The grey quasi-preferred analysis (GQPA) is one of important methods for realizing system analysis to conquer the limitations of the existing GQPA model, without any considerations to the difference of the different b...The grey quasi-preferred analysis (GQPA) is one of important methods for realizing system analysis to conquer the limitations of the existing GQPA model, without any considerations to the difference of the different behavioral factor′s importance. It could not be used to analyze the complex system with multi-hierarchy correlation factors, the weighted synthetic method for calculating abstract incidence degrees between the system beha-vioral characteristics and correlative factors in different hierarchies is given out,and the hierarchic grey quasi-preferred analysis (HGQPA) model is established. The effectiveness of the HGQPA model is tested by the scientific-technical system of Jiangsu Province. The depth and the range of the application of GQPA are developed, and the HGQPA model is regarded as a new approach to systemically analyze the complex systems with multi-hierarchy correlation factors.展开更多
The static correction of a near-surface model may be improved by using travel time tomographic inversion.We discuss unfavorable factors in the inversion of surface seismic waves that have been analyzed by the first br...The static correction of a near-surface model may be improved by using travel time tomographic inversion.We discuss unfavorable factors in the inversion of surface seismic waves that have been analyzed by the first break.These factors show that sources and geophones arranged on the surface,or close to the surface,give a first break that only includes the direct wave and the up going wave from the down going to up going transition.These up going waves have weak directivity when they arrive at a geophone and so the rays passing through the grids have small directional differences and a narrow azimuth.Drawing lessons from the advantages of Vertical Seismic Profiling(VSP) acquisition mode we describe a pseudo well-surface simultaneous travel time tomographic inversion of a near-surface model.The well depth should be increased in the surface seismic study to produce a pure up going wave,to enhance the verticality of the rays and to increase the azimuth and shorten path length of the rays.Simulations of the effect of well depth on a pseudo well-surface simultaneous travel time tomographic inversion model are reported.The results show that the static corrections are improved significantly when the well depth extends below the weathered or sub-weathered layers.The root mean square error of the statics is 1.14 or 0.93 ms for these two situations,respectively.展开更多
In order to apply physical simulation results to natural gas hydrate reservoir parameters to provide a theoretical framework for the design of a development plan,an analytical equation method was used to obtain the si...In order to apply physical simulation results to natural gas hydrate reservoir parameters to provide a theoretical framework for the design of a development plan,an analytical equation method was used to obtain the similarity criteria of natural gas hydrate reservoir development by physical simulation,based on a mathematical model of natural gas hydrate development.Given the approach of numerical simulation,a sensitivity analysis for all parameters was carried out,which specifically demonstrated that initial temperature is the most important parameter.Parameters of thermal conductivity coefficients are not necessary for conducting the NGH dissociation process,which will fundamentally simplify the design and establishment of the model.The analysis provides a sound theoretical basis and design principles for particular similarity.展开更多
We introduce a novel Sermntic-Category- Tree (SCT) model to present the sen-antic structure of a sentence for Chinese-English Machine Translation (MT). We use the SCT model to handle the reordering in a hierarchic...We introduce a novel Sermntic-Category- Tree (SCT) model to present the sen-antic structure of a sentence for Chinese-English Machine Translation (MT). We use the SCT model to handle the reordering in a hierarchical structure in which one reordering is dependent on the others. Different from other reordering approaches, we handle the reordering at three levels: sentence level, chunk level, and word level. The chunk-level reordering is dependent on the sentence-level reordering, and the word-level reordering is dependent on the chunk-level reordering. In this paper, we formally describe the SCT model and discuss the translation strategy based on the SCT model. Further, we present an algorithm for analyzing the source language in SCT and transforming the source SCT into the target SCT. We apply the SCT model to a role-based patent text MT to evaluate the ability of the SCT model. The experimental results show that SCT is efficient in handling the hierarehical reordering operation in MT.展开更多
Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine ...Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine consisting of six parts: decompile, grammar parsing, control flow and data flow analysis, safety analysis, and comprehensive evaluation. In the comprehensive evaluation, we obtain a weight vector of 29 evaluation indexes using the analytic hierarchy process. During this process, the detection engine exports a list of suspicious API. On the basis of this list, the evaluation part of the engine performs a compre- hensive evaluation of the hazard assessment of software sample. Finally, hazard classification is given for the software. The false positive rate of our approach for detecting rnalware samples is 4. 7% and normal samples is 7.6%. The experimental results show that the accuracy rate of our approach is almost similar to the method based on virus signatures. Compared with the method based on virus signatures, our approach performs well in detecting unknown malware. This approach is promising for the application of malware detection.展开更多
