Most Down Articles

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    Most Downloaded in Recent Year
    Please wait a minute...
    The two-grid algorithm of the finite volume element method for second-order indefinite elliptic problems
    DAI Zhen-xiang
    J4   
    Abstract1652)      PDF(pc) (240KB)(33414)       Save
    The two-grid algorithm of the finite volume element method for second-order indefinite elliptic problems in R2 was presented ,based on the P1 nonconforming element.The following error estimated in the H1-norm between the solution of the two-grid and the finite volume element appoximation of the elliptic problem were derived::‖uh-uh‖1,h≤CH2‖f‖1,‖u-uh‖1,h≤C(h+H2)‖f‖1.
    Related Articles | Metrics
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    1953, 00 (06): 1-.  
    Abstract268)      PDF(pc) (3108KB)(2007)       Save
    Related Articles | Metrics
    A system of monitoring and protecting Android privacy leakage
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2016, 51 (9): 59-67.   DOI: 10.6040/j.issn.1671-9352.1.2015.293
    Abstract2459)      PDF(pc) (3349KB)(3496)       Save
    In order to protect the data of Android operating system, we present a system called FlowMonitor to monitor and protect privacy flow based on Android. FlowMonitor adds taint marks and identity tags onto data. Moreover, it is a real-time, dynamic monitoring system. In order to avoid leaking private data by collusion attack, it uses the mechanism of taint's identity authentication based on the idea of RBAC, and finds all probable malicious applications. Based on open and closed policies, labels were designed for each data to control the use of private data. The user can control applications using private data based on their choices. Evaluation results show that Flowmonitor out performs taint Droid. It can not only find out all probable malicious applications which steal private data by collusion attack, but also control applications using each private data. Extensive experimental results demonstrate that FlowMonitor effectively protects the user privacy.
    Reference | Related Articles | Metrics
    Uniqueness of positive solutions of singular p-biharmonic equations with Hardy terms
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2019, 54 (6): 75-80.   DOI: 10.6040/j.issn.1671-9352.0.2018.496
    Abstract1044)      PDF(pc) (369KB)(1378)       Save
    We study a class of singular p-biharmonic equations with Hardy terms. The existence and uniqueness of the positive solution for above problem is obtained by minimization method.
    Reference | Related Articles | Metrics
    Algorithms of finite difference domain decomposition for two-heat equation
    LI Wan-shan, WANG Wen-qia*
    J4    2011, 46 (12): 1-5.  
    Abstract1256)      PDF(pc) (1316KB)(2620)       Save

    Considering algorithms of finite difference domain decomposition for twodimensional heat equation, a new kind of explicitimplicit difference schemes which is of unconditional stability is developed. The corresponding schemes consist of one explicit difference schemes at the interface point and fully implicit schemes in the subdomains. The stability and error estimates of the schemes are derived. Finally, the numerical experiment is presented which confirm the results and conclusions.

    Related Articles | Metrics
    Security analysis of the eCK model
    NI Liang1,2,3, CHEN Gong-liang3, LI Jian-hua3
    J4    2013, 48 (7): 46-50.  
    Abstract1600)      PDF(pc) (929KB)(2384)       Save

    Authenticated key agreement (AKA) protocol should capture desirable security properties as many as possible. As a formal method recently proposed to design and analyze two-party AKA protocols, the eCK model is currently receiving more and more attention, and the exact security guarantees that can be provided by this model are worthy of in-depth research. Hence, the relationship between the eCK model and the basic desirable security properties for AKA protocols is analyzed in detail. The conclusions indicate that AKA protocols with provable security in the eCK model capture most basic desirable security properties. Thereafter, the advantages and disadvantages of the eCK model are also summarized.

    Related Articles | Metrics
    A sentiment analysis method based on a polarity lexicon
    ZHANG Cheng-gong 1, 2, LIU Pei-yu1, 2*, ZHU Zhen-fang1,2, FANG Ming1,2
    J4    2012, 47 (3): 47-50.  
    Abstract1943)      PDF(pc) (1026KB)(5038)       Save

    A polarity lexicon is the foundation of sentiment analysis and orientation analysis. An overall and effective polarity lexicon was constructed, including base lexicon, domain lexicon, network lexicon and modifier lexicon. The influence of modifiers to polarity words was studied. A sentiment analysis method based on a polarity lexicon was proposed, in which the modifiers and polarity words were combined into polarity phrases, and the phrase was used as the basic unit to compute the polarity of sentences and texts. Experimental results showed that the effect of orientation analysis using polarity lexicon raised in this paper was good.

