期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
Classification Method of Graphlike Manifold
1
作者 WANGYu-min LIQi-sheng LIUZhen 《Chinese Quarterly Journal of Mathematics》 CSCD 2003年第2期178-181,共4页
In this paper,we give a kind of method which can easily be operated to classify the graphlike manifold with contraction.
关键词 CLASSIFICATION MANIFOLD
下载PDF
Vehicle detection algorithm based on codebook and local binary patterns algorithms 被引量:1
2
作者 许雪梅 周立超 +1 位作者 墨芹 郭巧云 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第2期593-600,共8页
Detecting the moving vehicles in jittering traffic scenes is a very difficult problem because of the complex environment.Only by the color features of the pixel or only by the texture features of image cannot establis... Detecting the moving vehicles in jittering traffic scenes is a very difficult problem because of the complex environment.Only by the color features of the pixel or only by the texture features of image cannot establish a suitable background model for the moving vehicles. In order to solve this problem, the Gaussian pyramid layered algorithm is proposed, combining with the advantages of the Codebook algorithm and the Local binary patterns(LBP) algorithm. Firstly, the image pyramid is established to eliminate the noises generated by the camera shake. Then, codebook model and LBP model are constructed on the low-resolution level and the high-resolution level of Gaussian pyramid, respectively. At last, the final test results are obtained through a set of operations according to the spatial relations of pixels. The experimental results show that this algorithm can not only eliminate the noises effectively, but also save the calculating time with high detection sensitivity and high detection accuracy. 展开更多
关键词 background modeling Gaussian pyramid CODEBOOK Local binary patterns(LBP) moving vehicle detection
下载PDF
Major factors influencing reading comprehension: A factor analysis approach
3
作者 WU Hong-yun HU Ping 《Sino-US English Teaching》 2007年第9期14-18,28,共6页
The present study attempts to identify the major factors influencing EFL reading comprehension by drawing on the data collected from questionnaire and tests. The findings indicate that reading comprehension is compose... The present study attempts to identify the major factors influencing EFL reading comprehension by drawing on the data collected from questionnaire and tests. The findings indicate that reading comprehension is composed of three major components: "Schema", "Vocabulary", and "Motivation & Purpose". These three components are made up of the following six factors respectively: "textual schema", "extra-textual schema", "vocabulary guessing", "vocabulary noticing", "motivation" and "purpose". Among the major components of reading comprehension, the four factors of "textual schema", "vocabulary guessing", "vocabulary noticing" and "motivation" are significantly correlated with reading comprehension. 展开更多
关键词 reading comprehension SCHEMA VOCABULARY MOTIVATION
下载PDF
Study on the Design Method of the Jack-up's X-Type Cantilever Allowable Load Nephogram 被引量:1
4
作者 Yazhou Zhu Chengmeng Sun +2 位作者 Hongde Qin Bin Jiang Yansong Fan 《Journal of Marine Science and Application》 2014年第3期315-320,共6页
The extending of a cantilever and transverse moving of a drilling floor enable the jack-up to operate in several well positions after the Jack-up has pitched. The cantilever allowable load nephogram is the critical re... The extending of a cantilever and transverse moving of a drilling floor enable the jack-up to operate in several well positions after the Jack-up has pitched. The cantilever allowable load nephogram is the critical reference which can evaluate the jack-up's drilling ability, design the cantilever structure and instruct a jack-up manager to make the operations safe. The intent of this paper is to explore the interrelationships between the cantilever position, drilling floor and the loads including wind force, the stand set-back weight etc., through analyzing the structure and load characteristics of the x-type cantilever and the simplified mechanics model with the restriction of the maximum moment capacity of the cantilever single side beam. Referring to several typical position designs load values, the cantilever allowable load nephogram is obtained by using the suitable interpolation method. The paper gives a method for cantilever allowable load design, which is proved reliable and effective by the calculation example. 展开更多
