In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military i...In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military intelligence database are discussed. On this condition, a new data-mining arithmetic based on relation intelligence database is presented according to the preference information and the requirement of time limit given by the commander. Furthermore, a simple calculative example is presented to prove the arithmetic with better maneuverability. Lastly, the problem of how to process the intelligence data mined from the intelligence database is discussed.展开更多
Task decomposition is a kind of powerful technique increasingly being used within industry as a pathway for achieving product's developing success. In this paper, topology's concept in modern mathematics is us...Task decomposition is a kind of powerful technique increasingly being used within industry as a pathway for achieving product's developing success. In this paper, topology's concept in modern mathematics is used for task decomposition technique's deduction in product developing process. It puts fonvard the views of resolvability, measurability and connectivity of tasks and their practi-cal principles. Combined with an example of developing the typical mechanical product, it ex-plains the implementing method of task decomposition in Concurrent Engineering (CE).展开更多
To study simultaneous location of different kinds of facilities, a new model of flow interception problem with multi-type of flows is proposed, with the consideration of multi-purpose flows and the influence of facili...To study simultaneous location of different kinds of facilities, a new model of flow interception problem with multi-type of flows is proposed, with the consideration of multi-purpose flows and the influence of facilities on each other. To be more practical, the objective is to maximize the benefits from flow-by customers instead of maximizing flows in the past. Since this problem is NP-hard and there is no optimal solution for large network, greedy and improved greedy heuristic algorithms are proposed. A computational example is presented to show that the optimal location decisions are proved to be strongly dependent on the influence coefficients and average profits by one customer and different types of facilities are almost co-located. Finally the results of sensitivity analysis are reported.展开更多
Polycrystalline PZT,PLT and PbTiO ferroelectric thin films,highly oriented PbTiOferroelectric thin films and epitaxial growth PZT,PLT ferroelectric thin films with per-ovskite-type structure were prepared by the sol-g...Polycrystalline PZT,PLT and PbTiO ferroelectric thin films,highly oriented PbTiOferroelectric thin films and epitaxial growth PZT,PLT ferroelectric thin films with per-ovskite-type structure were prepared by the sol-gel method.Ferroelectric properties of theceramic thin films were confirmed by P-E hysteresis loops.The pyroelectric and opticalproperties were also measured.展开更多
In commanding decision-making, the commander usually needs to know a lot of situations(intelligence) on the adversary. Because of the military intelligence with opposability, it is inevitable that intelligence perso...In commanding decision-making, the commander usually needs to know a lot of situations(intelligence) on the adversary. Because of the military intelligence with opposability, it is inevitable that intelligence personnel take some deceptive information released by the rival as intelligence data in the process of intelligence gathering. Since the failure of intelligence is likely to lead to a serious aftereffect, the recognition of intelligence is a very important problem. An elementary research on recognizing military intelligence and puts forward a systematic processing method are made. First, the types and characteristics of military intelligence are briefly discussed, a research thought of recognizing military intelligence by means of recognizing military hypotheses are presented. Next, the reasoning mode and framework for recognizing military hypotheses are presented from the angle of psychology of intelligence analysis and non-monotonic reasoning. Then, a model for recognizing military hypothesis is built on the basis of fuzzy judgement information given by intelligence analysts. A calculative example shows that the model has the characteristics of simple calculation and good maneuverability. Last, the methods that selecting the most likely hypothesis from the survival hypotheses via final recognition are discussed.展开更多
The minimization problem of time delays in networked control system (NCS) is concered, which is a hot area of such research field. First, some analysis and comments on time-delayed NCS model listed in previous work ...The minimization problem of time delays in networked control system (NCS) is concered, which is a hot area of such research field. First, some analysis and comments on time-delayed NCS model listed in previous work are given. Then, time delay minimization problem based on average behavior of network queuing delay is presented. Under fixed routing scheme and certain optimization performance indexes, the delay minimization problem is translated into convex optimization problem. And the solution of the delay minimization problems is attained through optimized allocation of flow rates among network links.展开更多