    Related Articles | Metrics
    Generalization of Gronwalls inequality and applications
    WANG Xiao-huan, LÜ Guang-ying, DAI Li-jie
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2022, 57 (6): 94-101.   DOI: 10.6040/j.issn.1671-9352.0.2021.451
    Abstract945)      PDF(pc) (408KB)(739)       Save
    The classical Gronwalls inequality is generalized and a Gronwalls inequality with multiple singularity points is obtained. Then the existence and uniqueness of solutions to stochastic fractional order differential equations is obtained by using the obtained inequality.
    Reference | Related Articles | Metrics
    Pottiaceae in Shandong Province, China
    LI De-li, REN Zhao-jie, YAN Li-mei, BIAN Xin-yu,ZHAO Zun-tian
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2016, 51 (3): 11-18.   DOI: 10.6040/j.issn.1671-9352.0.2015.401
    Abstract1274)      PDF(pc) (1051KB)(1367)       Save
    Based on the identification of about 5500 specimens collected from Shandong Province, 79 species, 3 varieties and 24 genera of Pottiaceae in Shandong Province are reported. Among them, Weissia muhlenbergiana (Swartz)W. D. Reese & B. A. E. Lemmon is found from China for the first time, while 3 genera, Chenia R. H. Zander, Gymnostomiella M. Fleisch. and Tuerckheimia Broth., and 28 species are reported from Shandong Province for the first time. At the same time, the species composition based on the specimens collected before and after 2000 are compared, it is found that the difference is obvious, and the reasons are given. This study aims to clarify the species diversity of Pottiaceae in Shandong Province. At the same time, the study can provide new data for the bryophyte researches of China.
    Related Articles | Metrics
    BERT-IDCNN-CRF for named entity recognition in Chinese
    Ni LI,Huan-mei GUAN,Piao YANG,Wen-yong DONG
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2020, 55 (1): 102-109.   DOI: 10.6040/j.issn.1671-9352.2.2019.076
    Abstract4320)   HTML137)    PDF(pc) (2001KB)(1954)       Save

    The pre-trained language model, BERT (bidirectional encoder representations from transformers), has shown promising result in NER (named entity recognition) due to its ability to represent rich syntactic, grammatical information in sentences and the polysemy of words. However, most existing BERT fine-tuning based models need to update lots of model parameters, facing with expensive time cost at both training and testing phases. To handle this problem, this work presents a novel BERT based language model for Chinese NER, named BERT-IDCNN-CRF (BERT-iterated dilated convolutional neural network-conditional random field). The proposed model utilizes traditional BERT model to obtain the context representation of the word as the input of IDCNN-CRF. At training phase, the model parameters of BERT in the proposed model remain unchanged so that the proposed model can reduce parameters training while maintaining polysemy of words. Experimental results show that the proposed model obtains significant training time with acceptable test error.

    Table and Figures | Reference | Related Articles | Metrics
    On the vertex-distinguishing proper edge-coloring of K3,3∨Kt
    GAO Yu-ping1, WANG Zhi-wen2, CHEN Xiang-en1*, YAO Bing1
    J4    2012, 47 (2): 60-64.  
    Abstract1228)      PDF(pc) (638KB)(1584)       Save

     A k-proper edge coloring of a simple graph G is called vertex-distinguishing if for two arbitrarily different vertices u and v, the set of colors assigned to the edges incident to u differs from the set of colors assigned to the edges incident to v. The minimum number of colors required for a vertex-distinguishing proper edge-coloring of a simple graph G is called the vertex-distinguishing proper edge chromatic number of G and denoted by χ′s(G). Vertex-distinguishing proper edge colorings of K3,3∨Kt are discussed.