关键词 JACK-UP cantilever expand cantilever allowable loadnephogram drilling ability x-type cantilever
下载PDF
Jacquard image segmentation using Mumford-Shah model
5
作者 冯志林 尹建伟 +1 位作者 陈刚 董金祥 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第2期109-116,共8页
Jacquard image segmentation is one of the primary steps in image analysis for jacquard pattern identification. The main aim is to recognize homogeneous regions within a jacquard image as distinct, which belongs to dif... Jacquard image segmentation is one of the primary steps in image analysis for jacquard pattern identification. The main aim is to recognize homogeneous regions within a jacquard image as distinct, which belongs to different patterns. Active contour models have become popular for finding the contours of a pattern with a complex shape. However, the performance of active contour models is often inadequate under noisy environment. In this paper, a robust algorithm based on the Mumford-Shah model is proposed for the segmentation of noisy jacquard images. First, the Mumford-Shah model is discretized on piecewise linear finite element spaces to yield greater stability. Then, an iterative relaxation algorithm for numerically solving the discrete version of the model is presented. In this algorithm, an adaptive triangular mesh is refined to generate Delaunay type triangular mesh defined on structured triangulations, and then a quasi-Newton numerical method is applied to find the absolute minimum of the discrete model. Experimental results on noisy jacquard images demonstrated the efficacy of the proposed algorithm. 展开更多
关键词 Mumford-Shah model Image segmentation Active contour Variational method Jacquard image
下载PDF
Exact Solutions to a (3+1)-Dimensional Variable-Coefficient Kadomtsev-Petviashvilli Equation via the Bilinear Method and Wronskian Technique
6
作者 ZHANG Chcng TIAN Bo +4 位作者 XU Tao LI Li-Li Lü Xing GENG Tao ZHU Hong-Wu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第9期468-472,共5页
By truncating the Painleve expansion at the constant level term,the Hirota bilinear form is obtainedfor a (3+1)-dimensional variable-coefficient Kadomtsev-Petviashvili equation.Based on its bilinear form,solitary-wave... By truncating the Painleve expansion at the constant level term,the Hirota bilinear form is obtainedfor a (3+1)-dimensional variable-coefficient Kadomtsev-Petviashvili equation.Based on its bilinear form,solitary-wavesolutions are constructed via the ε-expansion method and the corresponding graphical analysis is given.Furthermore,the exact solution in the Wronskian form is presented and proved by direct substitution into the bilinear equation. 展开更多
关键词 (3+1)-dimensional variable-coefficient Kadomtsev-Petviashvili equation Wronskian solution bilinear form exact solution
下载PDF
Enhancing real-time performance via controlled actor relocation in wireless sensor and actor networks
7
作者 车楠 Li Zhijun Jiang Shouxu 《High Technology Letters》 EI CAS 2013年第1期92-97,共6页
Actors'relocation is utilized during the network initialization to enhance real-time performance of wireless sensor and actor networks(WSANs)which is an important issue of WSANs.The actor deployment problem in WSA... Actors'relocation is utilized during the network initialization to enhance real-time performance of wireless sensor and actor networks(WSANs)which is an important issue of WSANs.The actor deployment problem in WSANs is proved NP-Hard whether the amount of actors is redundant or not,but to the best of our knowledge,no effective distributed algorithms in previous research can solve the problem.Thus two actor deployment strategies which need not the boundary control compared with present deployment strategies are proposed to solve this problem approximately based on the Voronoi diagram.Through simulation experiment,the results show that our distributed strategies are more effective than the present deployment strategies in terms of real-time performance,convergence time and energy consumption. 展开更多
