期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
动态面向服务的黑盒子优化计算平台设计与实现
1
作者 祁超 GEORGE CHENG 张哲 《计算机应用》 CSCD 北大核心 2014年第5期1255-1258,1291,共5页
针对工程优化算法中黑盒子的高计算代价问题,提出一个基于River技术的动态面向服务优化计算平台(R-DSOCP)用于分布式并行计算黑盒子。首先分析优化算法中黑盒子的执行模式,遵循动态面向服务架构并围绕着River的服务发布和查找功能设计... 针对工程优化算法中黑盒子的高计算代价问题,提出一个基于River技术的动态面向服务优化计算平台(R-DSOCP)用于分布式并行计算黑盒子。首先分析优化算法中黑盒子的执行模式,遵循动态面向服务架构并围绕着River的服务发布和查找功能设计所需的核心服务并利用它们组建R-DSOCP;然后设计了一个基于蚁群优化的黑盒子调度问题(BSP)算法,调度服务利用该算法不仅能够快速为黑盒子选取最佳计算服务而且能够均衡平台负载;最后,实验结果表明在分离优化算法执行和黑盒子计算后,黑盒子在平台中得到了有效的并行计算,平均计算效率相比单计算节点提高近n倍,其中n为并行因子。因此借助高性能计算(HPC)技术,R-DSOCP在工程优化领域能够为提高优化算法速度并降低计算成本提供一个可行方案。 展开更多
关键词 黑盒子 代码基 蚁群优化 负载均衡 信息素
下载PDF
黑盒子的分布式计算框架研究
2
作者 张曦 《海峡科技与产业》 2016年第5期111-112,共2页
本文针对电子工程领域中黑盒子优化分析问题,提出一个基于River技术的动态面向服务优化计算框架(DSOCF),旨在分布式并行计算黑盒子,加快优化速度。首先分析优化算法中黑盒子的执行模式,然后遵循动态面向服务架构并围绕着River的服务发... 本文针对电子工程领域中黑盒子优化分析问题,提出一个基于River技术的动态面向服务优化计算框架(DSOCF),旨在分布式并行计算黑盒子,加快优化速度。首先分析优化算法中黑盒子的执行模式,然后遵循动态面向服务架构并围绕着River的服务发布和查找功能设计所需的核心服务并利用它们构建DSOCF,最后根据黑盒子在DSOCF中优化的实验数据证明该框架的有效性。 展开更多
关键词 连续盒子 分析任务 代码基
下载PDF
Proxy signature scheme for ID-based original signers and certificate-based proxy signers
3
作者 辛向军 孙垒 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期318-321,共4页
To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o... To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem. 展开更多
关键词 proxy signature ID-based cryptosystem bilinear pairings
下载PDF
Cooperative diversity based on rotation code 被引量:1
4
作者 熊雄 葛建华 +1 位作者 李靖 唐云帅 《Journal of Central South University》 SCIE EI CAS 2009年第2期280-284,共5页
In order to obtain coding gain along with diversity gain,rotation code was applied to cooperative diversity employing decoded-and-forward cooperative protocol.Different from the same two symbols transmitted in convent... In order to obtain coding gain along with diversity gain,rotation code was applied to cooperative diversity employing decoded-and-forward cooperative protocol.Different from the same two symbols transmitted in conventional repetition-coded scheme,two different symbols were transmitted separately in two successive timeslots in the proposed rotation-coded cooperative diversity.In this way,constellation spread in the available two-dimensional signal space rather than on a single-dimensional line in repetition-coded scheme,which was supposed to be responsible for the additional coding gain.Under the proposed cooperative transmission model,upper bounds for the symbol-error-rate(SER)of cooperative diversity based on repetition code and rotation code were derived respectively.Both analytical and simulated results show that cooperative diversity based on rotation code can obtain an improved coding gain(by about 2 dB)than repetition-coded scheme without the expense of power or bandwidth. 展开更多
关键词 cooperative diversity repetition code rotation code coding gain symbol-error-rate
下载PDF
Digital Rights Management:Model,Technology and Application 被引量:7
5
作者 Zhaofeng Ma 《China Communications》 SCIE CSCD 2017年第6期156-167,共12页
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ... with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality. 展开更多
关键词 digital rights management drm security infrastructure ENCRYPTION WATERMARK usage control drm-free
下载PDF
Absolute multi-pole encoder with a simple structure based on an improved gray code to enhance the resolution 被引量:1
6
作者 刘勇 《Journal of Chongqing University》 CAS 2009年第3期181-187,共7页
We developed a novel absolute multi-pole encoder structure to improve the resolution of the multi-pole encoder, realize absolute output and reduce the manufacturing cost of the encoder. The structure includes two ring... We developed a novel absolute multi-pole encoder structure to improve the resolution of the multi-pole encoder, realize absolute output and reduce the manufacturing cost of the encoder. The structure includes two ring alnicos defined as index track and sub-division track, respectively. The index track is magnetized based on the improved gray code, with linear halls placed around the track evenly. The outputs of linear halls show the region the rotor belongs to. The sub-division track is magnetized to N-S-N-S (north-south-north-south), and the number of N-S pole pairs is determined by the index track. Three linear hall sensors with an air-gap of 2 mm are used to translate the magnetic filed to voltage signals. The relative offset in a single N-S is obtained through look-up. The magnetic encoder is calibrated using a higher-resolution incremental optical encoder. The pulse output from the optical encoder and hall signals from the magnetic encoder are sampled at the same time and transmitted to a computer, and the relation between them is calculated, and stored in the FLASH of MCU (micro controller unit) for look-up. In the working state, the absolute angle is derived by looking-up with hall signals. The structure is simple and the manufacturing cost is very low and suitable for mass production. 展开更多