Based on the Karman-Donnell shell equations, a two-timing perturbation technique together with Fourier series expansion is used to solve an imperfection sensitivity problem of submarine pipelines with dimple shaped in...Based on the Karman-Donnell shell equations, a two-timing perturbation technique together with Fourier series expansion is used to solve an imperfection sensitivity problem of submarine pipelines with dimple shaped initial deflection under external pressure combined with axial load. The relationship between limit load and initial postbuckling coefficient as well as imperfection parameter is obtained. It shows that these submarine pipelines are imperfection-sensitive to a dimple shaped imperfection over a large range of a geometrical parameter and that the effect of the dimple shaped imperfection on limit load depends only upon its linear buckling mode component of the corresponding Fourier series expansion.展开更多
Analyzing the structure and function of the brain's neural network is critical for identifying the working principles of the brain and the mechanisms of brain diseases.Recombinant rabies viral vectors allow for th...Analyzing the structure and function of the brain's neural network is critical for identifying the working principles of the brain and the mechanisms of brain diseases.Recombinant rabies viral vectors allow for the retrograde labeling of projection neurons and cell type-specific trans-monosynaptic tracing,making these vectors powerful candidates for the dissection of synaptic inputs.Although several attenuated rabies viral vectors have been developed,their application in studies of functional networks is hindered by the long preparation cycle and low yield of these vectors.To overcome these limitations,we developed an improved production system for the rapid rescue and preparation of a high-titer CVS-N2c-ΔG virus.Our results showed that the new CVS-N2c-ΔG-based toolkit performed remarkably:(1)N2cG-coated CVS-N2c-ΔG allowed for efficient retrograde access to projection neurons that were unaddressed by rAAV9-Retro,and the efficiency was six times higher than that of rAAV9-Retro;(2)the trans-monosynaptic efficiency of oG-mediated CVS-N2c-ΔG was 2–3 times higher than that of oG-mediated SAD-B19-ΔG;(3)CVS-N2c-ΔG could delivery modified genes for neural activity monitoring,and the time window during which this was maintained was 3 weeks;and(4)CVS-N2c-ΔG could express sufficient recombinases for efficient transgene recombination.These findings demonstrate that new CVS-N2c-ΔG-based toolkit may serve as a versatile tool for structural and functional studies of neural circuits.展开更多
Although many susceptibility loci for IgA nephropathy(IgAN)have been identified,they only account for 11.0%of the overall IgAN variance.We performed a large genome-wide meta-analysis of IgAN in Han Chinese with 3616 c...Although many susceptibility loci for IgA nephropathy(IgAN)have been identified,they only account for 11.0%of the overall IgAN variance.We performed a large genome-wide meta-analysis of IgAN in Han Chinese with 3616 cases and 10417 controls to identify additional genetic loci of IgAN.Considering that inflammatory bowel disease(IBD)and asthma might share an etiology of dysregulated mucosal immunity with IgAN,we performed cross-trait integrative analysis by leveraging functional annotations of relevant cell type and the pleiotropic information from IBD and asthma.Among 8669456 imputed variants,we identified a novel locus at 4p14 containing the long noncoding RNA LOC101060498.Cell type enrichment analysis based on annotations suggested that PMA-I-stimulated CD4+CD25–IL17+Th17 cell was the most relevant cell type for IgAN,which highlights the essential role of Th17 pathway in the pathogenesis of IgAN.Furthermore,we identified six more novel loci associated with IgAN,which included three loci showing pleiotropic effects with IBD or asthma(2q35/PNKD,6q25.2/SCAF8,and 22q11.21/UBE2L3)and three loci specific to IgAN(14q32.32/TRAF3,16q22.2/TXNL4B,and 21q21.3/LINC00113)in the pleiotropic analysis.Our findings support the involvement of mucosal immunity,especially T cell immune response and IL-17 signal pathway,in the development of IgAN and shed light on further investigation of IgAN.展开更多
Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the re...Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the resource constraints that is a critical sub-problem in partner selection of construction supply chain management because the capacities of the renewable resources supplied by the partners will effect on the project scheduling. Its mathematic model is presented firstly, and analysis on the characteristic of the problem shows that the objective function is non-regular and the problem is NP-complete following which the basic idea for solution is clarified. Based on a definition of preposing activity cost matrix, a heuristic algorithm is brought forward. Analyses on the complexity of the heuristics and the result of numerical studies show that the heuristic algorithm is feasible and relatively effective.展开更多
