期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
针对非连通流形数据降维的过渡曲线方法 被引量:2
1
作者 古楠楠 孟德宇 徐宗本 《软件学报》 EI CSCD 北大核心 2010年第8期1898-1907,共10页
针对位于非连通流形上的数据的特征提取是流形学习领域的一个公开问题,分解-整合算法是目前处理此问题的最有效的方法.然而,此算法的最大局限是边缘问题,即当不同类间的最短距数据对位于相应类内而非类边缘时,算法往往表现异常.针对这... 针对位于非连通流形上的数据的特征提取是流形学习领域的一个公开问题,分解-整合算法是目前处理此问题的最有效的方法.然而,此算法的最大局限是边缘问题,即当不同类间的最短距数据对位于相应类内而非类边缘时,算法往往表现异常.针对这一关键问题,提出了一种解决方法——过渡曲线方法.其主要思想为,通过构建连接不同类边缘最短距数据对间的平滑过渡曲线以使流形类间的连接关系更为有效,进而使得数据的全局形态在低维空间中能够更好地保持.一系列人工与图像数据集上的实验结果表明,过渡曲线方法的表现明显优于分解-整合算法,特别是,边缘问题得到了解决,这极大地扩展了分解-整合算法的应用范围. 展开更多
关键词 连通流形数据 数据降维 边缘问题 流形学习
下载PDF
穿墙雷达中的一种多层墙体强度补偿方法 被引量:1
2
作者 李志希 孔令讲 +1 位作者 贾勇 赵中兴 《雷达科学与技术》 2014年第1期91-96,100,共7页
在穿墙雷达建筑布局成像中,由墙体对电磁波信号的衰减而引起多层墙体成像强度的非均匀现象,这为建筑布局的重构带来极大的不便。对此提出一种基于霍夫变换门限检测的多层墙体衰减补偿方法。首先,对实测数据采用后向投影成像算法,并用基... 在穿墙雷达建筑布局成像中,由墙体对电磁波信号的衰减而引起多层墙体成像强度的非均匀现象,这为建筑布局的重构带来极大的不便。对此提出一种基于霍夫变换门限检测的多层墙体衰减补偿方法。首先,对实测数据采用后向投影成像算法,并用基于主成份分析和模糊逻辑图像增强方法处理,形成原始图像。其次,基于霍夫变换直线检测原理完成固定门限值的选取,并依此判决和划分目标墙体区域和非目标杂波区域。再次,根据门限判决后的数据连通域的特性,获得目标墙体连通域的强度补偿率并完成多层墙体衰减补偿。实测数据的处理验证了基于霍夫变换门限检测的多层墙体成像强度衰减补偿方法的有效性。 展开更多
关键词 穿墙雷达 建筑布局成像 图像补偿 霍夫变换 数据连通
下载PDF
手机终端技术及其发展趋势
3
作者 张延鸿 《电信交换》 2007年第2期47-48,F0003-F0004,共4页
本文对手机终端技术进行了介绍,包括多模接入、多媒体、智能化、数据连通、移动搜索、待电技术和时尚外形设计等多个方面,并分析了这些技术的发展趋势。
关键词 多模接入 多媒体 智能化 数据连通 超薄设计 手机 终端技术
下载PDF
On Maintenance of Inter-connectivity Among Multi-representations 被引量:1
4
作者 WANG Yan-hui MENG Hao LIU Xiao-meng 《Journal of China University of Mining and Technology》 EI 2006年第4期494-499,共6页
As the problems of conceptual and representational differences will arise among multi-representations, in- ter-connectivity maintenance among multi-representations exists as a foundational task in building multi-scale... As the problems of conceptual and representational differences will arise among multi-representations, in- ter-connectivity maintenance among multi-representations exists as a foundational task in building multi-scale data model. Since the existing methods are still not satisfactory in practice, the inter-connectivity among multiple representa- tions can be only achieved if the multi-scale model is capable of explicitly inter-relating them and dealing with their differences. So, this paper firstly explores the relation among multiple representations from the same entity, such as multi-semantic, multi-geometry, multi-attributes, hierarchical semantic relations and so on. Based on these, this paper proposes aggregation-based semantic hierarchical matching rules (ASHMR) as the basis of tackling inter-connectivity among multi-representations, and defines the available hierarchical semantic knowledge, namely semantically equal, semantically related and semantically irrelevant. According to different change among multi-representations from dif- ferent types of objects, the applications and techniques of the corresponding hierarchy inter-connectivity matching crite- rion are explored. And taken the road intersections as examples, a case in point is given in details for describing the strategies of inter-connectivity maintenance, showing that this method is feasible to deal with inter-connectivity. 展开更多
关键词 inter-connectivity multi-representation ASHMR hierarchical semantic relations data matching
