East China University of Technology

Fuzhou, China
Time filter
Source Type

Wang Q.,East China University of Technology | Liu A.,East China University of Technology | Xiao J.,East China University of Technology
Computers and Industrial Engineering | Year: 2017

The aim of this paper is to point out that all mathematical programming models proposed by Ying et al. (2016) are incorrect. We present four revised mathematical programming models and four improved mathematical programming models by adding and revising some constraints and decision variables. Moreover, we show that the first three scheduling problems considered in their paper are equivalent to the problems with the objective of minimizing the sum of completion times or minimizing the maximum lateness, which can be solved by algorithms proposed by Luo et al. (2015) in O(n2) time. © 2017 Elsevier Ltd

Li G.,Beijing Institute of Technology | Liu M.,Hunan University | Sethi S.P.,University of Texas at Dallas | Xu D.,East China University of Technology
International Journal of Production Economics | Year: 2017

Parallel machine structure is very common in modern production systems. Its performance sometimes has a decisive impact on the whole productivity. In this paper, we consider a parallel-machine scheduling problem where each machine is subject to periodic maintenance. Instead of assuming all the machines have the same maintenance periodic cycle, we assume the maintenance periodic cycles are machine-dependent. The objective is to schedule all the jobs to the machines such that the makespan is minimized. We first provide computational complexity and non-approximability analyses of the problem and then present two mathematical programming models to tackle small-sized instances. Thereafter, we present a worst-case analysis of the classical LPT and LS algorithms for the problem. Then we propose two improved heuristic algorithms based on some observations of large-sized instances. In order to evaluate the performance of the heuristic algorithms, we resort to a lower bound of the optimal makespan, and find that it has a very interesting characteristic. Numerical experiments show that the improved heuristic algorithm MLPT improves the objective value of the LPT schedule by about 6.75% on average and that the MLPT heuristic algorithm has an average-case relative error less than 1.57% for all combinations of instances, which means that it is very suitable for real world applications. © 2017 Elsevier B.V.

Chen J.,East China University of Technology | Dai S.,East China University of Technology
Proceedings - 2016 9th International Symposium on Computational Intelligence and Design, ISCID 2016 | Year: 2017

In this paper a new dynamic graph encoding scheme based on hybrid encoding between radix-k encoding enumeration, permutation graph coding and PPCT encoding enumeration is proposed for improving the low efficiency of PPCT dynamic graph encoding. In order to improve the efficiency of PPCT, the method that the pointer of circular linked list is used to encode the coefficients in radix-k encoding enumeration to PPCT encoding enumeration is applied. On the SandMark experimental platform, the data rate and robustness of the watermark are increased without affecting the PPCT data structure and its anti attack. © 2016 IEEE.

Zhang H.,Zhejiang University of Technology | Luo Y.-Y.,East China University of Technology
Meitan Xuebao/Journal of the China Coal Society | Year: 2012

Under the guidance of the simulation of antigen-antibody recognition in biological mechanisms of the immune system, based on the artificial immune algorithm, a prediction model for slope stability was introduced. The slope stability sample set was defined as antigen set, and the influence factors of slope stability were defined as the antibody. Through reiteration of genetic manipulation on the antigen gene segment, the antibody set that can perform slope stability well was developed. The affinity between prediction sample set and antibody set were calculated, and the KNN algorithm was used to predict the sample stability. The self-adaptive artificial immune algorithm was also employed to improve the model effectiveness and reliability. The case study confirms that self-adaptive artificial immune algorithm has a more accurate prediction than basic artificial immune algorithm, proving that the self-adaptive approach is effective. The new method can avoid from building complex non-linear function between influence factors and stability, effectively reduce the modeling complexity and has better adaptability.

