期刊文献+
共找到2,436篇文章
< 1 2 122 >
每页显示 20 50 100
Data Gathering in Wireless Sensor Networks Via Regular Low Density Parity Check Matrix 被引量:1
1
作者 Xiaoxia Song Yong Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期83-91,共9页
A great challenge faced by wireless sensor networks(WSNs) is to reduce energy consumption of sensor nodes. Fortunately, the data gathering via random sensing can save energy of sensor nodes. Nevertheless, its randomne... A great challenge faced by wireless sensor networks(WSNs) is to reduce energy consumption of sensor nodes. Fortunately, the data gathering via random sensing can save energy of sensor nodes. Nevertheless, its randomness and density usually result in difficult implementations, high computation complexity and large storage spaces in practical settings. So the deterministic sparse sensing matrices are desired in some situations. However,it is difficult to guarantee the performance of deterministic sensing matrix by the acknowledged metrics. In this paper, we construct a class of deterministic sparse sensing matrices with statistical versions of restricted isometry property(St RIP) via regular low density parity check(RLDPC) matrices. The key idea of our construction is to achieve small mutual coherence of the matrices by confining the column weights of RLDPC matrices such that St RIP is satisfied. Besides, we prove that the constructed sensing matrices have the same scale of measurement numbers as the dense measurements. We also propose a data gathering method based on RLDPC matrix. Experimental results verify that the constructed sensing matrices have better reconstruction performance, compared to the Gaussian, Bernoulli, and CSLDPC matrices. And we also verify that the data gathering via RLDPC matrix can reduce energy consumption of WSNs. 展开更多
关键词 data gathering regular low density parity check(RLDPC) matrix sensing matrix signal reconstruction wireless sensor networks(WSNs)
下载PDF
A Spatialization-based Method for Checking and Updating Metadata
2
作者 ZHAO Ren-liang WANG Dong-hua +3 位作者 SHI Li-hong ZHANG Bei-fei SHANG Yao-ling WANG Zhong-xiang 《Journal of China University of Mining and Technology》 2005年第3期183-186,共4页
In this paper the application of spatialization technology on metadata quality check and updating was dis-cussed. A new method based on spatialization was proposed for checking and updating metadata to overcome the de... In this paper the application of spatialization technology on metadata quality check and updating was dis-cussed. A new method based on spatialization was proposed for checking and updating metadata to overcome the defi-ciency of text based methods with the powerful functions of spatial query and analysis provided by GIS software. Thismethod employs the technology of spatialization to transform metadata into a coordinate space and the functions ofspatial analysis in GIS to check and update spatial metadata in a visual environment. The basic principle and technicalflow of this method were explained in detail, and an example of implementation using ArcMap of GIS software wasillustrated with a metadata set of digital raster maps. The result shows the new method with the support of interactionof graph and text is much more intuitive and convenient than the ordinary text based method, and can fully utilize thefunctions of GIS spatial query and analysis with more accuracy and efficiency. 展开更多
关键词 METAdata data quality checking SPATIALIZATION spatial analysis
下载PDF
A Data Transmission Method Using a Cyclic Redundancy Check and Inaudible Frequencies
3
作者 Myoungbeom Chung 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期32-36,共5页
This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of ... This paper describes a data transmission method using a cyclic redundancy check and inaudible frequencies.The proposed method uses inaudible high frequencies from 18 k Hz to 22 k Hz generated via the inner speaker of smart devices.Using the proposed method,the performance is evaluated by conducting data transmission tests between a smart book and smart phone.The test results confirm that the proposed method can send 32 bits of data in an average of 235 ms,the transmission success rate reaches 99.47%,and the error detection rate of the cyclic redundancy check is0.53%. 展开更多
