Hui Wang, Daming Zhu
The duplication-loss problem is to infer a species supertree from a collection of gene trees that are confounded by complex histories of gene duplication and loss events. The decision variant of this problem is NP-complete. The utility of this NP-hard problem for large-scale phylogenetic analyses has...
Kazuhiro Yamamoto, Masaji Watanabe, Narisu Chen
Techniques updating bottom topographical data are described. Positional data from a RTK-GPS are transformed to rectangular coordinates by the Gauss-Krüger Projection, and synchronized with depth data from an echo-sounder to generate three dimensional topographical data. A bottom topography over a triangular...
Xia Wang
Consistent approximate representation space is a unified model for formal contexts, consistent formal decision contexts and inconsistent formal decision contexts. In this paper, notions of attribute reduction are first developed in a consistent approximate representation space, and then necessary and...
Kazuhiro Yamamoto, Hashentuya, Masaji Watanabe
A tsunami generated in the North Pacific is simulated numerically. A system of partial differential equations derived from equations of a fluid dynamics were solved numerically by a finite element method. Depth data originally given in terms of longitude and latitude are transformed to projected coordinates...
Madhumita Ghosh, Hideaki Kuzuoka
Social robots may perform a variety of services like conveying information, guiding an audience, providing assistance to troubled customers and so on. In these situations, there might be a number of people who might need such assistance at the same time. Therefore, it is important to engage the audience,...
Marius Crisan
The paper continues some previous works and analyzes the possibility of phoneme generation with Elman-type neural networks. The vowels are composed of repetitions of the same elemental pattern with certain variations (assumed to be chaotic) of the signal parameters. The Elman-type network proved adequate...
Tongwook Hwang, Youngsang Shin, Kyungho Son, Haeryong Park
Cloud computing is becoming increasingly popular. Many companies utilize cloud computing services to minimize IT infrastructure costs. The popularity of cloud computing has attracted the interest of cyber criminals. As the result, virtualized environments are a valid and attractive target for APT attacks....
Kazunori Nakamura, Kazuya Okubo, Toru Fujii, Shoji Uchida
The purpose of this study is to find the optimum power contribution ratio defined as the ratio of traction force applied onto rack rail by front pinion gear and rear pinion gear of monorail used in this study.At first, relation between loading weight and applied stress was investigated when loading weight...
Bo Wang, Xiangbin Meng
3D and planar design software, as an indispensable aiding tool for the design industry, is widely used in architectural and landscape designs. This paper centered on the CAD-based study of comparatively important issues existing in freeway landscape designs - landscape “points” (entrances, exits and...
Yulin Zhang, Xinggang Wang
This paper presents a design of softdog based on FPGA and describes hardware and software design. PC applies the CP2103 to transfers data via the USB to the FPGA device without modifying the application. The SPARTAN XC2S200 FPGA is the core of the softdog. It completes acquiring, processing and sending...
Boli Liu, Caixia Liu, Junying Sun
In recent years, there has been a lot of interest in applying orthogonal frequency division maltiplexing (OFDM) in wireless systems because of its various advantages in lessening the severe effects of frequency selective fading. This paper firstly introduces the basic principle of OFDM, then analyses...
Bin Wang, Tiexin Cheng, Yiwang Wang
In this paper, according to current research on tender evaluation methods and bidding systems, the tender evaluation model was established and described in detail, and the framework and functions of the new bidding DSS(Decision Support System) of water projects in Tainjin were designed and illustrated,...
Yu Gao
As the rapid development of computer, the quondam software development methods may not meet the requirements, people need constructing new software development methods. In order to construct new software development method, it is necessary to research the "constructing routes of new software development...
Junying Sun, Jiaxing Chen, Boli Liu
At present, wireless sensor network is widely used in sensor technology. While to design the node of WSN which is powerful, good fault tolerance, low power consumption and cheap is essential in wireless sensor network. In this article, A Family’s fire prevention method using WSN was described. Which...
Yan Shen, Lina Liu, Guoqiang Li
A character recognition technology based on CMAC (Cerebellar Model Articulation Controller) neural network was proposed, considering the neural network with the characteristics of stability and high distinctiveness. The handwriting recognition system interface was designed and developed, which provide...
Ledan Huang, Xiaobo Wu, Yangu Zhang
It is critically important to define the correct requirements in order to get the success when developing an intensive software system. Win approach is a good negotiation model which effectively enables the interdependent stakeholders to work out a set of satisfactory requirements. The current available...
Tie-jun Chen, Xue-xia Li
A wireless sensor network monitor system is designed based on CC2520 to solve the problem of confusion existing in managment of library books. This method innovativly combines RFID radio frequency technology with ZigBee technology with the goal of tracking and positioning the books wirelessly.The designing...