Yang Z.,Jiangsu Xuzhou Construction Machinery Research Institute | Shi D.,East China University of Technology | Wen B.,Yanshan University | Melnik R.,Wilfrid Laurier University
Journal of Alloys and Compounds | Year: 2012

Structural, elastic and electronic properties, as well as heats of formation, of seven Ca-Zn intermetallic compounds have been studied by using first principles methods. It was found that with increasing Zn concentration, the bulk moduli and shear moduli of Ca-Zn intermetallic compounds increase monotonically. Our results also indicate that Ca 3Zn, Ca 5Zn 3, and CaZn are ductile, while CaZn 2, CaZn 5, CaZn 11, and CaZn 13 are brittle. Furthermore, calculations of the electronic properties and heats of formation indicate that seven Ca-Zn intermetallic compounds, considered in this work, are all conductors and thermodynamically stable. © 2012 Elsevier B.V.

Bi Z.,Shanghai University of Electric Power | Shan M.,East China University of Technology
Journal of Information and Computational Science | Year: 2012

Dependency theory is a very important concept in relational database, and has been used to repair the inconsistent data. Functional dependencies and inclusion dependencies are two main dependencies to model the data schema. Recently, there has been some new interest in dependencies to extend traditional dependencies, such as conditional functional dependencies and conditional inclusion dependencies. This paper revisits the traditional dependencies and some new advances in dependencies, and introduces the complexity result of satisfiability and implication problem of different dependencies. Finally, we outline some open research issue about dependencies in data repair. © 2012 by Binary Information Press.

Tan H.,Zhejiang University | Wu J.,Zhejiang University | Huang D.,East China University of Technology | Gao C.,Zhejiang University
Macromolecular Bioscience | Year: 2010

PLLA microspheres were aminolyzed in hexanediamine/propanol solution to introduce free amino groups on their surface, which were further transferred into aldehyde groups by a treatment of glutaraldehyde. Chitosan-graft-lactose was then covalently coupled via Schiff base formation. Morphological variation and chitosan-graft-lactose immobilization were characterized. In vitro culture of rabbit auricular chondrocytes demonstrated that the PLLA microcarriers could effectively support the cell attachment and particularly induce cell aggregation on their surface. The formed cell aggregates/microcarriers composite showed higher viability and extracellular matrix production. Thus, the PLLA microcarriers can be potentially used as an injectable delivery system for cartilage repair. (Figure Presented) © 2010 WILEY-VCH Verlag GmbH & Co. KGaA.

Shan M.J.,East China University of Technology
Advanced Materials Research | Year: 2014

In this paper we construct model in computer forensics by using Benford's Law, which is one of three famous laws in statistics in linguistics. Especially, we use Benford's Law to analyze data in file analysis and Anomaly detection. We illustrate that Benford's Law is able to supply the strategy for data analysis. The future work, Benford's Law will be the theoretical rule for intelligent compression of mass data. © (2014) Trans Tech Publications, Switzerland.

Nobes D.C.,East China University of Technology
Proceedings of 2016 16th International Conference of Ground Penetrating Radar, GPR 2016 | Year: 2016

Much work, some quite complex, has been expended on experiments and modelling for imaging voids using ground penetrating radar (GPR). However, much can be learned from simple models. For example, a simple Ricker wavelet model can be used to illustrate some fundamental properties of the GPR response from voids, both air- and water-filled. In particular, reflections from the top and the bottom of a void can overlap to a significant extent. Thus, one characteristic of the void response is the occurrence of a 'bright spot', analogous to the 'bright spot' observed in seismic exploration for gas. For time delays equal to about half the pulsewidth, the reflected wavelets superimpose to yield maximum reflection amplitudes, significantly greater than individual wavelet amplitudes. The wavelet reflected from the top of a void is not completely separated from the wavelet reflected from the bottom of the void until the time delay due to the void exceeds twice the wavelet pulsewidth. However, the two wavelets can be individually identified at earlier time delays, approximately equal to the wavelet pulsewidth. This is still substantial, and explains why it is difficult to image voids, especially air-filled voids, and to use GPR to infer void thicknesses. © 2016 IEEE.

Shan M.J.,East China University of Technology
Applied Mechanics and Materials | Year: 2014

This paper studies Mobile Payment App from Mobile payment and Application. We analyze the data security risks hidden in this payment model. Give the corresponding solutions. Finally, look forward the research direction of Mobile Payment App security. © (2014) Trans Tech Publications, Switzerland.

Loading East China University of Technology collaborators
Loading East China University of Technology collaborators