    Related Articles | Metrics
    Properties of the species invasion model with Allee effect
    ZHANG Bei-bei, XU Yao, ZHOU You, LING Zhi
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2022, 57 (1): 50-55.   DOI: 10.6040/j.issn.1671-9352.0.2021.259
    Abstract1193)      PDF(pc) (1783KB)(727)       Save
    Based on the reaction diffusion equation with free boundary, the mathematical model of species invasion with Allee effect is established, the dynamic process of the invasive species is described, and the existence and uniqueness of the global solution of the model are explored. Focusing on the nature of the long-term solution, the corresponding conditions of the spreading or vanishing of the invasive species in the new environment are obtained, we have proved the conclusion that the possibility the specie will be vanish due to the small initial survival area or poor self-spreading ability, and verified our analytical findings numerically with MATLAB software. These results provide a theoretical basis for the prevention and control of ecological protection and harmful species invasion.
    Reference | Related Articles | Metrics
    Multiplicity of solutions for local superlinear p-kirchhoff-type equation#br#
    ZHANG Shen-gui
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    DOI: 10.6040/j.issn.1671-9352.0.2013.410
    Tail dependence analysis based on tail sample data
    LI Shu-shan
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (12): 49-54.   DOI: 10.6040/j.issn.1671-9352.0.2014.156
    Abstract1812)      PDF(pc) (710KB)(2009)       Save
    Tail dependence is the nature of the tail to the joint distribution of the two random variables. Be directed against tail dependence analysis, two concepts of order statistics for 2-dimension random vector were proposed and an idea was advanced to estimate the tail dependence coefficient by fitting Copula function using tail sample. Then the method of parameter estimation and fitting tests for the tail based on tail sample date and the corresponding estimate method for tail dependence coefficient were also discussed. A Monte Carlo simulation was given to illustrate the validity of the method given. Finally the tail dependence between the SHI and the SZI was analyzed.
    Reference | Related Articles | Metrics
    Approximation of lagrange interpolation polynomials based on the fourth Chebyshev nodes
    ZHANG Yan-yan, YAN Chao
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2017, 52 (8): 10-16.   DOI: 10.6040/j.issn.1671-9352.0.2016.315
    Abstract1200)      PDF(pc) (588KB)(962)       Save
    This paper first provides the exact approximation errors for an analytic function class under the maximum norm based on the Lagrange interpolation polynomials with the fourth Chebyshev nodes in the worst setting. As for the norm of Lp(p>1), the corresponding strong asymptotic order for that kind of analytic function class is obtained.
    Reference | Related Articles | Metrics
    Research on the localization of firmware vulnerability based on stain tracking
    DAI Zhong-hua, FEI Yong-kang, ZHAO Bo, WANG Ting
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2016, 51 (9): 41-46.   DOI: 10.6040/j.issn.1671-9352.2.2015.245
    Abstract1613)      PDF(pc) (2130KB)(1719)       Save
    In the process of vulnerability detection, because of the limited physical device and closed operating system, we cant confirm and utilize the bug discovered by Fuzzing test in time. So this paper concentrated on embedded firmware and proposed a firmware vulnerability analysis and utilization method based on stain tracking. The method uses dynamic analysis technique in the simulation environment. With the help of this method, we could rapidly locate the exception position and trace back to the origin, then its possible to assess the corresponding solution rapidly. Furthermore, we did experiments on many devices such as router and IP camera and successfully utilized many 0day bugs on ARM and MIPS architecture. According to the results, the firmware vulnerability analysis and utilization method based on device simulation debugging is referable to vulnerability positioning and utilization of embedded firmware.
    Reference | Related Articles | Metrics
    Novel synthesis of C-terminal polypeptides by ISPPS method
    CHEN Lei, JIN Zhi, LIU Qiang, WANG Ming, WANG Pu*
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (1): 31-35.   DOI: 10.6040/j.issn.1671-9352.0.2013.235
    Abstract1219)      PDF(pc) (1456KB)(1680)       Save

    A facile approach for the preparation of polypeptide C-terminal derivatives by inverse solid phase peptide synthesis (ISPPS) was developed. This novel method combines both advantages of Fmoc-SPPS and TAEC technology, utilizes fewer functional group protection steps. In addition, the reaction can be carried out at room temperature under mild conditions and be easily monitored, and the working-up is simple and efficient. This method is complementary to the direct solid phase peptide synthesis. Several polypeptides as well as their C-terminal derivatives were efficiently prepared by this novel ISPPS method.

