4
4.0

Jun 28, 2018
06/18

by
Ying Wang; Ahmed Abdelhadi

texts

######
eye 4

######
favorite 0

######
comment 0

In this paper, we propose a novel optimal power allocation method that features a power limit function and is able to ensure more users reach the desired Quality-of-Service (QoS). In our model we use sigmoidal-like utility functions to represent the probability of successful reception of packets at user equipment (UE)s. Given that each UE has a different channel quality and different location from base station (BS), it has different CQI and modulation. For each CQI zone, we evaluate the power...

Topics: Networking and Internet Architecture, Computing Research Repository

Source: http://arxiv.org/abs/1507.07141

65
65

Sep 22, 2013
09/13

by
Ying Wang; Pierre Moulin

texts

######
eye 65

######
favorite 0

######
comment 0

An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability distribution as the covertext. Then no statistical test can reliably detect the presence of the hidden message. We refer to such steganographic schemes as perfectly secure. A few such schemes have been proposed in recent literature, but they have...

Source: http://arxiv.org/abs/cs/0702161v3

3
3.0

Jun 26, 2020
06/20

by
Ying Wang; Dong Ren

texts

######
eye 3

######
favorite 0

######
comment 0

30
30

Sep 18, 2013
09/13

by
Ying Wang; Pierre Moulin

texts

######
eye 30

######
favorite 0

######
comment 0

We study blind fingerprinting, where the host sequence into which fingerprints are embedded is partially or completely unknown to the decoder. This problem relates to a multiuser version of the Gel'fand-Pinsker problem. The number of colluders and the collusion channel are unknown, and the colluders and the fingerprint embedder are subject to distortion constraints. We propose a conditionally constant-composition random binning scheme and a universal decoding rule and derive the corresponding...

Source: http://arxiv.org/abs/0803.0265v1

38
38

Sep 22, 2013
09/13

by
Kuo-Ying Wang

texts

######
eye 38

######
favorite 0

######
comment 0

The outbreaks of the severe acute respiratory syndrome (SARS) epidemic in 2003 resulted in unprecedented impacts on people's daily life. One of the most significant impacts to people is the risk of contacting SARS while engaging daily routine activity. In this work we use data from daily underground ridership in Taipei and daily reported SARS cases in Taiwan to model the dynamics of the public underground usage during the wax and wane of the SARS period. We found that for each reported SARS...

Source: http://arxiv.org/abs/0811.2464v1

29
29

Sep 20, 2013
09/13

by
Pierre Moulin; Ying Wang

texts

######
eye 29

######
favorite 0

######
comment 0

Capacity formulas and random-coding exponents are derived for a generalized family of Gel'fand-Pinsker coding problems. These exponents yield asymptotic upper bounds on the achievable log probability of error. In our model, information is to be reliably transmitted through a noisy channel with finite input and output alphabets and random state sequence, and the channel is selected by a hypothetical adversary. Partial information about the state sequence is available to the encoder, adversary,...

Source: http://arxiv.org/abs/cs/0410003v2

1
1.0

Jun 26, 2020
06/20

by
Ying Wang; Dong Ren

texts

######
eye 1

######
favorite 0

######
comment 0

5
5.0

Jun 28, 2018
06/18

by
Ying Wang; Ahmed Abdelhadi

texts

######
eye 5

######
favorite 0

######
comment 0

In this paper, we demonstrate the optimal power allocation for QPSK, 16-QAM, and 64-QAM modulation schedules and the role of channel quality indicator (CQI). We used sigmoidal-like utility functions to represent the probability of successful reception of packets at user equipment (UE). CQI as a feedback to the base station (BS) indicates the data rate that a downlink channel can support. With Levenberg-Marquardt (LM) Optimization method, we present utility functions of different CQI values for...

Topics: Networking and Internet Architecture, Computing Research Repository

Source: http://arxiv.org/abs/1507.07159

43
43

Sep 23, 2013
09/13

by
Ying Wang; Chiu-Yen Kao

texts

######
eye 43

######
favorite 0

######
comment 0

The focus of the present study is the modified Buckley-Leverett (MBL) equation describing two-phase flow in porous media. The MBL equation differs from the classical Buckley-Leverett (BL) equation by including a balanced diffusive-dispersive combination. The dispersive term is a third order mixed derivatives term, which models the dynamic effects in the pressure difference between the two phases. The classical BL equation gives a monotone water saturation profile for any Riemann problem; on the...

