Soft computing techniques are becoming even more popular and particularly amenable to model the complex behaviors of most geotechnical engineering systems since they have demonstrated superior predictive capacity,comp...Soft computing techniques are becoming even more popular and particularly amenable to model the complex behaviors of most geotechnical engineering systems since they have demonstrated superior predictive capacity,compared to the traditional methods.This paper presents an overview of some soft computing techniques as well as their applications in underground excavations.A case study is adopted to compare the predictive performances of soft computing techniques including eXtreme Gradient Boosting(XGBoost),Multivariate Adaptive Regression Splines(MARS),Artificial Neural Networks(ANN),and Support Vector Machine(SVM) in estimating the maximum lateral wall deflection induced by braced excavation.This study also discusses the merits and the limitations of some soft computing techniques,compared with the conventional approaches available.展开更多
Cloud computing is always adopted to enhance the computing capability of mobile systems, especially when the mobile users prefer to use some computation intensive applications. Consequently, the distributed wireless r...Cloud computing is always adopted to enhance the computing capability of mobile systems, especially when the mobile users prefer to use some computation intensive applications. Consequently, the distributed wireless relay infrastructure should be deployed to aid the traffic transmission. To further enhance the QoS provisioning goals of wireless cooperative network, this paper puts forward a multi-objective approach for distributed optimal relay selection, which takes Bit Error Rate (BER) and Secrecy Capacity (SC) into account simultaneously. Firstly, our proposal partitions the channel state into several levels according to the received signal-to-noise ratio (SNR) and describes the time-varying Rayleigh fading channel characteristics by using first order finite-state Markov model. Secondly, we model the relay selection as Restless Multi-armed Bandit optimal solution problem with respect to the channel state and the state transition probability. Finally, simulation results demonstrate the efficiency of the proposed approach which outperforms the existing ones.展开更多
The results of numerical analysis of turbine flow capacity and other parameters at different turbine rows are presented in this paper. Mass flow calculations by 3D Euler code has been controlled by means of 3D Navier-...The results of numerical analysis of turbine flow capacity and other parameters at different turbine rows are presented in this paper. Mass flow calculations by 3D Euler code has been controlled by means of 3D Navier-Stokes code taking into account inlet turbulence intensity and turbulence scale. The use of complicated numerical approaches (3D Euler or 3D Navier-Stokes codes) for mass flow definition demands close attention to quality of numerical techniques. Various reasons of inaccuracy of mass flow definition by using different 3D numerical approaches are analyzed.展开更多
Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in tra...Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain.展开更多
基金supported by High-end Foreign Expert Introduction program (No.G20190022002)Chongqing Construction Science and Technology Plan Project (2019-0045)
文摘Soft computing techniques are becoming even more popular and particularly amenable to model the complex behaviors of most geotechnical engineering systems since they have demonstrated superior predictive capacity,compared to the traditional methods.This paper presents an overview of some soft computing techniques as well as their applications in underground excavations.A case study is adopted to compare the predictive performances of soft computing techniques including eXtreme Gradient Boosting(XGBoost),Multivariate Adaptive Regression Splines(MARS),Artificial Neural Networks(ANN),and Support Vector Machine(SVM) in estimating the maximum lateral wall deflection induced by braced excavation.This study also discusses the merits and the limitations of some soft computing techniques,compared with the conventional approaches available.
基金supported by National Natural Science Foundation of China under Grant No.60971083Science Technology Innovation Foundationfor Young Teachers in BUPT under Grant No.2011RC0306+1 种基金State Major Science and Technology Special Projects under Grant No.2011ZX03005-002-02 National International Science and Technology Cooperation Project of China under Grant No.2010DFA11320
文摘Cloud computing is always adopted to enhance the computing capability of mobile systems, especially when the mobile users prefer to use some computation intensive applications. Consequently, the distributed wireless relay infrastructure should be deployed to aid the traffic transmission. To further enhance the QoS provisioning goals of wireless cooperative network, this paper puts forward a multi-objective approach for distributed optimal relay selection, which takes Bit Error Rate (BER) and Secrecy Capacity (SC) into account simultaneously. Firstly, our proposal partitions the channel state into several levels according to the received signal-to-noise ratio (SNR) and describes the time-varying Rayleigh fading channel characteristics by using first order finite-state Markov model. Secondly, we model the relay selection as Restless Multi-armed Bandit optimal solution problem with respect to the channel state and the state transition probability. Finally, simulation results demonstrate the efficiency of the proposed approach which outperforms the existing ones.
文摘The results of numerical analysis of turbine flow capacity and other parameters at different turbine rows are presented in this paper. Mass flow calculations by 3D Euler code has been controlled by means of 3D Navier-Stokes code taking into account inlet turbulence intensity and turbulence scale. The use of complicated numerical approaches (3D Euler or 3D Navier-Stokes codes) for mass flow definition demands close attention to quality of numerical techniques. Various reasons of inaccuracy of mass flow definition by using different 3D numerical approaches are analyzed.
基金Supported by the High Technology Research and Development Programme of China (No. 2003AA1Z2070 ) and the National Natural Science Foundation of China (No. 90412013).
文摘Under virtualization idea based on large-scale dismantling and sharing, the implementing of network interconnection of calculation components and storage components by loose coupling, which are tightly coupling in traditional server, achieves computing capacity, storage capacity and service capacity distri- bution according to need in application-level. Under the new server model, the segregation and protection of user space and system space as well as the security monitoring of virtual resources are the important factors of ultimate security guarantee. This article presents a large-scale and expansible distributed invasion detection system of virtual computing environment based on virtual machine. The system supports security monitoring management of global resources and provides uniform view of security attacks under virtual computing environment, thereby protecting the user applications and system security under capacity services domain.