902 resultados para Compress-and-Forward


Relevância:

80.00% 80.00%

Publicador:

Resumo:

We used microarray technology to study differentially expressed genes in white spot syndrome virus (WSSV)-infected shrimp. A total of 3136 cDNA targets, including 1578 unique genes from a cephalothorax cDNA library and 1536 cDNA clones from reverse and forward suppression subtractive hybridization (SSH) libraries of Fenneropenaeus chinensis, plus 14 negative and 8 blank control clones, were spotted onto a 18 x 18 mm area of NH2-modified glass slides. Gene expression patterns in the cephalothorax of shrimp at 6 h after WSSV injection and moribund shrimp naturally infected by WSSV were analyzed. A total of 105 elements on the arrays showed a similar regulation pattern in artificially infected shrimp and naturally infected moribund shrimp; parts of the results were confirmed by semiquantitative reverse transcriptase-polymerase chain reaction (RT-PCR). The up-regulated expression of immune-related genes, including heat shock proteins (HSP70 and HSP90), trehalose-phosphate synthase (TPS), ubiquitin C, and so forth, were observed when shrimp were challenged with WSSV. Genes including myosin LC2, ATP synthase A chain, and arginine kinase were found to be down-regulated after WSSV infection. The expression of housekeeping genes such as actin, elongation factor, and tubulin is not stable, and so these genes are not suitable as internal standards for semiquantitative RT-PCR when shrimp are challenged by WSSV. As a substitute, we found that triosephosphate isomerase (TPI) was an ideal candidate of interstandards in this situation.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

针对原沈阳自动化研究所研制开发的五轴并联铣床的结构特点 ,提出了一种改进方案 ,并对这种新的构型的运动学进行了分析 ,针对其特点 ,从新的角度给出了位置正解及反解的方程。该构型的位置正解由于使用了附加传感器并充分考虑到机构特点而使得正解方程形式非常简单并且其中只存在一次项 ,从而避免了对复杂数值解法的采用

Relevância:

80.00% 80.00%

Publicador:

Resumo:

提出一种用铅垂导轨上 4个滑块作为原动件的新型四自由度并联机器人 .该并联机器人的动平台能够实现两个方向的移动以及绕两个方向轴线的转动 .研究了该并联机器人的运动学建模方法 ,给出了运动学正、逆解 ,用 Grassmann几何法分析了该并联机器人在其工作空间内不会出现奇异形位 .基于该四自由度并联机器人可以非常方便地开发具有大工作空间的五轴联动数控机床

Relevância:

80.00% 80.00%

Publicador:

Resumo:

提出了一种用水平导轨上 4个滑块作为原动件的 4自由度并联平台机构 ,该机构的动平台能够实现两个方向的移动以及绕两个方向轴线的转动 ,同时研究了该机构的运动学建模方法 ,给出了运动学正、逆解 ,并阐述了其应用前景。

