期刊文献+
共找到503篇文章
< 1 2 26 >
每页显示 20 50 100
Optimization of Process Parameters of Continuous Microwave Drying Raspberry Puree Based on RSM and ANN-GA 被引量:1
1
作者 Zheng Xian-zhe Gao Feng +2 位作者 Fu Ke-sen Lu Tian-lin Zhu Chong-hao 《Journal of Northeast Agricultural University(English Edition)》 CAS 2023年第1期69-84,共16页
To improve drying uniformity and anthocyanin content of the raspberry puree dried in a continuous microwave dryer,the effects of process parameters(microwave intensity,air velocity,and drying time)on evaluation indexe... To improve drying uniformity and anthocyanin content of the raspberry puree dried in a continuous microwave dryer,the effects of process parameters(microwave intensity,air velocity,and drying time)on evaluation indexes(average temperature,average moisture content,average retention rate of the total anthocyanin content,temperature contrast value,and moisture dispersion value)were investigated via the response surface method(RSM)and the artificial neural network(ANN)with genetic algorithm(GA).The results showed that the microwave intensity and drying time dominated the changes of evaluation indexes.Overall,the ANN model was superior to the RSM model with better estimation ability,and higher drying uniformity and anthocyanin retention rate were achieved for the ANN-GA model compared with RSM.The optimal parameters were microwave intensity of 5.53 W•g^(-1),air velocity of 1.22 m·s^(-1),and drying time of 5.85 min.This study might provide guidance for process optimization of microwave drying berry fruits. 展开更多
关键词 raspberry puree continuous microwave drying response surface method(RSM) artificial neural network(ANN) genetic algorithm(GA)CLC number:TG376 Document code:A Article id:1006-8104(2023)-01-0069-16
下载PDF
Improved Monarchy Butterfly Optimization Algorithm (IMBO): Intrusion Detection Using Mapreduce Framework Based Optimized ANU-Net
2
作者 Kunda Suresh Babu Yamarthi Narasimha Rao 《Computers, Materials & Continua》 SCIE EI 2023年第6期5887-5909,共23页
The demand for cybersecurity is rising recently due to the rapid improvement of network technologies.As a primary defense mechanism,an intrusion detection system(IDS)was anticipated to adapt and secure com-puting infr... The demand for cybersecurity is rising recently due to the rapid improvement of network technologies.As a primary defense mechanism,an intrusion detection system(IDS)was anticipated to adapt and secure com-puting infrastructures from the constantly evolving,sophisticated threat land-scape.Recently,various deep learning methods have been put forth;however,these methods struggle to recognize all forms of assaults,especially infrequent attacks,because of network traffic imbalances and a shortage of aberrant traffic samples for model training.This work introduces deep learning(DL)based Attention based Nested U-Net(ANU-Net)for intrusion detection to address these issues and enhance detection performance.For this IDS model,the first data preprocessing is carried out in three stages:duplication elimi-nation,label transformation,and data normalization.Then the features are extracted and selected based on the Improved Flower Pollination Algorithm(IFPA).The Improved Monarchy Butterfly Optimization Algorithm(IMBO),a new metaheuristic,is used to modify the hyper-parameters in ANU-Net,effectively increasing the learning rate for spatial-temporal information and resolving the imbalance problem.Through the use of parallel programming,the MapReduce architecture reduces computation complexity while signifi-cantly accelerating processing.Three publicly available data sets were used to evaluate and test the approach.The investigational outcomes suggest that the proposed technique can more efficiently boost the performances of IDS under the scenario of unbalanced data.The proposed method achieves above 98%accuracy and classifies various attacks significantly well compared to other classifiers. 展开更多
关键词 Intrusion detection system(idS) attention based nested U-Net
下载PDF
A New ID-Based Proxy Multi-Signature Scheme from Bilinear Pairings 被引量:1
3
作者 GU Chun-xiang PAN Heng ZHU Yue-fei 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期193-197,共5页
ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we... ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem. 展开更多
关键词 id-based signatures proxy multi-signature id-based proxy multi signatures bilinear pairlngs provable security
下载PDF
Provable Security of ID-Based Proxy Multi-Signature Schemes
4
作者 GU Chunxiang ZHU Yuefei ZHAO Tao 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期87-90,共4页
In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this pape... In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general security model for ID-based proxy multi-signature (ID-PMS) schemes. Then, we show how to construct a secure ID-PMS scheme from a secure ID-based signature scheme, and prove that the security of the construction can be reduced to the security of the original ID-based signature scheme. 展开更多
关键词 id-based signature id-based proxy multi-signature provable security bilinear pairings.