关键词 Cyclic redundancy check data transmission method high frequency inaudible frequencies
下载PDF
Check Point取得全面收购Protect Data的所需股权份额
4
《电子与电脑》 2007年第3期108-108,共1页
在互联网安全保护领域首屈一指的Check Point软件技术有限公司在2007年1月22日宣布,它已经收购了Protact Data约92.4%的股权,Check Point将继续以每股187瑞典克朗的价格,收购市场上剩余的Protect Date股份,并继续尽快进行一项强迫... 在互联网安全保护领域首屈一指的Check Point软件技术有限公司在2007年1月22日宣布,它已经收购了Protact Data约92.4%的股权,Check Point将继续以每股187瑞典克朗的价格,收购市场上剩余的Protect Date股份,并继续尽快进行一项强迫性的剩余股份及认股权证赎回计划,以便生面完成收购工作。 展开更多
关键词 check POINT 收购 安全保护 软件技术 互联网 剩余 Protact data
下载PDF
Censored Composite Conditional Quantile Screening for High-Dimensional Survival Data
5
作者 LIU Wei LI Yingqiu 《应用概率统计》 CSCD 北大核心 2024年第5期783-799,共17页
In this paper,we introduce the censored composite conditional quantile coefficient(cC-CQC)to rank the relative importance of each predictor in high-dimensional censored regression.The cCCQC takes advantage of all usef... In this paper,we introduce the censored composite conditional quantile coefficient(cC-CQC)to rank the relative importance of each predictor in high-dimensional censored regression.The cCCQC takes advantage of all useful information across quantiles and can detect nonlinear effects including interactions and heterogeneity,effectively.Furthermore,the proposed screening method based on cCCQC is robust to the existence of outliers and enjoys the sure screening property.Simulation results demonstrate that the proposed method performs competitively on survival datasets of high-dimensional predictors,particularly when the variables are highly correlated. 展开更多
关键词 high-dimensional survival data censored composite conditional quantile coefficient sure screening property rank consistency property
下载PDF
EpiData用于数据管理逻辑核查功能的实现 被引量:15
6
作者 郭郡浩 刘玉秀 蔡辉 《中国临床药理学与治疗学》 CAS CSCD 2008年第5期541-544,共4页
目的:探讨借助EpiData软件实现药物临床试验数据管理逻辑核查以保证数据正确性的有效手段。方法:应用EpiData提供的CHECK命令和WRITENOTE命令,产生变量核查法和记录核查法两种逻辑核查方法,对数据库中的数据进行可靠性检验。变量核查法... 目的:探讨借助EpiData软件实现药物临床试验数据管理逻辑核查以保证数据正确性的有效手段。方法:应用EpiData提供的CHECK命令和WRITENOTE命令,产生变量核查法和记录核查法两种逻辑核查方法,对数据库中的数据进行可靠性检验。变量核查法是以数据库中的变量为单位进行逻辑核查,记录核查法是以数据库中的记录为单位进行逻辑核查。结果:两种逻辑核查方法均能核查出逻辑错误的数据,有效地实现了对数据库中数据的逻辑核查。结论:EpiData用于药物临床试验数据的逻辑核查,方法简便、有效、可靠。 展开更多
关键词 临床试验 数据管理 逻辑核查 EPIdata
下载PDF
An Example of Machine Vision Applied in Printing Quality Checking——Research on the Checking of Printing Quality by Image Processing 被引量:5
7
作者 唐万有 王文凤 《微计算机信息》 北大核心 2008年第6期45-47,共3页
The traditional printing checking method always uses printing control strips,but the results are not very well in repeatability and stability. In this paper,the checking methods for printing quality basing on image ar... The traditional printing checking method always uses printing control strips,but the results are not very well in repeatability and stability. In this paper,the checking methods for printing quality basing on image are taken as research objects. On the base of the traditional checking methods of printing quality,combining the method and theory of digital image processing with printing theory in the new domain of image quality checking,it constitute the checking system of printing quality by image processing,and expound the theory design and the model of this system. This is an application of machine vision. It uses the high resolution industrial CCD(Charge Coupled Device) colorful camera. It can display the real-time photographs on the monitor,and input the video signal to the image gathering card,and then the image data transmits through the computer PCI bus to the memory. At the same time,the system carries on processing and data analysis. This method is proved by experiments. The experiments are mainly about the data conversion of image and ink limit show of printing. 展开更多
关键词 机器视觉 印刷质量检测 图像处理 数据转换 墨量显示
下载PDF
Oracle GoldenGate Veridata数据验证技术的研究与应用 被引量:1
8
作者 王文阁 《电力信息与通信技术》 2013年第11期16-20,共5页
在企业数据中心、灾备中心的建设中广泛采用数据同步复制技术和数据异步复制技术来得到共享数据或灾备数据,许多原因会导致复制两端数据不一致而又很难及时发现。这些不一致会导致采用不准确的数据进行数据恢复和基于不准确数据的企业... 在企业数据中心、灾备中心的建设中广泛采用数据同步复制技术和数据异步复制技术来得到共享数据或灾备数据,许多原因会导致复制两端数据不一致而又很难及时发现。这些不一致会导致采用不准确的数据进行数据恢复和基于不准确数据的企业决策。通过引入Oracle GoldenGate Veridata数据验证技术,可以实现在线校验在不同应用之间共同使用的大量数据,确保数据绝对可信,找到可以常态化的数据一致性、完整性验证方法。 展开更多