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In China and world, more than half the recent basin discovered reserves involve lithologic hydrocarbon reservoir reserves. The major target for further hydrocarbon basin exploration is the subtle reservoir. The Liaodong Bay prospect is much important in Bohai Sea, which includes Liaoxi low uplift, Liaodong uplift, Liaoxi sag and Liaozhong sag. After dozens years’ exploration in Liaodong Bay, few unexplored big-and-middle-sized favorable structural traps are remained and most of the stock structure targets are bad for fragmentary. Thus seeking for new prospect area and making a breakthrough, have become the unique way to relieve the severe exploration condition in Liaodong Bay. Technique Route Based on the petrophysical property of target area, the seismic forward inference of typical subtle trap model is expanded with analysis of logging, seismic and geologic data. According to petrophysical characteristics and forward inference and research on seismic response of actual seismic data in target area, the optimization of geophysical technique is used in subtle trap identification and the geophysical identification technique system of subtle reservoir is formed. The Key Research ① Petrophysical Model The petrophysical parameter is the basic parameter for seismic wave simulation. The seismic response difference of rocks bearing different fluids is required. With the crossplot of log data, the influence of petrophysical parameters on rock elastic properties of target area is analyzed, such as porosity, shale index, fluid property and saturation. Based on the current research on Biot-Gassmann and Kuster-Toksoz model, the petrophysical parameter calculator program which can be used for fluid substitution is established. ② S-wave evaluation based on conventional log data The shear velocity is needed during forward inference of AVO or other elastic wave field. But most of the recent conventional log data is lack of shear wave. Thus according to the research on petrophysical model, the rock S-wave parameter can be evaluated from conventional log data with probability inverse method. ③ AVO forward modeling based on well data For 6 wells in JZ31-6 block and 9 wells in LD22-1 block, the AVO forward modeling recording is made by log curve. The classification of AVO characteristics in objective interval is made by the lithologic information. ④ The 2D parameter model building and forward modeling of subtle hydrocarbon trap in target area. According to the formation interpretation of ESS03D seismic area, the 2D parameter model building and seismic wave field forward modeling are carried on the given and predicted subtle hydrocarbon trap with log curve. ⑤ The lithology and fluid identification of subtle trap in target area After study the seismic response characteristics of lithology and fluid in given target area, the optimization of geophysical technique is used for lithology identification and fluid forecast. ⑥The geophysical identification technique system of subtle reservoir The Innovative Points of this Paper ① Based on laboratory measurement and petrophysical model theory, the rock S-wave parameter can be evaluated from conventional log data with probability inverse method. Then the fluid substitution method based on B-G and K-T theory is provided. ② The method and workflow for simulating seismic wave field property of subtle hydrocarbon trap are established based on the petrophysical model building and forward modeling of wave equation. ③ The description of subtle trap structural feature is launched. According to the different reflection of frequency wave field structural attribute, the fluid property of subtle trap can be identified by wave field attenuation attribute and absorption analysis. ④ It’s the first time to identify subtle trap by geophysical technique and provide exploration drilling well location. ⑤ The technique system of subtle reservoir geophysical identification is formed to provide available workflow and research ideas for other region of interest.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

With the development of seismic exploration, the target becomes more and more complex, which leads to a higher demand for the accuracy and efficiency in 3D exploration. Fourier finite-difference (FFD) method is one of the most valuable methods in complex structure exploration, which keeps the ability of finite-differenc method in dealing with laterally varing media and inherits the predominance of the phase-screen method in stablility and efficiency. In this thesis, the accuracy of the FFD operator is highly improved by using simulated annealing algorithm. This method takes the extrapolation step and band width into account, which is more suitable to various band width and discrete scale than the commonely-used optimized method based on velocity contrast alone. In this thesis, the FFD method is extended to viscoacoustic modeling. Based on one-way wave equation, the presented method is implemented in frequency domain; thus, it is more efficient than two-way methods, and is more convenient than time domain methods in handling attenuation and dispersion effects. The proposed method can handle large velocity contrast and has a high efficiency, which is helpful to further research on earth absorption and seismic resolution. Starting from the frequency dispersion of the acoustic VTI wave equation, this thesis extends the FFD migration method to the acoustic VTI media. Compared with the convetional FFD method, the presented method has a similar computational efficiency, and keeps the abilities of dealing with large velocity contrasts and steep dips. The numerical experiments based on the SEG salt model show that the presented method is a practical migration method for complex acoustical VTI media, because it can handle both large velocity contrasts and large anisotropy variations, and its accuracy is relatively high even in strong anisotropic media. In 3D case, the two-way splitting technique of FFD operator causes artificial azimuthal anisotropy. These artifacts become apparent with increasing dip angles and velocity contrasts, which prevent the application of the FFD method in 3D complex media. The current methods proposed to reduce the azimuthal anisotropy significantly increase the computational cost. In this thesis, the alternating-direction-implicit plus interpolation scheme is incorporated into the 3D FFD method to reduce the azimuthal anisotropy. By subtly utilizing the Fourier based scheme of the FFD method, the improved fast algorithm takes approximately no extra computation time. The resulting operator keeps both the accuracy and the efficiency of the FFD method, which is helpful to the inhancements of both the accuracy and the efficiency for prestack depth migration. The general comparison is presented between the FFD operator and the generalized-screen operator, which is valuable to choose the suitable method in practice. The percentage relative error curves and migration impulse responses show that the generalized-screen operator is much sensiutive to the velocity contrasts than the FFD operator. The FFD operator can handle various velocity contrasts, while the generalized-screen operator can only handle some range of the velocity contrasts. Both in large and weak velocity contrasts, the higher order term of the generalized-screen operator has little effect on improving accuracy. The FFD operator is more suitable to large velocity contrasts, while the generalized-screen operator is more suitable to middle velocity contrasts. Both the one-way implicit finite-difference migration and the two-way explicit finite-differenc modeling have been implemented, and then they are compared with the corresponding FFD methods respectively. This work gives a reference to the choosen of proper method. The FFD migration is illustrated to be more attractive in accuracy, efficiency and frequency dispertion than the widely-used implicit finite-difference migration. The FFD modeling can handle relatively coarse grids than the commonly-used explicit finite-differenc modeling, thus it is much faster in 3D modeling, especially for large-scale complex media.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Objects move, collide, flow, bend, heat up, cool down, stretch, compress and boil. These and other things that cause changes in objects over time are intuitively characterized as processes. To understand common sense physical reasoning and make programs that interact with the physical world as well as people do we must understand qualitative reasoning about processes, when they will occur, their effects, and when they will stop. Qualitative Process theory defines a simple notion of physical process that appears useful as a language in which to write dynamical theories. Reasoning about processes also motivates a new qualitative representation for quantity in terms of inequalities, called quantity space. This report describes the basic concepts of Qualitative Process theory, several different kinds of reasoning that can be performed with them, and discusses its impact on other issues in common sense reasoning about the physical world, such as causal reasoning and measurement interpretation. Several extended examples illustrate the utility of the theory, including figuring out that a boiler can blow up, that an oscillator with friction will eventually stop, and how to say that you can pull with a string but not push with it. This report also describes GIZMO, an implemented computer program which uses Qualitative Process theory to make predictions and interpret simple measurements. The represnetations and algorithms used in GIZMO are described in detail, and illustrated using several examples.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefore highly desirable. To secure group communications, several group key management protocols have been introduced. However, the majority of the proposed solutions are not adapted to the IoT and its strong processing, storage, and energy constraints. In this context, we introduce a novel decentralized and batch-based group key management protocol to secure multicast communications. Our protocol is simple and it reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy. To assess our protocol, we conduct a detailed analysis with respect to its communcation and storage costs. This analysis is validated through simulation to highlight energy gains. The obtained results show that our protocol outperforms its peers with respect to keying overhead and the mobility of members.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Li, Longzhuang, Liu, Yonghuai, Obregon, A., Weatherston, M. Visual Segmentation-Based Data Record Extraction From Web Documents. Proceedings of IEEE International Conference on Information Reuse and Integration, 2007, pp. 502-507. Sponsorship: IEEE

