期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
远距离规则的内隐学习使用了何种记忆存储器:来自神经网络模拟的证据 被引量:1
1
作者 李菲菲 刘宝根 《心理科学》 CSSCI CSCD 北大核心 2018年第4期796-802,共7页
远距离规则的知识是如何被内隐学习的,研究尚未得出结论。该研究采用和人类被试相同的实验材料和程序,考察了简单循环网络模型(SRN)对两种汉语声调远距离规则——倒映和逆行规则的学习。结果发现:(1)在广泛的参数范围上,SRN能够学会倒... 远距离规则的知识是如何被内隐学习的,研究尚未得出结论。该研究采用和人类被试相同的实验材料和程序,考察了简单循环网络模型(SRN)对两种汉语声调远距离规则——倒映和逆行规则的学习。结果发现:(1)在广泛的参数范围上,SRN能够学会倒映和逆行规则,表明模型的记忆缓冲器可以模拟人类远距离规则的内隐学习;(2)SRN学习倒映规则比逆行规则更好,表明在功能上远距离规则的内隐学习可能优先使用了先进先出的记忆存储器及信息加工模式。该研究为探究远距离规则内隐学习的机制提供了新的证据和视角。 展开更多
关键词 远距离规则 内隐学习 记忆存储器 神经网络模拟
下载PDF
磁记忆存储器微晶玻璃基板 被引量:1
2
作者 何国平 黄文(日山) 《材料导报》 EI CAS CSCD 北大核心 1998年第3期34-36,23,共4页
介绍了适用于高容量、小型化磁记忆存储器基板的各种微晶玻璃材料。详细讨论了微晶玻璃的化学组成、显微结构、主晶相种类以及微晶玻璃的物化性能和表面特性,并与NiP/Al基板材料性能进行了对比。简要介绍了硬盘微晶玻璃基板的实用性研... 介绍了适用于高容量、小型化磁记忆存储器基板的各种微晶玻璃材料。详细讨论了微晶玻璃的化学组成、显微结构、主晶相种类以及微晶玻璃的物化性能和表面特性,并与NiP/Al基板材料性能进行了对比。简要介绍了硬盘微晶玻璃基板的实用性研究结果。 展开更多
关键词 记忆存储器 硬盘 基板 微晶玻璃
下载PDF
电视节目内容存储器CXK1004L
3
作者 黎键 《集成电路应用》 1991年第4期19-21,共3页
在现今的彩色电视接收机中,都趋向于微电脑化,但基于微电脑的记忆存储容量有限,大多机器都外接了一块用于记忆存储的集成电路。CXK1004L 是日本索尼公司研制并生产出的一种记忆存储器。采用单列十脚封装,使用它和一片 CPU 便能组合成一... 在现今的彩色电视接收机中,都趋向于微电脑化,但基于微电脑的记忆存储容量有限,大多机器都外接了一块用于记忆存储的集成电路。CXK1004L 是日本索尼公司研制并生产出的一种记忆存储器。采用单列十脚封装,使用它和一片 CPU 便能组合成一个完整的微电脑记忆控制泵统。CXK1004L 是一个结构上采用 P 沟道 NMOS 型永久性晶体管存储器,具有32字×16位的E^2PROM,IC 内装有一个充电的泵电路,仅用一个单5V 的供电电源,就能够完成全部操作,这种设计彻底摒去了其他公司生产的存储器必须使用一个-30V 左右的高压的做法。 展开更多
关键词 电视节目 记忆存储器 微电脑化
下载PDF
Hopfield网络在武器装备评估及分类中的应用 被引量:8
4
作者 李飞 谷奇平 《空军工程大学学报(自然科学版)》 CSCD 2000年第2期60-63,共4页
分析了装备综合性能评估特点 ,提出基于 Hopfield网络的武器装备分类模型 ,给出了仿真实验结果并进行了分析 ,初步探索了将动态神经网络运用于装备论证工作的有效途径 ,具有一定的实用价值。
关键词 综合性能评估 联想记忆存储器 神经网络
下载PDF
基于BAM的用户查询与网页匹配的研究 被引量:1
5
作者 邓波 杜亚军 王丽 《河北师范大学学报(自然科学版)》 CAS 北大核心 2007年第5期594-599,共6页
提出一个新匹配的策略使用更加精确和现实的概念以提高过去的基于关键词的匹配策略.根据从各个网页中提取的自然语义概念为每个网页建立1个概念格子.这样概念格由双向联想记忆存储器进行编码以区别于过去复杂概念格建立算法.然后提取这... 提出一个新匹配的策略使用更加精确和现实的概念以提高过去的基于关键词的匹配策略.根据从各个网页中提取的自然语义概念为每个网页建立1个概念格子.这样概念格由双向联想记忆存储器进行编码以区别于过去复杂概念格建立算法.然后提取这些形式概念中与查询的关键词相关的对象与属性进行匹配操作. 展开更多
关键词 信息检索 双向联想记忆存储器 形式概念分析
下载PDF
基于FCA与BAM结合的网页匹配方法的研究
6
作者 朱正国 《电脑开发与应用》 2012年第8期33-34,37,共3页
在互联网高速发展的今天,搜索引擎成了大家在互联网上获取自己所需要信息的重要工具之一,在搜索引擎中,使用最多的就是基于关键词的匹配策略。采用了形式概念分析(FCA)和双向联想记忆存储器(BAM)结合的研究方法,并对该方法进行了实验,... 在互联网高速发展的今天,搜索引擎成了大家在互联网上获取自己所需要信息的重要工具之一,在搜索引擎中,使用最多的就是基于关键词的匹配策略。采用了形式概念分析(FCA)和双向联想记忆存储器(BAM)结合的研究方法,并对该方法进行了实验,实验表明该方法优于传统的网页匹配方法。 展开更多
关键词 网页匹配 形式概念分析(FCA) 双向联想记忆存储器(BAM)
下载PDF
中英文计算机词汇的文体差异 被引量:8
7
作者 赵翠莲 徐秀忠 《解放军外国语学院学报》 CSSCI 1998年第3期44-47,共4页
中英文计算机词汇的文体差异赵翠莲徐秀忠电子计算机的日益普及使一种新的语体——计算机语言(cyberspeech)——越来越深入到人们的日常生活中,而其中最具特色的是计算机词汇。与普通的科技词汇相比,计算机词汇(特别是... 中英文计算机词汇的文体差异赵翠莲徐秀忠电子计算机的日益普及使一种新的语体——计算机语言(cyberspeech)——越来越深入到人们的日常生活中,而其中最具特色的是计算机词汇。与普通的科技词汇相比,计算机词汇(特别是英文计算机词汇)简单易懂,极少有源... 展开更多
关键词 计算机词汇 日常用语 计算机部件 正式程度 技术意义 计算机语言 记忆存储器 外语教学与研究 准技术词 英文词汇
下载PDF
机械找堵水技术在锦州油田的应用与改进 被引量:2
8
作者 张义萍 《内蒙古石油化工》 CAS 2013年第14期99-100,共2页
伴随着油层压力不断下降和非均质性导致边底水、注入水的侵入,油田在开发过程中普遍存在的问题逐渐显露出来,锦州采油厂工艺技术人员以提高适用性、延长堵水有效期和成功率为突破口,通过开发利用滑套式开关、智能找水开关和液控循环开... 伴随着油层压力不断下降和非均质性导致边底水、注入水的侵入,油田在开发过程中普遍存在的问题逐渐显露出来,锦州采油厂工艺技术人员以提高适用性、延长堵水有效期和成功率为突破口,通过开发利用滑套式开关、智能找水开关和液控循环开关工艺,针对性的开展了油井找、堵水工作,取得了很好的经济效益。 展开更多
关键词 找堵水 改进 封隔器 压力记忆存储器 磁性定位 防砂卡
下载PDF
The MMU Implementation of Unity-1 Microprocessor 被引量:2
9
作者 宋传华 Cheng +2 位作者 Xu Zhu Dexin 《High Technology Letters》 EI CAS 2003年第4期27-32,共6页
