Cloud storage employs software that interconnects and facilitates collaboration between different types of storage devices Compared with traditional storage methods, cloud storage poses new challenges in data security...Cloud storage employs software that interconnects and facilitates collaboration between different types of storage devices Compared with traditional storage methods, cloud storage poses new challenges in data security, reliability, and management. This paper introduces four layers of cloud storage architecture: data storage layer (connecting multiple storage components), data management layer (providing common support technology for multiple services), data service layer (sustaining multiple storage applications), and user access layer. A typical cloud storage application--Backup Cloud (B-Cloud)--is examined and its software architecture, characteristics, and main research areas are discussed.展开更多
A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed...A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed,including the single-chip computer with CAN controller AT89C51CC03,the CAN bus transceiver TJA1050,the large capacity DataFlash memory,the real-time clock DS1302,the voice chip ISD2560 and the card-reading circuit in Wie-gand format. All the extended hardware satisfies the requirements for intrinsically safe circuits (GB3836.4-2000) and intrinsically safe authentication promoted by the national explosion-proof institute. Further,the software programming methods for the CAN controller (AT89C51CC03) and the implementation of the CAN communications protocol are presented as well.展开更多
A new algorithm was developed to correctly identify fault conditions and accurately monitor fault development in a mine hoist. The new method is based on the Wavelet Packet Transform (WPT) and kernel PCA (Kernel Princ...A new algorithm was developed to correctly identify fault conditions and accurately monitor fault development in a mine hoist. The new method is based on the Wavelet Packet Transform (WPT) and kernel PCA (Kernel Principal Compo- nent Analysis, KPCA). For non-linear monitoring systems the key to fault detection is the extracting of main features. The wavelet packet transform is a novel technique of signal processing that possesses excellent characteristics of time-frequency localization. It is suitable for analysing time-varying or transient signals. KPCA maps the original input features into a higher dimension feature space through a non-linear mapping. The principal components are then found in the higher dimen- sion feature space. The KPCA transformation was applied to extracting the main nonlinear features from experimental fault feature data after wavelet packet transformation. The results show that the proposed method affords credible fault detection and identification.展开更多
This paper presents the flip-flop tone(FFT)DMAC protocol,a tone based MAC protocol using di-rectional antennas to solve the deafness problem,hidden terminal and exposed terminal problems simulta-neously.It uses two pa...This paper presents the flip-flop tone(FFT)DMAC protocol,a tone based MAC protocol using di-rectional antennas to solve the deafness problem,hidden terminal and exposed terminal problems simulta-neously.It uses two pairs of flip-flop tones .The first pair of tone is to send omni-directionally to reachevery neighboring node to announce the start and the end of communication,and therefore to alleviate thedeafness problem.The second pair of tone is to send directionally towards the sender.It is used to solvethe hidden terminal problem as well as the exposed terminal problem.Evaluation shows that FFT-DMACcan achieve better performance compared to the 802 .11 and ToneDMAC protocol.展开更多
In this paper, a Wavelength Division Multiplexing (WDM) network model based on the equivalent networks is described, and wavelength-dependent equivalent arc, equivalent networks, equivalent multicast tree and some oth...In this paper, a Wavelength Division Multiplexing (WDM) network model based on the equivalent networks is described, and wavelength-dependent equivalent arc, equivalent networks, equivalent multicast tree and some other terms are presented. Based on this model and relevant Routing and Wavelength Assign- ment (RWA) strategy, a unicast RWA algorithm and a multicast RWA algorithm are presented. The wave- length-dependent equivalent arc expresses the schedule of local RWA and the equivalent network expresses the whole topology of WDM optical networks, so the two algorithms are of the flexibility in RWA and the optimi- zation of the whole problem. The theoretic analysis and simulation results show the two algorithms are of the stronger capability and the lower complexity than the other existing algorithms for RWA problem, and the complexity of the two algorithms are only related to the scale of the equivalent networks. Finally, we prove the two algorithms’ feasibility and the one-by-one corresponding relation between the equivalent multicast tree and original multicast tree, and point out the superiorities and drawbacks of the two algorithms respectively.展开更多
The purpose of this paper is to study the construction of concept lattice from variable formal contexts.Composition and decomposition theories are proposed for the unraveling of concept lattice from contexts with vari...The purpose of this paper is to study the construction of concept lattice from variable formal contexts.Composition and decomposition theories are proposed for the unraveling of concept lattice from contexts with variable attribute set in the process of information updating.The relationship between the extension sets of the original context and that of its sub-context is analyzed.The composition and decomposition theories are then generalized to the situation involving more than two sub-contexts and the situation with variable attribute set and object set.展开更多
基金funded by the National High Technology Research and Development Program of China "(863"program) under Grant No. 2009AA01A402
文摘Cloud storage employs software that interconnects and facilitates collaboration between different types of storage devices Compared with traditional storage methods, cloud storage poses new challenges in data security, reliability, and management. This paper introduces four layers of cloud storage architecture: data storage layer (connecting multiple storage components), data management layer (providing common support technology for multiple services), data service layer (sustaining multiple storage applications), and user access layer. A typical cloud storage application--Backup Cloud (B-Cloud)--is examined and its software architecture, characteristics, and main research areas are discussed.