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We consider the problem of architecting a reliable content delivery system across an overlay network using TCP connections as the transport primitive. We first argue that natural designs based on store-and-forward principles that tightly couple TCP connections at intermediate end-systems impose fundamental performance limitations, such as dragging down all transfer rates in the system to the rate of the slowest receiver. In contrast, the ROMA architecture we propose incorporates the use of loosely coupled TCP connections together with fast forward error correction techniques to deliver a scalable solution that better accommodates a set of heterogeneous receivers. The methods we develop establish chains of TCP connections, whose expected performance we analyze through equation-based methods. We validate our analytical findings and evaluate the performance of our ROMA architecture using a prototype implementation via extensive Internet experimentation across the PlanetLab distributed testbed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Current low-level networking abstractions on modern operating systems are commonly implemented in the kernel to provide sufficient performance for general purpose applications. However, it is desirable for high performance applications to have more control over the networking subsystem to support optimizations for their specific needs. One approach is to allow networking services to be implemented at user-level. Unfortunately, this typically incurs costs due to scheduling overheads and unnecessary data copying via the kernel. In this paper, we describe a method to implement efficient application-specific network service extensions at user-level, that removes the cost of scheduling and provides protected access to lower-level system abstractions. We present a networking implementation that, with minor modifications to the Linux kernel, passes data between "sandboxed" extensions and the Ethernet device without copying or processing in the kernel. Using this mechanism, we put a customizable networking stack into a user-level sandbox and show how it can be used to efficiently process and forward data via proxies, or intermediate hosts, in the communication path of high performance data streams. Unlike other user-level networking implementations, our method makes no special hardware requirements to avoid unnecessary data copies. Results show that we achieve a substantial increase in throughput over comparable user-space methods using our networking stack implementation.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper proposes the use of in-network caches (which we call Angels) to reduce the Minimum Distribution Time (MDT) of a file from a seeder – a node that possesses the file – to a set of leechers – nodes who are interested in downloading the file. An Angel is not a leecher in the sense that it is not interested in receiving the entire file, but rather it is interested in minimizing the MDT to all leechers, and as such uses its storage and up/down-link capacity to cache and forward parts of the file to other peers. We extend the analytical results by Kumar and Ross [1] to account for the presence of angels by deriving a new lower bound for the MDT. We show that this newly derived lower bound is tight by proposing a distribution strategy under assumptions of a fluid model. We present a GroupTree heuristic that addresses the impracticalities of the fluid model. We evaluate our designs through simulations that show that our Group-Tree heuristic outperforms other heuristics, that it scales well with the increase of the number of leechers, and that it closely approaches the optimal theoretical bounds.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This thesis proposes the use of in-network caches (which we call Angels) to reduce the Minimum Distribution Time (MDT) of a file from a seeder – a node that possesses the file – to a set of leechers – nodes who are interested in downloading the file. An Angel is not a leecher in the sense that it is not interested in receiving the entire file, but rather it is interested in minimizing the MDT to all leechers, and as such uses its storage and up/down-link capacity to cache and forward parts of the file to other peers. We extend the analytical results by Kumar and Ross (Kumar and Ross, 2006) to account for the presence of angels by deriving a new lower bound for the MDT. We show that this newly derived lower bound is tight by proposing a distribution strategy under assumptions of a fluid model. We present a GroupTree heuristic that addresses the impracticalities of the fluid model. We evaluate our designs through simulations that show that our GroupTree heuristic outperforms other heuristics, that it scales well with the increase of the number of leechers, and that it closely approaches the optimal theoretical bounds.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The enormous growth of wireless communication systems makes it important to evaluate the capacity of such channels. Multiple Input Multiple Output (MIMO) wireless communication systems are shown to yield significant performance improvement to data rates when compared to the traditional Single Input Single Output (SISO) wireless systems. The benefits of multiple antenna elements at the transmitter and receiver have become necessary to the research and the development of the next generation of mobile communication systems. In this paper we propose the use of Relaying MIMO wireless communication systems for use over long throughput. We investigate how Relays can be used in a "demodulate-and-forward" operation when the transmitter is equipped with spatially correlated multiple antenna elements and the receiver has only partial knowledge of the statistics of the channel. We show that Relays between the source and destination nodes of a wireless communication system in MIMO configuration improve the throughput of the system when compared to the typical MIMO systems, or achieve the desired channel capacity with significantly lower power resources needed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