    Related Articles | Metrics
    HPLC separation of enantiomers of dracocephins A
    LI Chao, ZHAO Li-juan, ZHANG Yao, REN Dong-mei*
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (1): 36-38.   DOI: 10.6040/j.issn.1671-9352.0.2013.419
    Abstract1258)      PDF(pc) (1255KB)(1459)       Save

    To establish a direct enantioseparation method by HPLC on immobilized amylose-based chiral stationary phase for the chiral separation of the enantiomers of dracocephins A. The separation was carried out using a Chiralpak IA column (4.6mm×250mm, 5μm) in combination with n-hexane-ethyl acetate (10∶90) as mobile phase. The flow rate was 1.0mL·min-1 and detection wavelength was 290nm, whilst the column temperature was room temperature. The established chromatographic method was effective for the simultaneous separation of the two pairs of enantiomers of dracocephins A. The elution order was determined by coupling HPLC-CD detection and comparison with each single enantiomer. Immobilized amylosebased chiral stationary phase is suitable for the enantioseparation of dracocephins A.

    Related Articles | Metrics
    Remarks on n-strongly Gorenstein FP-injective modules
    CHEN Wen-jing, LIU Zhong-kui
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    DOI: 10.6040/j.issn.1671-9352.0.2013.562
    A LBS privacy-preserving method for geo-fencing services
    YANG Song-tao, MA Chun-guang, ZHOU Chang-li, ZHANG Zong-li
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (09): 69-73.   DOI: 10.6040/j.issn.1671-9352.2.2014.065
    Abstract1654)      PDF(pc) (1753KB)(2681)       Save
    Geo-fencing technology is widely used in recommender systems, advertising push and other services. It has serious risk of personal privacy leakage threat. Focus on triggered query in Geo-fencing, the theories of the secure tripartite computation were applied in the research of the LBS privacy-preserving model, which follows the concept of location obfuscation and location k-anonymity and reaches the target of user's identity unlink-ability and location's untraced-ability. Location anonymity hidden problem and secret authentication problem were solved by computational geometry techniques and principles of cryptography in the triggered queries scenario. Theoretical analysis shows the model is security. From the perspective of privacy-preserving, the attackers do not get new knowledge from LBS system. Experiments demonstrate the computational efficiency and communication loads of this medel are superior to the traditional spatial-temporal cloaking methods.
    Reference | Related Articles | Metrics
    The solution of the time-fractional model of heat transport in complex human tissue
    ZHAI Ru-kun, JIANG Xiao-yun
    J4    2012, 47 (6): 1-4.  
    Abstract1085)      PDF(pc) (816KB)(2115)       Save

    A fractional Pennes bioheat transfer equation is established. By applying the finite Fourier sine transformation, Laplace transformation and their corresponding inverse transforms, the analytic solution of the fractional Pennes bioheat transfer equation is obtained. And the expression in the form of generalized Mittag-Leffler function is given. Finally, the integer-order as a particular case is discussed.

    Related Articles | Metrics
    Research advances of novel nonlinear optical crystals based on second-order Jahn-Teller effects (SOJT)
    ZHANG Jun-jie, ZHANG Zhong-han, TAO Xu-tang*
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2011, 46 (10): 99-120.  
    Abstract2986)      PDF(pc) (5876KB)(2706)       Save

    Explorations of new inorganic second-order nonlinear optical (NLO) materials is one of the current frontier topics due to their optoelectronics application such as frequency shifting, optical modulating, telecommunications and signal processing. Since 1998, a series of noncentrosymmetric (NCS) and polar oxides containing cations susceptible to second-order Jahn-Teller (SOJT) distortions, specifically, octahedrally coordinated d0 transition metals (TMs: Mo6+,W6+,V5+,Nb5+,etc.) and cations with stereochemically active lone pairs (SCALP, e.g. I5+, Te4+, Se4+, Sn2+, etc.), were successfully synthesized. Many of these materials exhibit large powder second-harmonic generation (SHG) efficiencies (> 400×α-SiO2). This paper reviews the progress on the materials in the past decade, including the search for new materials and crystal growth. The materials are divided into three categories: NCS oxides containing one kind of SOJT cations (d0 or SCALP), NCS oxides containing both kinds of SOJT cations, and NCS oxides containing SOJT cations and other NCS building units such as borate πorbital systems, tetrahedral groups and d10 transition metal cations (Zn2+, Cd2+, Sn4+, etc.).