Source: http://arxiv.org/abs/1109.3481v1

2
2.0

Jun 30, 2018
06/18

by
Huyuan Chen; Laurent Veron; Ying Wang

texts

######
eye 2

######
favorite 0

######
comment 0

We study existence and uniqueness of weak solutions to (F) $\partial\_t u+ (-\Delta)^\alphau+h(t, u)=0 $ in $(0,\infty)\times\R^N$,with initial condition $u(0,\cdot)=\nu$ in $\R^N$, where $N\ge2$, the operator $(-\Delta)^\alpha$is the fractional Laplacian with $\alpha\in(0,1)$, $\nu$ isa bounded Radon measure and $h:(0,\infty)\times\R\to\R$ is a continuous function satisfying a subcritical integrability condition.In particular, if $h(t,u)=t^\beta u^p$ with $\beta\textgreater{}-1$ and $0...

Topics: Mathematics, Analysis of PDEs

Source: http://arxiv.org/abs/1401.7187

1
1.0

Jun 27, 2018
06/18

by
Huyuan Chen; Hichem Hajaiej; Ying Wang

texts

######
eye 1

######
favorite 0

######
comment 0

Let $\alpha\in(0,1)$, $\Omega$ be a bounded open domain in $R^N$ ($N\ge 2$) with $C^2$ boundary $\partial\Omega$ and $\omega$ be the Hausdorff measure on $\partial\Omega$. We denote by $\frac{\partial^\alpha \omega}{\partial \vec{n}^\alpha}$ a measure $$\langle\frac{\partial^\alpha \omega}{\partial \vec{n}^\alpha},f\rangle=\int_{\partial\Omega}\frac{\partial^\alpha f(x)}{\partial \vec{n}_x^\alpha} d\omega(x),\quad f\in C^1(\bar\Omega),$$ where $\vec{n}_x$ is the unit outward normal vector at...

Topics: Analysis of PDEs, Mathematics

Source: http://arxiv.org/abs/1505.02490

0
0.0

Jun 30, 2018
06/18

by
Xian Chen; Zhi-Ming Ma; Ying Wang

texts

######
eye 0

######
favorite 0

######
comment 0

Genetic recombination is one of the most important mechanisms that can generate and maintain diversity, and recombination information plays an important role in population genetic studies. However, the phenomenon of recombination is extremely complex, and hence simulation methods are indispensable in the statistical inference of recombination. So far there are mainly two classes of simulation models practically in wide use: back-in-time models and spatially moving models. However, the...

Topics: Mathematics, Statistics Theory, Statistics

Source: http://arxiv.org/abs/1407.0215

2
2.0

Jun 28, 2018
06/18

by
Ying Wang; Ruijin Sun; Xinshui Wang

texts

######
eye 2

######
favorite 0

######
comment 0

This letter considers secrecy simultaneous wireless information and power transfer (SWIPT) in full duplex systems. In such a system, full duplex capable base station (FD-BS) is designed to transmit data to one downlink user and concurrently receive data from one uplink user, while one idle user harvests the radio-frequency (RF) signals energy to extend its lifetime. Moreover, to prevent eavesdropping, artificial noise (AN) is exploited by FD-BS to degrade the channel of the idle user, as well...

Topics: Information Theory, Computing Research Repository, Mathematics

Source: http://arxiv.org/abs/1511.05683

29
29

Sep 21, 2013
09/13

by
Hristo S. Sendov; Ying Wang; Ricardas Zitikis

texts

######
eye 29

######
favorite 0

######
comment 0

The paper is motivated by a problem concerning the monotonicity of insurance premiums with respect to their loading parameter: the larger the parameter, the larger the insurance premium is expected to be. This property, usually called loading monotonicity, is satisfied by premiums that appear in the literature. The increased interest in constructing new insurance premiums has raised a question as to what weight functions would produce loading-monotonic premiums. In this paper we demonstrate a...