My dissertation examines the traces of inverse (mytho)mysticism, more synchronous with mythical alchemy than transcendent mystery, in H.D.’s mature work (1946-1961). Whereas H.D.’s earliest works respond to a fin de siècle occultism and a collective psyche troubled by the eschatological distress that, as Susan Acheson writes, “was widespread amongst modernist writers grappling with …world events and with the implications of Nietzsche’s inaugural annunciation of modernity in terms of the death of God” (187), her later oeuvre is dedicated to the same work of soul undertaken by the “secret cult of Night” in Vale Ave. Here, her thematic scope faces two ways: backward to ancient Greek mystery cults and their palingenesic rites and forward to depth psychologists searching for the Soul of the World. Vale Ave plays a pronounced role in my study as symbolic guide; in its seventy-four sequences the layering of time in the “trilogy” of past, present, and future that H.D. had explored during the years of the Second World War in order to get behind the fallen walls of cause and effect collapses into two distinct phases of human origin—“meeting” (evolution) and “parting” (involution)—and the poem invites Lilith and Lucifer to be its archetypal guides. My method for the study is imaginal, entering such disciplines as history, philosophy, and theology and bringing psychological understanding to them. John Walsh’s introduction to Vale Ave notes H.D.’s theme “that the human psyche exists in a dimension outside of time and space as well as within them. In Vale Ave, H.D. presents the extremity of this dual-dimensionality: metempsychosis” (vii). However, the concept that H.D. investigates is more than a literary processus of characters who adopt different masks and appear at various junctures in a chronological unwinding of history. I explore H.D.'s works as part of a Modernist tradition of writing “books of the dead” designed not to guide the soul after death, but to draw the gaze upon “a nearer thing,” as H.D. writes in Erige Cor Tuum Ad Me In Caelum, the wisdom intrinsic in the spirit of life itself.