期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
General Solution of Normal Equations in the Intra-Block Analysis of PBIB Designs with Four Associates
1
作者 Dav inder Kumar Garg Ghansham Mishra 《Journal of Mathematics and System Science》 2013年第8期412-416,共5页
General solution of normal equations in the general intra-block analysis of partially balanced incomplete block designs involving four associates is presented in this talk as they are quite useful in practice. Only in... General solution of normal equations in the general intra-block analysis of partially balanced incomplete block designs involving four associates is presented in this talk as they are quite useful in practice. Only intra-block estimates are given as the necessary formulae for inter-block estimates can be derived from them by changing the parameters as discussed in Rao[5]. We have obtained the general formulae for computation of four types of efficiencies, the average efficiency factor and the variance of the estimated elementary treatment contrast of the four types of comparisons irrespective of the type of association scheme a PBIB Design follows. 展开更多
关键词 Partially balanced incomplete block designs inter- block analysis intra-block analysis.
下载PDF
Security Analysis and Enhanced Design of a Dynamic Block Cipher 被引量:3
2
作者 ZHAO Guosheng WANG Jian 《China Communications》 SCIE CSCD 2016年第1期150-160,共11页
There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution o... There are a lot of security issues in block cipher algorithm.Security analysis and enhanced design of a dynamic block cipher was proposed.Firstly,the safety of ciphertext was enhanced based on confusion substitution of S-box,thus disordering the internal structure of data blocks by four steps of matrix transformation.Then,the diffusivity of ciphertext was obtained by cyclic displacement of bytes using column ambiguity function.The dynamic key was finally generated by using LFSR,which improved the stochastic characters of secret key in each of round of iteration.The safety performance of proposed algorithm was analyzed by simulation test.The results showed the proposed algorithm has a little effect on the speed of encryption and decryption while enhancing the security.Meanwhile,the proposed algorithm has highly scalability,the dimension of S-box and the number of register can be dynamically extended according to the security requirement. 展开更多
关键词 cryptography block cipher encryption algorithm safety analysis
下载PDF
Evolution Analysis About Soybean MIR166 Family 被引量:2
3
作者 Wang Zhi-hao Jin Hui-hui +1 位作者 Chen Qing-shan Zhu Rong-sheng 《Journal of Northeast Agricultural University(English Edition)》 CAS 2015年第1期22-29,共8页
MicroRNA(miRNA) is a class of important regulating non-coding small molecular RNA. The gma-MIR166 gene family consists of 21 members and their expression patterns diversify widely. It is important to analyze the evo... MicroRNA(miRNA) is a class of important regulating non-coding small molecular RNA. The gma-MIR166 gene family consists of 21 members and their expression patterns diversify widely. It is important to analyze the evolution of gma-MIR166 gene family in order to understand the evolutionary mechanisms of miRNAs in soybean. In this study, we implemented soybean wide genome block analysis, the molecular phylogeny of gma-MIR166 and block analysis of gma-MIR166 family. The results showed that both chromosome big segmental duplications and tandem duplications were main reasons contributed to the expanding of gmaMIR166 gene family. These findings suggested that gma-MIR166 gene family might originate from one or two ancient miRNA genes. The results of research provided a support for evolutionary study of miRNAs in soybean and related species in Fabaceae. 展开更多
关键词 microRNA family EVOLUTION SOYBEAN block analysis
下载PDF
Undrained Stability Analysis of Three-Dimensional Rectangular Trapdoor in Clay 被引量:1
4
作者 YIN Xiaojun XIE Jun 《Journal of Donghua University(English Edition)》 EI CAS 2020年第4期334-339,共6页
A new collapse model of the trapdoors,three-dimensional rectangular trapdoor(3DRT),is presented for ground surface collapse.Undrained stability of 3DRT is examined with the upper bound method of plasticity limit analy... A new collapse model of the trapdoors,three-dimensional rectangular trapdoor(3DRT),is presented for ground surface collapse.Undrained stability of 3DRT is examined with the upper bound method of plasticity limit analysis theory.The soil where the trapdoors are located is assumed to be a perfectly plastic model with a Tresca yield criterion.Block analysis technique is employed to investigate the collapse of 3DRT.The model is divided into five different block types and added up to ten rigid blocks.According to the law of conservation of energy,the critical stability ratios of 3DRT are obtained through a search proceeding.The results of upper bound solution for 3DRT are given,and three trapdoor models with depth various are discussed during the application in the stability analysis of square trapdoors.The critical stability ratios can be used in the design of underground excavation and support force. 展开更多