关键词 wireless sensor and actor networks (WSANs) REAL-TIME relocation strategy Voronoi diagram
下载PDF
SAR imagery coding based on blocking high frequency energy matching 被引量:1
8
作者 陈德元 Luan +2 位作者 Enjie Tu Guofang 《High Technology Letters》 EI CAS 2009年第4期378-383,共6页
A new fractal image compression algorithm based on high frequency energy (HFE) partitioning andmatched domain block searching is presented to code synthetic aperture radar (SAR) imagery. In the hybridcoding algorithm,... A new fractal image compression algorithm based on high frequency energy (HFE) partitioning andmatched domain block searching is presented to code synthetic aperture radar (SAR) imagery. In the hybridcoding algorithm, the original SAR image is decomposed to low frequency components and high frequencycomponents by wavelet transform (WT). Then the coder uses HFE of block to partition and searchthe matched domain block for each range block to code the low frequency components. For the high frequencycomponents, a modified embedded zero-tree wavelet coding algorithm is applied. Experiment resultsshow that the proposed coder obtains about 0. 3dB gain when compared to the traditional fractal coderbased on the quadtree partition. Moreover, the subjective visual quality of the reconstructed SAR imageof the proposed coder outperforms that of the traditional fractal coders in the same compression ratio(CR). 展开更多
关键词 synthetic aperture radar (SAR) fractal image compression wavelet transform high frequency energy (HFE)
下载PDF
A Heuristic Approach to Fast NOVCA (Near Optimal Vertex Cover Algorithm)
9
作者 Sanj aya Gajurel Roger Bielefeld 《Computer Technology and Application》 2014年第2期83-90,共8页
This paper describes an extremely fast polynomial time algorithm, the NOVCA (Near Optimal Vertex Cover Algorithm) that produces an optimal or near optimal vertex cover for any known undirected graph G (V, E). NOVC... This paper describes an extremely fast polynomial time algorithm, the NOVCA (Near Optimal Vertex Cover Algorithm) that produces an optimal or near optimal vertex cover for any known undirected graph G (V, E). NOVCA is based on the idea of(l) including the vertex having maximum degree in the vertex cover and (2) rendering the degree of a vertex to zero by including all its adjacent vertices. The three versions of algorithm, NOVCA-I, NOVCA-II, and NOVCA-random, have been developed. The results identifying bounds on the size of the minimum vertex cover as well as polynomial complexity of algorithm are given with experimental verification. Future research efforts will be directed at tuning the algorithm and providing proof for better approximation ratio with NOVCA compared to any available vertex cover algorithms. 展开更多
关键词 Vertex cover problem combinatorial problem NP-complete problem approximation algorithm OPTIMIZATION algorithms.
下载PDF
On k-Star Arboricity of Graphs
10
作者 陶昉昀 林文松 《Journal of Donghua University(English Edition)》 EI CAS 2014年第3期335-338,共4页
A star forest is a forest whose components are stars. The star arboricity of a graph G,denoted by sa( G),is the minimum number of star forests needed to decompose G. Let k be a positive integer. A k-star forest is a... A star forest is a forest whose components are stars. The star arboricity of a graph G,denoted by sa( G),is the minimum number of star forests needed to decompose G. Let k be a positive integer. A k-star forest is a forest whose components are stars of order at most k + 1. The k-star arboricity of a graph G,denoted by sak( G),is the minimum number of k-star forests needed to decompose G. In this paper,it is proved that if any two vertices of degree 3 are nonadjacent in a subcubic graph G then sa2( G) ≤2.For general subcubic graphs G, a polynomial-time algorithm is described to decompose G into three 2-star forests. For a tree T and[Δ k, T)/k]t≤ sak( T) ≤[Δ( T)- 1/K]+1,where Δ( T) is the maximum degree of T.kMoreover,a linear-time algorithm is designed to determine whether sak( T) ≤m for any tree T and any positive integers m and k. 展开更多