    Related Articles | Metrics
    A bilingual word alignment method of Vietnamese-Chinese based on deep neural network
    MO Yuan-yuan, GUO Jian-yi, YU Zheng-tao, MAO Cun-li, NIU Yi-tong
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2016, 51 (1): 77-83.   DOI: 10.6040/j.issn.1671-9352.3.2014.289
    Abstract1363)      PDF(pc) (1557KB)(1314)       Save
    It is difficult to achieve auto-alignment between Vietnamese and Chinese, because their syntax and structure are quite different. In this case, we present a novel method for the Vietnamese-Chinese word alignment based on DNN(deep neural network). Firstly, we should convert Vietnamese-Chinese bilingual word into word embedding, and as the input within DNN. Secondly, DNN-HMM word alignment model is constructed by expanding HMM model, which also integrating the context information. The basic model of the experiments are HMM and IBM4. The results of large-scale Vietnamese-Chinese bilingual word alignment task show that this method not only significantly improved its accuracy and recall rate than the two basic models, but also greatly reduced word alignment error rate.
    Reference | Related Articles | Metrics
    Application of the combination prediction model in forecasting the GDP of China
    J4    2009, 44 (2): 56-59.  
    Abstract1654)      PDF(pc) (246KB)(1652)       Save

    On  basis of the ARIMA model, mixedtime series model and GM(1,1) model,  a combination forecast model was established by using the Chinese economic development data, and the forecasted GDP of China was applied. The resulted show that the error of this combination prediction model is smaller than the other three models, and denoted that the combination prediction model in forecasting  the timeseries data is more advantageous.

    Related Articles | Metrics
    Research on totally sequential decision-model of two firms location and pricing based on Hotelling model
    XU Bing, ZHANG Yang
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2017, 52 (6): 1-9.   DOI: 10.6040/j.issn.1671-9352.0.2017.045
    Abstract1540)      PDF(pc) (1064KB)(1072)       Save
    It widely exists that firms enter the modern market sequentially. Based on Hotelling model, one decision-model of totally sequential entry with quadratic transportation cost was built to characterize the horizontal competition of two firms in a linear market that the leader makes price-decision after location-decision, and then the follower makes price-decision after location-decision. The analysis of two firms game shows that the follower has the advantage and gains more profits as a late-mover. The leader will locate at the end of market and chooses low-price strategy, while the follower will locate at the center of market and choose high-price strategy. The comparison of the decision-model of totally sequential entry, the game model of two firms making simultaneous decisions of location and price one after another, the game model that two firms simultaneously make location-decisions before they make price-decisions one after another, the game model that two firms make simultaneously price-decisions after their location-decisions were made simultaneously. It shows that the decisions of the first model and the second model are same, in which the prices and profits of two firms are lower than the following models. All four models cant realize the welfare-maximization of society. It needs “the visible hand” of government to regulate the behavior of firms.
    Reference | Related Articles | Metrics
    A Bayesian approach for variable selection using spike-and-slab prior distribution
    ZHANG Xian-you, LI Dong-xi
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2021, 56 (12): 84-93.   DOI: 10.6040/j.issn.1671-9352.0.2021.065
    Abstract2069)      PDF(pc) (621KB)(893)       Save
    For ultra-high dimensional data, a Bayesian approach using a novel spike-and-slab prior for variable selection in high-dimensional linear regression models is presented. The proposed method aims to inherit the advantages of the elastic net and the EM algorithm to obtain sparse prediction models with faster convergence speed. Furthermore, a spike-and-slab setting of coefficients which allows for borrowing strength across coordinates, adjust to data sparsity information and exert multiplicity adjustment is proposed. Finally, the accuracy and efficiency of the proposed method are demonstrated via comparisons and analyses with common methods.
    Reference | Related Articles | Metrics
    Synthesis and characterization of a novel coordination complex [Ni(Hpdc)(2,2’-bipy)(H2O)2]·H2O
    HAN Lu1, SHENG Dao-peng1, WEI Hui-ying1, YANG Yan-zhao1,2 *
    J4    2012, 47 (5): 9-12.  
    Abstract1734)      PDF(pc) (867KB)(1878)       Save

