Vol.53 (ACE 2014), pp.218-223

نویسندگان

  • Tao Liu
  • Xuan Xiao
  • Donglan Ying
چکیده

To understand how land has transformed kiln in ancient Jingdezhen DongHe River Basin from the Yuan Dynasty to the Ming Dynasty, we create virtual maps of ancient study area and present such concepts that unambiguously realize a combination model. In this model, Model parameters and neighborhood rules are obtained with the cellular automata model melt Particle Swarm Optimization algorithm. Meanwhile, model performance is evaluated using Moran’s I index estimation for selected landscape pattern indices and make a comparative analysis of different evolution with different number of candidate site and different conversion threshold. In overall, the model that we propose is effective and feasible in simulating kiln landscape evolution in ancient when Geographic Information and System information are lacking.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fiftieth Annual List of Papers

Agnew, R. P. Some remarks on a paper entitled General Tauberian theorems." Read April 27, 1940. Journal of the London Mathematical Society, vol. 15, no. 4 (Oct., 1940), pp. 242-246. Tauberian conditions. Read Feb. 24, 1940. Annals of Mathematics, (2), vol. 42, no. 1 (Jan., 1941), pp. 293-308. On methods of summability and mass f unctions determined by hyper geometric coefficients. Read Jan. 1, ...

متن کامل

Ucsd Ece 255

[1] J. P. M. Schalkwijk, “The binary multiplying channel—A coding scheme that operates beyond Shannon’s inner bound region,” IEEE Trans. Inf. Theory, vol. 28, pp. 107–110, January 1982. [2] J. P. M. Schalkwijk, “On an extension of an achievable rate region for the binary multiplying channel,” IEEE Trans. Inf. Theory, vol. 29, pp. 445–448, May 1983. [3] Z. Zhang, T. Berger, and J. P. M. Schalkwi...

متن کامل

Analysis of improved signcryption scheme with key privacy

In this paper, we analyse the Yang–Wong–Deng signcryption scheme [G. Yang, D.S. Wong, X. Deng, Analysis and improvement of a signcryption scheme with key privacy, in: Information Security Conference—ISC’05, in: Lecture Notes in Comput. Sci., vol. 3650, Springer-Verlag, Berlin, 2005, pp. 218–232] proposed in ISC’05, which is the improvement and enhancement of the security of Libert–Quisquater si...

متن کامل

Anticipatory iterative learning control for nonlinear systems with arbitrary relative degree

[14] G. De Nicolao, L. Magni, and R. Scattolini, “Stabilizing receding-horizon control of nonlinear time-varying systems,” IEEE Trans. Automat. Contr., vol. 43, pp. 1030–1036, July 1998. [15] T. Parisini and R. Zoppoli, “A receding horizon regulator for nonlinear systems and a neural approximation,” Automatica, vol. 31, pp. 1443–1451, 1995. [16] J. A. Primbs, V. Nevistić, and J. C. Doyle, “A re...

متن کامل

Comments on "A shaped reflector antenna for 60-GHz indoor wireless LAN access points" [and reply]

[3] T. S. Rappaport, Wireless Communications: Principles and Practice. Englewood Cliffs, NJ: Prentice-Hall, 1996. [4] M.-S. Alouini and A. Goldsmith, “A unified approach for calculating the error rates of linearly modulated signals over generalized fading channels,” IEEE Trans. Commun., vol. 47, pp. 1324–1334, Sept. 1999. [5] M. K. Simon and M.-S. Alouini, “A unified approach for the probabilit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014