Wuhan University Journal of Natural Sciences
Latest Publications


TOTAL DOCUMENTS

3204
(FIVE YEARS 84)

H-INDEX

18
(FIVE YEARS 2)

Published By Springer-Verlag

1993-4998, 1007-1202

2021 ◽  
Vol 26 (6) ◽  
pp. 513-520
Author(s):  
Daoyang ZHU ◽  
Jun YAN ◽  
Shaoli DUAN

Motion cueing algorithms (MCA) are often applied in the motion simulators. In this paper, a nonlinear optimal MCA, taking into account translational and rotational motions of a simulator within its physical limitation, is designed for the motion platform aiming to minimize human’s perception error in order to provide a high degree of fidelity. Indeed, the movement sensation center of most MCA is placed at the center of the upper platform, which may cause a certain error. Pilot’s station should be paid full attention to in the MCA. Apart from this, the scaling and limiting module plays an important role in optimizing the motion platform workspace and reducing false cues during motion reproduction. It should be used along within the washout filter to decrease the amplitude of the translational and rotational motion signals uniformly across all frequencies through the MCA. A nonlinear scaling method is designed to accurately duplicate motions with high realistic behavior and use the platform more efficiently without violating its physical limitations. The simulation experiment is verified in the longitudinal/pitch direction for motion simulator. The result implies that the proposed method can not only overcome the problem of the workspace limitations in the simulator motion reproduction and improve the realism of movement sensation, but also reduce the false cues to improve dynamic fidelity during the motion simulation process.


2021 ◽  
Vol 26 (6) ◽  
pp. 459-463
Author(s):  
Lifang DAI ◽  
Maolin LIANG ◽  
Yonghong SHEN

Let A be an arbitrary square matrix, then equation AXA =XAX with unknown X is called Yang-Baxter matrix equation. It is difficult to find all the solutions of this equation for any given A . In this paper, the relations between the matrices A and B are established via solving the associated rank optimization problem, where B = AXA = XAX , and some analytical formulas are derived, which may be useful for finding all the solutions and analyzing the structures of the solutions of the above Yang-Baxter matrix equation.


2021 ◽  
Vol 26 (6) ◽  
pp. 464-472
Author(s):  
Bo HUANG ◽  
Jiaji JU ◽  
Huan CHEN ◽  
Yimin ZHU ◽  
Jin LIU ◽  
...  

The Product Sensitive Online Dirichlet Allocation model (PSOLDA) proposed in this paper mainly uses the sentiment polarity of topic words in the review text to improve the accuracy of topic evolution. First, we use Latent Dirichlet Allocation (LDA) to obtain the distribution of topic words in the current time window. Second, the word2vec word vector is used as auxiliary information to determine the sentiment polarity and obtain the sentiment polarity distribution of the current topic. Finally, the sentiment polarity changes of the topics in the previous and next time window are mapped to the sentiment factors, and the distribution of topic words in the next time window is controlled through them. The experimental results show that the PSOLDA model decreases the probability distribution by 0.160 1, while Online Twitter LDA only increases by 0.069 9. The topic evolution method that integrates the sentimental information of topic words proposed in this paper is better than the traditional model.


2021 ◽  
Vol 26 (6) ◽  
pp. 489-494
Author(s):  
Yahui WANG ◽  
Huanguo ZHANG

Shor in 1994 proposed a quantum polynomial-time algorithm for finding the order r of an element a in the multiplicative group Zn*, which can be used to factor the integer n by computing [see formula in PDF]and hence break the famous RSA cryptosystem. However, the order r must be even. This restriction can be removed. So in this paper, we propose a quantum polynomial-time fixed-point attack for directly recovering the RSA plaintext M from the ciphertext C, without explicitly factoring the modulus n. Compared to Shor’s algorithm, the order r of the fixed-point C for RSA(e, n) satisfying [see formula in PDF] does not need to be even. Moreover, the success probability of the new algorithm is at least [see formula in PDF] and higher than that of Shor’s algorithm, though the time complexity for both algorithms is about the same.


2021 ◽  
Vol 26 (6) ◽  
pp. 507-512
Author(s):  
Wenjian LU ◽  
Sanjun LIU ◽  
Guohong LAI

This paper presents a design scheme of wire-line telephone system using self-interference (SI) cancellation technology in co-frequency co-time full-duplex (CCFD) system to realize absolute secure communication at the physical layer. This scheme can hide the target signal by skillfully releasing the high-power artificial noise to the whole link at the receiving node, and then make use of the receiver’s knowledge of the SI signal to achieve high dB SI cancellation with the help of analog domain SI cancellation technology in CCFD domain, so that the signal-to-noise ratio (SNR) received by the eavesdropper at any position of the link is far lower than that of the legitimate receiver, so as to realize the absolutely secure communication in the sense of Wyner principle. This paper not only puts forward the specific design scheme of absolutely secure communication telephone, but also analyzes the calculation of security capacity under different eavesdropping positions, different SI cancellation capability and different system parameters according to Shannon theory.


