期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
著者号码计算机自动提取的实现方法 被引量:3
1
作者 王泽贤 邓尧伟 +1 位作者 刘洪斌 何涛 《情报杂志》 CSSCI 北大核心 2003年第8期82-84,87,共4页
介绍了“著者号码计算机查询管理系统”实现的方法 ,包括中、英文著者的取号规则 ,系统的数据库结构 。
关键词 著者号码 计算机查询管理系统 图书编目 索书号 取码规则 图书查询 数据库 功能模块 算法
下载PDF
二维动态加密算法示例及其应用
2
作者 邓寒 刘坤 金瑶 《科技创新导报》 2010年第32期29-29,共1页
随着人类社会逐渐步入信息时代,信息安全也越来越受到了关注。对计算机而言,信息表现为各种各样的数据,是否采用了适当的方法对数据进行加密,已成为保障数据安全的首要方法,寻求一种安全可靠的加密算法对信息进行加密,使信息即使被截取... 随着人类社会逐渐步入信息时代,信息安全也越来越受到了关注。对计算机而言,信息表现为各种各样的数据,是否采用了适当的方法对数据进行加密,已成为保障数据安全的首要方法,寻求一种安全可靠的加密算法对信息进行加密,使信息即使被截取了也不能被读取出来。 展开更多
关键词 二维加密 循环编码 动态密钥 动态密码条 赋步取码函数 明文加密位置填充函数
下载PDF
实用汉字输入法——太极码简介
3
作者 王志刚 岳千钧 《实验教学与仪器》 1994年第Z1期48-49,共2页
随着计算机在我国的普及和发展,先后涌现出许多各具特色的计算机汉字输入法,由顺天电脑公司推出的太极码(两笔字型)就是其中一例。它在很大程度上解决了汉字输入的简易性与高效性之间的矛盾,是一种普及型汉字输入法,今年已被列入国家级... 随着计算机在我国的普及和发展,先后涌现出许多各具特色的计算机汉字输入法,由顺天电脑公司推出的太极码(两笔字型)就是其中一例。它在很大程度上解决了汉字输入的简易性与高效性之间的矛盾,是一种普及型汉字输入法,今年已被列入国家级火炬计划。 展开更多
关键词 太极 计算机汉字输入法 字元 取码 字型 拆分 汉字系统 长沙电力学院 简易性 基本笔画
下载PDF
几种号码排检法浅析
4
作者 谢薇薇 《湘潭大学学报(哲学社会科学版)》 CSSCI 1989年第S1期116-119,共4页
我国汉字构造复杂,数量庞大,字与字之间没有严密的顺序,因而排检十分不便。从古至今,人们一直在寻求着科学的汉字排检方法,到目前为止,人们已从不同的角度编制了上百种不同体例的检字法,归纳起来可分为形序法、号码法、音序法。在此,本... 我国汉字构造复杂,数量庞大,字与字之间没有严密的顺序,因而排检十分不便。从古至今,人们一直在寻求着科学的汉字排检方法,到目前为止,人们已从不同的角度编制了上百种不同体例的检字法,归纳起来可分为形序法、号码法、音序法。在此,本文想谈谈汉字的号码排检法。 展开更多
关键词 四角号码法 笔形 排检法 检字法 汉字排检 高低法 取码 重码 笔号 码字
下载PDF
电子计算机“三笔”汉字输入法
5
《殷都学刊》 1985年第4期4-4,共1页
我室最近研究出一种“三笔”汉字输入技术。该方案吸取了已有输入法的优点,根据便于掌握、易于推广的原则,按照人们书写汉字的习惯,把中文信息输入计算机。
关键词 汉字输入法 电子计算机 便于掌握 中文信息 输入计算机 研究出 组成规律 标准键 助字 取码
下载PDF
T形汉字码输入法
6
作者 王治阳 《计算机时代》 2014年第8期11-13,16,共4页
T形汉字码输入法的提出,目的是提供一种易学易用、汉字部件规范直观、取码规则合理、重码率低、能够高速盲打或听打的计算机汉字编码输入法。它由拼音码和形部编码两部分组成,形部编码优选28个左右的多笔画部件和5种基本笔画,形部编码... T形汉字码输入法的提出,目的是提供一种易学易用、汉字部件规范直观、取码规则合理、重码率低、能够高速盲打或听打的计算机汉字编码输入法。它由拼音码和形部编码两部分组成,形部编码优选28个左右的多笔画部件和5种基本笔画,形部编码的取码规则规定为:左右结构的汉字,分别按书写顺序取该汉字的左部和右部的第一个基本部件的代码进行编码;非左右结构的汉字,按书写顺序取该汉字的第一个和最末一个基本部件的代码编码。 展开更多
关键词 拼音 取码 简单 快速 输入法
下载PDF
Decomposition behavior of CaSO_4 during potassium extraction from a potash feldspar-CaSO_4 binary system by calcination 被引量:7
7
作者 Li Lü Chun Li +2 位作者 Guoquan Zhang Xiaowei Hu Bin Liang 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2018年第4期838-844,共7页
The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted sl... The extraction of potassium from a tablet mixture of K-feldspar ore and CaSO4by roasting was studied with a focus on the effects of the decomposition behavior of CaSO4on the potassium extraction process.The roasted slags were characterized by X-ray diffraction(XRD),scanning electron microscopy(SEM),energy-dispersive X-ray spectroscopy,and thermogravimetric(TG)analysis.The XRD analysis revealed that hydrosoluble mischcrystal K2Ca2(SO4)3was obtained by ion exchange of Ca^2+ in CaSO4 and K^+ in KAlSi3O8.Meanwhile,the intermediate product,SiO2,separated from KAl Si3O8and reacted with CaSO4to decompose CaSO4.The SEM results showed that some blowholes emerged on the surface of the CaSO4particles when they reacted with SiO2at 1200℃,which indicates that SO2and O2gases were released from CaSO4.The TG curves displayed that pure CaSO4could not be decomposed below 1200℃,while the mixture of K-feldspar ore and CaSO4began to lose weight at 1000℃.The extraction rate of potassium and decomposition rate of CaSO4were 62%and 44%,respectively,at a mass ratio of CaSO4to K-feldspar ore of 3:1,temperature of 1200℃,tablet-forming pressure of6 MPa,and roasting time of 2 h.The decomposition of CaSO4reduced the potassium extraction rate;therefore,the required amount of CaSO4was more than the theoretical amount.However,excess CaSO4was also undesirable for the potassium extraction reaction because a massive amount of SO2and O2gas were derived from the decomposition of CaSO4,which provided poor contact between the reactants.The SO2released from CaSO4decomposition can be effectively recycled. 展开更多
关键词 K-feldspar Calcium sulfate Potassium extraction Calcium sulfate decomposition Roasting
下载PDF
Polar Coded Iterative Multiuser Detection for Sparse Code Multiple Access System 被引量:1
