期刊文献+
共找到53篇文章
< 1 2 3 >
每页显示 20 50 100
An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree 被引量:1
1
作者 苏怡宁 王兴元 林淑娟 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第11期262-271,共10页
This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plai... This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plaintext image is sorted according to the middle order traversal sequence on the permutation.Secondly,the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value.Finally,the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix.The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness. 展开更多
关键词 spatiotemporal chaos image encryption middle order traversal coupled map lattice
下载PDF
An Improved Approach for Generating Test Cases during Model-Based Testing Using Tree Traversal Algorithm
2
作者 Oluwatolani Achimugu Philip Achimugu +3 位作者 Chinonyelum Nwufoh Sseggujja Husssein Ridwan Kolapo Tolulope Olufemi 《Journal of Software Engineering and Applications》 2021年第6期257-265,共9页
<p align="left"> <span style="font-family:Verdana;">During the model-based software testing process, test cases are generated from modeled requirements to conduct acceptance testing. Ho... <p align="left"> <span style="font-family:Verdana;">During the model-based software testing process, test cases are generated from modeled requirements to conduct acceptance testing. However, existing approaches generate erroneous test cases, lack full coverage criteria and prototype tools. Therefore, the aim of this research is to develop an approach capable of reducing erroneous test case generation based on full coverage criteria and a prototype tool. The method employed was to develop a parser to extract information from the XMI file of a modeling diagram where a tree is constructed and a traversal operation executed on the nodes and edges to generate test cases. The results obtained from the proposed approach showed that 97.35% of the generated test cases were precise and comprehensive enough to conduct testing because 99.01% of all the nodes and edges were fully covered during the traversal operations.</span> </p> 展开更多
关键词 Requirements MODEL TESTING TREE traversal
下载PDF
Binary Tree’s Recursion Traversal Algorithm and Its Improvement
3
作者 Hua Li 《Journal of Computer and Communications》 2016年第7期42-47,共6页
Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvement... Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvements in programming are proposed. 展开更多
关键词 Binary Tree traversal STACK
下载PDF
DYNAMIC TRAVERSAL CRITERION FOR GEOMETRIC FRACTALS
4
作者 Zhang Qian Lu Zhenrong Xiao Zhonghui 《Computer Aided Drafting,Design and Manufacturing》 1996年第1期25-31,共2页
This paper presents a new generating criterion for self-similar geometric fractalsDynamic Traversal Criterion (DTC) and the principle to practice it. According to the principle,symbol shifting technique is put forward... This paper presents a new generating criterion for self-similar geometric fractalsDynamic Traversal Criterion (DTC) and the principle to practice it. According to the principle,symbol shifting technique is put forward which can control the traversal symbols dynamically in recursive procession. The Dynamic Traversal Criterion inherits the mechanism for generating self-similar fractals from traditional way and creates more fractal images from one initiator and generator than Static traversal strategy. 展开更多
关键词 ss: geometric fractal SELF-SIMILAR dynamic traversal criterion symbol shifting
全文增补中
Fast Single-phase Fault Location Method Based on Community Graph Depth-first Traversal for Distribution Network
5
作者 Jian Dang Yunjiang Yan +2 位作者 Rong Jia Xiaowei Wang Hui Wei 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2023年第2期612-622,共11页
With the increasing complexity of distribution network structures originating from the high penetration of renewable energy and responsive loads,fast and accurate fault location technology for distribution networks is... With the increasing complexity of distribution network structures originating from the high penetration of renewable energy and responsive loads,fast and accurate fault location technology for distribution networks is a prerequisite for rapid isolation of faults and restoration of the power supply.In this paper,a fault location method based on community graph depth-first traversal is proposed for fast location of single-phase ground faults in distribution networks.First,this paper defines the fault graph weight of the vertices in the distribution network graph model,which can be used to reflect the topology of the vertices and fault points as well as the fluctuation of the vertices’currents.Then,the vertices on the graph model are clustered by using an improved parallel louvain method(IPLM).Finally,the community formed by IPLM is used as the smallest unit for depth-first traversal to achieve fast and accurate location of the fault section.The paper develops a distribution network graph model of IEEE 33-bus system on the graph database for testing.And three other methods are selected for comparison with IPLMDF.The test results show that IPLMDF can achieve fast and accurate fault location when half of the nodes in the distribution network are equipped with D-PMUs.When some of the D-PMUs lose time synchronization,it is still possible to locate the fault section,and at the same time,the locating results can be avoided by falling into local optimal solutions. 展开更多