关键词 star arboricity k-star arboricity linear k-arboricity cubic graphs subcubic graphs
下载PDF
图解经方初探 被引量:4
11
作者 魏赈权 关瑞花 +2 位作者 谭妍妍 孔令新 马新童 《中华中医药杂志》 CAS CSCD 北大核心 2020年第3期1140-1144,共5页
方以药成,药物通过合理配伍形成方剂。仲景经方,组方更为规范,探究其组方规律对于理解经方功效,提高临证经方运用水平具有重要意义。长期以来方剂学中一直将君臣佐使作为组方的一般规律,强调组方的主次结构,而忽略了中医学独特的平衡圆... 方以药成,药物通过合理配伍形成方剂。仲景经方,组方更为规范,探究其组方规律对于理解经方功效,提高临证经方运用水平具有重要意义。长期以来方剂学中一直将君臣佐使作为组方的一般规律,强调组方的主次结构,而忽略了中医学独特的平衡圆通观念。中医学以阴阳五行为本,河洛文化为阴阳五行术数之源,因此以河洛之理探讨经方组方规律为溯源之举。文章根据中医平衡圆通观念和河图象数思维,构建解析经方规律的五六法式图,提出“以图解方”的经方组方规律研究新方法。 展开更多
关键词 解方 法式图 洛书 经方
原文传递
再论《营造法式》中的“分心斗底槽”与“金箱斗底槽”
12
作者 朱永春 《建筑史》 2018年第1期79-87,共9页
本文从《营造法式》图样'殿堂八铺作双槽草架侧样图'中一条小注'斗底槽准此,下双槽同'的疏证开始,指出将其通释成'’斗底槽’侧样与’双槽’侧样相同',有悖于古籍训诂中'随文释义注疏'的原则。进而指出... 本文从《营造法式》图样'殿堂八铺作双槽草架侧样图'中一条小注'斗底槽准此,下双槽同'的疏证开始,指出将其通释成'’斗底槽’侧样与’双槽’侧样相同',有悖于古籍训诂中'随文释义注疏'的原则。进而指出:将'斗底'解释成'斗'的形态(回字形)的一个无法逾越的障碍,是'斗形'与条状的'槽'相悖。既然《营造法式》是以'殿阁地盘图'与'草架侧样图'配合,来描述殿堂结构,就不应当脱离殿堂结构的属性去建空中楼阁。指出:'铺作层'是殿堂结构的特征,殿阁地盘图则是描述铺作层分槽形式的图,草架侧样图中的铺作形式,则反映了槽的深度。 展开更多
关键词 《营造法式》地盘分槽 斗底 殿堂结构 分槽形式 分心斗底槽 金箱斗底槽
原文传递
Jigsaw Strategy as a Cooperative Learning Technique:Focusing on the Language Learners 被引量:4
13
作者 乔梦铎 金晓玲 《Chinese Journal of Applied Linguistics》 2010年第4期113-125,127,共14页
拼图式教学法是一种合作学习的技巧。自从此教学法创立以来,研究者和教师们一直在不同层次和不同学科的课堂上以各种各样的方式研究它。然而,本研究不同于以往的研究,其目的在于探索在大学英语课堂上能否成功地运用拼图式教学,将听、读... 拼图式教学法是一种合作学习的技巧。自从此教学法创立以来,研究者和教师们一直在不同层次和不同学科的课堂上以各种各样的方式研究它。然而,本研究不同于以往的研究,其目的在于探索在大学英语课堂上能否成功地运用拼图式教学,将听、读、重复、背诵、复述以及写融为一体(即L+4R+W),完成教学任务。课堂实施拼图式教学实验后,研究者进行了问卷调查,分析了调查结果,并提出相关的看法。在英语作为外语的课堂上实施拼图式教学策略可以使语言学习者成为课堂的中心,使语言学习成为学习者之间相互依赖而不是彼此独立的活动。本研究得出的结论是:拼图式教学策略不仅是英语作为外语的课堂上以语言学习者为中心来完成学习任务的有用技巧,而且是督促学生参与课堂活动、调动学生学习热情的一种有效方式。 展开更多
关键词 JIGSAW cooperative learning language learners EFL classroom L+ four R’s + W
原文传递
Detection of microRNA expressions in tissues and exfoliative cells reveals the potential role of miR-203 in oral lichen planus 被引量:1
14
作者 冯震东 史闻 +2 位作者 蔡志刚 华红 周德敏 《Journal of Chinese Pharmaceutical Sciences》 CAS CSCD 2014年第5期279-286,共8页
Oral lichen planus (OLP) is a chronic inflammatory disorder and premalignantlesion, of which the mechanisms are still obscure. In the present study, the expression levels of miR-96/182/183 cluster, miR-203, miR-375,... Oral lichen planus (OLP) is a chronic inflammatory disorder and premalignantlesion, of which the mechanisms are still obscure. In the present study, the expression levels of miR-96/182/183 cluster, miR-203, miR-375, and miR-769-5p in both tissues and exfoliative cells of OLP patients as well as healthy volunteers were detected, differentially expressed miRNAs were identified and their correlation with OLP was evaluated by a biplot method. Experimental results show that miR-203 is significantly up-regulated in patient lesion tissues in comparison to volunteer mucosa tissues. Moreover, the contra- dictory insignificant expression changes of miR-203 as well as miR-96/182/183 cluster in comparisons of exfoliative cell samples suggest that different cell compositions in OLP lesion have distinct miRNA regulation, which accords with the histological heterogeneity of OLP. Finally, biplot analyses indicate the expression of miR-203 and miR-96/182/183 cluster are positively correlated in patient lesions. These results provide miR-203 as a molecular indicator of heterogeneity of OLP, and also a potential diagnostic biomarker or therapeutic target that deserves further studies. 展开更多
关键词 Oral lichen planus MICRORNA RT-QPCR Biplot method miR-203
原文传递
Lump Solution of (2+1)-Dimensional Boussinesq Equation 被引量:5
15
作者 马彩虹 邓爱平 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第5期546-552,共7页
