the traffic intensity.
基金Supported by the National Natural Science Foundation of China(11471053)
文摘In this paper,we study a centralized supply chain for a two-stage with selling price discount.This supply chain consists of a supplier and a retailer. Based on the feature that the product’s selling season is short and the supply chain faces great demand uncertainty. We consider a two-stage scenario where,at the beginning of stage 1,the supplier reserves production capacity based on historic data in advance,stage 2 comes to us after some leadtime,both the supplier and the retailer update the demand information,the retailer then places an order not exceeding the reserved capacity based on the selling-pricing discount dependent demand. We make optimal decisions on the reserved capacity in stage 1,selling price discount and order quantity in stage 2. In this supply chain,the pattern in stage2 is figured out first,and then stage 1 is cleared as well. Then we present a numerical example to give some insights. Finally we get some conclusions.