下载PDF
Similarity based mixed transaction concurrency control protocol
5
作者 潘怡 《Journal of Chongqing University》 CAS 2005年第2期107-112,共6页
Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transact... Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transactions are not sufficient for mixed real-time database systems (MRTDBS), where different types of real-time transactions coexist in the systems concurrently. In this paper, a new concurrency control protocol MRTT_CC for mixed real-time transactions is proposed. The new strategy integrates with different concurrency control protocols to meet the deadline requirements of different types of real-time transactions. The data similarity concept is also explored in the new protocol to reduce the blocking time of soft real-time transactions, which increases their chances to meet the deadlines. Simulation experiments show that the new protocol has gained good performance. 展开更多
关键词 real-time database semantic concurrency control temporary consistency data similarity
下载PDF
基于项目制的企业运营管理模式及支撑平台研究 被引量:5
6
作者 李晓娟 胡杨博 邵壮 《项目管理技术》 2021年第1期45-50,共6页
在企业运营管理中,围绕不同阶段运营管理的需求,制定多种运营管理办法,并依据管理职能建立多个信息化支撑系统,可在一定程度上提升运营管理水平,但也会带来新的问题。尤其是随着项目的增多,问题愈加明显。基于此,提出建立新的“以项目... 在企业运营管理中,围绕不同阶段运营管理的需求,制定多种运营管理办法,并依据管理职能建立多个信息化支撑系统,可在一定程度上提升运营管理水平,但也会带来新的问题。尤其是随着项目的增多,问题愈加明显。基于此,提出建立新的“以项目为单位”的企业运营管理模式,构建以“合同为源头、项目为核心、报销为支撑”的运营管理平台,并通过实例验证该管理模式和平台的可行性。 展开更多
关键词 项目制 运营管理 部门制 数据连通
原文传递
Chaotic digital cryptosystem using serial peripheral interface protocol and its ds PIC implementation 被引量:1
7
作者 Rodrigo MéNDEZ-RAMíREZ Adrian ARELLANO-DELGADO +2 位作者 César CRUZ-HERNáNDEZ Fausto ABUNDIZ-PéREZ Rigoberto MARTíNEZ-CLARK 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第2期165-179,共15页
The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by... The current massive use of digital communications demands a secure link by using an embedded system(ES) with data encryption at the protocol level. The serial peripheral interface(SPI) protocol is commonly used by manufacturers of ESs and integrated circuits for applications in areas such as wired and wireless communications. We present the design and experimental implementation of a chaotic encryption and decryption algorithm applied to the SPI communication protocol. The design of the chaotic encryption algorithm along with its counterpart in the decryption is based on the chaotic Hénon map and two methods for blur and permute(in combination with DNA sequences). The SPI protocol is configured in 16 bits to synchronize a transmitter and a receiver considering a symmetric key. Results are experimentally proved using two low-cost dsPIC microcontrollers as ESs. The SPI digital-to-analog converter is used to process, acquire, and reconstruct confidential messages based on its properties for digital signal processing. Finally, security of the cryptogram is proved by a statistical test. The digital processing capacity of the algorithm is validated by dsPIC microcontrollers. 展开更多
关键词 Chaotic systems Statistical tests Embedded systems dsPIC microcontroller Serial peripheral interface (SPI)protocol
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部