期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
浅议消防乱点的危害性、存在问题及整治措施 被引量:2
1
作者 马辉 《科技与创新》 2014年第3期115-116,共2页
消防乱点是各级政府和职能部门管理的薄弱环节,一旦发生火灾,极易造成群死、群伤事故。深入了解消防乱点的危害性,深刻剖析消防乱点存在的各种问题,并逐步解决这些问题,成为当前一个重要的课题。
关键词 消防乱点 消防通道 火灾隐患 消防宣传
下载PDF
乱点立体图的临床应用及评价 被引量:1
2
作者 金曦 秦金莉 +1 位作者 瓮学清 陆桂香 《中华儿童保健杂志》 1997年第2期102-104,共3页
为了探讨乱点立体图的临床应用价值.方法 用乱点立体图(立体视锐度为300秒)对652例门诊就诊儿童做了立体视检查,并根据其年龄、视力及眼位等情况分组,以了解在不同情况下立体视的出现率,从而对乱点立体图的可靠性和灵敏性进行研究.结果... 为了探讨乱点立体图的临床应用价值.方法 用乱点立体图(立体视锐度为300秒)对652例门诊就诊儿童做了立体视检查,并根据其年龄、视力及眼位等情况分组,以了解在不同情况下立体视的出现率,从而对乱点立体图的可靠性和灵敏性进行研究.结果 正常组儿童93.6%具有立体视,而在屈光不正、斜视和弱视组儿童具有立体视的百分比明显下降,与以往其它方法所查立体视状况有较好的一致性,且该图携带简便、操作快捷.结论 乱点立体图可在儿科临床用于立体视的初筛,更是大面积弱视普查工作中进行立体视检查的较好方法. 展开更多
关键词 乱点立体图 立体视 儿童 弱视 屈光不正
原文传递
基于特征点预置乱熵OpenCV的无线视频传输
3
作者 张延芳 张军丽 《科技通报》 北大核心 2014年第8期203-205,共3页
提出一种基于域特征点预置乱熵编码的高保密性无线视频传输实现方法,基于计算机视觉库OpenCV处理,对域特征点进行相关,并对视频域特征点进行分离,形成原始域特征点库,采用预置乱算法对域特征点库进行置乱,使得域特征点库在不增加容量的... 提出一种基于域特征点预置乱熵编码的高保密性无线视频传输实现方法,基于计算机视觉库OpenCV处理,对域特征点进行相关,并对视频域特征点进行分离,形成原始域特征点库,采用预置乱算法对域特征点库进行置乱,使得域特征点库在不增加容量的情况下提高保密性,基于置乱后的域特征点库进行熵编码,实现高效压缩,兼顾视频保密性和压缩率要求。采用实际视频进行处理,结果显示,采用该方法进行无线视频加密传输,视频在相对保密性提高40%的情况下,压缩效率仅降低了1%,在高保密性无线视频传输中具有很好的应用价值。 展开更多
关键词 域特征预置 高保密性 无线视频传输
下载PDF
Segmentation of scattered point data through a new curvature analysis algorithm 被引量:3
4
作者 贺美芳 周来水 +1 位作者 张丽艳 刘胜兰 《Journal of Southeast University(English Edition)》 EI CAS 2004年第1期90-95,共6页
A systematic scheme is proposed to automatically extract geometric surface features from a point cloud composed of a set of unorganized three-dimensional coordinate points by data segmentation. The key technology is a... A systematic scheme is proposed to automatically extract geometric surface features from a point cloud composed of a set of unorganized three-dimensional coordinate points by data segmentation. The key technology is a algorithm that estimates the local surface curvature properties of scattered point data based on local base surface parameterization. Eight surface types from the signs of the Gaussian and mean curvatures provide an initial segmentation, which will be refined by an iterative region growing method. Experimental results show the scheme's performance on two point clouds. 展开更多
关键词 Feature extraction Image segmentation Three dimensional
下载PDF
太湖:传统加科技 实现新跨越
5
作者 陈瑛(文/图) 聂生俊(文/图) 《道路交通管理》 2019年第5期42-43,共2页
安徽省安庆市太湖县地处大别山南麓,境内国道(105线)28.5公里、省道224.9公里、县道149.61公里、“村村通”约3000公里,在册入户机动车9.5万辆,驾驶人12.54万人。太湖交警创业意志不减、干事状态不退、工作标准不降,着力构建道路交通安... 安徽省安庆市太湖县地处大别山南麓,境内国道(105线)28.5公里、省道224.9公里、县道149.61公里、“村村通”约3000公里,在册入户机动车9.5万辆,驾驶人12.54万人。太湖交警创业意志不减、干事状态不退、工作标准不降,着力构建道路交通安全防线。“三抓”促路畅人安针对以往影响道路交通秩序、影响群众平安出行的乱点乱象. 展开更多
关键词 意志 着力 影响 太湖县 乱点 村村通 太湖 县道 大别山
下载PDF
Pathophysiological aspects of diverticular disease of colon and role of large bowel motility 被引量:2
6
作者 Gabrio Bassotti Fabio Chistolini Antonio Morelli 《World Journal of Gastroenterology》 SCIE CAS CSCD 2003年第10期2140-2142,共3页
Colonic diverticular disease (diverticulosis) is one of the most common gastrointestinal disorders in Western countries. This disorder is strictly related to aging and fibre intake, and still bears a discrete amount o... Colonic diverticular disease (diverticulosis) is one of the most common gastrointestinal disorders in Western countries. This disorder is strictly related to aging and fibre intake, and still bears a discrete amount of morbidity. Numerous etiological co-factors have to date been implicated in the pathogenesis of the disease, yet the supporting evidence is still far from absolute. The present review considers the pathophysiology of colonic diverticular disease, with a special emphasis on factors related to abnormal colonic motility. 展开更多
关键词 COLON Diverticulosis Colonic Gastrointestinal Motility Humans
下载PDF
Performance optimization for multicast packet authentication 被引量:1
7
作者 李保红 《Journal of Chongqing University》 CAS 2005年第3期154-157,共4页