Technique for horror video recognition is important for its application in web content filtering and surveillance, especially for preventing children from being threaten. In this paper, a novel horror video recognitio...Technique for horror video recognition is important for its application in web content filtering and surveillance, especially for preventing children from being threaten. In this paper, a novel horror video recognition algorithm based on fuzzy comprehensive evolution model is proposed. Three low-level video features are extracted as typical features, and they are video key-light, video colour energy and video rhythm. Analytic Hierarchy Process (AHP) is adopted to estimate the weights of extracted features in fuzzy evolution model. Horror evaluation (membership function) is on shot scale and it is constructed based on the knowledge that videos which share the same affective have similar low-level features. K-Means algorithm is implemented to help finding the most representative feature vectors. The experimental results demonstrate that the proposed approach has good performance in recognition precision, recall rate and F1 measure.展开更多
Orthogonal turn-milling is a high-efficiency and precision machining method.Its cutting layer directly affects chip formation,cutting forces,and chatter,and further affects tool life,machining quality,etc.We studied T...Orthogonal turn-milling is a high-efficiency and precision machining method.Its cutting layer directly affects chip formation,cutting forces,and chatter,and further affects tool life,machining quality,etc.We studied The cutting layer geometry(CLG)in orthogonal turn-milling with zero eccentricity(OTMZE)is studied to explore orthogonal turn-milling cutting layer formation process.OTMZE principles of motion and formation processes are analyzed statically without considering kinetic influences.Mathematical models of the entrance and exit angles,cutting thickness,and cutting depth are established.In addition,these models are validated experimentally and some influences of cutting parameters on the tool cutting layer are analyzed.The results show that OTMZE cutting layer formation can be divided into two stages,chip shapes are nearly consistent with the simulated CLGs,and the most influencial parameter in affecting the cutting layer is found to be the tool feed per revolation of workpiece fa,followed by the ratio of the tool and workpiece speedsλand the cutting depth ap.These models and results can provide theoretical guidance to clarify formation processes and quantitatively analyze changes in cutting layer geometry during OTMZE.In addition,they offer theoretical guidelines for cutting forces and chatter.展开更多
A traffic matrix is a necessary parameter fornetwork management functions,and itsupplies a flow-level view of a largescale IP-over-WDM backbone network.This paper studies the problem of traffic matrix estimationand pr...A traffic matrix is a necessary parameter fornetwork management functions,and itsupplies a flow-level view of a largescale IP-over-WDM backbone network.This paper studies the problem of traffic matrix estimationand proposes an exact traffic matrix estimation approach based on network tomography techniques.The traditional network tomography model is extended to make it compatible with compressive sensing constraints.First,a stochastic perturbation is introduced in the traditional network tomography inference model.Then,an algorithm is proposed to achieve additional optical link observations via optical bypass techniques.The obtained optical link observations are used as extensions for the perturbed network tomography model to ensure that the synthetic model can meetcompressive sensing constraints.Finally,the traffic matrix is estimated from the synthetic model by means of a compressive sensing recovery algorithm.展开更多
In the process of accurate interpretation of multi-wave seismic data,we wanted to solve the problem of multi-wave information recognition.Based on techniques of elastic wave forwarding,targeting the geological model o...In the process of accurate interpretation of multi-wave seismic data,we wanted to solve the problem of multi-wave information recognition.Based on techniques of elastic wave forwarding,targeting the geological model of a reservoir of an oil field exploration area,we used a high-order staggered-grid difference technology to simulate many shots of seismic records of nonzero offset shots,implemented multi-wave seismic data processing to acquire the CMP of P waves and converted waves,NMO traces of CCP pre stacks,including AVA information and superposition profiles.Based on the AVA calculation of the model,the layer parameters of the model and the forwarding wave field relations of the P-S wave,we also compared and studied the correspondence between P waves and converted waves.The results of our analysis show that the results from simulation and from the AVO analysis are consistent.Significant wave field differences between P waves and converted waves in the same reservoir were found,which are helpful in recognizing and interpreting the multi-wave information in this area.We made use of the multi-wave data to provide the important guidelines for reservoir prediction.展开更多
文摘The grey quasi-preferred analysis (GQPA) is one of important methods for realizing system analysis to conquer the limitations of the existing GQPA model, without any considerations to the difference of the different behavioral factor′s importance. It could not be used to analyze the complex system with multi-hierarchy correlation factors, the weighted synthetic method for calculating abstract incidence degrees between the system beha-vioral characteristics and correlative factors in different hierarchies is given out,and the hierarchic grey quasi-preferred analysis (HGQPA) model is established. The effectiveness of the HGQPA model is tested by the scientific-technical system of Jiangsu Province. The depth and the range of the application of GQPA are developed, and the HGQPA model is regarded as a new approach to systemically analyze the complex systems with multi-hierarchy correlation factors.