关键词 signal encoding magnetic encoder improved gray code absolute output
下载PDF
CTCPPre: A prediction method for accepted pull requests in GitHub 被引量:1
7
作者 JIANG Jing ZHENG Jia-teng +1 位作者 YANG Yun ZHANG Li 《Journal of Central South University》 SCIE EI CAS CSCD 2020年第2期449-468,共20页
As the popularity of open source projects,the volume of incoming pull requests is too large,which puts heavy burden on integrators who are responsible for accepting or rejecting pull requests.An accepted pull request ... As the popularity of open source projects,the volume of incoming pull requests is too large,which puts heavy burden on integrators who are responsible for accepting or rejecting pull requests.An accepted pull request prediction approach can help integrators by allowing them either to enforce an immediate rejection of code changes or allocate more resources to overcome the deficiency.In this paper,an approach CTCPPre is proposed to predict the accepted pull requests in GitHub.CTCPPre mainly considers code features of modified changes,text features of pull requests’description,contributor features of developers’previous behaviors,and project features of development environment.The effectiveness of CTCPPre on 28 projects containing 221096 pull requests is evaluated.Experimental results show that CTCPPre has good performances by achieving accuracy of 0.82,AUC of 0.76 and F1-score of 0.88 on average.It is compared with the state of art accepted pull request prediction approach RFPredict.On average across 28 projects,CTCPPre outperforms RFPredict by 6.64%,16.06%and 4.79%in terms of accuracy,AUC and F1-score,respectively. 展开更多
关键词 accepted pull request PREDICTION code review GitHub pull-based software development
下载PDF
信息技术对教育发展的影响分析
8
作者 李霞 《贵州民族学院学报(哲学社会科学版)》 2004年第1期151-154,共4页
2 1世纪是信息时代 ,当前中国教育在面临各种挑战越来越严峻的情况下 ,如何与时俱进 ,完成国民素质的改塑工程 ,这是中国教育界必须关注的重大课题。要尽快有计划、有选择地逐步在全国建立一批教育现代化实验学校 。
关键词 信息高速公路 代码 超文本 多媒体 超媒体 信息技术 教育发展 中国教育
下载PDF
Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings 被引量:7
9
作者 亓延峰 唐春明 +2 位作者 娄裕 徐茂智 郭宝安 《China Communications》 SCIE CSCD 2013年第11期37-41,共5页
Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi... Signcryption, which was introduced by ZHEN~ is a cryptographic primitive that fulfils the functions of both digital signature and encryption and guarantees confidentiality, integrity and non-repudiation in a more effi- cient way. Certificateless signcryption and pro- xy signcryption in identity-based cryptography were proposed for different applications. Most of these schemes are constructed by bilinear pairings from elliptic curves. However, some schemes were recently presented without pai- rings. In this paper, we present a certificateless proxy identity-based signcryption scheme with- out bilinear pairings, which is efficient and secure. 展开更多
关键词 certificateless signcryption iden-tity-based cryptography proxy signcryption elliptic curve discrete logarithm problem
下载PDF
Realtime robust speech communication based on iterative joint source-channel decoding and demodulation algorithm for MELP vocoder
10
作者 彭坦 Cui Huijuan Tang Kun 《High Technology Letters》 EI CAS 2010年第2期111-116,共6页
Realtime speech communications require high efficient compression algorithms to encode speech signals. As the compressed speech parameters are highly sensitive to transmission errors, robust source and channel decodin... Realtime speech communications require high efficient compression algorithms to encode speech signals. As the compressed speech parameters are highly sensitive to transmission errors, robust source and channel decoding and demodulation schemes are both important and of practical use. In this paper, an it- erative joint souree-channel decoding and demodulation algorithm is proposed for mixed excited linear pre- diction (MELP) vocoder by both exploiting the residual redundancy and passing soft information through- out the receiver while introducing systematic global iteration process to further enhance the performance. Being fully compatible with existing transmitter structure, the proposed algorithm does not introduce addi- tional bandwidth expansion and transmission delay. Simulations show substantial error correcting perfor- mance and synthesized speech quality improvement over conventional separate designed systems in delay and bandwidth constraint channels by using the joint source-channel decoding and demodulation (JSCCM) algorithm. 展开更多
关键词 speech coding joint souree-channel coding and modulation (JSCCM) iterative decoding
下载PDF
Differential expression of genes encoding sulfur metabolism-related periplasmic proteins of Acidithiobacillus ferrooxidans ATCC 23270
11
作者 夏金兰 张瑞永 +4 位作者 张倩 武顺 张成桂 聂珍媛 邱冠周 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2010年第12期2366-2370,共5页