The preparation process of electrically conductive filler for anisotropic conductive adhesive was performed and discussed.The spherical filler contains tri-layer structures: resin core,Ni-P intermediate coating layer,...The preparation process of electrically conductive filler for anisotropic conductive adhesive was performed and discussed.The spherical filler contains tri-layer structures: resin core,Ni-P intermediate coating layer,Au outer coating layer.The 4 μm resin spherical cores were synthesized by monodispersion polymerization method.Then they were contributed to electrical conductivity by electrolessly plating Ni-P layer and gold layer.These particles have good corrosion resistance,high stability,and enough mechanical strength.When mixed with thermosetting epoxy resin to produce anisotropic conductive adhesive(ACA),it can realize a good conductive bonding between bumps on dies and pads on substrates.This environmentally friendly conductive material offers numerous advantages over conventional solder technology and is an ideal substitute for the lead-contained solder in electronics packaging.展开更多
With the fast growth of Chinese economic, more and more capital will be invested in environmental projects. How to select the environmental investment projects (alternatives) for obtaining the best environmental qua...With the fast growth of Chinese economic, more and more capital will be invested in environmental projects. How to select the environmental investment projects (alternatives) for obtaining the best environmental quality and economic benefits is an important problem for the decision makers. The purpose of this paper is to develop a decision-making model to rank a finite number of alternatives with several and sometimes conflicting criteria. A model for ranking the projects of municipal sewage treatment plants is proposed by using exports' information and the data of the real projects. And, the ranking result is given based on the PROMETHEE method. Furthermore, by means of the concept of the weight stability intervals (WSI), the sensitivity of the ranking results to the size of criteria values and the change of weights value of criteria are discussed. The result shows that some criteria, such as “proportion of benefit to project cost”, will influence the ranking result of alternatives very strong while others not. The influence are not only from the value of criterion but also from the changing the weight of criterion. So, some criteria such as “proportion of benefit to project cost” are key critera for ranking the projects. Decision makers must be cautious to them.展开更多
Abundant test data are required in assessment of weapon performance. When weapon test data are insufficient, Bayesian analyses in small sample circumstance should be considered and the test data should be provided by ...Abundant test data are required in assessment of weapon performance. When weapon test data are insufficient, Bayesian analyses in small sample circumstance should be considered and the test data should be provided by simulations. The several Bayesian approaches are discussed and some limitations are founded. An improvement is put forward after limitations of Bayesian approaches available are analyzed and the improved approach is applied to assessment of some new weapon performance.展开更多
Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader us...Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader uses the feedback information from followers to the leader to modify its motion. The advantage of this control scheme is that it reduces the tracking errors and improves the robustness of the team cohesion to followers' faults. The results of simulation are provided to illustrate that information feedback can improve the performance of the system.展开更多
The purpose of this paper is to consider the expected value of a discounted penalty due at ruin in the Erlang(2) risk process under constant interest force. An integro-differential equation satisfied by the expected...The purpose of this paper is to consider the expected value of a discounted penalty due at ruin in the Erlang(2) risk process under constant interest force. An integro-differential equation satisfied by the expected value and a second-order differential equation for the Laplace transform of the expected value are derived. In addition, the paper will present the recursive algorithm for the joint distribution of the surplus immediately before ruin and the deficit at ruin. Finally, by the differential equation, the defective renewal equation and the explicit expression for the expected value are given in the interest-free case.展开更多
A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced...A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced, and robust fault-tolerant control problem of networked control systems with noise disturbance under actuator failures is studied. The parametric expression of the controller under actuator failures is given. Furthermore, the result is analyzed by simulation tests, which not only satisfies the networked control systems stability, but also decreases the data information number in network channel and makes full use of the network resources.展开更多
Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the m...Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the mathematical model of such a system is established. A stochastic stabilization condition for the system is given. The maximum delay can be derived from the stabilization condition.展开更多
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H...Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.展开更多
The paper introduced a special approach for diesel’s all-speed-governor modeling, which, in some cases, could solve the knotty problem frequently met in computer simulation of diesel propulsion system or diesel gener...The paper introduced a special approach for diesel’s all-speed-governor modeling, which, in some cases, could solve the knotty problem frequently met in computer simulation of diesel propulsion system or diesel generating set. Suppose that it is hard to get a control-oriented governor mathematical model when the general approaches, the analytical approach or the experimental approach, are applied, and that an open-loop step response of the diesel engine and its system is available by means of computer simulation, the critical three parameters of a governor mathematical model, the proportional gain K_p, integral time constant K_i, and derivative time constant K_d, can be determined by use of PID tuning method which are widely applied in industrial process control. This paper discussed the train of thought of the approach, precondition, procedure, several modifications of the classical PID model, and some points for attention. A couple of case studies were given to demonstrate the effectiveness of this approach.展开更多
A direction-of-arrival (DOA) estimation algorithm based on direct data domain (D3) approach is presented. This method can accuracy estimate DOA using one snapshot modified data, called the temporal and spatial two...A direction-of-arrival (DOA) estimation algorithm based on direct data domain (D3) approach is presented. This method can accuracy estimate DOA using one snapshot modified data, called the temporal and spatial two-dimensional vector reconstruction (TSR) method. The key idea is to apply the D3 approach which can extract the signal of given frequency but null out other frequency signals in temporal domain. Then the spatial vector reconstruction processing is used to estimate the angle of the spatial coherent signal source based on extract signal data. Compared with the common temporal and spatial processing approach, the TSR method has a lower computational load, higher real-time performance, robustness and angular accuracy of DOA. The proposed algorithm can be directly applied to the phased array radar of coherent pulses. Simulation results demonstrate the performance of the proposed technique.展开更多
文摘In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military intelligence database are discussed. On this condition, a new data-mining arithmetic based on relation intelligence database is presented according to the preference information and the requirement of time limit given by the commander. Furthermore, a simple calculative example is presented to prove the arithmetic with better maneuverability. Lastly, the problem of how to process the intelligence data mined from the intelligence database is discussed.
基金the State High-Tech Developmets Plan of Cina(No.863-511-9930-007)
文摘Task decomposition is a kind of powerful technique increasingly being used within industry as a pathway for achieving product's developing success. In this paper, topology's concept in modern mathematics is used for task decomposition technique's deduction in product developing process. It puts fonvard the views of resolvability, measurability and connectivity of tasks and their practi-cal principles. Combined with an example of developing the typical mechanical product, it ex-plains the implementing method of task decomposition in Concurrent Engineering (CE).
基金supported by the National Natural Science Foundation of China(7060101170871044)Trans-Century Traning Program Foundation for the Talents by the State Education Commission(NECT-06-0653).
文摘To study simultaneous location of different kinds of facilities, a new model of flow interception problem with multi-type of flows is proposed, with the consideration of multi-purpose flows and the influence of facilities on each other. To be more practical, the objective is to maximize the benefits from flow-by customers instead of maximizing flows in the past. Since this problem is NP-hard and there is no optimal solution for large network, greedy and improved greedy heuristic algorithms are proposed. A computational example is presented to show that the optimal location decisions are proved to be strongly dependent on the influence coefficients and average profits by one customer and different types of facilities are almost co-located. Finally the results of sensitivity analysis are reported.
基金the High Technology Research and Development Programme of China.
文摘Polycrystalline PZT,PLT and PbTiO ferroelectric thin films,highly oriented PbTiOferroelectric thin films and epitaxial growth PZT,PLT ferroelectric thin films with per-ovskite-type structure were prepared by the sol-gel method.Ferroelectric properties of theceramic thin films were confirmed by P-E hysteresis loops.The pyroelectric and opticalproperties were also measured.