Source: http://arxiv.org/abs/1008.3427v1

3
3.0

Nov 4, 2019
11/19

by
Wang Xiao-Ying, Wang Pei-Shan

texts

######
eye 3

######
favorite 0

######
comment 0

37
37

Sep 22, 2013
09/13

by
Kuo-Ying Wang; Dudley E. Shallcross

texts

######
eye 37

######
favorite 0

######
comment 0

Modeling is a very important tool for scientific processes, requiring long-term dedication, desire, and continuous reflection. In this work, we discuss several aspects of modeling, and the reasons for doing it. We discuss two major modeling systems that have been built by us over the last 10 years. It is a long and arduous process but the reward of understanding can be enormous, as demonstrated in the examples shown in this work. We found that long-range transport of emerging Asian pollutants...

Source: http://arxiv.org/abs/0811.2566v1

0
0.0

Jun 28, 2018
06/18

by
Huyuan Chen; Ying Wang; Feng Zhou

texts

######
eye 0

######
favorite 0

######
comment 0

This paper is concerned with the nonlinear elliptic problem $-\Delta u=\frac{\lambda }{(a-u)^2}$ on a bounded domain $\Omega$ of $\mathbb{R}^N$ with Dirichlet boundary conditions. This problem arises from Micro-Electromechanical Systems devices in the case that the elastic membrane contacts the ground plate on the boundary. We analyze the properties of minimal solutions to this equation when $\lambda>0$ and the function $a:\bar\Omega\to[0,1]$ satisfying $a(x)\ge \kappa{\rm...

Topics: Analysis of PDEs, Mathematics

Source: http://arxiv.org/abs/1512.03180

11
11

Jun 26, 2018
06/18

by
Huyuan Chen; Hichem Hajaiej; Ying Wang

texts

######
eye 11

######
favorite 0

######
comment 0

The purpose of this article is to give a complete study of the weak solutions of the fractional elliptic equation \begin{equation}\label{00} \arraycolsep=1pt \begin{array}{lll} (-\Delta)^{\alpha} u+u^p=0\ \ \ \ &\ {\rm in}\ \ B_1(e_N),\\[2mm]\phantom{(-\Delta)^{\alpha} +u^p} u=\delta_{0}& \ {\rm in}\ \ \mathbb{R}^N\setminus B_1(e_N), \end{array} \end{equation} where $p>0$, $ (-\Delta)^{\alpha}$ with $\alpha\in(0,1)$ denotes the fractional Laplacian operator in the principle value...

Topics: Mathematics, Analysis of PDEs

Source: http://arxiv.org/abs/1501.06242

1
1.0

Jun 30, 2018
06/18

by
Hui-Gen Liu; Ying Wang; Hui Zhang; Ji-Lin Zhou

texts

######
eye 1

######
favorite 0

######
comment 0

Transit times around single stars can be described well by a linear ephemeris. However, transit times in circumbinary systems are influenced both by the gravitational perturbations and the orbital phase variations of the central binary star. Adopting a coplanar analog of Kepler-16 as an example, we find that circumbinary planets can transit the same star more than once during a single planetary orbit, a phenomenon we call "tight transits". In certain geometric, the projected orbital...

Topics: Earth and Planetary Astrophysics, Astrophysics

Source: http://arxiv.org/abs/1407.0860

32
32

Sep 22, 2013
09/13

by
Kuo-Ying Wang; Dudley E. Shallcross; John A. Pyle

texts

######
eye 32

######
favorite 0

######
comment 0

Here we report a modelling study of the spring ozone maximum and its interhemispheric asymmetry in the remote marine boundary layer (MBL). The modelled results are examined at the surface and on a series of time-height cross sections at several locations spread over the Atlantic, the Indian, and the Pacific Oceans. Comparison of model with surface measurements at remote MBL stations indicate a close agreement. The most striking feature of the hemispheric spring ozone maximum in the MBL can be...

Source: http://arxiv.org/abs/0811.3118v1

1
1.0

Jun 29, 2018
06/18

by
Ruijin Sun; Ying Wang; Xinshui Wang; Yuan Zhang

texts

######
eye 1

######
favorite 0

######
comment 0

In this paper, an energy harvesting (EH) based cooperative non-orthogonal multiple access (NOMA) system is considered, where node S simultaneously sends independent signals to a stronger node R and a weaker node D. We focus on the scenario that the direct link between S and D is too weak to meet the quality of service (QoS) of D. Based on the NOMA principle, node R, the stronger user, has prior knowledge about the information of the weaker user, node D. To satisfy the targeted rate of D, R also...