基金Financial support for this work,provided by the National Natural Science Foundation of China(No.50904070)the Science and Technology Foundation of China University of Mining & Technology (Nos.2007A046 and 2008A042)the Joint Production and Research Innovation Project of Jiangsu Province (No.BY2009114)
基金The project supported by the 973 Program under Grant No. 2006CB921106, National Natural Science Foundation of China under Grant Nos. 10325521 and 60433050, and the Key Project 306020 and Science Research Fund of Doctoval Program of the Ministry of Education of China
文摘我们把算法给 factorize 在两重性计算机的大整数。Weprovide 为因式分解的三个两重性算法基于一个天真的因式分解方法,在量计算的 Shoralgorithm,和 Fermat “在古典计算的 s 方法。所有这些算法可以是在输入尺寸的多项式。
基金Projects 50674086 supported by the National Natural Science Foundation of ChinaBS2006002 by the Society Development Science and Technology Planof Jiangsu Province20060290508 by the Doctoral Foundation of Ministry of Education of China
文摘A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed,including the single-chip computer with CAN controller AT89C51CC03,the CAN bus transceiver TJA1050,the large capacity DataFlash memory,the real-time clock DS1302,the voice chip ISD2560 and the card-reading circuit in Wie-gand format. All the extended hardware satisfies the requirements for intrinsically safe circuits (GB3836.4-2000) and intrinsically safe authentication promoted by the national explosion-proof institute. Further,the software programming methods for the CAN controller (AT89C51CC03) and the implementation of the CAN communications protocol are presented as well.
基金Projects 50674086 supported by the National Natural Science Foundation of ChinaBS2006002 by the Society Development Science and Technology Planof Jiangsu Province20060290508 by the Doctoral Foundation of Ministry of Education of China
文摘A new algorithm was developed to correctly identify fault conditions and accurately monitor fault development in a mine hoist. The new method is based on the Wavelet Packet Transform (WPT) and kernel PCA (Kernel Principal Compo- nent Analysis, KPCA). For non-linear monitoring systems the key to fault detection is the extracting of main features. The wavelet packet transform is a novel technique of signal processing that possesses excellent characteristics of time-frequency localization. It is suitable for analysing time-varying or transient signals. KPCA maps the original input features into a higher dimension feature space through a non-linear mapping. The principal components are then found in the higher dimen- sion feature space. The KPCA transformation was applied to extracting the main nonlinear features from experimental fault feature data after wavelet packet transformation. The results show that the proposed method affords credible fault detection and identification.
基金This work is supported by the National Hi-Tech Research and Development 863 Program of China (No 2002AA881030), the Nature Science Foundation of Jiangsu Province (No. BK2005027, No. BK2002040) and the 211 Foundation of Soochow University,
基金This work was supported by the National Natural Science Foundation of China (No. 70674108/60703118) and the Natural Science Foundation of Shaanxi (No. 2007A01).
基金Supported by the National High Teehnology Research and Development Programme of China (No. 2006AA01Z172);the Provincial Key Laboratory of Computer Information Processing Technology of Jiangsu Province (No. KJS0605);Natural Science Foundation of China (No. 60573138) ;the National Key Basic Research and Development Progranane of China (No. 2006CB303000).
文摘This paper presents the flip-flop tone(FFT)DMAC protocol,a tone based MAC protocol using di-rectional antennas to solve the deafness problem,hidden terminal and exposed terminal problems simulta-neously.It uses two pairs of flip-flop tones .The first pair of tone is to send omni-directionally to reachevery neighboring node to announce the start and the end of communication,and therefore to alleviate thedeafness problem.The second pair of tone is to send directionally towards the sender.It is used to solvethe hidden terminal problem as well as the exposed terminal problem.Evaluation shows that FFT-DMACcan achieve better performance compared to the 802 .11 and ToneDMAC protocol.
基金Supported by the Natrual Science Foundation of Shaanxi (No.2004A02) and Outstanding Scholar Project of P. R. China (2002).
文摘In this paper, a Wavelength Division Multiplexing (WDM) network model based on the equivalent networks is described, and wavelength-dependent equivalent arc, equivalent networks, equivalent multicast tree and some other terms are presented. Based on this model and relevant Routing and Wavelength Assign- ment (RWA) strategy, a unicast RWA algorithm and a multicast RWA algorithm are presented. The wave- length-dependent equivalent arc expresses the schedule of local RWA and the equivalent network expresses the whole topology of WDM optical networks, so the two algorithms are of the flexibility in RWA and the optimi- zation of the whole problem. The theoretic analysis and simulation results show the two algorithms are of the stronger capability and the lower complexity than the other existing algorithms for RWA problem, and the complexity of the two algorithms are only related to the scale of the equivalent networks. Finally, we prove the two algorithms’ feasibility and the one-by-one corresponding relation between the equivalent multicast tree and original multicast tree, and point out the superiorities and drawbacks of the two algorithms respectively.
基金supported by grants from the National Natural Science Foundation of China(No.60703117 and No.11071281)the Fundamental Research Funds for the Central Universities(No.JY 10000903010 and No.JY 10000903014).
文摘The purpose of this paper is to study the construction of concept lattice from variable formal contexts.Composition and decomposition theories are proposed for the unraveling of concept lattice from contexts with variable attribute set in the process of information updating.The relationship between the extension sets of the original context and that of its sub-context is analyzed.The composition and decomposition theories are then generalized to the situation involving more than two sub-contexts and the situation with variable attribute set and object set.