关键词 three-dimensional rectangular trapdoor upper bound solution stability ratio rigid block block analysis technique
下载PDF
Improved Blocking Time Analysis and Evaluation for the Multiprocessor Priority Ceiling Protocol 被引量:2
5
作者 杨茂林 雷航 +1 位作者 廖勇 Furkan Rabee 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第6期1003-1013,共11页
The Multiprocessor Priority Ceiling Protocol (MPCP) is a classic suspension-based real-time locking protocol for partitioned fixed-priority (P-FP) scheduling. However, existing blocking time analysis is pessimisti... The Multiprocessor Priority Ceiling Protocol (MPCP) is a classic suspension-based real-time locking protocol for partitioned fixed-priority (P-FP) scheduling. However, existing blocking time analysis is pessimistic under the P-FP + MPCP scheduling, which negatively impacts the schedulability for real-time tasks. In this paper, we model each task as an alternating sequence of normal and critical sections, and use both the best-case execution time (BCET) and the worst-case execution time (WCET) to describe the execution requirement for each section. Based on this model, a novel analysis is proposed to bound shared resource requests. This analysis uses BCET to derive the lower bound on the inter-arrival time for shared resource requests, and uses WCET to obtain the upper bound on the execution time of a task on critical sections during an arbitrary time interval of △t. Based on this analysis, improved blocking analysis and its associated worst-case response time (WCRT) analysis are proposed for P-FP + MPCP scheduling. Schedulability experiments indicate that the proposed method outperforms the existing methods and improves the schedulability significantly. 展开更多
关键词 real-time scheduling multiprocessor scheduling locking protocol blocking analysis worst-case response time
原文传递
Block Principle Component Analysis with Lp-norm for Robust and Sparse Modelling 被引量:3
6
作者 TANG Ganyi LU Guifu 《Journal of Shanghai Jiaotong university(Science)》 EI 2018年第3期398-403,共6页
Block principle and pattern classification component analysis (BPCA) is a recently developed technique in computer vision In this paper, we propose a robust and sparse BPCA with Lp-norm, referred to as BPCALp-S, whi... Block principle and pattern classification component analysis (BPCA) is a recently developed technique in computer vision In this paper, we propose a robust and sparse BPCA with Lp-norm, referred to as BPCALp-S, which inherits the robustness of BPCA-L1 due to the employment of adjustable Lp-norm. In order to perform a sparse modelling, the elastic net is integrated into the objective function. An iterative algorithm which extracts feature vectors one by one greedily is elaborately designed. The monotonicity of the proposed iterative procedure is theoretically guaranteed. Experiments of image classification and reconstruction on several benchmark sets show the effectiveness of the proposed approach. 展开更多
关键词 block principle component analysis(BPCA) LP-NORM robust modelling sparse modelling
原文传递
Blocking Analysis of Time-Division Multiplexed Multicast Switch
7
作者 LIUYan-bing TANGHong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第3期57-61,共5页
The particular switch concerned here is a Three-Stage Time-space-time (TST)interconnection network and performs the time-division circuit switching. The input and outputstages are Time Slot Interchangers (TSI) . The c... The particular switch concerned here is a Three-Stage Time-space-time (TST)interconnection network and performs the time-division circuit switching. The input and outputstages are Time Slot Interchangers (TSI) . The central stage is a time-multiplexed switch with twoports per address. By exploiting the channel grouping at the central stage as well as reducing theaverage loading at each internal frame, the three-stage multicast switch has potential to removealmost all slot contention blockings. 展开更多
关键词 multicast switch blocking analysis TST
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部