    The  compound, [Ni(Hpdc)(2,2’-bipy)(H2O)2]·H2O (H3pdc=3,5pyrazoledicarboxylic acid, 2,2’-bipy=2,2’-bipyridine), was prepared under hydrothermal conditions. The structure of the coordination complex was determined by Xray single crystal diffraction and characterized by elemental analysis, IR spectrum and thermogravimetric analysis. The coordination complex crystallized in the triclinic system, with space group Pī. The metal ion was located in the centre of a distorted octahedron. The Ni(II) ion was sixcoordinated with three oxygen atoms and three nitrogen atoms. The four molecules that built  up a cell unit were connected via hydrogen bonds while no π-π interactions were observed between aromatic rings.

    Related Articles | Metrics
    Fault tracing method of industrial production control data network based on SDG simplified model
    Yan-hua YANG,Li-gang YAO
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2020, 55 (11): 46-57.   DOI: 10.6040/j.issn.1671-9352.0.2020.353
    Abstract1078)   HTML84)    PDF(pc) (1763KB)(1137)       Save

    For the fault diagnosis and source tracing in industrial production control data network, this paper proposes a solution based on SDG simplified model. Firstly, a SDG model is established based on the structural characteristics of the industrial production control data network, then the search space for fault location is reduced through hierarchical and demarcated modeling method.On this basis, according to the observed signal amount extracted when the business alarm occurs, analyse the survival of the nodes based on the longitudinal data and survival data. Secondly, combined with the analysis of the characteristics of network faults, the single-node fault detemination method is used to determine whether each node device is faulty. Finally, based on the fault cause classification of the fault tracing database in the traceability diagnosis rules, the root cause of the network fault is determined. Through the test and verification method, the feasibility of the proposed method in the industrial production control data network is verified, which can meet the requirements of rapid fault tracing.

    Table and Figures | Reference | Related Articles | Metrics
    Studies on roots characteristics and correlations between the aerial and underground parts of Populus clones
    ZHAO Jian-cheng1, CAO Bang-hua1*, WU Li-yun2, ZHAO Pei1, HOU Rui1, NIU Qing-lin1
    J4    2013, 48 (11): 7-13.  
    Abstract873)      PDF(pc) (2187KB)(1252)       Save

    A field experiment was conducted to investigate the roots characteristics and the correlations between the aboveground and underground parts of 20 Populus clones. The results showed that their root systems are mainly concentrated in 0~50cm soil layer, the root system is given priority to with horizontal root, vertical root basic disappearance, adventitious roots of small Angle, with the ground close to the level.Zhongzhu 1, NL 351, T 26 and zhongzhu 6 had larger total length of adventitious roots and zhongzhu 1, zhongzhu 6, NL 351 and I 107 adventitious roots in the total quantity is more which the ground diameter under 2cm accounted for 60%~80% of total number of adventitious roots. The growth indexes between the aerial and underground parts, exists significant correlation relationship, such as height, crown diameter, root weight and root length. The root/shoot ratio ranged from 0.23 to 0.45. The root length per unit shoot weight differences is bigger, the biggest for T26, the smallest for zhonghe 1. The root absorption efficiency was significantly negative correlated with the root/shoot ratio and the root length per unit shoot weigh, known as root redundancy. By cluster analysis, 20 Populus clones were divided into 3 groups and 6 categories at similarity coefficient 1.3. The results may provide a theoretical basis for further breeding improved clones of poplar and management.

