简介:编码基于的方法的一篇小说说出同样本地的二进制取向代码(LBOCode)因为palmprint识别被建议。palmprint图象第一与Gabor过滤器的一个银行被卷,然后取向信息与一条winner-take-all规则被达到。随后,产生取向印射数组被一致本地二进制模式操作。因此,LBOCode图象被完成它在象素水平包含palmprint取向信息。进一步,我们把LBOCode图象划分成几相等尺寸并且nonoverlapping区域,和摘录从每个区域的统计代码直方图独立地,它在地区性的水平造对palmprint的全球描述。在匹配舞台,在二palmprints之间的匹配的分数被精明的二张空间提高的直方图的不同完成,它带计算简洁的利益。试验性的结果证明建议方法与几个最先进的方法的相比完成更有希望的识别性能。
简介:ThislettergivesarandomconstructionforLowDensityParityCheck(LDPC)codes,whichusesaniterativealgorithmtoavoidshortcyclesintheTannergraph.TheconstructionmethodhasgreatflexiblechoiceinLDPCcode'sparametersincludingcodelength,coderate,theleastgirthofthegraph,theweightofcolumnandrowintheparitycheckmatrix.ThemethodcanbeappliedtotheirregularLDPCcodesandstrictregularLDPCcodes.Systemiccodeshavemanyapplicationsindigitalcommunication,sothisletterproposesaconstructionofthegeneratormatrixofsystemicLDPCcodesfromtheparitycheckmatrix.Simulationsshowthatthemethodperformswellwithiterativedecoding.
简介:Addingdampersisacommonlyadoptedseismicriskmitigationstrategyformodernbuildings,andthecorrespondingdesignprocedureofdampershasbeenwellestablishedbytheChineseBuildingCode.Eventhoughalltypesofdampersaredesignedbythesameprocedure,actualseismicperformanceofthebuildingmaydifferfromonetotheothers.Inthisstudy,anine-storybenchmarksteelbuildingisestablished,andthreedifferentandtypicaltypesofdampersaredesignedaccordingtotheChineseBuildingCodetorealizestructuralvibrationcontrolunderstrongearthquakeexcitation.Theseismicresponseoftheprototypebuildingequippedwithaviscoelasticdamper,viscousdamperandbuckling-restrainedbrace(BRB)subjectedto10earthquakerecordsarecalculated,andIncrementalDynamicAnalysis(IDA)isperformedtodescribeprogressivedamageofthestructureunderincreasingearthquakeintensity.Intheperspectiveoffragility,itshowsthattheviscoelasticdamperhasthehighestcollapsemarginratio(CMR),andtheviscousdamperprovidesthebestdriftcontrol.BoththeBRBandviscoelasticdamperscaneffectivelyreducetheflooraccelerationresponsesinthemid-risebuilding.
简介:Code-switchingisasocio-linguisticterm,whichreferstotheswitchingfromonelanguagetoanother.Thispaperattemptstoshowthatcode-switchingcanbeusedasateachingstrategyforsecondlanguageteachingbyillustratingthepossiblereasonsfortheswitching.Italsoexploresthepossibilityofviewingcode-switchingaslanguageinterferenvefromateachingperspective.Inaccordancewiththeseanalysisthispapermakesaconclusionthatwhencode-switchingistocompensateforalanguagecifficultyitmaybeviewedasinterfernceandwhenitisusedasasocio-linguistictoolitbecomesastrategy.
简介:FBIisacodeoriginallydevelopedonJT-60UtoquicklycalculatecomprehensiveplasmaparametersforadischargeunderUnixOS.IthasbeentransferredtoHL-2Aatthebeginningof2003.Itsmainfunctionistoidentifyplasmaboundarybyfilamentcurrentmethodwithsignalsfromtheelectromagneticmeasurement.Thefundamentaldifferencesofmachinescaleandstructure,
简介:HurricanesKatrinaandRitaresultedinthelargestnumberofplatformsdestroyedanddamagedinthehistoryofGulfofMexicooperations.Withthetrendofglobalwarming,sealevelrisingandthefrequencyandintensityoftyphoonincrease.Howtodetermineareasonabledeckelevationagainstthelargesthurricanewaveshasbecomeakeyissueinoffshoreplatformsdesignandconstructionfortheunificationofeconomyandsafety.Inthispaper,themultivariatecompoundextremevaluedistribution(MCEVD)modelisusedtopredictthedeckelevationwithdifferentcombinationoftide,surgeheight,andcrestheight.ComparedwithpracticerecommendedbyAmericanPetroleumInstitute(API),thepredictionbyMCEVDhasprobabilisticmeaninganduniversality.