文摘In commanding decision-making, the commander usually needs to know a lot of situations(intelligence) on the adversary. Because of the military intelligence with opposability, it is inevitable that intelligence personnel take some deceptive information released by the rival as intelligence data in the process of intelligence gathering. Since the failure of intelligence is likely to lead to a serious aftereffect, the recognition of intelligence is a very important problem. An elementary research on recognizing military intelligence and puts forward a systematic processing method are made. First, the types and characteristics of military intelligence are briefly discussed, a research thought of recognizing military intelligence by means of recognizing military hypotheses are presented. Next, the reasoning mode and framework for recognizing military hypotheses are presented from the angle of psychology of intelligence analysis and non-monotonic reasoning. Then, a model for recognizing military hypothesis is built on the basis of fuzzy judgement information given by intelligence analysts. A calculative example shows that the model has the characteristics of simple calculation and good maneuverability. Last, the methods that selecting the most likely hypothesis from the survival hypotheses via final recognition are discussed.
基金This project was supported by the National Natural Science Foundation of China (60274014) Specialized Research Fund forthe Doctoral Programof Higher Education (20020487006) China Education Ministry’s Key Laboratory Foundation for Intelli-gent Manufacture Technology (I mstsu-2002 -03) .
文摘The minimization problem of time delays in networked control system (NCS) is concered, which is a hot area of such research field. First, some analysis and comments on time-delayed NCS model listed in previous work are given. Then, time delay minimization problem based on average behavior of network queuing delay is presented. Under fixed routing scheme and certain optimization performance indexes, the delay minimization problem is translated into convex optimization problem. And the solution of the delay minimization problems is attained through optimized allocation of flow rates among network links.
基金Project supported by National Natural Science Foundation
文摘Based on the Karman-Donnell shell equations, a two-timing perturbation technique together with Fourier series expansion is used to solve an imperfection sensitivity problem of submarine pipelines with dimple shaped initial deflection under external pressure combined with axial load. The relationship between limit load and initial postbuckling coefficient as well as imperfection parameter is obtained. It shows that these submarine pipelines are imperfection-sensitive to a dimple shaped imperfection over a large range of a geometrical parameter and that the effect of the dimple shaped imperfection on limit load depends only upon its linear buckling mode component of the corresponding Fourier series expansion.
基金supported by the National Natural Science Foundation of China,Nos.32100899(to KZL),31830035(to FQX),31771156(to FQX),21921004(to FQX)the National Science and Technology Innovation 2030,No.2021ZD0201003(to FQX)+2 种基金the Key-Area Research and Development Program of Guangdong Province,No.2018B030331001(to FQX)the Strategic Priority Research Program of the Chinese Academy of Sciences,No.XDB32030200(to FQX)the Shenzhen Key Laboratory of Viral Vectors for Biomedicine,No.ZDSYS20200811142401005(to FQX)。
文摘Analyzing the structure and function of the brain's neural network is critical for identifying the working principles of the brain and the mechanisms of brain diseases.Recombinant rabies viral vectors allow for the retrograde labeling of projection neurons and cell type-specific trans-monosynaptic tracing,making these vectors powerful candidates for the dissection of synaptic inputs.Although several attenuated rabies viral vectors have been developed,their application in studies of functional networks is hindered by the long preparation cycle and low yield of these vectors.To overcome these limitations,we developed an improved production system for the rapid rescue and preparation of a high-titer CVS-N2c-ΔG virus.Our results showed that the new CVS-N2c-ΔG-based toolkit performed remarkably:(1)N2cG-coated CVS-N2c-ΔG allowed for efficient retrograde access to projection neurons that were unaddressed by rAAV9-Retro,and the efficiency was six times higher than that of rAAV9-Retro;(2)the trans-monosynaptic efficiency of oG-mediated CVS-N2c-ΔG was 2–3 times higher than that of oG-mediated SAD-B19-ΔG;(3)CVS-N2c-ΔG could delivery modified genes for neural activity monitoring,and the time window during which this was maintained was 3 weeks;and(4)CVS-N2c-ΔG could express sufficient recombinases for efficient transgene recombination.These findings demonstrate that new CVS-N2c-ΔG-based toolkit may serve as a versatile tool for structural and functional studies of neural circuits.
