Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classic...Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classical algorithms based on one-way quantum computation were proposed. In this work, we propose a method to implement the classical Hadamard transform algorithm utilizing the CV cluster state. Compared with classical computation, only half operations are required when it is operated in the one-way CV quantum computer. As an example, we present a concrete scheme of four-mode classical Hadamard transform algorithm with a four-partite CV cluster state. This method connects the quantum computer and the classical algorithms, which shows the feasibility of running classical algorithms in a quantum computer efficiently.展开更多
The IP multicast technology helps achieveefficient point-to-multipoint datatransmission on IP networks,save networkbandwidth and reduce traffic loads.Withthe growth of multimedia services,the multicasttechnology,which...The IP multicast technology helps achieveefficient point-to-multipoint datatransmission on IP networks,save networkbandwidth and reduce traffic loads.Withthe growth of multimedia services,the multicasttechnology,which enables lots of broadbandvalue-added services,has a great marketpotential.Moreover,after years of development,xDSL network platforms have been implementedon a considerable scale.展开更多
The Belt and Road Initiativeis a scheme for bolstering boththe connectivity and synergeticdevelopment between China and itsneighboring countries, and it wasput forward by the Communist Partyof China and Chinese leader...The Belt and Road Initiativeis a scheme for bolstering boththe connectivity and synergeticdevelopment between China and itsneighboring countries, and it wasput forward by the Communist Partyof China and Chinese leaders basedon new changes and new trendsin global political, economic, andstrategic patterns.展开更多
A simple three-dimensional (3D) autonomous chaotic system is extended to four-dimensions so as to generate richer nonlinear dynamics. The new system not only inherits the dynamical characteristics of its parental 3D...A simple three-dimensional (3D) autonomous chaotic system is extended to four-dimensions so as to generate richer nonlinear dynamics. The new system not only inherits the dynamical characteristics of its parental 3D system but also exhibits many new and complex dynamics, including assembled 1-scroll, 2-scroll and 4-scroll attractors, as well as hyperchaotic attractors, by simply tuning a single system parameter. Lyapunov exponents and bifurcation diagrams are obtained via numerical simulations to further justify the existences of chaos and hyperchaos. Finally, an electronic circuit is constructed to implement the system, with experimental and simulation results presented and compared for demonstration and verification.展开更多
English curriculum reform for the students of engineering and technology in vocational college is to be implemented in that the structures of the English curriculum is not updated to the current teaching requirement.T...English curriculum reform for the students of engineering and technology in vocational college is to be implemented in that the structures of the English curriculum is not updated to the current teaching requirement.The ways of reforming and implementing is stated in order to give guidance of how to actualize the structure of English curriculum.展开更多
When implementing open access, policy pioneers and flagship institutions alike have faced considerable challenges in meeting their own aims and achieving a recognized success. Legitimate authority, sufficient resource...When implementing open access, policy pioneers and flagship institutions alike have faced considerable challenges in meeting their own aims and achieving a recognized success. Legitimate authority, sufficient resources and the right timing are crucial, but the professionals charged with implementing policy still need several years to accomplish significant progress. This study defines a methodological standard for evaluating the first generation of open access policies. Evaluating implementation establishes evidence, enables reflection, and may foster the emergence of a second generation of open access policies.While the study is based on a small number of cases, these case studies cover most of the pioneer institutions, present the most significant issues and offer an international overview.Each case is reconstructed individually on the basis of public documents and background information, and supported by interviews with professionals responsible for open access implementation. This article presents the highlights from each case study. The results are utilized to indicate how a second generation of policies might define open access as a key component of digital research infrastructures that provide inputs and outputs for research,teaching and learning in real time.展开更多
In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical ach...In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.展开更多
Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for...Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for this process is to combine inertial navigation system sensor information with the global navigation satellite system(GNSS)signal.However,some factors can interfere with the GNSS signal,such as ionospheric scintillation,jamming,or spoofing.One alternative method to avoid using the GNSS signal is to apply an image processing approach by matching UAV images with georeferenced images.But a high effort is required for image edge extraction.Here a support vector regression(SVR)model is proposed to reduce this computational load and processing time.The dynamic partial reconfiguration(DPR)of part of the SVR datapath is implemented to accelerate the process,reduce the area,and analyze its granularity by increasing the grain size of the reconfigurable region.Results show that the implementation in hardware is 68 times faster than that in software.This architecture with DPR also facilitates the low power consumption of 4 mW,leading to a reduction of 57%than that without DPR.This is also the lowest power consumption in current machine learning hardware implementations.Besides,the circuitry area is 41 times smaller.SVR with Gaussian kernel shows a success rate of 99.18%and minimum square error of 0.0146 for testing with the planning trajectory.This system is useful for adaptive applications where the user/designer can modify/reconfigure the hardware layout during its application,thus contributing to lower power consumption,smaller hardware area,and shorter execution time.展开更多