关键词 Depth-first traversal fault location graph computation single-phase fault
原文传递
On the graph traversal method for evaluating linear binary-chain programs
6
作者 陈阳军 《Science China(Technological Sciences)》 SCIE EI CAS 1999年第3期225-243,共19页
Grahne et al. have presented a graph algorithm for evaluating a subset of recursive queries. This method consists of two phases. In the first phase, the method transforms a linear binary-chain program into a set of eq... Grahne et al. have presented a graph algorithm for evaluating a subset of recursive queries. This method consists of two phases. In the first phase, the method transforms a linear binary-chain program into a set of equations over expressions containing predicate symbols. In the second phase, a graph is constructed from the equations and the answers are produced by traversing the relevant paths. A new algorithm is described which requires less time than Grahne’ s. The key idea of the improvement is to reduce the search space that will be traversed when a query is invoked. Further, the evaluation of cyclic data is speeded up by generating most answers directly in terms of the answers already found and the associated 'path information' instead of traversing the corresponding paths as usual. In this way, this algorithm achieves a linear time complexity for both acyclic and most of cyclic data. 展开更多
关键词 GRAPH traversal method LINEAR binary-chain programs.
原文传递
Graph Traversal and Top-Down Evaluation of Logic Queries
7
作者 陈阳军 《Journal of Computer Science & Technology》 SCIE EI CSCD 1998年第4期300-316,共17页
In this paper, an optimal method to handle cyclic and acyclic data relations in the linear recursive queries is proposed. High efficiency is achieved by integrating graph traversal mechanisms into a top-down evaluatio... In this paper, an optimal method to handle cyclic and acyclic data relations in the linear recursive queries is proposed. High efficiency is achieved by integrating graph traversal mechanisms into a top-down evaluation. In such a way the subsumption checks and the identification of cyclic data can be done very efficielltly First, based on the subsumption checks, the search space can be reduced drastically by avoiding any redundant expansion operation. In fact, in the case of non-cyclic data, the proposed algorithm requires only linear time for evaluating a linear recursive query. On the other hand, in the case of cyclic data, by using the technique for isolating strongly connected components a lot of answers can be generated directly in terms of the intermediate results and the relevant path information instead of evaluating them by performing algebraic operations. Since the cost of generating an answer is much less than that of evaluating an answer by algebraic operations, the time consumption for cyclic data can be reduced by an order of magnitude or more. 展开更多
关键词 recursive query top-down evaluation RQA/FQI strategy logic query graph traversal
原文传递
Z^2 traversal order: An interleaving approach for VR stereo rendering on tile-based GPUs
8
作者 Jae-Ho Nah Yeongkyu Lim +1 位作者 Sunho Ki Chulho Shin 《Computational Visual Media》 CSCD 2017年第4期349-357,共9页
With increasing demands of virtual reality(VR) applications, efficient VR rendering techniques are becoming essential. Because VR stereo rendering has increased computational costs to separately render views for the l... With increasing demands of virtual reality(VR) applications, efficient VR rendering techniques are becoming essential. Because VR stereo rendering has increased computational costs to separately render views for the left and right eyes, to reduce the rendering cost in VR applications, we present a novel traversal order for tile-based mobile GPU architectures: Z^2 traversal order. In tile-based mobile GPU architectures,a tile traversal order that maximizes spatial locality can increase GPU cache efficiency. For VR applications, our approach improves upon the traditional Z order curve.We render corresponding screen tiles in left and right views in turn, or simultaneously, and as a result, we can exploit spatial adjacency of the two tiles. To evaluate our approach, we conducted a trace-driven hardware simulation using Mesa and a hardware simulator. Our experimental results show that Z^2 traversal order can reduce external memory bandwidth requirements and increase rendering performance. 展开更多