8
作者 Hang MU Youhua Tang +3 位作者 Li Li Zheng Ma Pingzhi Fan Weiqiang Xu 《China Communications》 SCIE CSCD 2018年第11期51-61,共11页
Polar coded sparse code multiple access(SCMA) system is conceived in this paper. A simple but new iterative multiuser detection framework is proposed, which consists of a message passing algorithm(MPA) based multiuser... Polar coded sparse code multiple access(SCMA) system is conceived in this paper. A simple but new iterative multiuser detection framework is proposed, which consists of a message passing algorithm(MPA) based multiuser detector and a soft-input soft-output(SISO) successive cancellation(SC) polar decoder. In particular, the SISO polar decoding process is realized by a specifically designed soft re-encoder, which is concatenated to the original SC decoder. This soft re-encoder is capable of reconstructing the soft information of the entire polar codeword based on previously detected log-likelihood ratios(LLRs) of information bits. Benefiting from the soft re-encoding algorithm, the resultant iterative detection strategy is able to obtain a salient coding gain. Our simulation results demonstrate that significant improvement in error performance is achieved by the proposed polar-coded SCMA in additive white Gaussian noise(AWGN) channels, where the performance of the conventional SISO belief propagation(BP) polar decoder aided SCMA, the turbo coded SCMA and the low-density parity-check(LDPC) coded SCMA are employed as benchmarks. 展开更多
关键词 iterative multiuser receiver polarcode sparse code multiple access (SCMA)
下载PDF
Research on Recognition Method of Handwritten Numerals Segmentation based on B-P Neural Network
9
作者 Ningfang Wei 《International Journal of Technology Management》 2013年第1期112-114,共3页
We propose a binarization method based pigment in the ZIP code of 24 bmp image simulation and digital identification by CCD sensors, were extracted the grid binary, image of zip code box and message of the two charact... We propose a binarization method based pigment in the ZIP code of 24 bmp image simulation and digital identification by CCD sensors, were extracted the grid binary, image of zip code box and message of the two characters binary image: analyze the image processing, which includes code frame edge detection and separation of the image binarization, denoising smoothing, tilt correction, the extraction code number, position, normalization processing, digital image thinning, character recognition feature extraction. Through testing, the recognition rate of this method can be over 90%. The recognition time of characters for character is less than 1.3 second, which means the method is of more effective recognition ability and can better satisfy the real system requirements. 展开更多
关键词 fuzzy recognition BP neural network zip code
下载PDF
A NEW APPROACH TO DVC COMBINED WITH ROI EXTRACTION AND RESIDUAL VIDEO CODING FOR MULTIMEDIA SENSOR NETWORKS
10
作者 Lin Zhaoxiao Sun Lijuan +1 位作者 Xiao Fu Wang Ruchuan 《Journal of Electronics(China)》 2013年第1期17-24,共8页
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual co... The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme. 展开更多
关键词 Distributed Video Coding (DVC) Residual video coding Region Of Interest (ROI)
下载PDF
Sparsity-Assisted Intelligent Condition Monitoring Method for Aero-engine Main Shaft Bearing 被引量:4
11
作者 DING Baoqing WU Jingyao +3 位作者 SUN Chuang WANG Shibin CHEN Xuefeng LI Yinghong 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2020年第4期508-516,共9页