Zhigao Luo, Qiang Chen, Xin He
This paper relates to local wave decomposition and back-propagation (BP) neural network.With local wave method, an arbitrary acoustic emission signal can be decomposed efficiently and accurately into a set of intrinsic mode functions (IMFs) and a residual trend. The energy feature parameters extracted...
Ying Liao, Ridong Hu, Chunchun Chen
This paper has established a Logistics Information demand model based on information technology network externalities to explain that information technology network externalities has made the logistics firms join the momentum of the information network. And based on the panel data from 1995to 2006 across...
Yang Zhang, Lin Li
To reduce the optimization parameters in error alignment for the multi-arm mechanical tracking augmented reality (AR) system, the improved error alignment algorithm inspired by Denavit-Hartenberg (D-H) convention commonly used in robotics is proposed. To establish new coordinate systems, the plane geometry...
Chao Liu, Guang-xian Xu, Feng Gao, Nan Xu
In the world, the disasters often occur due to natural disasters, terrorist activity and other reasons, and the rescuers only have a very short time in the ruins to find survivors in disaster relief, or their survived chances are nearly nil. In this dangerous environment, robotics can help rescued workers....
Hai-feng Li, Zheng Lu
Land resources is an important non-renewable resource, using land resources treasuring and rational is the basic policy of our country, so monitoring the land resources utilization real-time, dynamic and managing them effective are the important routines for the land management departments. With the...
Renyi Cao, Yanbin Zhou, Qi Xiong
Since nature fracture develops in the low permeability reservoir, the anisotropy has a great impact on areal sweep efficiency of water flooding, however most of the current methods don't consider and describe the influence of anisotropy. This paper introduces the frontal water equisaturation interface,...
Liang Ma, Pen Qian, Jingping Wu, Zhaoyuan Bai, Qiang Yang
The inside flow field of a gas–liquid cyclone separator with a diameter of 75 mm was simulated with the computational fluid dynamics (CFD). Results showed that a variation of inlet flow rate significantly changes the inside flow field structure and affects separation efficiency. The axial velocity of...
Yoonseok Shin
With the aging of the existing construction workforce and the reluctance of young manpower to enter the construction field due to it being one of the so-called “3D” (Dirty, Dangerous and Difficult) industries, the number of foreign laborers employed in Korean construction industry has been on the rise....
Masaji Watanabe, Fusako Kawai
Microbial depolymerization processes of polyethylene glycol are analyzed by numerical simulation. The weight distribution after cultivation of microorganisms for two and four days was used to solve an inverse problem for the molecular factor of the degradation rate. Numerical results are compared with...
Peng Qian, Liang Ma, Yi Liu, Yanhong Zhang
Based on Reynolds stress model (RSM), the three-dimensional flow field of a gas–liquid micro-cyclone separator with a diameter of 75 mm have been simulated with the computational fluid dynamics (CFD). The distribution of gas tangential velocity of the inside flow field and its effects on the movement...
Zhiqi Xu, Chaohui Jiang
In consideration of simple workflow security model, there are some defects such as simple authentication, inflexible authorization and absent of audit, etc. However, based on the intensive research of security needs of WfMS, and by involving PKI/PMI technology, an enhanced workflow security model can...
Ying Wang, Yan Liu
The source of innovation is the technological talent .This paper established the indicator system of evaluation of enterprise's technological innovation talent team . It used ANP to determine the weight of indicators and grey related analysis to determine the rank ordering of enterprises. It provides...
Liang Jiang, Yong-zhao Zhan
For the multi-object detection problems with complex background, a method which combines background subtraction with Guassian pyramid on objects detection is presented. The method detects the whole object with taking samples from the objects with Guassian pyramid, building background models, extracting...
Yi Deng, Qingyin Jiang, Zhikai Cao
The Particle Swarm Optimization (PSO) and the Genetic Algorithm (GA) are two of the most powerful methods to solve the unconstrained and constrained global optimization problems. In this paper, these two methods are briefly introduced firstly, and then the online rolling optimization of industrial FCC...
Feifei Zhou, Rui Yang, Bo Li
Representation and coding of transform coefficients is a key factor in image compression. In this work, we introduce a coefficient representation model, called tri-plane. The proposed method is able to bring more kinds of symbols and significance states, which deeply develops the correlations among transform...
Linglin Li, Jinpeng Tang
In order to integrate e-learning into the existing work flow management system, we proposed a learning process model oriented workflow. This model is based on WfMC (Workflow Management Coalition) Xml Process Description Language-XPDL standard, combining IMS Learning design specification. The model can...