关键词 ORACLE GOLDENGATE Veridata 数据验证 数据一致性 数据复制
下载PDF
XML-Data模式的一致性问题(英文)
9
作者 闫萍 吕腾 盛其荣 《新疆大学学报(自然科学版)》 CAS 2004年第4期366-369,共4页
运用键、外键和 XML-Data模式篱笆等概念研究了 XML-Data模式的一致性问题 .XML-Data模式的一致性问题就是判断是否存在一个既满足 XML-Data模式又满足完整性约束的 XML-Data模式篱笆 .提出了XML-Data模式及 XML-Data模式篱笆的概念 .... 运用键、外键和 XML-Data模式篱笆等概念研究了 XML-Data模式的一致性问题 .XML-Data模式的一致性问题就是判断是否存在一个既满足 XML-Data模式又满足完整性约束的 XML-Data模式篱笆 .提出了XML-Data模式及 XML-Data模式篱笆的概念 .给出了如何从现有的 XML-Data模式构造 XML-Data模式篱笆的算法并且证明了 展开更多
关键词 XML 一致性问题 完整性约束 算法 判定 模式 证明 概念研究 判断 构造
下载PDF
Geodatabase模型及其在成矿区带数据裁剪中的应用研究
10
作者 琚锋 汪新庆 蔡帆 《工程地球物理学报》 2006年第1期70-74,共5页
Geodatabase是美国环境系统研究所(ESRI)提出的第三代地理数据模型,本文从总体上描述了Geodatabase空间数据模型,并基于Geodatabase数据模型设计并实现了全国重要成矿区带资源评价基础数据库管理系统的数据裁剪分系统。测试结果表明数... Geodatabase是美国环境系统研究所(ESRI)提出的第三代地理数据模型,本文从总体上描述了Geodatabase空间数据模型,并基于Geodatabase数据模型设计并实现了全国重要成矿区带资源评价基础数据库管理系统的数据裁剪分系统。测试结果表明数据裁剪功能为用户进行数据检查减少入库数据的冗余以及从海量数据中便捷、快速提取出所需数据提供了较好的支持,该数据模型得到成功地运用。 展开更多
关键词 GEOdataBASE 数据裁剪 数据检查 ARCOBJECTS
下载PDF
Check Box List组件在ADO.net中的应用
11
作者 谷宝磊 姜秀柱 《电脑开发与应用》 2010年第2期28-29,共2页
通过对一个WEB应用程序分析,旨在阐述如何将数据库中的字段绑定到Check Box List组件,并将数据库的某一字段的值作为其Item集合的成员,当Check Box List中的若干选项被选中时,触发读取数据库中对应的数据记录并在WEB页面上显示。从数据... 通过对一个WEB应用程序分析,旨在阐述如何将数据库中的字段绑定到Check Box List组件,并将数据库的某一字段的值作为其Item集合的成员,当Check Box List中的若干选项被选中时,触发读取数据库中对应的数据记录并在WEB页面上显示。从数据绑定、选中项判断、选中项的获取、数据读取显示等不同方面进行阐述,希望对实际的WEB应用程序的开发具有一定的参考价值。 展开更多
关键词 check BOX List组件 数据绑定 选中项获取 ADO.NET
下载PDF
Consistency check of degradation mechanism between natural storage and enhancement test for missile servo system 被引量:3
12
作者 Wang Xu Sun Quan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第2期415-424,共10页
Reliability enhancement testing(RET) is an accelerated testing which hastens the performance degradation process to surface its inherent defects of design and manufacture. It is an important hypothesis that the degrad... Reliability enhancement testing(RET) is an accelerated testing which hastens the performance degradation process to surface its inherent defects of design and manufacture. It is an important hypothesis that the degradation mechanism of the RET is the same as the one of the normal stress condition. In order to check the consistency of two mechanisms, we conduct two enhancement tests with a missile servo system as an object of the study, and preprocess two sets of test data to establish the accelerated degradation models regarding the temperature change rate that is assumed to be the main applied stress of the servo system during the natural storage. Based on the accelerated degradation models and natural storage profile of the servo system, we provide and demonstrate a procedure to check the consistency of two mechanisms by checking the correlation and difference of two sets of degradation data. The results indicate that the two degradation mechanisms are significantly consistent with each other. 展开更多
关键词 reliability ENHANCEMENT testing (RET) degradation model ACCELERATED equation CONSISTENCY check Pearson correlation coefficient
下载PDF
KERNEL ESTIMATION OF HIGHER DERIVATIVES OF DENSITY AND HAZARD RATE FUNCTION FOR TRUNCATED AND CENSORED DEPENDENT DATA 被引量:3
13
作者 陈清平 戴永隆 《Acta Mathematica Scientia》 SCIE CSCD 2003年第4期477-486,共10页
Based on left truncated and right censored dependent data, the estimators of higher derivatives of density function and hazard rate function are given by kernel smoothing method. When observed data exhibit α-mixing d... Based on left truncated and right censored dependent data, the estimators of higher derivatives of density function and hazard rate function are given by kernel smoothing method. When observed data exhibit α-mixing dependence, local properties including strong consistency and law of iterated logarithm are presented. Moreover, when the mode estimator is defined as the random variable that maximizes the kernel density estimator, the asymptotic normality of the mode estimator is established. 展开更多
关键词 Truncated and censored data Α-MIXING strong consistency law of iterated logarithm MODE
下载PDF