关键词 virtual reality(VR) tile traversal order tile-based GPU mobile GPU graphics hardware
原文传递
Noncommutative-Geometry Wormholes Based on the Casimir Effect 被引量:1
9
作者 Peter K. F. Kuhfittig 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2023年第1期295-300,共6页
While wormholes are as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. In particular, holding a wormhole open requires a violation of the null... While wormholes are as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. In particular, holding a wormhole open requires a violation of the null energy condition, calling for the existence of exotic matter. The Casimir effect has shown that this physical requirement can be met on a small scale, thereby solving a key conceptual problem. The Casimir effect does not, however, guarantee that the small-scale violation is sufficient for supporting a macroscopic wormhole. The purpose of this paper is to connect the Casimir effect to noncommutative geometry, which also aims to accommodate small-scale effects, the difference being that these can now be viewed as intrinsic properties of spacetime. As a result, the noncommutative effects can be implemented by modifying only the energy momentum tensor in the Einstein field equations, while leaving the Einstein tensor unchanged. The wormhole can therefore be macroscopic in spite of the small Casimir effect. 展开更多
关键词 Traversable Wormholes Noncommutative Geometry Casimir Effect
下载PDF
Exploration of Traversable Wormholes Sustained by an Extra Spatial Dimension
10
作者 Peter K. F. Kuhfittig 《International Journal of Astronomy and Astrophysics》 2023年第3期141-153,共13页
The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To ... The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To begin with, the extra spatial dimension is assumed to be time dependent, while the redshift and shape functions, as well as the extra dimension, are functions of both r and l, the respective radial and extra coordinates;the last of these is therefore a function of r, l, and t. The main objective is to determine the conditions that allow the throat of the wormhole to be threaded with ordinary matter (by respecting the null energy condition) and that the same conditions lead to a violation of the null energy condition in the fifth dimension, which is therefore responsible for sustaining the wormhole. The dependence of the extra dimension on l and t is subject to additional conditions that are subsequently analyzed in this paper. Finally, the extra dimension may be extremely small or even curled up. 展开更多
关键词 Traversable Wormholes Extra Spatial Dimension Time Dependence
下载PDF
粒子穿越方势阱时的反射相位时间研究 被引量:2
11
作者 张玉武 李春芳 《Advances in Manufacturing》 SCIE CAS 2000年第S1期38-41,共4页
To understand the physical meaning of phase time further more, we discuss the reflection phase time of quantum-particles passing though a potential well It is shown that the reflection phase time is equal to the trans... To understand the physical meaning of phase time further more, we discuss the reflection phase time of quantum-particles passing though a potential well It is shown that the reflection phase time is equal to the transmission phase time in value and negative under certain conditions for a square potential well by analyzing While quantum-particles passing through the potential well, we think that this course can be described only with the velocity of energy of quantum mechanics whether or not they are reflected or transmitted eventually 展开更多
关键词 reflection phase time potential well velocity of energy the traversal time
下载PDF
轿车尾流移测试验研究 被引量:1
12
作者 张群锋 王望予 +1 位作者 傅立敏 蔡国华 《兵工学报》 EI CAS CSCD 北大核心 2000年第1期57-60,共4页
轿车的尾流结构与其空气阻力、升力与安全性有密切联系 ,为进一步研究轿车尾流结构及验证尾流场数值模拟结果的精确性提供依据 ,需通过试验得到较为全面地反映尾流结构的定量信息。为此 ,进行了红旗CA774轿车 1 10模型的七孔探针尾流移... 轿车的尾流结构与其空气阻力、升力与安全性有密切联系 ,为进一步研究轿车尾流结构及验证尾流场数值模拟结果的精确性提供依据 ,需通过试验得到较为全面地反映尾流结构的定量信息。为此 ,进行了红旗CA774轿车 1 10模型的七孔探针尾流移测试验 。 展开更多
关键词 尾流结构 尾流移测 七孔探针 A WAKE TRAVERSE SURVEY ON PASSENGER CARS Zhang Qunfeng Wang Wangyu Fu Limin
下载PDF
陀螺控制导线精度的正确评定 被引量:2
13
作者 冯仲科 陈于恒 《有色金属》 CSCD 1992年第1期1-5,9,共6页
本文推证了陀螺控制导线精度评定的严密公式,并讨论了用误差椭圆来表示最弱点点位精度的方法。所有评定精度的公式均依据最小二乘矩阵平差原理得出,这些公式对正确进行误差预计很有意义。
关键词 Evaluation Gyro-control traverse PRECISION Error ellipse
下载PDF
THE NEW METHOD OF GENERATION OF BINARY TREES FROM ZER0(0) AND ONE(1) CODES
14
作者 蔡恒 《Journal of China Textile University(English Edition)》 EI CAS 1995年第2期94-99,共6页
A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-no... A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-nodes is proposed. It differs from the coding scheme generally used and makes no distinction between internal nodes and terminal nodes. A code of a regular binary tree with nnodes is formed by labeling the left branches by O’s and the right branches by l’s and then traversing these branches in pre-order. Root is always assumed to be on a left branch. 展开更多
关键词 code traversal MONOTONIC order BINARY TREE RECURSION backtrack approach algorithm design.