2021 ◽  
Vol 26 (6) ◽  
pp. 481-488
Author(s):  
Changjing WANG ◽  
Xilong DING ◽  
Jiangfei HE ◽  
Xi CHEN ◽  
Qing HUANG ◽  
...  

We propose a systematic method to deduce and synthesize the Dafny programs. First, the specification of problem is described in strict mathematical language. Then, the derivation process uses program specification transformation technology to perform equivalent transformation. Furthermore, Dafny program is synthesized through the obtained recursive relationship and loop invariants. Finally, the functional correctness of Dafny program is automatically verified by Dafny verifier or online tool. Through this method, we deduce and synthesize Dafny programs for many typical problems such as the cube sum problem, the minimum (or maximum) contiguous subarray problems, several searching problems, several sorting problems, and so on. Due to space limitation, we only illustrate the development process of Dafny programs for two typical problems: the minimum contiguous subarray problem and the new local bubble sorting problem. It proves that our method can effectively improve the correctness and reliability of Dafny program developed. What’s more, we demonstrate the potential of the deductive synthesis method by developing a new local bubble Sorting program.


2021 ◽  
Vol 26 (6) ◽  
pp. 495-506
Author(s):  
Lixuan LU ◽  
Tao ZHANG

In this paper, we propose a shear high-order gradient (SHOG) operator by combining the shear operator and high-order gradient (HOG) operator. Compared with the HOG operator, the proposed SHOG operator can incorporate more directionality and detect more abundant edge information. Based on the SHOG operator, we extend the total variation (TV) norm to shear high-order total variation (SHOTV), and then propose a SHOTV deblurring model. We also study some properties of the SHOG operator, and show that the SHOG matrices are Block Circulant with Circulant Blocks (BCCB) when the shear angle is [see formula in PDF]. The proposed model is solved efficiently by the alternating direction method of multipliers (ADMM). Experimental results demonstrate that the proposed method outperforms some state-of-the-art non-blind deblurring methods in both objective and perceptual quality.


2021 ◽  
Vol 26 (6) ◽  
pp. 527-534
Author(s):  
Jianquan LI ◽  
Yue YUAN ◽  
Shuzheng LUO

Wooden furniture production consumes a lot of forest resource and other resources, so it is important to estimate its environmental effect. In this research, we collected data in a sofa factory of China and appraised its environment impacts by the ecological footprint (EF) methodology. The results showed that the total EF of the sofa factory was 2 316.25 gha/year (gha: global hectare). The average EF of a sofa was 0.18 gha/year. For the total EF of the sofa factory, main contribution came from wooden materials (55%), followed by non-wooden materials (41.26%), and these two categories contributed above 96% of the total EF. Human labor accounted for 2.21% of the total footprint. The built land and water contributed a little to the total EF. For the total EF of the wooden materials, main contribution came from wood beams (57.6%), followed by plywood (41.08%); and for the total EF of the non-wooden materials, main contribution came from sponge (95.37%). In the end, we concluded that the incorporate of recycled wooden material and reused sponge in the sofa production could be viewed as an important strategy to achieve more sustainable manufacturing.


2021 ◽  
Vol 26 (6) ◽  
pp. 453-458
Author(s):  
Niu JIANG ◽  
Zepeng ZHUO ◽  
Guolong CHEN ◽  
Liting WANG

The Walsh transform is an important tool to investigate cryptographic properties of Boolean functions. This paper is devoted to study the Walsh transform of a class of Boolean functions defined as [see formula in PDF], by making use of the known conclusions of Walsh transform and the properties of trace function, and the conclusion is obtained by generalizing an existing result.


2021 ◽  
Vol 26 (6) ◽  
pp. 473-480
Author(s):  
Gangqiang LI ◽  
Yu LIU ◽  
Lili ZHANG ◽  
Chunhong LI ◽  
Wei ZHANG

The traditional distributed tactical training simulation system is limited by the availability and bandwidth of military network transmission channel and does not have the feasibility of remote interconnection and spatial sub-regional deployment. In this paper, a new communication method of distributed tactical training simulation system is proposed to solve the problem of strong business coupling between nodes and system availability under the condition of low bandwidth. The operator of federated exchange, federated queue and their concepts and design requirements are firstly proposed, and the inverted tree, triangle, ring exchange topology and circular queue structure are further constructed. Theoretically, the expected goal of high-speed interworking between nodes in the cluster and high reliable transmission between clusters is realized. The example also shows that this method can significantly improve the throughput of single switching node and federated node after using reliability confirmation mechanism.


Sign in / Sign up

Export Citation Format

Share Document