Virtual memory management is always a very essential issue of the modern microprocessor design. A memory management unit (MMU) is designed to implement a virtual machine for user programs, and provides a management me... Virtual memory management is always a very essential issue of the modern microprocessor design. A memory management unit (MMU) is designed to implement a virtual machine for user programs, and provides a management mechanism between the operating system and user programs. This paper analyzes the tradeoffs considered in the MMU design of Unity 11 CPU of Peking University, and introduces in detail the solution of pure hardware table walking with two level page table organization. The implementation takes care of required operations and high performances needed by modern operating systems and low costs needed by embedded systems. This solution has been silicon proven, and successfully porting the Linux 2.4.17 kernel, the XWindow system, GNOME and most application software onto the Unity platform. 展开更多
关键词 Unity 1 MMU TLB table walking MICROPROCESSOR
下载PDF
LMI-based approach for global asymptotic stability analysis of continuous BAM neural networks 被引量:2
10
作者 张森林 刘妹琴 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第1期32-37,共6页
Studies on the stability of the equilibrium points of continuous bidirectional associative memory (BAM) neural network have yielded many useful results. A novel neural network model called standard neural network mode... Studies on the stability of the equilibrium points of continuous bidirectional associative memory (BAM) neural network have yielded many useful results. A novel neural network model called standard neural network model (SNNM) is ad- vanced. By using state affine transformation, the BAM neural networks were converted to SNNMs. Some sufficient conditions for the global asymptotic stability of continuous BAM neural networks were derived from studies on the SNNMs’ stability. These conditions were formulated as easily verifiable linear matrix inequalities (LMIs), whose conservativeness is relatively low. The approach proposed extends the known stability results, and can also be applied to other forms of recurrent neural networks (RNNs). 展开更多
关键词 Standard neural network model (SNNM) Bidirectional associative memory (BAM) neural network Linear matrix inequality (LMI) Linear differential inclusion (LDI) Global asymptotic stability
下载PDF
Behavioral interventions to eliminate fear responses 被引量:4
11
作者 Jingli Yue Le Shi +3 位作者 Xiao Lin Muhammad Zahid Khan Jie Shi Lin Lu 《Science China(Life Sciences)》 SCIE CAS CSCD 2018年第6期625-632,共8页
Fear memory underlies anxiety-related disorders, including posttraumatic stress disorder(PTSD). PTSD is a fear-based disorder,characterized by difficulties in extinguishing the learned fear response and maintaining ex... Fear memory underlies anxiety-related disorders, including posttraumatic stress disorder(PTSD). PTSD is a fear-based disorder,characterized by difficulties in extinguishing the learned fear response and maintaining extinction. Currently, the first-line treatment for PTSD is exposure therapy, which forms an extinction memory to compete with the original fear memory. However,the extinguished fear often returns under numerous circumstances, suggesting that novel methods are needed to eliminate fear memory or facilitate extinction memory. This review discusses research that targeted extinction and reconsolidation to manipulate fear memory. Recent studies indicate that sleep is an active state that can regulate memory processes. We also discuss the influence of sleep on fear memory. For each manipulation, we briefly summarize the neural mechanisms that have been identified in human studies. Finally, we highlight potential limitations and future directions in the field to better translate existing interventions to clinical settings. 展开更多
关键词 fear memory extinction sleep manipulation reconsolidation human