ASYMPTOTIC PROPERTIES OF ESTIMATORS IN PARTIALLY LINEAR SINGLE-INDEX MODEL FOR LONGITUDINAL DATA 被引量:3
14
作者 田萍 杨林 薛留根 《Acta Mathematica Scientia》 SCIE CSCD 2010年第3期677-687,共11页
In this article, a partially linear single-index model /or longitudinal data is investigated. The generalized penalized spline least squares estimates of the unknown parameters are suggested. All parameters can be est... In this article, a partially linear single-index model /or longitudinal data is investigated. The generalized penalized spline least squares estimates of the unknown parameters are suggested. All parameters can be estimated simultaneously by the proposed method while the feature of longitudinal data is considered. The existence, strong consistency and asymptotic normality of the estimators are proved under suitable conditions. A simulation study is conducted to investigate the finite sample performance of the proposed method. Our approach can also be used to study the pure single-index model for longitudinal data. 展开更多
关键词 Longitudinal data partially linear single-index model penalized spline strong consistency asymptotic normality
下载PDF
Model Checking-Based Testing of Web Applications 被引量:2
15
作者 ZENG Hongwei MIAO Huaikou 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期922-926,共5页
A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagra... A formal model representing the navigation behavior of a Web application as the Kripke structure is proposed and an approach that applies model checking to test case generation is presented. The Object Relation Diagram as the object model is employed to describe the object structure of a Web application design and can be translated into the behavior model. A key problem of model checking-based test generation for a Web application is how to construct a set of trap properties that intend to cause the violations of model checking against the behavior model and output of counterexamples used to construct the test sequences. We give an algorithm that derives trap properties from the object model with respect to node and edge coverage criteria. 展开更多
关键词 Web application test generation model checking consistency relation
下载PDF
Developing a Geological Management Information System: National Important Mining Zone Database 被引量:1
16
作者 左仁广 汪新庆 夏庆霖 《Journal of China University of Geosciences》 SCIE CSCD 2006年第1期79-83,94,共6页
Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics data... Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics database, gravity database, geochemistry database and remote sensing database, is very significant. We developed national important mining zone database (NIMZDB) to manage 14 national important mining zone databases to support a new round prediction of ore deposit. We found that attention should be paid to the following issues: ① data accuracy: integrity, logic consistency, attribute, spatial and time accuracy; ② management of both attribute and spatial data in the same system;③ transforming data between MapGIS and ArcGIS; ④ data sharing and security; ⑤ data searches that can query both attribute and spatial data. Accuracy of input data is guaranteed and the search, analysis and translation of data between MapGIS and ArcGIS has been made convenient via the development of a checking data module and a managing data module based on MapGIS and ArcGIS. Using AreSDE, we based data sharing on a client/server system, and attribute and spatial data are also managed in the same system. 展开更多
关键词 geological management information system checking data ARCSDE transforming data format data sharing data security
下载PDF
Site selection and data processing of GNSS receiver calibration networks based on TEQC and GAMIT 被引量:2
17
作者 ZHOU Changjie MAO Jiuchang +1 位作者 WANG Hongyao WU Qiong 《Global Geology》 2019年第2期121-127,共7页