文摘The static correction of a near-surface model may be improved by using travel time tomographic inversion.We discuss unfavorable factors in the inversion of surface seismic waves that have been analyzed by the first break.These factors show that sources and geophones arranged on the surface,or close to the surface,give a first break that only includes the direct wave and the up going wave from the down going to up going transition.These up going waves have weak directivity when they arrive at a geophone and so the rays passing through the grids have small directional differences and a narrow azimuth.Drawing lessons from the advantages of Vertical Seismic Profiling(VSP) acquisition mode we describe a pseudo well-surface simultaneous travel time tomographic inversion of a near-surface model.The well depth should be increased in the surface seismic study to produce a pure up going wave,to enhance the verticality of the rays and to increase the azimuth and shorten path length of the rays.Simulations of the effect of well depth on a pseudo well-surface simultaneous travel time tomographic inversion model are reported.The results show that the static corrections are improved significantly when the well depth extends below the weathered or sub-weathered layers.The root mean square error of the statics is 1.14 or 0.93 ms for these two situations,respectively.
基金supported by the China Petroleum and Chemical Corporation (No.P06070)the National Natural Science Foundation of China (No.50404003)
文摘In order to apply physical simulation results to natural gas hydrate reservoir parameters to provide a theoretical framework for the design of a development plan,an analytical equation method was used to obtain the similarity criteria of natural gas hydrate reservoir development by physical simulation,based on a mathematical model of natural gas hydrate development.Given the approach of numerical simulation,a sensitivity analysis for all parameters was carried out,which specifically demonstrated that initial temperature is the most important parameter.Parameters of thermal conductivity coefficients are not necessary for conducting the NGH dissociation process,which will fundamentally simplify the design and establishment of the model.The analysis provides a sound theoretical basis and design principles for particular similarity.
基金supported by the National High Technology Research and Development Program of China under Grant No.2012AA011104the Fundamental Research Funds for the Center Universities
文摘We introduce a novel Sermntic-Category- Tree (SCT) model to present the sen-antic structure of a sentence for Chinese-English Machine Translation (MT). We use the SCT model to handle the reordering in a hierarchical structure in which one reordering is dependent on the others. Different from other reordering approaches, we handle the reordering at three levels: sentence level, chunk level, and word level. The chunk-level reordering is dependent on the sentence-level reordering, and the word-level reordering is dependent on the chunk-level reordering. In this paper, we formally describe the SCT model and discuss the translation strategy based on the SCT model. Further, we present an algorithm for analyzing the source language in SCT and transforming the source SCT into the target SCT. We apply the SCT model to a role-based patent text MT to evaluate the ability of the SCT model. The experimental results show that SCT is efficient in handling the hierarehical reordering operation in MT.
基金supported by Major National Science and Technology Projects(No.3) under Grant No. 2012ZX03002012
文摘Mobile malware is rapidly increasing and its detection has become a critical issue. In this study, we summarize the common characteristics of this inalicious software on Android platform. We design a detection engine consisting of six parts: decompile, grammar parsing, control flow and data flow analysis, safety analysis, and comprehensive evaluation. In the comprehensive evaluation, we obtain a weight vector of 29 evaluation indexes using the analytic hierarchy process. During this process, the detection engine exports a list of suspicious API. On the basis of this list, the evaluation part of the engine performs a compre- hensive evaluation of the hazard assessment of software sample. Finally, hazard classification is given for the software. The false positive rate of our approach for detecting rnalware samples is 4. 7% and normal samples is 7.6%. The experimental results show that the accuracy rate of our approach is almost similar to the method based on virus signatures. Compared with the method based on virus signatures, our approach performs well in detecting unknown malware. This approach is promising for the application of malware detection.
