期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
人译理论研究与机译系统设计的入门向导——G·米兰著、李锡胤译《翻译算法》评介
1
作者 易绵竹 南振兴 《外语学刊》 CSSCI 北大核心 2003年第3期106-109,共4页
关键词 翻译理论 人译理论研究 机译系统设计 《翻译算法》 评介 G·米兰 李锡胤 创作动机 创作特色 总体结构
下载PDF
Cluster parallel rendering based on encoded mesh 被引量:3
2
作者 QIN Ai-hong XIONG Hua +2 位作者 PENG Hao-yu LIU Zhen SHI Jiao-ying 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第7期1124-1133,共10页
Use of compressed mesh in parallel rendering architecture is still an unexplored area, the main challenge of which is to partition and sort the encoded mesh in compression-domain. This paper presents a mesh compressio... Use of compressed mesh in parallel rendering architecture is still an unexplored area, the main challenge of which is to partition and sort the encoded mesh in compression-domain. This paper presents a mesh compression scheme PRMC (Parallel Rendering based Mesh Compression) supplying encoded meshes that can be partitioned and sorted in parallel rendering system even in encoded-domain. First, we segment the mesh into submeshes and clip the submeshes’ boundary into Runs, and then piecewise compress the submeshes and Runs respectively. With the help of several auxiliary index tables, compressed submeshes and Runs can serve as rendering primitives in parallel rendering system. Based on PRMC, we design and implement a parallel rendering architecture. Compared with uncompressed representation, experimental results showed that PRMC meshes applied in cluster parallel rendering system can dramatically reduce the communication requirement. 展开更多
关键词 CLUSTER Parallel rendering RENDERING Compression algorithm Mesh coding Mesh segmentation
下载PDF
Cryptanalysis of Key Exchange Protocol Based on Tensor Ergodic Problem
3
作者 Chunsheng Gu Youyu Gu +2 位作者 Peizhong Shi Chunpeng Ge Zhenjun Jing 《China Communications》 SCIE CSCD 2018年第10期172-181,共10页
Recently, Mao, Zhang, Wu et al. constructed two key exchange(KE) protocols based on tensor ergodic problem(TEP). Although they conjectured that these constructions can potentially resist quantum computing attack, they... Recently, Mao, Zhang, Wu et al. constructed two key exchange(KE) protocols based on tensor ergodic problem(TEP). Although they conjectured that these constructions can potentially resist quantum computing attack, they did not provide a rigorous security proof for their KE protocols. In this paper, applying the properties of ergodic matrix, we first present a polynomial time algorithm to solve the TEP problem using O(n^6) arithmetic operations in the finite field, where n is the security parameter. Then, applying this polynomial time algorithm, we generate a common shared key for two TEP-based KE constructions, respectively. In addition, we also provide a polynomial time algorithm with O(n^6) arithmetic operations that directly recovers the plaintext from a ciphertext for the KE-based encryption scheme. Thus, the TEP-based KE protocols and their corresponding encryption schemes are insecure. 展开更多
关键词 key exchange KE-based encryption tensor decomposition ergodic matrix
下载PDF
Effect of Gaussian Noise Amplitude on Translation Error Estimated Using Double-Wayland Algorithm
4
《Journal of Mathematics and System Science》 2012年第8期482-488,共7页
The Wayland algorithm has been improved in order to evaluate the degree of visible determinism for dynamical systems that generate time series. The objective of this study is to show that the Double-Wayland algorithm ... The Wayland algorithm has been improved in order to evaluate the degree of visible determinism for dynamical systems that generate time series. The objective of this study is to show that the Double-Wayland algorithm can distinguish between time series generated by a deterministic process and those generated by a stochastic process. The authors conducted numerical analysis of the van der Pol equation and a stochastic differential equation as a deterministic process and a Ganssian stochastic process, respectively. In case of large S/N ratios, the noise term did not affect the translation error derived from time series data, but affected that from the temporal differences of time series. In case of larger noise amplitudes, the translation error from the differences was calculated to be approximately 1 using the Double-Wayland algorithm, and it did not vary in magnitude. Furthermore, the translation error derived from the differenced sequences was considered stable against noise. This novel algorithm was applied to the detection of anomalous signals in some fields of engineering, such as the analysis of railway systems and bio-signals. 展开更多
关键词 Gaussian white noise Wayland algorithm delay time embedding space degree of visible determinism translation error VPE (van der Pol equation) SDE (stochastic differential equation).
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部