Ruizhu He, Junxia Cui
The pseudo-random code is an important part of the satellite navigation and positioning signals, its performance directly affects the accuracy of positioning system. Especially, in navigation and communication integrated system, the system's anti-jamming, anti-multipath fading, anti-intercepted, anti-multiple...
Yanpeng Sun
Border collision is an important function in the game, but the existing methods, like bounding box, octree, etc. are complex and they require extensive scene statistics for support. However, XNA-based 3D racing game achieved a simple and effective collision detection algorithm, which could properly resolve...
Minggang Jing, Jitao Wu, Xiaotao Wang
C-V model has the advantage of being able to detect boundaries of objects that are not defined by gradient. However, when detecting these types of edges, the C-V model only considers the average value of each region without local information. As a result, its segmentation result may exist errors, when...
Dan Yang, Yantao Chen, Richen Liu
This paper introduced a method of background subtraction model for detecting vehicles in video, the model was based on the framework of the kernel density estimation. To compute the adjacent frame subtraction on the spatio-temporal by the median filter, when the median value is 0, keep the background...
Yu-Bin Zhou, Yu-Ning Yang
In order to realize digital image sequence processing for multi-channel vision in real-time simultaneously, a hardware system with FPGA&DSP is designed. In the system, two ZBT SRAM chips are used as the input and output cache for high data transferring. A FPGA chip is responsible for the core logic controlling...
Zhejun Zhang, Guanghui He, Jun Ma
Low-density parity-check (LDPC) codes are one of the most popular linear block codes have ever been used in the communication system. The standard two-phase message passing decoding (TPMPD) algorithm and the layered message-passing decoding (LMPD) algorithm are widely used in LDPC decoder. However, the...
Zhifeng Zhou
BP neural networks are employed to estimate the static axle weight of moving vehicles. On the basis of analyzing the characteristics of dynamic tire force, the influence of dynamic tire force is briefly introduced on the weighing accuracy. The three-layer BP neural networks are designed to process the...
Xiaoling Tan, Zefu Tan, Weijian Fang
Network traffic analysis model is the base of traffic predication and network evaluation. The model is improving when the knowledge about the traffic features being abundant. According to the different features, the paper introduced the typical models in modern network application, and studied on their...
Yong Yang, Xinliang Zhang, Xiucai Guo
DV-Hop algorithm is one of the important range-free localization algorithms. According to the localization principle of the DV-Hop algorithm and the defect of wireless sensor networks, this paper proposes three improvements including the estimation of average single hop distance, generalizing average...
Siwei Wei, Ruoxi Wang
This paper proposes a kind of encoding method with the loop switch number as gene and the number of branches of the systematic loop as the length of the chromosome, greatly shortening the length of the chromosome. And this paper also takes a kind of effective means in genetic operation, which is eliminating...
Miangui Cheng
The disposal of public crisis prevention problem was researched, and we established the game model between local government and inspection department. From the point of profit maximization, the operation efficiency of local government and inspection department was analyzed. Through the results, got from...
Zheng Tang, Chao Sun, Zong-wei Liu, Di Meng
The Kalman filter has been widely used in state estimation of moving targets. Furthermore, the well-known conventional Kalman filter requires an accurate system model and exact prior information. However, the nonlinearity, dynamic and randomicity in the underwater environment result in uncertainty and...
Guodong Sun, Shenghui Su
Formal methods are one of the most important technologies to analyze and design authentication protocols. Kerberos protocol is a famous identity authentication protocol and it is widely used in the network. Although some fruitful formal verifications of the Kerberos protocol have been implemented, there...
Xiuhua Zeng, Jian Yang, Libo Zuo, Yonghua Xu
Research in language identification require corpus of multi-languages speech data to capture the distinguishable information within and across languages. In the past few decades, many statistical approaches to language identification have been developed based on two common and public-domain corpora which...
Xiusheng Duan, Ganlin Shan
Reform of graduate education has been focus of education sector in recent years. A universal problem needed to be faced is that graduates usually have strong theoretical ability but weak application ability of solving practical problems. In order to solve the problems, teaching method is needed to be...
Yun Xu, Biwei Li
Currently,the evaluation of teaching quality is mainly based on the method of combining scores given by students and teaching supervisors after attending classes. This method is based entirely on personal evaluation, which is much influenced by various subjective factors. So, the real effects of teaching...
Xuefeng Zhao, Li Xu
Cultural industry is a rising industry that could speed up the change of economic growth ways, also the cultural industry park is the important carrier to nurse the cultural industry. The western of China has advantaged qualifications and good opportunities to develop cultural industry. Combined with...