Memristors are extensively used to estimate the external electromagnetic stimulation and synapses for neurons.In this paper,two distinct scenarios,i.e.,an ideal memristor serves as external electromagnetic stimulation...Memristors are extensively used to estimate the external electromagnetic stimulation and synapses for neurons.In this paper,two distinct scenarios,i.e.,an ideal memristor serves as external electromagnetic stimulation and a locally active memristor serves as a synapse,are formulated to investigate the impact of a memristor on a two-dimensional Hindmarsh-Rose neuron model.Numerical simulations show that the neuronal models in different scenarios have multiple burst firing patterns.The introduction of the memristor makes the neuronal model exhibit complex dynamical behaviors.Finally,the simulation circuit and DSP hardware implementation results validate the physical mechanism,as well as the reliability of the biological neuron model.展开更多
On the basis of PDM(product data management) definition and its connotation, the factors to ensure implementation success are analyzed. The definition phase, analysis phase, design phase, build and test phase, and pos...On the basis of PDM(product data management) definition and its connotation, the factors to ensure implementation success are analyzed. The definition phase, analysis phase, design phase, build and test phase, and post production phase during PDM implementation are described. The implementation is divided into ten processes, which consist of the above different phases. The relationships between phases and processes are illustrated. Finally, a workflow is proposed to guide the implementing at a fixed price.展开更多
The paper investigates the learner-focused English as a Foreign Langue(EFL) curricular innovation in China Agricultural University(referred to as CAU in the following text) from the perspectives of curricular formulat...The paper investigates the learner-focused English as a Foreign Langue(EFL) curricular innovation in China Agricultural University(referred to as CAU in the following text) from the perspectives of curricular formulation,implementation and evaluation of EFL learning & teaching in the one-year duration from Autumn semester of 2016 to Spring semester of 2017.A discussion of the effects of the curricular restructuring is presented.展开更多
基金Supported by the National Natural Science Foundation of China under Grant Nos 11504024,61502041,61602045 and 61602046the National Key Research and Development Program of China under Grant No 2016YFA0302600
文摘Measurement-based one-way quantum computation, which uses cluster states as resources, provides an efficient model to perforrn computation. However, few of the continuous variable (CV) quantum algorithms and classical algorithms based on one-way quantum computation were proposed. In this work, we propose a method to implement the classical Hadamard transform algorithm utilizing the CV cluster state. Compared with classical computation, only half operations are required when it is operated in the one-way CV quantum computer. As an example, we present a concrete scheme of four-mode classical Hadamard transform algorithm with a four-partite CV cluster state. This method connects the quantum computer and the classical algorithms, which shows the feasibility of running classical algorithms in a quantum computer efficiently.
文摘The IP multicast technology helps achieveefficient point-to-multipoint datatransmission on IP networks,save networkbandwidth and reduce traffic loads.Withthe growth of multimedia services,the multicasttechnology,which enables lots of broadbandvalue-added services,has a great marketpotential.Moreover,after years of development,xDSL network platforms have been implementedon a considerable scale.
文摘The Belt and Road Initiativeis a scheme for bolstering boththe connectivity and synergeticdevelopment between China and itsneighboring countries, and it wasput forward by the Communist Partyof China and Chinese leaders basedon new changes and new trendsin global political, economic, andstrategic patterns.
文摘A simple three-dimensional (3D) autonomous chaotic system is extended to four-dimensions so as to generate richer nonlinear dynamics. The new system not only inherits the dynamical characteristics of its parental 3D system but also exhibits many new and complex dynamics, including assembled 1-scroll, 2-scroll and 4-scroll attractors, as well as hyperchaotic attractors, by simply tuning a single system parameter. Lyapunov exponents and bifurcation diagrams are obtained via numerical simulations to further justify the existences of chaos and hyperchaos. Finally, an electronic circuit is constructed to implement the system, with experimental and simulation results presented and compared for demonstration and verification.
文摘English curriculum reform for the students of engineering and technology in vocational college is to be implemented in that the structures of the English curriculum is not updated to the current teaching requirement.The ways of reforming and implementing is stated in order to give guidance of how to actualize the structure of English curriculum.
文摘When implementing open access, policy pioneers and flagship institutions alike have faced considerable challenges in meeting their own aims and achieving a recognized success. Legitimate authority, sufficient resources and the right timing are crucial, but the professionals charged with implementing policy still need several years to accomplish significant progress. This study defines a methodological standard for evaluating the first generation of open access policies. Evaluating implementation establishes evidence, enables reflection, and may foster the emergence of a second generation of open access policies.While the study is based on a small number of cases, these case studies cover most of the pioneer institutions, present the most significant issues and offer an international overview.Each case is reconstructed individually on the basis of public documents and background information, and supported by interviews with professionals responsible for open access implementation. This article presents the highlights from each case study. The results are utilized to indicate how a second generation of policies might define open access as a key component of digital research infrastructures that provide inputs and outputs for research,teaching and learning in real time.