Topics: Information Theory, Computing Research Repository, Mathematics

Source: http://arxiv.org/abs/1608.07672

36
36

Sep 19, 2013
09/13

by
Wei Yang; Lihua Li; Gang Wu; Haifeng Wang; Ying Wang

texts

######
eye 36

######
favorite 0

######
comment 0

We consider relay selection technique in a cooperative cellular network where user terminals act as mobile relays to help the communications between base station (BS) and mobile station (MS). A novel relay selection scheme, called Joint Uplink and Downlink Relay Selection (JUDRS), is proposed in this paper. Specifically, we generalize JUDRS in two key aspects: (i) relay is selected jointly for uplink and downlink, so that the relay selection overhead can be reduced, and (ii) we consider to...

Source: http://arxiv.org/abs/1009.0068v1

1
1.0

Jun 28, 2018
06/18

by
Weijie Lin; Huawei Fan; Ying Wang; Heping Ying; Xingang Wang

texts

######
eye 1

######
favorite 0

######
comment 0

Although the set of permutation symmetries of a complex network can be very large, few of the symmetries give rise to stable synchronous patterns. Here we present a new framework and develop techniques for controlling synchronization patterns in complex network of coupled chaotic oscillators. Specifically, according to the network permutation symmetry, we design a small-size and weighted network, namely the control network, and use it to control the large-size complex network by means of...

Topics: Chaotic Dynamics, Nonlinear Sciences

Source: http://arxiv.org/abs/1511.00892

5
5.0

Oct 29, 2019
10/19

by
Yuan-Hsun Sun; H J Wu; Ying Wang

texts

######
eye 5

######
favorite 0

######
comment 0

39
39

Jul 20, 2013
07/13

by
Xuebin Wu; Meghanad Wagh; Ning Chen; Zhiyuan Yan; Ying Wang

texts

######
eye 39

######
favorite 0

######
comment 0

Discrete Fourier transforms~(DFTs) over finite fields have widespread applications in digital communication and storage systems. Hence, reducing the computational complexities of DFTs is of great significance. Recently proposed cyclotomic fast Fourier transforms (CFFTs) are promising due to their low multiplicative complexities. Unfortunately, there are two issues with CFFTs: (1) they rely on efficient short cyclic convolution algorithms, which has not been investigated thoroughly yet, and (2)...

Source: http://arxiv.org/abs/1007.1213v2

116
116

Sep 23, 2013
09/13

by
Xiang-Mu Kong; Ying Wang; Cong-Fei Du

texts

######
eye 116

######
favorite 0

######
comment 0

Using semiclassical approximation method, Bose-Einstein condensation (BEC) of a relativistic ideal boson gas (RIBG) with and without antibosons in three-dimensional (3-D) harmonic traps is investigated. The BEC transition temperature T_{c} and the Helmholtz free energy at T_{c} are calculated. The effect of the rest mass of the boson on the properties of the system is also studied. We find that T_{c} of RIBG is higher than that of the nonrelativistic approximation. The RIBG with antibosons is...

Source: http://arxiv.org/abs/1111.0364v1

34
34

Sep 23, 2013
09/13

by
Binlong Li; Zdeněk Ryjáček; Ying Wang; Shenggui Zhang

texts

######
eye 34

######
favorite 0

######
comment 0

Let $G$ be a graph on $n$ vertices. An induced subgraph $H$ of $G$ is called heavy if there exist two nonadjacent vertices in $H$ with degree sum at least $n$ in $G$. We say that $G$ is $H$-heavy if every induced subgraph of $G$ isomorphic to $H$ is heavy. For a family $\mathcal{H}$ of graphs, $G$ is called $\mathcal{H}$-heavy if $G$ is $H$-heavy for every $H\in\mathcal{H}$. In this paper we characterize all connected graphs $R$ and $S$ other than $P_3$ (the path on three vertices) such that...

Source: http://arxiv.org/abs/1109.4122v1

5
5.0

Nov 1, 2019
11/19

by
Yuan-Hsun Sun; Ying Wang; K A Arnold

texts

######
eye 5

######
favorite 0

######
comment 0

0
0.0

Jun 30, 2018
06/18

by
Feiyun Zhu; Ying Wang; Shiming Xiang; Bin Fan; Chunhong Pan

texts

######
eye 0

######
favorite 0

######
comment 0

Hyperspectral Unmixing (HU) has received increasing attention in the past decades due to its ability of unveiling information latent in hyperspectral data. Unfortunately, most existing methods fail to take advantage of the spatial information in data. To overcome this limitation, we propose a Structured Sparse regularized Nonnegative Matrix Factorization (SS-NMF) method from the following two aspects. First, we incorporate a graph Laplacian to encode the manifold structures embedded in the...