基金supported by Guangdong-Hong Kong Joint Laboratory on Immunological and Genetic Kidney Diseases(No.2019B121205005)National Natural Science Foundation of China(Nos.81920108008,81770661,82170714,and 82003561)+2 种基金Guangzhou Municipal Science and Technology Project of China(No.202201011246)Basic and Applied Basic Research Foundation of Guangdong Province(No.2021A1515111054)Fundamental Research Funds for the Central Universities(No.2019kfyXJJS036).
文摘Although many susceptibility loci for IgA nephropathy(IgAN)have been identified,they only account for 11.0%of the overall IgAN variance.We performed a large genome-wide meta-analysis of IgAN in Han Chinese with 3616 cases and 10417 controls to identify additional genetic loci of IgAN.Considering that inflammatory bowel disease(IBD)and asthma might share an etiology of dysregulated mucosal immunity with IgAN,we performed cross-trait integrative analysis by leveraging functional annotations of relevant cell type and the pleiotropic information from IBD and asthma.Among 8669456 imputed variants,we identified a novel locus at 4p14 containing the long noncoding RNA LOC101060498.Cell type enrichment analysis based on annotations suggested that PMA-I-stimulated CD4+CD25–IL17+Th17 cell was the most relevant cell type for IgAN,which highlights the essential role of Th17 pathway in the pathogenesis of IgAN.Furthermore,we identified six more novel loci associated with IgAN,which included three loci showing pleiotropic effects with IBD or asthma(2q35/PNKD,6q25.2/SCAF8,and 22q11.21/UBE2L3)and three loci specific to IgAN(14q32.32/TRAF3,16q22.2/TXNL4B,and 21q21.3/LINC00113)in the pleiotropic analysis.Our findings support the involvement of mucosal immunity,especially T cell immune response and IL-17 signal pathway,in the development of IgAN and shed light on further investigation of IgAN.
文摘Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the resource constraints that is a critical sub-problem in partner selection of construction supply chain management because the capacities of the renewable resources supplied by the partners will effect on the project scheduling. Its mathematic model is presented firstly, and analysis on the characteristic of the problem shows that the objective function is non-regular and the problem is NP-complete following which the basic idea for solution is clarified. Based on a definition of preposing activity cost matrix, a heuristic algorithm is brought forward. Analyses on the complexity of the heuristics and the result of numerical studies show that the heuristic algorithm is feasible and relatively effective.
基金The National Natural Science Foundation of China(No.10474024)NSFC-RGC Joint Research Scheme(No.60318002)+1 种基金Youth Chenguang Project of Science and Technology of Wuhan City of China(No.20065004116-10)StateKey Lab.of Advanced Technology for Materials Synthesis and Processing(Wuhan University of Technology,No.WUT2004 M08)
文摘The preparation process of electrically conductive filler for anisotropic conductive adhesive was performed and discussed.The spherical filler contains tri-layer structures: resin core,Ni-P intermediate coating layer,Au outer coating layer.The 4 μm resin spherical cores were synthesized by monodispersion polymerization method.Then they were contributed to electrical conductivity by electrolessly plating Ni-P layer and gold layer.These particles have good corrosion resistance,high stability,and enough mechanical strength.When mixed with thermosetting epoxy resin to produce anisotropic conductive adhesive(ACA),it can realize a good conductive bonding between bumps on dies and pads on substrates.This environmentally friendly conductive material offers numerous advantages over conventional solder technology and is an ideal substitute for the lead-contained solder in electronics packaging.
基金Shanghai Leading Academic Discipline Project (T0502)Shanghai Municipal Educational Commission Project (05EZ32).