原文传递
Filament growth dynamics in solid electrolyte-based resistive memories revealed by in situ TEM 被引量:5
12
作者 Xuezeng Tian Lifen Wang Jiake Wei Shize Yang Wenlong Wang Zhi Xu Xuedong Bai 《Nano Research》 SCIE EI CAS CSCD 2014年第7期1065-1072,共8页
Solid electrolyte based-resistive memories have been considered to be a potential candidate for future information technology with applications in non-volatile memory, logic circuits and neuromorphic computing. A cond... Solid electrolyte based-resistive memories have been considered to be a potential candidate for future information technology with applications in non-volatile memory, logic circuits and neuromorphic computing. A conductive filament model has been generally accepted to be the underlying mechanism for the resistive switching. However, the growth dynamics of such conductive filaments is still not fully understood. Here, we explore the controllability of filament growth by correlating observations of the filament growth with the electric field distribution and several other factors. The filament growth behavior has been recorded using in situ transmission electron microscopy. By studying the real- time recorded filament growth behavior and morphologies, we have been able to simulate the electric field distribution in accordance with our observations. Other factors have also been shown to affect the filament growth, such as Joule heating and electrolyte infrastructure. This work provides insight into the controllable growth of conductive filaments and will help guide research into further functionalities of nanoionic resistive memories. 展开更多
关键词 resistive switching conductive filaments in situ transmissionelectron microscope real-time observation computer simulation
原文传递
Enhancing security of NVM-based main memory with dynamic Feistel network mapping
13
作者 Fang-ting HUANG Dan FENG +5 位作者 Wen XIA Wen ZHOU Yu-cheng ZHANG Min FU Chun-tao JIANG Yu-kun ZHOU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第7期847-863,共17页
As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing securit... As promising alternatives in building future main memory systems, emerging non-volatile memory(NVM) technologies can increase memory capacity in a cost-effective and power-efficient way. However, NVM is facing security threats due to its limited write endurance: a malicious adversary can wear out the cells and cause the NVM system to fail quickly. To address this issue, several wear-leveling schemes have been proposed to evenly distribute write traffic in a security-aware manner. In this study, we present a new type of timing attack, remapping timing attack(RTA), based on information leakage from the remapping latency difference in NVM. Our analysis and experimental results show that RTA can cause three of the latest wear-leveling schemes(i.e., region-based start-gap,security refresh, and multi-way wear leveling) to lose their effectiveness in several days(even minutes), causing failure of NVM. To defend against such an attack, we further propose a novel wear-leveling scheme called the ‘security region-based start-gap(security RBSG)', which is a two-stage strategy using a dynamic Feistel network to enhance the simple start-gap wear leveling with level-adjustable security assurance. The theoretical analysis and evaluation results show that the proposed security RBSG not only performs well when facing traditional malicious attacks, but also better defends against RTA. 展开更多
关键词 Non-volatile memory (NVM) ENDURANCE Wear leveling Timing attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部