Topics: Computing Research Repository, Computer Vision and Pattern Recognition, Artificial Intelligence

Source: http://arxiv.org/abs/1403.4682

30
30

Sep 20, 2013
09/13

by
Wan-Ying Wang; Bin Shang; Chuan Wang; Gui Lu Long

texts

######
eye 30

######
favorite 0

######
comment 0

We give algorithms to factorize large integers in the duality computer. We provide three duality algorithms for factorization based on a naive factorization method, the Shor algorithm in quantum computing, and the Fermat's method in classical computing. All these algorithms are polynomial in the input size.

Source: http://arxiv.org/abs/quant-ph/0607026v1

1
1.0

Oct 29, 2019
10/19

by
Yuan-Hsun Sun; Ying Wang; C F Lee

texts

######
eye 1

######
favorite 0

######
comment 0

1
1.0

Jun 30, 2018
06/18

by
Zuo-Hong Li; Zong-Guo Si; Ying Wang; Nan Zhu

texts

######
eye 1

######
favorite 0

######
comment 0

A new estimate is presented of the dileptonic $B$ decays $B\to\pi\ell^+\ell^-(\ell=e,\mu,\tau)$ in naive factorization within the standard-model (SM) framework. Using a combination of several approaches, we investigate the behavior of the $B\to \pi$ form factors in the entire region of the momentum transfer squared $q^2$. For the vector and scalar form factors, we employ the light cone sum rule (LCSR) with a chiral current correlator to estimate, at twist-2 next-to-leading order (NLO) accuracy,...

Topic: High Energy Physics - Phenomenology

Source: http://arxiv.org/abs/1411.0466

1
1.0

Jun 29, 2018
06/18

by
Ruijin Sun; Ying Wang; Zhongyu Miao; Xinshui Wang

texts

######
eye 1

######
favorite 0

######
comment 0

This paper considers an energy-limited cognitive relay network where a secondary transmitter (ST) assists to forward the traffic from a primary transmitter (PT) to a primary receiver (PR), in exchange for serving its own secondary receiver (SR) in the same frequency. The multiple-antenna ST is assumed to be energy-constrained and powered by both information flow from source (PT) and dedicated energy streams from destinations (PR and SR), which is called destination-aided wireless power transfer...

Topics: Information Theory, Computing Research Repository, Mathematics

Source: http://arxiv.org/abs/1608.07666

0
0.0

Jun 29, 2018
06/18

by
Jin-Qiang Zhong; Hui-Min Li; Xue-ying Wang

texts

######
eye 0

######
favorite 0

######
comment 0

We present measurements of the azimuthal orientation {\theta}(t) and thermal amplitude {\delta}(t) of the large-scale circulation (LSC) of turbulent rotating convection within an unprecedented large Rossby number range 170. We identify the mechanism through which the mean retrograde rotation speed can be enhanced by stochastic cessations in the presence of weak Coriolis force, and show that a low-dimensional, stochastic model provides predictions of the observed large-scale flow dynamics and...

Topics: Fluid Dynamics, Physics

Source: http://arxiv.org/abs/1609.03284

7
7.0

Jun 28, 2018
06/18

by
Ying Wang; Xiangming Dai; Jason Min Wang; Brahim Bensaou

texts

######
eye 7

######
favorite 0

######
comment 0

With the rapidly increasing number of deployed LTE femtocell base stations (FBS), energy consumption of femtocell networks has become a serious environmental issue. Therefore, energy-efficient protocols are needed to balance the trade-off between energy saving and bandwidth utilization. The key component of the desired protocol to prevent both energy and bandwidth waste is interference mitigation, which, nevertheless, most previous work has failed to properly consider. To this end, in this...

