oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 1 )

2019 ( 120 )

2018 ( 815 )

2017 ( 770 )

Custom range...

Search Results: 1 - 10 of 58276 matches for " Feng Hu "
All listed articles are free for downloading (OA Articles)
Page 1 /58276
Display every page Item
Moment bounds for IID sequences under sublinear expectations
Feng Hu
Mathematics , 2011, DOI: 10.1007/s11425-011-4272-z
Abstract: In this paper, with the notion of independent identically distributed (IID) random variables under sublinear expectations introduced by Peng [7-9], we investigate moment bounds for IID sequences under sublinear expectations. We can obtain a moment inequality for a sequence of IID random variables under sublinear expectations. As an application of this inequality, we get the following result: For any continuous function $\phi$ satisfying the growth condition $|\phi(x)|\leq C(1+|x|^p)$ for some $C>0$, $p\geq1$ depending on $\phi$, central limit theorem under sublinear expectations obtained by Peng [8] still holds.
General laws of large numbers under sublinear expectations
Feng Hu
Mathematics , 2011,
Abstract: In this paper, under some weaker conditions, we give three laws of large numbers under sublinear expectations (capacities), which extend Peng's law of large numbers under sublinear expectations in [8] and Chen's strong law of large numbers for capacities in [1]. It turns out that these theorems are natural extensions of the classical strong (weak) laws of large numbers to the case where probability measures are no longer additive.
An Improved Chirplet Transform and Its Application for Harmonics Detection  [PDF]
Guo-Sheng Hu, Feng-Feng Zhu
Circuits and Systems (CS) , 2011, DOI: 10.4236/cs.2011.23016
Abstract: The chirplet transform is the generalization form of fast Fourier transform , short-time Fourier transform, and wavelet transform. It has the most flexible time frequency window and successfully used in practices. However, the chirplet transform has not inherent inverse transform, and can not overcome the signal reconstructing problem. In this paper, we proposed the improved chirplet transform (ICT) and constructed the inverse ICT. Finally, by simulating the harmonic voltages, The power of the improved chirplet transform are illustrated for harmonic detection. The contours clearly showed the harmonic occurrence time and harmonic duration.
Study on the Authenticity of Intangible Cultural Heritage
—Take Guangdong Nanhai Boluodan Temple Fair as an Example
 [PDF]