A class of lump solutions of(2+1)-dimensional Boussinesq equation are obtained with the help of Maple by using Hirota bilinear method.Some contour plots with different determinant values are sequentially made to show ... A class of lump solutions of(2+1)-dimensional Boussinesq equation are obtained with the help of Maple by using Hirota bilinear method.Some contour plots with different determinant values are sequentially made to show that the corresponding lump solution tends to zero when the determinant approaches zero.The particular lump solutions with specific values of the involved parameters are plotted,as illustrative examples. 展开更多
关键词 lump solution Boussinesq equation exact solution soliton Hirota bilinear method
原文传递
DETERMINATION OF THE DENSEST SUBGRAPH
16
作者 DONGJinquan LIUYanpei 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2004年第1期23-27,共5页
Define the density d(G) of a graph G as (ε(G))/(v(G)). A polynomialalgorithm for finding the densest subgraph of a graph is provided. Some results related to thedensity of the densest subgraph of a graph are obtained... Define the density d(G) of a graph G as (ε(G))/(v(G)). A polynomialalgorithm for finding the densest subgraph of a graph is provided. Some results related to thedensity of the densest subgraph of a graph are obtained as well. 展开更多
关键词 DENSITY ALGORITHM ORIENTATION computable
原文传递
A method for brain 3D surface reconstruction from MR images 被引量:2
17
作者 赵德新 《Optoelectronics Letters》 EI 2014年第5期383-386,共4页
Due to the encephalic tissues are highly irregular, three-dimensional (3D) modeling of brain always leads to compli- cated computing. In this paper, we explore an efficient method for brain surface reconstruction fr... Due to the encephalic tissues are highly irregular, three-dimensional (3D) modeling of brain always leads to compli- cated computing. In this paper, we explore an efficient method for brain surface reconstruction from magnetic reso- nance (MR) images of head, which is helpful to surgery planning and tumor localization. A heuristic algorithm is pro- posed foi" surface triangle mesh generation with preserved features, and the diagonal length is regarded as the heuristic information to optimize the shape of triangle. The experimental results show that our approach not only reduces the computational complexity, but also completes 3D visualization with good quality. 展开更多
关键词 Heuristic algorithms Magnetic resonance imaging Mesh generation Surface reconstruction Three dimensional computer graphics
原文传递
A Semi-Fragile Wavelet Transform Watermarking Scheme for Content Authentication of Images
18
作者 宋好好 张艳 邹春明 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第5期569-573,共5页
A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform(WT) is presented in this paper.It is tolerant to the embedded wavelet image compression methods based on WT suc... A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform(WT) is presented in this paper.It is tolerant to the embedded wavelet image compression methods based on WT such as embedded zerotree wavelet(EZW) ,set partitioning in hierarchical trees(SPIHT) and embedded block coding with optimized truncation(EBCOT) in JPEG2000 to a pre-determined bit-plane,but is sensitive to all other malicious attacks.The image features are generated from the lowest-frequency(LF) subband of the original image as the embedded watermark.The watermark is embedded into the pre-determined bit-plane by adjusting the corresponding values in the given subband.In the process of watermarking authentication,we compare the image features generated from the LF subband of the received image with the embedded watermarking information(the image features of the original image) extracted from the pre-determined bit-plane in the given subband of the received image to decide whether the image is attacked maliciously or processed acceptably(the embedded wavelet compression) .The most important advantage of our watermarking scheme is that the watermark information can be extracted from the watermarked image when detecting watermark,so the received image authentication needs no information about the original image or watermark.Experimental results prove the effectiveness of our proposed watermarking scheme. 展开更多
关键词 WAVELET image watermarking information security SEMI-FRAGILE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部