下载PDF
Web Security:Emerging Threats and Defense
15
作者 Abdulwahed Awad Almutairi Shailendra Mishra Mohammed AlShehri 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期1233-1248,共16页
Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functiona... Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities,the configuration is growing and becoming more complicated.The growing demand and complexity also make these web applications a preferred target for intruders on the internet.Even with the support of security specialists,they remain highly problematic for the complexity of penetration and code reviewing methods.It requires considering different testing patterns in both codes reviewing and penetration testing.As a result,the number of hacked websites is increasing day by day.Most of these vulnerabilities also occur due to incorrect input validation and lack of result validation for lousy programming practices or coding errors.Vulnerability scanners for web applications can detect a few vulnerabilities in a dynamic approach.These are quite easy to use;however,these often miss out on some of the unique critical vulnerabilities in a different and static approach.Although these are time-consuming,they can find complex vulnerabilities and improve developer knowledge in coding and best practices.Many scanners choose both dynamic and static approaches,and the developers can select them based on their requirements and conditions.This research explores and provides details of SQL injection,operating system command injection,path traversal,and cross-site scripting vulnerabilities through dynamic and static approaches.It also examines various security measures in web applications and selected five tools based on their features for scanning PHP,and JAVA code focuses on SQL injection,cross-site scripting,Path Traversal,operating system command.Moreover,this research discusses the approach of a cyber-security tester or a security developer finding out vulnerabilities through dynamic and static approaches using manual and automated web vulnerability scanners. 展开更多
关键词 SQL injection attack cross-site scripting attack command injection attack path traversal attack
下载PDF
伺服驱动在精确定位磁盘位置上的应用
16
作者 赵海燕 郭利中 刘鹏 《包钢科技》 2010年第6期41-43,共3页
"SIMODRIVE 611 Universal"是一种具有独立驱动控制器的轴控制模块,在"定位"方式下最多可被选择并执行64个快移程序段。文章介绍了SIMODRIVE 611U在自动打包机线中磁盘接近参考点原理及在吊装传递管捆过程中精确定... "SIMODRIVE 611 Universal"是一种具有独立驱动控制器的轴控制模块,在"定位"方式下最多可被选择并执行64个快移程序段。文章介绍了SIMODRIVE 611U在自动打包机线中磁盘接近参考点原理及在吊装传递管捆过程中精确定位磁盘位置上的应用。 展开更多
关键词 SIMODRIVE611 UNIVERSAL 建立参考点 traversing BLOCKS
下载PDF
CASIO fx-4500P计算器在建筑工程测量中的应用(下)
17
作者 莫南明 《旅游研究》 1997年第1期53-58,68,共7页
9.1 计算导线转折角和 计算器全清零后,找到文件名“GZJH”,进行如下操作:
关键词 Computer APPLICATION TRIANGULATION Chain Of APPLICATION Adjustment Adjustment of TRAVERSE CALCULATING PROGRAMME
下载PDF
路径条件生成中的优化策略 被引量:1
18
作者 于亚南 周喜 《计算机工程与设计》 CSCD 北大核心 2012年第10期3995-3998,4003,共5页
为了提高利用符号执行生成测试数据的效率,提出了一种结合传统前向遍历和后向遍历的方法。通过对传统前向遍历和后向遍历方式的优缺点进行对比分析,设计了一个结合二者优点的算法。该算法将程序分块处理,整体采用前向遍历的思想,但在每... 为了提高利用符号执行生成测试数据的效率,提出了一种结合传统前向遍历和后向遍历的方法。通过对传统前向遍历和后向遍历方式的优缺点进行对比分析,设计了一个结合二者优点的算法。该算法将程序分块处理,整体采用前向遍历的思想,但在每一个块中是后向遍历代码的;它兼具前向遍历较早发现不可达路径的优点和后向遍历可以避免不相关变量赋值的优点,解决了传统前向遍历中的冗余问题。实验结果表明了该方法的可行性和有效性。 展开更多
关键词 符号执行 路径条件 前向遍历 后向遍历 依赖变量
下载PDF
Soil Parameter Identification for Wheel-terrain Interaction Dynamics and Traversability Prediction 被引量:8
19