Jun Hu, Xiaona Feng, Mu Zhang
Open Journal of Social Sciences (JSS) , 2015, DOI: 10.4236/jss.2015.39035
Abstract: Authenticity is a difficult academic problem in the tourism. The authenticity of the cultural heritage represents the value and appeal of heritage. With the acceleration of intangible cultural heritage (ICH) tourism development, scholars have been calling for protecting the authenticity of ICH at the same time of the development of ICH. What is the authenticity of the content in the end and how to protect are lack of being studied. Thus, the aim of this study is to research through reviewing literatures and finding characteristics of ICH, to examine the means and differences of tourists’ perception about the authenticity of ICH, so as to achieve the goal of protecting and developing ICH better. The study investigated tourists with the experience of visiting Bo Luo Dan Festival temple, and used SPSS to carry on the quota date statistical analysis. This study researched the main factors which affected the perceived of authenticity, and the relationship between the factors and satisfaction. The study got two core factors that had an impact on perceived authenticity, and told that there was a significant positive impact between the authenticity of ICH and the satisfaction of ICH tourism.
Knowledge Reduction Based on Divide and Conquer Method in Rough Set Theory
Feng Hu,Guoyin Wang
Mathematical Problems in Engineering , 2012, DOI: 10.1155/2012/864652
Abstract: The divide and conquer method is a typical granular computing method using multiple levels of abstraction and granulations. So far, although some achievements based on divided and conquer method in the rough set theory have been acquired, the systematic methods for knowledge reduction based on divide and conquer method are still absent. In this paper, the knowledge reduction approaches based on divide and conquer method, under equivalence relation and under tolerance relation, are presented, respectively. After that, a systematic approach, named as the abstract process for knowledge reduction based on divide and conquer method in rough set theory, is proposed. Based on the presented approach, two algorithms for knowledge reduction, including an algorithm for attribute reduction and an algorithm for attribute value reduction, are presented. Some experimental evaluations are done to test the methods on uci data sets and KDDCUP99 data sets. The experimental results illustrate that the proposed approaches are efficient to process large data sets with good recognition rate, compared with KNN, SVM, C4.5, Naive Bayes, and CART.
6-Methyl-N-(2-methylphenyl)-3-phenyl-1,6-dihydro-1,2,4,5-tetrazine-1-carboxamide. Corrigendum
Feng Xu,Weixiao Hu
Acta Crystallographica Section E , 2010, DOI: 10.1107/s160053680903013x
Abstract: The formula of the title compound in the paper by Xu & Hu [Acta Cryst. (2008), E64, o1432] is corrected.
6-Methyl-N-(2-methylphenyl)-3-phenyl-1,6-dihydro-1,2,4,5-tetrazine-1-carboxamide
Feng Xu,Weixiao Hu
Acta Crystallographica Section E , 2008, DOI: 10.1107/s1600536808020199
Abstract: In the title compound, C17H16N5O, the central tetrazine ring adopts an unsymmetrical boat conformation with the two C atoms as flagpoles. This compound can be considered as having homoaromaticity. The crystal structure is stabilized by intermolecular C—H...O interactions between a benzene H atom and the carbonyl O atom.
Description of two new Stenohya species from China (Pseudoscorpiones, Neobisiidae)
Junfang Hu,Feng Zhang
ZooKeys , 2012, DOI: 10.3897/zookeys.213.2237
Abstract: Two new species of the genus Stenohya Beier, 1967 are described from China: Stenohya pengae sp. n. (male and female; type locality Daming Mountain, Nanning City, Guangxi Zhuang Autonomous Region) and S. huangi sp. n. (female; type locality Gushan Mountain, Fuzhou City, Fujian Prov.). The presence of S. pengae sp. n. in the tree crown of Castanopsis fabri represents a new habitat for Neobisiidae. A key and a distribution map of the Chinese Stenohya species are also provided.
Next Generation Campus Network Deployment Project Based on Softswitch
HU Feng,LIU Ziyan
International Journal of Wireless and Microwave Technologies , 2011, DOI: 10.5815/ijwmt.2011.04.07
Abstract: After analyzing the current networks of Guizhou University,we brought forward a scheme of next generation campus networks based on softswitch technology by choosing SoftX3000 switching system of HuaWei and provided the specific solution of accessing campus networks in this paper. It is proved that this scheme is feasible by using OPNET, which not only accomplished the integration of the PSTN and IP networks but also achieved the combining of voice services and data services.
A New Proof of Central Limit Theorem for i.i.d. Random Variables
Zhaojun Zong,Feng Hu
Abstract and Applied Analysis , 2013, DOI: 10.1155/2013/294910
Abstract: Central limit theorem (CLT) has long and widely been known as a fundamental result in probability theory. In this note, we give a new proof of CLT for independent identically distributed (i.i.d.) random variables. Our main tool is the viscosity solution theory of partial differential equation (PDE). 1. Introduction Central limit theorem (CLT) has long and widely been known as a fundamental result in probability theory. The most familiar method to prove CLT is to use characteristic functions. To a mathematician having been already familiar with Fourier analysis, the characteristic function is a natural tool, but to a student of probability or statistics, confronting a proof of CLT for the first time, it may appear as an ingenious but artificial device. Thus, although knowledge of characteristic functions remains indispensable for the study of general limit theorems, there may be some interest in an alternative way of attacking the basic normal approximation theorem. Indeed, due to the importance of CLT, there exist the numerous proofs of CLT such as Stein’s method and Lindeberg’s method. Let us mention the contribution of Lindeberg [1] which used Taylor expansions and careful estimates to prove CLT. For more details of the history of CLT and its proofs, we can see Lindeberg [1], Feller [2, 3], Adams [4], Billingsley [5], Dalang [6], Dudley [7], Nourdin and Peccati [8], Ho and Chen [9], and so on. Recently, motivated by model uncertainties in statistics, finance, and economics, Peng [10, 11] initiated the notion of independent identically distributed random variables and the definition of -normal distribution. He further obtained a new CLT under sublinear expectations. In this note, inspired by the proof of Peng’s CLT, we give a new proof of the classical CLT for independent identically distributed (i.i.d.) random variables. Our proof is short and simple since we borrow the viscosity solution theory of partial differential equation (PDE). 2. Preliminaries In this section, we introduce some basic notations, notions, and propositions that are useful in this paper. Let denote the class of bounded functions satisfying for some depending on ; let denote the class of continuous functions ; let denote the class of bounded and -time continuously differentiable functions with bounded derivatives of all orders less than or equal to on and -time continuously differentiable functions with bounded derivatives of all orders less than or equal to on . Let be a random variable with distribution function , so that, for any , If is any function in , the mathematical
Page 1 /58276
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.