Reverse-transcription qualitative PCR(RT-qPCR)was used to analyze the changes in transcription levels of the sulfur metabolism-related periplasmic protein genes of Acidithiobacillus ferrooxidans ATCC 23270 grown on su... Reverse-transcription qualitative PCR(RT-qPCR)was used to analyze the changes in transcription levels of the sulfur metabolism-related periplasmic protein genes of Acidithiobacillus ferrooxidans ATCC 23270 grown on sulfur or ferrous.Seven periplasmic proteins with apparently higher abundance grown on elemental sulfur than on ferrous sulfate were identified by matrix-assisted laser desorption ionization time-of-flight mass spectrometry(MALDI-TOF-MS).Expression analysis of the corresponding genes by RT-qPCR shows that the constitutive expression of all those genes are more up-regulated grown on sulfur than those grown on ferrous(>10 folder).Study on the corresponding genes of the identified periplasmic proteins by RT-qPCR confirmed the results of two-dimensioned gel electrophoresis,indicating they may be related with sulfur metabolism in A.ferrooxidans. 展开更多
关键词 Acidithiobacillus ferrooxidans RT-QPCR periplasmic proteins
下载PDF
THE F5 ALGORITHM IN BUCHBERGER'S STYLE 被引量:6
12
作者 Yao SUN Dingkang WANG 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2011年第6期1218-1231,共14页
The famous F5 algorithm for computing Grobner basis was presented by Faugere in 2002. The original version of F5 is given in programming codes, so it is a bit difficult to understand. In this paper, the F5 algorithm i... The famous F5 algorithm for computing Grobner basis was presented by Faugere in 2002. The original version of F5 is given in programming codes, so it is a bit difficult to understand. In this paper, the F5 algorithm is simplified as F5B in a Buchberger's style such that it is easy to understand and implement. In order to describe F5B, we introduce F5-reduction, which keeps the signature of labeled polynomials unchanged after reduction. The equivalence between F5 and F5B is also shown. At last, some versions of the F5 algorithm are illustrated. 展开更多
关键词 Buchberger's style F5 algorithm Grobner basis.
原文传递
A code-based approach for labeling in complex irregular regions
13
作者 Zhi-long LI Jun-jie CAO +1 位作者 Xiu-ping LIU Zhi-xun SU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第10期1450-1460,共11页
Labeling information in a complex irregular region is a useful procedure occurring frequently in sheet metal and the furniture industry which will be beneficial in parts management.A fast code-based labeler(FCBL) is p... Labeling information in a complex irregular region is a useful procedure occurring frequently in sheet metal and the furniture industry which will be beneficial in parts management.A fast code-based labeler(FCBL) is proposed to accomplish this objective in this paper.The region is first discretized,and then encoded by the Freeman encoding technique for providing the 2D regional information by 1D codes with redundancies omitted.We enhance the encoding scheme to make it more suitable for our complex problem.Based on the codes,searching algorithms are designed and can be extended with customized constraints.In addition,by introducing a smart optimal direction estimation,the labeling speed and accuracy of FCBL are significantly improved.Experiments with a large range of real data gained from industrial factories demonstrate the stability and millisecond-level speed of FCBL.The proposed method has been integrated into a shipbuilding CAD system,and plays a very important role in ship parts labeling process. 展开更多
关键词 LABELING Freeman codes Region filling Optimal direction SHIPBUILDING
原文传递
Transcriptomics:Advances and approaches 被引量:18
14
作者 DONG ZhiCheng CHEN Yan 《Science China(Life Sciences)》 SCIE CAS 2013年第10期960-967,共8页
Transcriptomics is one of the most developed fields in the post-genomic era.Transcriptome is the complete set of RNA transcripts in a specific cell type or tissue at a certain developmental stage and/or under a specif... Transcriptomics is one of the most developed fields in the post-genomic era.Transcriptome is the complete set of RNA transcripts in a specific cell type or tissue at a certain developmental stage and/or under a specific physiological condition,including messenger RNA,transfer RNA,ribosomal RNA,and other non-coding RNAs.Transcriptomics focuses on the gene expression at the RNA level and offers the genome-wide information of gene structure and gene function in order to reveal the molecular mechanisms involved in specific biological processes.With the development of next-generation high-throughput sequencing technology,transcriptome analysis has been progressively improving our understanding of RNA-based gene regulatory network.Here,we discuss the concept,history,and especially the recent advances in this inspiring field of study. 展开更多
关键词 TRANSCRIPTOMICS next-generation sequencing (NGS) non-coding RNA RNA-SEQ
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部