Topics: Networking and Internet Architecture, Computing Research Repository

Source: http://arxiv.org/abs/1508.01454

3
3.0

Jun 27, 2020
06/20

by
Ning Mu; Xi-Jun Kuang; Zi-Ying Wang

texts

######
eye 3

######
favorite 0

######
comment 0

0
0.0

Jun 28, 2018
06/18

by
Ying Wang; Yury M. Bystritskiy; Egle Tomasi-Gustafsson

texts

######
eye 0

######
favorite 0

######
comment 0

Antiproton--proton annihilation into light mesons is revisited in the few GeV energy domain, in view of a global description of the existing data. An effective meson model is developed, with mesonic and baryonic degrees od freedom in $s$, $t$, and $u$ channels. Regge factors are added to reproduce the proper energy behavior and the forward and backward peaked behavior. A comparison with existing data and predictions for angular distributions and energy dependence are done for charged and...

Topics: Nuclear Theory, High Energy Physics - Phenomenology

Source: http://arxiv.org/abs/1512.05520

0
0.0

Dec 1, 2019
12/19

by
Dr Ying Wang - American Cancer Society, Atlanta, USA

movies

######
eye 0

######
favorite 0

######
comment 0

Dr Ying Wang speaks with ecancertv at AACR 2016 about the impact of regular low-impact exercise on patient prognosis in prostate cancer. Patient survival has been related to physical exercise in previous research, and Dr Wang reports on the associations relating to prostate cancer, considering the potential influence of post-diagnosis decline and the risks associated with time spent sat down.

1
1.0

Jun 9, 2020
06/20

by
Li-Bing Zhang; Pei-Shan Wang; Xiao-Ying Wang

texts

######
eye 1

######
favorite 0

######
comment 0

30
30

Sep 23, 2013
09/13

by
Chuan Wang; Wan-Ying Wang; Li Xiao; Gui Lu Long

texts

######
eye 30

######
favorite 0

######
comment 0

A two-step quantum key distribution protocol using frequency and polarization doubly entangled photons is proposed. In this protocol, information is encoded by a unitary operation on each of the two doubly entangled photons and sent from Alice to Bob in two steps. State measurement device is designed. The security of the communication is analyzed.

Source: http://arxiv.org/abs/0710.1348v1

1
1.0

Jun 9, 2020
06/20

by
Li-Bing Zhang; Pei-Shan Wang; Xiao-Ying Wang

texts

######
eye 1

######
favorite 0

######
comment 0

2
2.0

Jun 28, 2018
06/18

by
Hong-Lei Li; Peng-Cheng Lu; Zong-Guo Si; Ying Wang

texts

######
eye 2

######
favorite 0

######
comment 0

One of the future goals of the LHC is to precisely measure the properties of Higgs boson. The associated production of Higgs boson and the top quark pair is a promising process to investigate the related Yukawa interaction and the properties of Higgs. Compared with the pure scalar sector in the Standard Model, the Higgs sector contains both scalar and pseudoscalar in many new physics models, which makes the $t\bar t H$ interaction more complex and provides a variety of phenomena. To investigate...

Topic: High Energy Physics - Phenomenology

Source: http://arxiv.org/abs/1508.06416

49
49

Sep 19, 2013
09/13

by
Ning Chen; Zhiyuan Yan; Maximilien Gadouleau; Ying Wang; Bruce W. Suter

texts

######
eye 49

######
favorite 0

######
comment 0

While random linear network coding is a powerful tool for disseminating information in communication networks, it is highly susceptible to errors caused by various sources. Due to error propagation, errors greatly deteriorate the throughput of network coding and seriously undermine both reliability and security of data. Hence error control for network coding is vital. Recently, constant-dimension codes (CDCs), especially K\"otter-Kschischang (KK) codes, have been proposed for error control...

Source: http://arxiv.org/abs/0909.4601v3

7
7.0

Jun 27, 2018
06/18

by
Yun Kang; Krystal Blanco; Talia Davies; Ying Wang; Gloria DeGrandi-Hoffman

texts

######
eye 7

######
favorite 0

######
comment 0

We propose a honeybee-mite-virus model that incorporates (1) parasitic interactions between honeybees and the Varroa mites; (2) five virus transmission terms between honeybees and mites at different stages of Varroa mites: from honeybees to honeybees, from adult honeybees to phoretic mites, from honeybee brood to reproductive mites, from reproductive mites to honeybee brood, and from honeybees to phoretic mites; and (3) Allee effects in the honeybee population generated by its internal...