In secure multicast, one of the challenging problems is the authentication of multicast packets. This paper presents a novel scheme to address this problem, which combines ideas in both the hash tree schemes and the h... In secure multicast, one of the challenging problems is the authentication of multicast packets. This paper presents a novel scheme to address this problem, which combines ideas in both the hash tree schemes and the hash chain schemes. In this scheme, a group of packets is partitioned into equal-sized subgroups. Then a Merkle hash tree is built for each subgroup of packets, and the hash value of every root is appended to preceding packets to form hash chains. Its performance is analyzed and simulated using Biased Coin Toss loss model and 2-state Markov Chain loss model, respectively. Compared with the original hash chain schemes, results show that this scheme is much more efficient in term of communication overhead. 展开更多
关键词 Multicast packet authentication hash chains burst loss authentication probability
下载PDF
A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System
8
作者 ZHANG Xiao-Hong MIN Le-Quan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第6X期1115-1124,共10页
Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital ... Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decz:Fpt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security. 展开更多
关键词 generalized chaos synchronization Sinai map image confusion non-symmetric key data origin authentication network communication
下载PDF
C^1 C^2INTERPOLATION OF SCATTERED DATA POINTS 
9
作者 WANG JIAYE AND ZHANG CAIMING(Department of Computer Science,Shandong University Jinan 250100) 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 1994年第1期1-9,共9页
In this paper an error in[4]is pointed out and a method for constructingsurface interpolating scattered data points is presented.The main feature of the methodin this paper is that the surface so constructed is polyno... In this paper an error in[4]is pointed out and a method for constructingsurface interpolating scattered data points is presented.The main feature of the methodin this paper is that the surface so constructed is polynomial,which makes the construction simple and the calculation easy. 展开更多
关键词 INTERPOLATION Scattered Data Points TRIANGLE POLYNOMIAL BarycentricCoordinate.
下载PDF
基于混沌序列和浮点小波变换的盲水印
10
作者 王宇 王惠 蔡翔云 《计算机与信息技术》 2008年第5期58-59,共2页
利用同一密钥的混沌序列对经过置乱的水印信息实现双重加密,考虑小波变换的能量分布问题,把水印信息嵌入低频系数中,确保水印信息的可靠性。提取时利用图像复原方法实现盲检测。根据实验的结果和峰值信噪比(PSNR)的结果可知,该数字水印... 利用同一密钥的混沌序列对经过置乱的水印信息实现双重加密,考虑小波变换的能量分布问题,把水印信息嵌入低频系数中,确保水印信息的可靠性。提取时利用图像复原方法实现盲检测。根据实验的结果和峰值信噪比(PSNR)的结果可知,该数字水印具有较好的鲁棒性和安全性并有很好的不可见性。 展开更多
关键词 数字图像 LOGISTIC混沌序列 DB4小波变换
原文传递
扫黑除恶专项斗争小知识
11
《衡阳通讯》 2019年第4期48-48,共1页
中共中央、国务院部署扫黑除恶专项斗争的背景是什么?为深入贯彻落实党的十九大部署和习近平总书记重要指示精神,保障人民安居乐业、社会安定有序、国家长治久安,进一步巩固党的执政基础,党中央、国务院决定,在全国开展扫黑除恶专项斗... 中共中央、国务院部署扫黑除恶专项斗争的背景是什么?为深入贯彻落实党的十九大部署和习近平总书记重要指示精神,保障人民安居乐业、社会安定有序、国家长治久安,进一步巩固党的执政基础,党中央、国务院决定,在全国开展扫黑除恶专项斗争。扫黑除恶专项斗争的目标任务是什么?通过3年不懈努力,黑恶势力违法犯罪特别是农村涉黑涉恶问题得到根本遏制,涉黑涉恶治安乱点得到全面整治. 展开更多
关键词 有序 指示精神 人民 行业 乱点 社会安定 部署
原文传递
Cubature Formula for Spherical Basis Function Networks
12
作者 Shaobo LIN Feilong CAO +1 位作者 Zongben XU Xiaofei GUO 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 2012年第6期807-814,共8页
Some mathematical models in geophysics and graphic processing need to compute integrals with scattered data on the sphere.Thus cubature formula plays an important role in computing these spherical integrals.This paper... Some mathematical models in geophysics and graphic processing need to compute integrals with scattered data on the sphere.Thus cubature formula plays an important role in computing these spherical integrals.This paper is devoted to establishing an exact positive cubature formula for spherical basis function networks.The authors give an existence proof of the exact positive cubature formula for spherical basis function networks,and prove that the cubature points needed in the cubature formula are not larger than the number of the scattered data. 展开更多
关键词 Cubature formula Spherical basis function Scattered data
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部