This study introduces the site selection and data processing of GNSS receiver calibration networks. According to the design requirements and relevant specifications, the authors investigate the observation conditions ... This study introduces the site selection and data processing of GNSS receiver calibration networks. According to the design requirements and relevant specifications, the authors investigate the observation conditions of the potential sites and collect the experimental GNSS observation data. TEQC is used to evaluate the data availability rate and multipath effects of the observation data to determine the appropriate site. After the construction and measurement of the calibration network, the baseline processing of the medium and long baseline network is conducted by GAMIT. The accuracy indexes including NRMS, difference between repeated baselines, and closure of independent observation loops all meet the specified criteria. 展开更多
关键词 GNSS CALIBRATION network TEQC data quality check GAMIT
下载PDF
Blockchain Consistency Check Protocol for Improved Reliability 被引量:2
18
作者 Mohammed Alwabel Youngmi Kwon 《Computer Systems Science & Engineering》 SCIE EI 2021年第2期281-292,共12页
Blockchain is a technology that provides security features that can be used for more than just cryptocurrencies.Blockchain achieves security by saving the information of one block in the next block.Changing the inform... Blockchain is a technology that provides security features that can be used for more than just cryptocurrencies.Blockchain achieves security by saving the information of one block in the next block.Changing the information of one block will require changes to all the next block in order for that change to take effect.Which makes it unfeasible for such an attack to happen.However,the structure of how blockchain works makes the last block always vulnerable for attacks,given that its information is not saved yet in any block.This allows malicious node to change the information of the last block and generate a new block and broadcast it to the network.Given that the nodes always follow the longer chain wins rule,the malicious node will win given that it has the longest chain in the network.This paper suggests a solution to this issue by making the nodes send consistency check messages before broadcasting a block.If the nodes manage to successfully verify that the node that generated a new block hasn’t tampered with the blockchain than that block will be broadcasted.The results of the simulation show suggested protocol provided better security compared to the regular blockchain. 展开更多
关键词 Blockchain SECURITY forking blockchain consistency check(BCC) PROTOCOL
下载PDF
PARAMETER ESTIMATION IN LINEAR REGRESSION MODELS FOR LONGITUDINAL CONTAMINATED DATA 被引量:1
19
作者 QianWeimin LiYumei 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2005年第1期64-74,共11页
The parameter estimation and the coefficient of contamination for the regression models with repeated measures are studied when its response variables are contaminated by another random variable sequence.Under the sui... The parameter estimation and the coefficient of contamination for the regression models with repeated measures are studied when its response variables are contaminated by another random variable sequence.Under the suitable conditions it is proved that the estimators which are established in the paper are strongly consistent estimators. 展开更多
关键词 longitudinal data coeffcient of contamination parameter estimation strong consistency.
下载PDF
Research on Constructing Contoursfrom Regular Terrain GridsContaining Invalid Data 被引量:1
20
作者 粟卫民 吴凡 《Journal of China University of Mining and Technology》 2004年第2期138-142,共5页
A new method for constructing contours from complicated terrain elevation grids containing invalid data is put forward. By using this method, the topological consistency of contours in groups can be maintained effecti... A new method for constructing contours from complicated terrain elevation grids containing invalid data is put forward. By using this method, the topological consistency of contours in groups can be maintained effectively and the contours can be drawn smoothly based on boundaries pre-searching and local correction. An experimental example is given to demonstrate that the contours constructed by this method are of good quality. 展开更多
关键词 CONTOURS TERRAIN ELEVATION grid INVALID data curves INTERSECTION topological consistency
下载PDF
上一页 1 2 122 下一页 到第
使用帮助 返回顶部