简介:许多软件系统在很多个连续版本被开发。在每个版本不仅新代码被增加而且存在代码经常被修改。在这研究,我们证明修改代码能是差错的重要来源。差错广泛地在软件项目作为主要费用司机之一被认出。因此,我们寻找在修改代码改进故障检测的方法。我们建议并且评估很多个预测模型增加故障检测的效率。为了造并且评估我们的模型,我们使用从Ericsson生产的二个大远程通信系统收集的数据。我们由比那两个都把他们用于系统的一个不同版本评估我们的模型的表演他们被造在上并且到一个不同系统。我们的模型的性能与理论最好的模型,的性能相比一个简单模型基于尺寸,以及到在一份随机的订单分析代码(不用任何模型)。我们发现我们的模型的使用在根本并且过去不基于班尺寸用一个简单模型使用任何模型上提供重要改进。我们的模型提供的获得对应于3857%理论最大增益。电子增补材料这篇文章(doi:10.1007/s11390-007-9053-3)的联机版本contatins增补材料,它对授权用户可得到。
简介:Anumericalsimulationcodehasbeenestablishedwithparticlesimulationmethodinordertostudythegyro-kineticequationsfortheelectrostaticelectrontemperaturegradientmodesintoroidalplasmas.Theflowchartisgivenaswellforthecode.Thefourth-orderadaptivestep-sizeschemeisadopted,thatsavescomputertimeandissimple.Thecalculationcodeisusefulfortheresearchoftheelectrontemperaturegradientinstability.
简介:Codedisseminationisanimportantbuildingblockofwirelessreprogramming.Wenoticethatcurrentcodedisseminationprotocolsfailstoconsiderpageselectionandenergybalancing.Inthispaper,wepresentanintegratedmutualselectionbasedcodedisseminationprotocol(MSD).ThekeyideaofMSDismutualselectioncomprisingsenderselectionandpageselection.Byexploitinglinkqualityinformationinmutualselection,MSDenhancesthepropagation.Further,MSDtakesenergylevelinformationinthesenderselection,thusavoidinglowpowernodes'over-consumption.WesimulateMSDbysettingsofMica-Zmotes.SimulationresultsshowthatMSDcanreducethecompletiontimeandaveragetransmission,andhelplowpowernodesavoidunnecessarytransmissionandenergyconsumption.
简介:Inholographicencryption,doublerandom-phaseencodingintheFresneldomain(DRPEiFD)isaprevalentencryptionmethodbecauseitislenslessandsecure.However,noisesbringadverseeffectsduringdecryption.Inthisletter,weintroducequick-response(QR)codingduringencryptiontoresistnoises.WetransformtheoriginalinformationintoaQRcodeandthenencryptthecodeasahologramthroughDRPEiFD.Toretrievetheinput,wedecryptthehologramintheoppositemannertotheencryptionandsubsequentlyobtainaQRcodewithnoises.Byscanningthiscodewithproperapplicationsinsmartphones,wecanobtainanoise-freeretrieval.Numericalexperimentsandimagesscannedbyasmartphoneareshowntovalidateourproposedmethod.
简介:Thisarticleisfocusedonanalyzingthekeytechnologiesofnewmaliciouscodeandcorrespondingdefensivemeasuresinthelarge-scalecommunicationnetworks.Basedondescriptionoftheconceptsanddevelopmentofthemaliciouscode,thearticleintroducestheanti-analysistechnology,splittingandinsertingtechnology,hidingtechnology,polymorphvirustechnology,andautoproductiontechnologyofthemaliciouscodetrendswithintelligence,diversityandintegration.Followingthat,itsummarizesthesecurityvulnerabilitiesofcommunicationnetworksfromfourrelatedlayersaspects,accordingtothemechanismsofmaliciouscodeinthecommunicationnetworks.Finally,itproposesrapidresponsedispositionofmaliciouscodeattacksfromfourcorrelatedsteps:buildingupthenetworknodemonitoringsystem,suspiciouscodefeatureautomationanalysisandextraction,rapidactivemaliciouscoderesponsetechniqueforunknownmaliciouscode,andmaliciouscodeattackimmunitytechnique.Asaresult,itactivelydefensesagainsttheunknownmaliciouscodeattacksandenhancesthesecurityperformanceofcommunicationnetworks.