Topics: Populations and Evolution, Quantitative Biology, Dynamical Systems, Mathematics

Source: http://arxiv.org/abs/1505.03742

2
2.0

Jun 29, 2018
06/18

by
Ying Wang; Minghai Qin; Krishna R. Narayanan; Anxiao Jiang; Zvonimir Bandic

texts

######
eye 2

######
favorite 0

######
comment 0

We exploit the redundancy of the language-based source to help polar decoding. By judging the validity of decoded words in the decoded sequence with the help of a dictionary, the polar list decoder constantly detects erroneous paths after every few bits are decoded. This path-pruning technique based on joint decoding has advantages over stand-alone polar list decoding in that most decoding errors in early stages are corrected. In order to facilitate the joint decoding, we first propose a...

Topics: Information Theory, Computing Research Repository, Mathematics

Source: http://arxiv.org/abs/1601.06184

0
0.0

Jun 30, 2018
06/18

by
Feiyun Zhu; Ying Wang; Bin Fan; Gaofeng Meng; Shiming Xiang; Chunhong Pan

texts

######
eye 0

######
favorite 0

######
comment 0

Hyperspectral unmixing, the process of estimating a common set of spectral bases and their corresponding composite percentages at each pixel, is an important task for hyperspectral analysis, visualization and understanding. From an unsupervised learning perspective, this problem is very challenging---both the spectral bases and their composite percentages are unknown, making the solution space too large. To reduce the solution space, many approaches have been proposed by exploiting various...

Topics: Computing Research Repository, Computer Vision and Pattern Recognition

Source: http://arxiv.org/abs/1403.3155

Mendeley Climate Change Library

10
10.0

Jul 6, 2019
07/19

by
Rui Wang; Qiqi Sun; Ying Wang; Wei Zheng; Lunguang Yao; Yaxian Hu; Shengli Guo

texts

######
eye 10

######
favorite 0

######
comment 0

Land use plays an essential role in regional carbon cycling, potentially influencing the exchange rates of CO 2 flux between soil and the atmosphere in terrestrial ecosystems. Temperature sensitivity of soil respiration (Q 10 ), as an efficient parameter to reflect the possible feedback between the global carbon cycle and climate change, has been extensively studied. However, very few reports have assessed the difference in temperature sensitivity of soil respiration under different land use...

Topics: Bacterial communities, Land use type, Q 10 values, Soil enzyme activities

1
1.0

Jun 30, 2018
06/18

by
Feiyun Zhu; Bin Fan; Xinliang Zhu; Ying Wang; Shiming Xiang; Chunhong Pan

texts

######
eye 1

######
favorite 0

######
comment 0

Subset selection from massive data with noised information is increasingly popular for various applications. This problem is still highly challenging as current methods are generally slow in speed and sensitive to outliers. To address the above two issues, we propose an accelerated robust subset selection (ARSS) method. Specifically in the subset selection area, this is the first attempt to employ the $\ell_{p}(0

Topics: Machine Learning, Computing Research Repository, Computer Vision and Pattern Recognition, Learning,...

Source: http://arxiv.org/abs/1409.3660

Mendeley Climate Change Library

23
23

Jul 6, 2019
07/19

by
Long Wang; Hang Yu; Maoling Yang; Rui Yang; Rui Gao; Ying Wang

texts

######
eye 23

######
favorite 0

######
comment 0

Based on the principles underlying the calculation of the standardized precipitation index (SPI) and standardized precipitation evapotranspiration index (SPEI), this study selects precipitation, temperature, relative humidity, sunshine hours, wind speed and runoff data to develop a multi-scalar drought index, the standardized precipitation evapotranspiration runoff index (SPERI), using methods such as Penman-Monteith and Copula. This index is applied along with the SPI and SPEI to Yunnan...

Topics: Copula function, SPEI, SPERI, SPI

Mendeley Climate Change Library

27
27

Jul 6, 2019
07/19

by
Fangwen Bao; Tianhai Cheng; Ying Li; Xingfa Gu; Hong Guo; Yu Wu; Ying Wang; Jinhui Gao

texts

######
eye 27

######
favorite 0

######
comment 0

As an important part of the anthropogenic aerosol, Black Carbon (BC) aerosols in the atmospheric environment have strong impacts on climate change. Recently, most remote sensing studies on aerosol components detection are limited to the inversion of aerosol optical properties, integration of chemistry models or in situ observations. In this paper, an algorithm based on Effective Medium Approximations (EMA) and statistically optimized aerosol inversion algorithm was integrated for retrieving the...

Topics: Air pollution, Black carbon concentration, Satellite remote sensing