    Related Articles | Metrics
    Short text clustering based on word embeddings and EMD
    HUANG Dong, XU Bo, XU Kan, LIN Hong-fei, YANG Zhi-hao
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2017, 52 (7): 66-72.   DOI: 10.6040/j.issn.1671-9352.1.2016.123
    Abstract1624)      PDF(pc) (1207KB)(1722)       Save
    Short text clustering plays an important role in data mining. The traditional short text clustering model has some problems, such as high dimensionality、sparse data and lack of semantic information. To overcome the shortcomings of short text clustering caused by sparse features、semantic ambiguity、dynamics and other reasons, this paper presents a feature based on the word embeddings representation of text and short text clustering algorithm based on the moving distance of the characteristic words. Initially, the word embeddings that represents semantics of the feature word was gained through training in large-scale corpus with the Continous Skip-gram Model. Furthermore, use the Euclidean distance calculation feature word similarity. Additionally, EMD(Earth Movers Distance)was used to calculate the similarity between the short text. Finally, apply the similarity between the short text to Kmeans clustering algorithm implemented in the short text clustering. The evaluation results on three data sets show that the effect of this method is superior to traditional clustering algorithms.
    Reference | Related Articles | Metrics
    Study and application of CAD technology in grade crossing vertical design
    WANG Gui-Jie, WANG Wen-De, TAO De-Li
    J4    2009, 44 (11): 79-82.  
    Abstract1282)      PDF(pc) (1883KB)(2925)       Save

    he advantages and disadvantages are analysed on the basis of the grade crossing vertical design. Based on these design methods and computer aided design(CAD)technology,grid and contour line construction drawings are given by auto draft.Design results could be checked by the threedimensional Surface model based on the grids data and the threedimensional panoramic dynamic perspective picture.Finally, as certification, some road grade crossing engineering cases which are designed by these methods and CAD technology are presented.

    Related Articles | Metrics
    A globally convergent conjugate gradient method with Armijo line search
    ZHENG Xiu-yun, SHI Jia-rong
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2017, 52 (1): 98-101.   DOI: 10.6040/j.issn.1671-9352.0.2016.154
    Abstract1679)      PDF(pc) (766KB)(945)       Save
    By modifying the search direction, a sufficient descent conjugate gradient method was proposed for solving unconstrained optimization problems. The proposed method can generate sufficient descent directions at each iteration without any line search. The global convergence of the proposed method was proved under Armijo line search. Some numerical experiments show that the proposed method is promising.
    Reference | Related Articles | Metrics
    Probabilistic q-rung hesitant fuzzy TODIM method and its application
    Yu ZHOU,Ligang ZHOU,Zhichao LIN,Xin XU
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2023, 58 (6): 9-17.   DOI: 10.6040/j.issn.1671-9352.0.2022.260
    Abstract345)   HTML0)    PDF(pc) (931KB)(414)       Save

    To measure differences in probabilistic q-rung hesitant fuzzy information, a novel measure of the probabilistic q-rung hesitant fuzzy distance is proposed based on the score function and overall hesitancy. The properties of this measure are discussed. A probabilistic q-rung hesitant fuzzy TODIM method is proposed based on the new distance measure. Finally, a practical example is presented to illustrate the reasonableness and effectiveness of the proposed method, and a sensitivity analysis is performed.