文摘Technique for horror video recognition is important for its application in web content filtering and surveillance, especially for preventing children from being threaten. In this paper, a novel horror video recognition algorithm based on fuzzy comprehensive evolution model is proposed. Three low-level video features are extracted as typical features, and they are video key-light, video colour energy and video rhythm. Analytic Hierarchy Process (AHP) is adopted to estimate the weights of extracted features in fuzzy evolution model. Horror evaluation (membership function) is on shot scale and it is constructed based on the knowledge that videos which share the same affective have similar low-level features. K-Means algorithm is implemented to help finding the most representative feature vectors. The experimental results demonstrate that the proposed approach has good performance in recognition precision, recall rate and F1 measure.
基金supported by the National Natural Science Foundation of China (No. 51475233)the Natural Science Foundation of Jiangsu Province(No. BK20171170)+2 种基金the Six Talent Peaks Project of Jiangsu Province(No. JXQC-049)the Major Program of the Natural Science Foundation for Colleges and Universities of Jiangsu Province(No. 19KJA560007)the Project of Jiangsu Key Laboratory of Large Engineering Equipment Detection and Control(No. JSKLEDC201512)
文摘Orthogonal turn-milling is a high-efficiency and precision machining method.Its cutting layer directly affects chip formation,cutting forces,and chatter,and further affects tool life,machining quality,etc.We studied The cutting layer geometry(CLG)in orthogonal turn-milling with zero eccentricity(OTMZE)is studied to explore orthogonal turn-milling cutting layer formation process.OTMZE principles of motion and formation processes are analyzed statically without considering kinetic influences.Mathematical models of the entrance and exit angles,cutting thickness,and cutting depth are established.In addition,these models are validated experimentally and some influences of cutting parameters on the tool cutting layer are analyzed.The results show that OTMZE cutting layer formation can be divided into two stages,chip shapes are nearly consistent with the simulated CLGs,and the most influencial parameter in affecting the cutting layer is found to be the tool feed per revolation of workpiece fa,followed by the ratio of the tool and workpiece speedsλand the cutting depth ap.These models and results can provide theoretical guidance to clarify formation processes and quantitatively analyze changes in cutting layer geometry during OTMZE.In addition,they offer theoretical guidelines for cutting forces and chatter.
基金supported in part by the National Natural Science Foundation of China(Nos.61571104,61071124,61501105)the General Project of Scientific Research of the Education Department of Liaoning Province(No.L20150174)+2 种基金the Program for New Century Excellent Talents in University(No.NCET-11-0075)the Fundamental Research Funds for the Central Universities(Nos.N150402003,N120804004,N130504003,N150404018)the State Scholarship Fund(201208210013)
文摘A traffic matrix is a necessary parameter fornetwork management functions,and itsupplies a flow-level view of a largescale IP-over-WDM backbone network.This paper studies the problem of traffic matrix estimationand proposes an exact traffic matrix estimation approach based on network tomography techniques.The traditional network tomography model is extended to make it compatible with compressive sensing constraints.First,a stochastic perturbation is introduced in the traditional network tomography inference model.Then,an algorithm is proposed to achieve additional optical link observations via optical bypass techniques.The obtained optical link observations are used as extensions for the perturbed network tomography model to ensure that the synthetic model can meetcompressive sensing constraints.Finally,the traffic matrix is estimated from the synthetic model by means of a compressive sensing recovery algorithm.
基金the Doctor Research Fund for Universities of China (No.20070616004)the National High Technology Research and Development Program of China (No.2007AA060505)
文摘In the process of accurate interpretation of multi-wave seismic data,we wanted to solve the problem of multi-wave information recognition.Based on techniques of elastic wave forwarding,targeting the geological model of a reservoir of an oil field exploration area,we used a high-order staggered-grid difference technology to simulate many shots of seismic records of nonzero offset shots,implemented multi-wave seismic data processing to acquire the CMP of P waves and converted waves,NMO traces of CCP pre stacks,including AVA information and superposition profiles.Based on the AVA calculation of the model,the layer parameters of the model and the forwarding wave field relations of the P-S wave,we also compared and studied the correspondence between P waves and converted waves.The results of our analysis show that the results from simulation and from the AVO analysis are consistent.Significant wave field differences between P waves and converted waves in the same reservoir were found,which are helpful in recognizing and interpreting the multi-wave information in this area.We made use of the multi-wave data to provide the important guidelines for reservoir prediction.