文摘With the fast growth of Chinese economic, more and more capital will be invested in environmental projects. How to select the environmental investment projects (alternatives) for obtaining the best environmental quality and economic benefits is an important problem for the decision makers. The purpose of this paper is to develop a decision-making model to rank a finite number of alternatives with several and sometimes conflicting criteria. A model for ranking the projects of municipal sewage treatment plants is proposed by using exports' information and the data of the real projects. And, the ranking result is given based on the PROMETHEE method. Furthermore, by means of the concept of the weight stability intervals (WSI), the sensitivity of the ranking results to the size of criteria values and the change of weights value of criteria are discussed. The result shows that some criteria, such as “proportion of benefit to project cost”, will influence the ranking result of alternatives very strong while others not. The influence are not only from the value of criterion but also from the changing the weight of criterion. So, some criteria such as “proportion of benefit to project cost” are key critera for ranking the projects. Decision makers must be cautious to them.
文摘Abundant test data are required in assessment of weapon performance. When weapon test data are insufficient, Bayesian analyses in small sample circumstance should be considered and the test data should be provided by simulations. The several Bayesian approaches are discussed and some limitations are founded. An improvement is put forward after limitations of Bayesian approaches available are analyzed and the improved approach is applied to assessment of some new weapon performance.
基金supported by the National Natural Science Foundation of China(60574088).
文摘Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader uses the feedback information from followers to the leader to modify its motion. The advantage of this control scheme is that it reduces the tracking errors and improves the robustness of the team cohesion to followers' faults. The results of simulation are provided to illustrate that information feedback can improve the performance of the system.
基金supported by the National Natural science Foundation of china(70271069)
文摘The purpose of this paper is to consider the expected value of a discounted penalty due at ruin in the Erlang(2) risk process under constant interest force. An integro-differential equation satisfied by the expected value and a second-order differential equation for the Laplace transform of the expected value are derived. In addition, the paper will present the recursive algorithm for the joint distribution of the surplus immediately before ruin and the deficit at ruin. Finally, by the differential equation, the defective renewal equation and the explicit expression for the expected value are given in the interest-free case.
基金Hohai University Startup Outlay for Doctor Scientific Research (2084/40601136)
文摘A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced, and robust fault-tolerant control problem of networked control systems with noise disturbance under actuator failures is studied. The parametric expression of the controller under actuator failures is given. Furthermore, the result is analyzed by simulation tests, which not only satisfies the networked control systems stability, but also decreases the data information number in network channel and makes full use of the network resources.
基金This project was supported by the National Natural Science Foundation of China (60274014, 60574088).
文摘Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the mathematical model of such a system is established. A stochastic stabilization condition for the system is given. The maximum delay can be derived from the stabilization condition.
基金the "863" High Technology Research and Development Program of China (2006AA01Z226)the Scientific Research Foundation of Huazhong University of Science and Technology (2006Z011B)the Program for New Century Excellent Talents in University (NCET-07-0328).
文摘Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.
文摘The paper introduced a special approach for diesel’s all-speed-governor modeling, which, in some cases, could solve the knotty problem frequently met in computer simulation of diesel propulsion system or diesel generating set. Suppose that it is hard to get a control-oriented governor mathematical model when the general approaches, the analytical approach or the experimental approach, are applied, and that an open-loop step response of the diesel engine and its system is available by means of computer simulation, the critical three parameters of a governor mathematical model, the proportional gain K_p, integral time constant K_i, and derivative time constant K_d, can be determined by use of PID tuning method which are widely applied in industrial process control. This paper discussed the train of thought of the approach, precondition, procedure, several modifications of the classical PID model, and some points for attention. A couple of case studies were given to demonstrate the effectiveness of this approach.
文摘A direction-of-arrival (DOA) estimation algorithm based on direct data domain (D3) approach is presented. This method can accuracy estimate DOA using one snapshot modified data, called the temporal and spatial two-dimensional vector reconstruction (TSR) method. The key idea is to apply the D3 approach which can extract the signal of given frequency but null out other frequency signals in temporal domain. Then the spatial vector reconstruction processing is used to estimate the angle of the spatial coherent signal source based on extract signal data. Compared with the common temporal and spatial processing approach, the TSR method has a lower computational load, higher real-time performance, robustness and angular accuracy of DOA. The proposed algorithm can be directly applied to the phased array radar of coherent pulses. Simulation results demonstrate the performance of the proposed technique.