基金supported by the National Key Research and Development Program of China(Grant No.2020YFB1804604).
文摘In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher security.As the latest theoretical achievement in active defense,mimic defense demonstrates high robustness against complex attacks.This study proposes a Function-aware,Bayesian adjudication,and Adaptive updating Mimic Defense(FBAMD)theory for addressing the current problems of existing work including limited ability to resist unknown threats,imprecise heterogeneous metrics,and over-reliance on relatively-correct axiom.FBAMD incorporates three critical steps.Firstly,the common features of executors’vulnerabilities are obtained from the perspective of the functional implementation(i.e,input-output relationships extraction).Secondly,a new adjudication mechanism considering Bayes’theory is proposed by leveraging the advantages of both current results and historical confidence.Furthermore,posterior confidence can be updated regularly with prior adjudication information,which provides mimic system adaptability.The experimental analysis shows that FBAMD exhibits the best performance in the face of different types of attacks compared to the state-of-the-art over real-world datasets.This study presents a promising step toward the theo-retical innovation of mimic defense.
基金financially supported by the National Council for Scientific and Technological Development(CNPq,Brazil),Swedish-Brazilian Research and Innovation Centre(CISB),and Saab AB under Grant No.CNPq:200053/2022-1the National Council for Scientific and Technological Development(CNPq,Brazil)under Grants No.CNPq:312924/2017-8 and No.CNPq:314660/2020-8.
文摘Unmanned aerial vehicles(UAVs)have been widely used in military,medical,wireless communications,aerial surveillance,etc.One key topic involving UAVs is pose estimation in autonomous navigation.A standard procedure for this process is to combine inertial navigation system sensor information with the global navigation satellite system(GNSS)signal.However,some factors can interfere with the GNSS signal,such as ionospheric scintillation,jamming,or spoofing.One alternative method to avoid using the GNSS signal is to apply an image processing approach by matching UAV images with georeferenced images.But a high effort is required for image edge extraction.Here a support vector regression(SVR)model is proposed to reduce this computational load and processing time.The dynamic partial reconfiguration(DPR)of part of the SVR datapath is implemented to accelerate the process,reduce the area,and analyze its granularity by increasing the grain size of the reconfigurable region.Results show that the implementation in hardware is 68 times faster than that in software.This architecture with DPR also facilitates the low power consumption of 4 mW,leading to a reduction of 57%than that without DPR.This is also the lowest power consumption in current machine learning hardware implementations.Besides,the circuitry area is 41 times smaller.SVR with Gaussian kernel shows a success rate of 99.18%and minimum square error of 0.0146 for testing with the planning trajectory.This system is useful for adaptive applications where the user/designer can modify/reconfigure the hardware layout during its application,thus contributing to lower power consumption,smaller hardware area,and shorter execution time.
基金supported by the National Natural Science Foundation of China(Grant No.62061014)Technological Innovation Projects in the Field of Artificial Intelligence in Liaoning province(Grant No.2023JH26/10300011)Basic Scientific Research Projects in Department of Education of Liaoning Province(Grant No.JYTZD2023021).
文摘Memristors are extensively used to estimate the external electromagnetic stimulation and synapses for neurons.In this paper,two distinct scenarios,i.e.,an ideal memristor serves as external electromagnetic stimulation and a locally active memristor serves as a synapse,are formulated to investigate the impact of a memristor on a two-dimensional Hindmarsh-Rose neuron model.Numerical simulations show that the neuronal models in different scenarios have multiple burst firing patterns.The introduction of the memristor makes the neuronal model exhibit complex dynamical behaviors.Finally,the simulation circuit and DSP hardware implementation results validate the physical mechanism,as well as the reliability of the biological neuron model.
文摘On the basis of PDM(product data management) definition and its connotation, the factors to ensure implementation success are analyzed. The definition phase, analysis phase, design phase, build and test phase, and post production phase during PDM implementation are described. The implementation is divided into ten processes, which consist of the above different phases. The relationships between phases and processes are illustrated. Finally, a workflow is proposed to guide the implementing at a fixed price.
文摘The paper investigates the learner-focused English as a Foreign Langue(EFL) curricular innovation in China Agricultural University(referred to as CAU in the following text) from the perspectives of curricular formulation,implementation and evaluation of EFL learning & teaching in the one-year duration from Autumn semester of 2016 to Spring semester of 2017.A discussion of the effects of the curricular restructuring is presented.