Weak feature extraction is of great importance for condition monitoring and intelligent diagnosis of aeroengine.Aimed at achieving intelligent diagnosis of aero-engine main shaft bearing,an enhanced sparsity-assisted ... Weak feature extraction is of great importance for condition monitoring and intelligent diagnosis of aeroengine.Aimed at achieving intelligent diagnosis of aero-engine main shaft bearing,an enhanced sparsity-assisted intelligent condition monitoring method is proposed in this paper.Through analyzing the weakness of convex sparse model,i.e.the tradeoff between noise reduction and feature reconstruction,this paper proposes an enhanced-sparsity nonconvex regularized convex model based on Moreau envelope to achieve weak feature extraction.Accordingly,a sparsity-assisted deep convolutional variational autoencoders network is proposed,which achieves the intelligent identification of fault state through training denoised normal data.Finally,the effectiveness of the proposed method is verified through aero-engine bearing run-to-failure experiment.The comparison results show that the proposed method is good at abnormal pattern recognition,showing a good potential for weak fault intelligent diagnosis of aero-engine main shaft bearings. 展开更多
关键词 aero-engine main shaft bearing intelligent condition monitoring feature extraction sparse model variational autoencoders deep learning
下载PDF
Research on Recognition Method of Handwritten Numerals Segmentation based on B-P Neural Network
12
作者 Ningfang Wei 《International Journal of Technology Management》 2013年第7期64-66,共3页
We propose a binarization method based pigment in the ZIP code of 24 bmp image simulation and digital identification by CCD sensors, were extracted the grid binary image of zip code box and message of the two characte... We propose a binarization method based pigment in the ZIP code of 24 bmp image simulation and digital identification by CCD sensors, were extracted the grid binary image of zip code box and message of the two characters binary image; analyze the image processing, which includes code frame edge detection and separation of the image binarization, denoising smoothing, tilt correction, the extraction code number, position, normalization processing, digital image thinning, character recognition feature extraction. Through testing, the recognition rate of this method can be over 90%. The recognition time of characters for character is less than 1.3 second, which means the method is of more effective recognition ability and can better satisfy the real system requirements. 展开更多
关键词 fuzzy recognition: BP neural network zip code
下载PDF
Automatic malware classification and new malware detection using machine learning 被引量:10
13
作者 Liu LIU Bao-sheng WANG +1 位作者 Bo YU Qiu-xi ZHONG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第9期1336-1347,共12页
The explosive growth ofmalware variants poses a major threat to information security. Traditional anti-virus systems based on signatures fail to classify unknown malware into their corresponding families and to detect... The explosive growth ofmalware variants poses a major threat to information security. Traditional anti-virus systems based on signatures fail to classify unknown malware into their corresponding families and to detect new kinds of malware pro- grams. Therefore, we propose a machine learning based malware analysis system, which is composed of three modules: data processing, decision making, and new malware detection. The data processing module deals with gray-scale images, Opcode n-gram, and import fimctions, which are employed to extract the features of the malware. The decision-making module uses the features to classify the malware and to identify suspicious malware. Finally, the detection module uses the shared nearest neighbor (SNN) clustering algorithm to discover new malware families. Our approach is evaluated on more than 20 000 malware instances, which were collected by Kingsoft, ESET NOD32, and Anubis. The results show that our system can effectively classify the un- known malware with a best accuracy of 98.9%, and successfully detects 86.7% of the new malware. 展开更多
关键词 Malware classification Machine learning N-GRAM Gray-scale image Feature extraction Malware detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部