期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
基于多类特征的Android应用重打包检测方法 被引量:1
1
作者 邹慕蓉 胡勇 《现代计算机》 2017年第5期50-54,共5页
针对Android系统的应用重打包安全威胁,提出一种基于多类特征的Android应用重打包检测方法,结合简化的图特征向量检测算法与图片相似度算法,在保证应用相似度计算准确率的基础上提高计算效率。通过原型系统的实验,表明该系统能抵抗多种... 针对Android系统的应用重打包安全威胁,提出一种基于多类特征的Android应用重打包检测方法,结合简化的图特征向量检测算法与图片相似度算法,在保证应用相似度计算准确率的基础上提高计算效率。通过原型系统的实验,表明该系统能抵抗多种代码混淆带来的影响,准确地识别重打包应用程序,同时在运算效率上优于原重打包检测方案。 展开更多
关键词 ANDROID应用 重打包 特征向量 感知哈希 抗混淆
下载PDF
拉萨河谷植物物种丰富度空间分布格局及其环境解释 被引量:13
2
作者 拉多 张燕杰 +2 位作者 刘杰 崔玲玲 庞有智 《草业学报》 CSCD 北大核心 2016年第10期202-211,共10页
为研究拉萨河谷植物物种丰富度的空间分布格局,按不同植被类型设置47个样地,每个样地随机设置3个样方,共141个样方。记录维管植物247种,隶属47科、134属。运用基于距离的Moran特征向量图(MEM)和方差分解,分析环境因子和空间变量对植物... 为研究拉萨河谷植物物种丰富度的空间分布格局,按不同植被类型设置47个样地,每个样地随机设置3个样方,共141个样方。记录维管植物247种,隶属47科、134属。运用基于距离的Moran特征向量图(MEM)和方差分解,分析环境因子和空间变量对植物物种丰富度空间分布的影响;运用广义可加模型(GAM)对各环境因子与转换物种丰富度(TSR)进行回归分析,同时对各环境因子之间进行相关分析;运用除趋势对应分析(DCA)对样地和物种进行非约束排序,并将环境因子与排序轴之间进行相关分析。结果表明空间结构对拉萨河谷植物物种丰富度分布具有重要作用,而环境因子的空间格局是影响物种丰富度空间分布格局的重要因素;各环境因子与TSR的GAM拟合结果发现气候因子、经纬度和海拔对TSR存在显著的影响;DCA排序结果表明干扰可能是影响物种丰富度空间格局的未测环境因子,DCA第二轴反映了湿度梯度。干扰和湿度可能是拉萨河谷植物物种丰富度空间分布格局的主要影响因素。 展开更多
关键词 物种丰富度 Moran特征向量图 干扰 气候因子 拉萨河谷
下载PDF
森林害虫发生的空间模式研究进展 被引量:3
3
作者 景天忠 李田宇 《生态学报》 CAS CSCD 北大核心 2018年第10期3414-3421,共8页
森林昆虫种群表现出多样的时空模式,空间同步性是其中最常见的。回顾了森林昆虫空间同步性的特点、形成机制及研究方法方面的进展。森林害虫发生的同步性是广泛存在的,但不同昆虫种类的同步性大小不同。空间同步性常随距离的增大而下降... 森林昆虫种群表现出多样的时空模式,空间同步性是其中最常见的。回顾了森林昆虫空间同步性的特点、形成机制及研究方法方面的进展。森林害虫发生的同步性是广泛存在的,但不同昆虫种类的同步性大小不同。空间同步性常随距离的增大而下降,还与时间尺度有关。Moran效应和扩散是解释空间同步性的两种主要机制,通常Moran效应的影响要比扩散大。从虫害发生数据的获取、同步性的度量及成因3个方面介绍了空间同步性的研究方法方面的进展。利用树轮生态学原理重建森林虫害发生历史的方法可在事后获取可靠的数据,很值得国内研究者借鉴和应用。在空间自相关度量上,空间统计学方法和地统计学方法都是非常有力的手段,但由于不能处理多时间点数据而限制了其在同步性研究中的应用。在同步性成因研究中,利用变异分解将基于距离的Moran特征向量图(dbMEM)作为空间变量研究害虫发生的驱动力是比较新颖的研究方法。 展开更多
关键词 暴发机制 空间同步性 空间自相关 树轮生态学分析 Moran特征向量图
下载PDF
关于谱半径达到第二大的赋权树(英文) 被引量:5
4
作者 袁劲松 束金龙 《运筹学学报》 CSCD 北大核心 2006年第1期81-87,共7页
赋权图的谱的研究已经被用来解决很多实际问题,网络设计以及电路设计实际上都依赖于赋权图.本文主要研究的是赋权树的谱半径,从而得到赋权树谱半径达到次大的是双星图Sn-3,1ω*.