作者 Suksun Hutangkabodee Yahya Hashem Zweiri +1 位作者 Lakmal Dasarath Seneviratne Kaspar Althoefer 《International Journal of Automation and computing》 EI 2006年第3期244-251,共8页
This paper presents a novel technique for identifying soil parameters for a wheeled vehicle traversing unknown terrain. The identified soil parameters are required for predicting vehicle drawbar pull and wheel drive t... This paper presents a novel technique for identifying soil parameters for a wheeled vehicle traversing unknown terrain. The identified soil parameters are required for predicting vehicle drawbar pull and wheel drive torque, which in turn can be used for traversability prediction, traction control, and performance optimization of a wheeled vehicle on unknown terrain. The proposed technique is based on the Newton Raphson method. An approximated form of a wheel-soil interaction model based on Composite Simpson's Rule is employed for this purpose. The key soil parameters to be identified are internal friction angle, shear deformation modulus, and lumped pressure-sinkage coefficient. The fourth parameter, cohesion, is not too relevant to vehicle drawbar pull, and is assigned an average value during the identification process. Identified parameters are compared with known values, and shown to be in agreement. The identification method is relatively fast and robust. The identified soil parameters can effectively be used to predict drawbar pull and wheel drive torque with good accuracy. The use of identified soil parameters to design a traversability criterion for wheeled vehicles traversing unknown terrain is presented. 展开更多
关键词 Soil parameter traversability Newton Raphson Composite Simpson's Rule wheeled vehicle
下载PDF
Influence of magnetically constricted arc traverse speed (MCATS) on tensile properties and microstructural characteristics of welded Inconel 718 alloy sheets 被引量:1
20
作者 Tushar Sonar Visvalingam Balasubramanian +2 位作者 Sudersanan Malarvizhi Thiruvenkatam Venkateswaran Dhenuvakonda Sivakumar 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第4期1395-1413,共19页
The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent lav... The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent laves phase evolution in fusion zone.This paper reports the direct effect of magnetically constricted arc traverse speed(MCATS)on bead profile,tensile properties and microstructural evolution of Inconel 718 alloy sheets joined by Gas Tungsten Constricted Arc Welding(GTCAW)process.The mechanism amenable for the microstructural modification and corresponding influence on the tensile properties of joints is investigated both in qualitative and quantitative manner related to the mechanics of arc constriction and pulsing.It is correlated to the solidification conditions during welding.The relationship between MCATS and Arc Constriction Current(ACC)was derived.Its interaction effect on the magnetic arc constriction and joint performance was analysed.Results showed that the joints fabricated using CATS of 70 mm/min exhibited superior tensile properties(98.39% of base metal strength with 31.50% elongation).It is attributed to the grain refinement in fusion zone microstructure leading to the evolution of finer,discrete laves phase in interdendritic areas. 展开更多
关键词 GTCA welding Inconel 718 alloy Magnetically constricted arc traverse speed Tensile properties Microstructure Laves phase
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部