    Table and Figures | Reference | Related Articles | Metrics
    N-shortest paths retrieval algorithm based on artificial immunity
    WANG Feng, MAN Yuan, WANG Xing-le
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2017, 52 (9): 35-40.   DOI: 10.6040/j.issn.1671-9352.1.2015.048
    Abstract1160)      PDF(pc) (1070KB)(763)       Save
    To solve the N-shortest paths retrieval problem, the implementations of traditional approaches are complicated and often cost large computational resources. To address these concerns, a novel retrieval algorithm based on artificial immunity was proposed. The problem was solved through the immune evolutionary process of antibody population, by borrowing the diversity of antibody, clone selection, hyper-mutation, immune memory from immune system and information feedback mechanism from ant colony algorithm. Experiments were conducted on different data sets, compared with traditional Yen method and Dijkstra-based method. Experimental results show that the proposed algorithm can obtain the global best paths set with high success rate and good time performance. It is insensitive to the size and structure of graphs as well as the number of paths to be solved.
    Reference | Related Articles | Metrics
    Sentiment classification method of Chinese Micro-blog based on semantic analysis
    YANG Jia-neng, YANG Ai-min, ZHOU Yong-mei
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2014, 49 (11): 14-21.   DOI: 10.6040/j.issn.1671-9352.3.2014.069
    Abstract1829)      PDF(pc) (1943KB)(2818)       Save
    By analyzing the structural features of Chinese Micro-blog, a sentiment classification method based on semantic analysis was proposed. For the proposed method, firstly, an emoticons sentiment lexicon and a network language sentiment lexicon were built. Then by using these two lexicons and the dependency parsing results, the sentiment expression Binary Tree was constructed. Finally, the sentiment strength, which was calculated by the established rules, was applied into the sentiment classification. Experimental results show that this method is effective and two built sentiment lexicons can better enhance the performance of the sentiment analysis system.
    Reference | Related Articles | Metrics
    The supremum and infimum of partially ordered objects in a topos
    LU Tao, WANG Xi-juan, HE Wei
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2016, 51 (4): 112-117.   DOI: 10.6040/j.issn.1671-9352.0.2015.430
    Abstract1239)      PDF(pc) (863KB)(1361)       Save
    The concepts of supremum and infimum which are common generalizations of lattice theory is introduced, and some well-known lattice theory into an arbitrary topos is lifted. The main result that an object in a topos is a complete partially ordered object if and only if its general subset has supremum and infimum is obtianed.
    Reference | Related Articles | Metrics
    α-skew Armendariz rings relative to a monoid
    GENG Dao-hong, WANG Yao, REN Yan-li
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2016, 51 (2): 1-5.   DOI: 10.6040/j.issn.1671-9352.0.2015.213
    Abstract1025)      PDF(pc) (690KB)(878)       Save
    The concept of α-skew M-Armendariz rings is introduced. The relationship between α-skew M-Armendariz rings and related rings is investigated, and it is proved that the skew monoid ring extension of a Baer ring(right p.p.-ring, right zip ring)is a Baer ring(right p.p.-ring, right zip ring)in case the ring is an α-skew M-Armendariz.
    Reference | Related Articles | Metrics
    Measuring user influence of a microblog based on information diffusion
    GUO Hao, LU Yu-liang, WANG Yu, ZHANG Liang
    J4    2012, 47 (5): 78-83.  
    Abstract1160)      PDF(pc) (832KB)(2805)       Save

    Information diffusion and influence modeling are hot topics in microblog research. To do research on influence quantitatively, a concept based on the message diffusion was introduced and complied with how to count it out. The proposed approach was validated on real world datasets, and the result of experiments shows that our method is both effective and stable, especially in condition of limited dataset and time span.

    Related Articles | Metrics
    The digraphs representation of finite topologies
    MA Hai-cheng, LI Sheng-gang
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2017, 52 (4): 100-104.   DOI: 10.6040/j.issn.1671-9352.0.2016.362
    Abstract1076)      PDF(pc) (1209KB)(1040)       Save
    A digraph which is called topology graph is defined for each finite topology space. First, an equivalence relation between elements is defined, and then, the equivalence classes is came into being. These digraphs is defined by using the inclusion relation between equivalence classes. Topological space and its topology graph to determine each other is proved. It is easy to calculate the closure, the derived set, the interior and border of a set by using the topology graph. The connectedness consistent of the topological space and its topology graph is proved. The number of non-homeomorphism topology with 1≤n≤4 elements is calculated by using the topology graph.
    Reference | Related Articles | Metrics
    Deep representative learning based sentiment analysis in the cross-lingual environment
    YU Chuan-ming, FENG Bo-lin, TIAN Xin, AN Lu
    JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE)    2018, 53 (3): 13-23.   DOI: 10.6040/j.issn.1671-9352.0.2017.064
    Abstract1755)      PDF(pc) (1135KB)(1100)       Save
    Transfer learning focuses on solving the problem that it is difficult for supervised learning to obtain good classification results with the small training sets. Compared with the traditional supervised methods, it does not require the training and testing sets follow the same or similar data distributions. The model can be trained on the language which has rich data and labeling resources(source language), and the source and target language documents can be projected into the same feature space. In this way the large data from the source domain or language can be leveraged to solve the low performance problem in the target language. The reviews of three product categories, i.e. books, DVD and music, from Amazon, which are written in Chinese, English and Japanese, are collected as the experimental data. A novel model, i.e. the Cross Lingual Deep Representation Learning(CLDRL)is proposed and empirical study is conducted upon the experimental data. From the experimental results, it shows that the best performance of CLDRL achieves 78.59%, which prove the effectiveness of the proposed model.
    Reference | Related Articles | Metrics