关键词 运筹学 赋权树 的谱半径和特征向量
下载PDF
Feature Relationship and Process Planning
5
作者 卢继平 宁汝新 《Journal of Beijing Institute of Technology》 EI CAS 1997年第1期85-91,共7页
Concurrent engineering(CE)involves the consideration during the design phase of the various factors associated with the life cycle of the product.Using the principle of CE,a feature-based CAPP system is proposed.On th... Concurrent engineering(CE)involves the consideration during the design phase of the various factors associated with the life cycle of the product.Using the principle of CE,a feature-based CAPP system is proposed.On the basis of feature modeling,the system is able to reason feature relationships,produce feature digraph of a part,and decide the machining sequence of features. 展开更多
关键词 concurrent engineering feature relation feature digraph dynamic matching
下载PDF
Face mask detection algorithm based on HSV+HOG features and SVM 被引量:6
6
作者 HE Yumin WANG Zhaohui +2 位作者 GUO Siyu YAO Shipeng HU Xiangyang 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第3期267-275,共9页
To automatically detecting whether a person is wearing mask properly,we propose a face mask detection algorithm based on hue-saturation-value(HSV)+histogram of oriented gradient(HOG)features and support vector machine... To automatically detecting whether a person is wearing mask properly,we propose a face mask detection algorithm based on hue-saturation-value(HSV)+histogram of oriented gradient(HOG)features and support vector machines(SVM).Firstly,human face and five feature points are detected with RetinaFace face detection algorithm.The feature points are used to locate to mouth and nose region,and HSV+HOG features of this region are extracted and input to SVM for training to realize detection of wearing masks or not.Secondly,RetinaFace is used to locate to nasal tip area of face,and YCrCb elliptical skin tone model is used to detect the exposure of skin in the nasal tip area,and the optimal classification threshold can be found to determine whether the wear is properly according to experimental results.Experiments show that the accuracy of detecting whether mask is worn can reach 97.9%,and the accuracy of detecting whether mask is worn correctly can reach 87.55%,which verifies the feasibility of the algorithm. 展开更多
关键词 hue-saturation-value(HSV)features histogram of oriented gradient(HOG)features support vector machine(SVM) face mask detection feature point detection
下载PDF
Novel histogram descriptor for global feature extraction and description 被引量:3
7
作者 张刚 马宗民 +1 位作者 邓立国 徐长明 《Journal of Central South University》 SCIE EI CAS 2010年第3期580-586,共7页
A novel histogram descriptor for global feature extraction and description was presented. Three elementary primitives for a 2×2 pixel grid were defined. The complex primitives were computed by matrix transforms. ... A novel histogram descriptor for global feature extraction and description was presented. Three elementary primitives for a 2×2 pixel grid were defined. The complex primitives were computed by matrix transforms. These primitives and equivalence class were used for an image to compute the feature image that consisted of three elementary primitives. Histogram was used for the transformed image to extract and describe the features. Furthermore, comparisons were made among the novel histogram descriptor, the gray histogram and the edge histogram with regard to feature vector dimension and retrieval performance. The experimental results show that the novel histogram can not only reduce the effect of noise and illumination change, but also compute the feature vector of lower dimension. Furthermore, the system using the novel histogram has better retrieval performance. 展开更多
关键词 feature extraction and description histogram descriptor gray histogram edge histogram
下载PDF
Blur Invariant Image Forgery Detection Method Using Local Phase Quantization
8
作者 Beste Ustubioglu Elif Baykal +1 位作者 Gul Muzaffer Guzin Ulutas 《Journal of Energy and Power Engineering》 2016年第6期358-363,共6页
With the rapid development of powerful image, editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image a... With the rapid development of powerful image, editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image authentication technique to determine the copy move forgery that copied a part of an image and pasted it on the other region in the same image. First, the method divides the image into overlapping blocks. It uses LPQ (local phase quantization) to label each block. The column average value of labeled blocks constitutes the feature vector for the block. Similarity among the feature vectors gives a clue about the forgery. Local phase quantization has not been used to detect copy move forgery in the literature before. Experimental results show that, the method has higher accuracy ratios and lower false negative values under blurring operation at high levels compared to other methods. Our method can also detect multiple copy move forgery. 展开更多
关键词 Copy move forgery LPQ blur invariant.
下载PDF
Texture Classification of 3D Surface Textures Via Directional Quincunx Lifting
9
作者 Youjiao Li Tongsheng Ju Meng Ga 《International Journal of Technology Management》 2014年第8期62-64,共3页
This thesis presents a new approach to classify 3D surface textures by using lifting transform with quincunx subsampling. Feature vectors are generated from eight different lifting prediction directions. We classify 3... This thesis presents a new approach to classify 3D surface textures by using lifting transform with quincunx subsampling. Feature vectors are generated from eight different lifting prediction directions. We classify 3D surface texture images based on minimum Euclidean distance between the test images and the training sets. The feasibility and effectiveness of our proposed approach can be validated by the experimental results. 展开更多
关键词 3D Surface Texture Lifting Transform Texture Classification
下载PDF
Some Remarks for Discrete Versions of Nodal Domain Theorems
10
作者 李耀堂 关莉 《Journal of Mathematical Research and Exposition》 CSCD 北大核心 2003年第2期275-278,共4页
In this paper, an error is firstly pointed out in the proof of the main theorems (Theorem 4 and Theorem 6) in [1]. Then the error is corrected and the right proof is given.
关键词 nodal domain theorem discrete version
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部