下载PDF
A 330-500 GHz Zero-Biased Broadband Tripler Based on Terahertz Monolithic Integrated Circuits 被引量:2
5
作者 任田昊 张勇 +4 位作者 延波 徐锐敏 杨成樾 周静涛 金智 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第2期31-34,共4页
A 330-500 GHz zero-biased broadband monolithic integrated tripler is reported. The measured results show that the maximum efficiency and the maximum output power are 2% and 194μW at 348 GHz. The saturation characteri... A 330-500 GHz zero-biased broadband monolithic integrated tripler is reported. The measured results show that the maximum efficiency and the maximum output power are 2% and 194μW at 348 GHz. The saturation characteristic test shows that the output i dB compression point is about -8.5 dBm at 334 GHz and the maximum efficiency is obtained at the point, which is slightly below the 1 dB compression point. Compared with the conventional hybrid integrated circuit, a major advantage of the monolithic integrated circuit is the significant improvement of reliability and consistency. In this work, a terahertz monolithic frequency multiplier at this band is designed and fabricated. 展开更多
关键词 InP InGaAs A 330-500 GHz Zero-Biased Broadband Tripler based on Terahertz Monolithic Integrated Circuits dBm SBD
下载PDF
Pyrolysis Characteristics and Kinetics of the Preparation Process of Sludge-Based Activated Carbon by ZnCl_2 Activation Method 被引量:2
6
作者 Xin Li Guang-Zhi Wang +1 位作者 Wei-Guang Li Ping Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2013年第6期29-36,共8页
To obtain the pyrolysis characteristics and kinetics of preparation process of sludge-based activated carbon by ZnCl2 activation method (i.e.the pyrolysis process of the sludge with ZnCl2 activation),the characteris... To obtain the pyrolysis characteristics and kinetics of preparation process of sludge-based activated carbon by ZnCl2 activation method (i.e.the pyrolysis process of the sludge with ZnCl2 activation),the characteristic of mass loss and gas products generated during pyrolysis of the sludge with ZnCl2 activation were analyzed by thermogravimetric analysis coupled with Fourier Transform Infrared Spectroscopy (TG-FTIR).The kinetic parameters were calculated by the Coats-Redfem method and the mechanism models were established.The role of ZnCl2 in the pyrolysis process of the sludge with ZnCl2 activation was also illustrated through the comparison of the pyrolysis characteristics and kinetics of the sludge with and without ZnCl2 activation.The results showed that the pyrolysis process of the sludge with ZnCl2 activation can be divided into four stages including the dehydration of sludge and initial depolymerization of a small portion of organics matters,the decomposition of large molecular organic matters into small molecular intermediates,the further degradation of intermediates and volatilization of ZnCl2,and the decomposition of inorganic minerals and undecomposed organic matters.CO2,CO,CH4,H2O,some aldehydes and carboxylic acids are the major pyrolysis gaseous products.The activation energies and pre-exponential factors are in the range of 28.84-206.42 kJ/mol and 9885.16-8.08× 1011 min-1,respectively.During the pyrolysis of sludge,ZnC12 not only can function as a dehydration agent and inhibit the formation of tar,but also can peptize the organic matters in the sludge,making them easier to be decomposed. 展开更多
关键词 SLUDGE ZNCL2 ACTIVATION pyrolysisCLC number:X705 Document code:AArticle id:1005-9113(2013)06-0029-08
下载PDF
Roll angle measurement system based on triaxial magneto-resistive sensor 被引量:2
7
作者 赵鑫炉 张晓明 《Journal of Measurement Science and Instrumentation》 CAS 2013年第3期214-217,共4页
Aiming at large error when inertial devices measure the roll angle under high overload conditions,the article designs one kind of roll angle measurement system based on magneto-resistive sensor which calculates the ro... Aiming at large error when inertial devices measure the roll angle under high overload conditions,the article designs one kind of roll angle measurement system based on magneto-resistive sensor which calculates the roll angle by micro controller STM32.Experiment results of a triaxial turntable show that using magneto-resistive sensor to measure roll angle is feasible and of high accuracy,and it can calculate the roll angle of the conventional projectile with the error in 1°. 展开更多
关键词 magneto-resistive sensor roll angle errorCLC number:TP212.1 Document code:AArticle id:1674-8042(2013)03-0214-04
下载PDF
A Multi-Interface Remote Monitoring and Control System Architecture Based on Embedded Server 被引量:3
8
作者 He Liu Lei Wang +1 位作者 Sheng-Peng Sun Ya-Dong Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2013年第6期67-76,共10页
This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen ... This paper presents a multi-interface embedded server architecture for remote real-time monitoring system and distributed monitoring applications. In the scheme,an embedded microprocessor( LPC3250 from NXP) is chosen as the CPU of the embedded server with a linux operation system( OS) environment. The embedded server provides multiple interfaces for supporting various application scenarios. The whole network is based on local area network and adopts the Browser / Server( B / S) model. The monitoring and control node is as a browser endpoint and the remote node with an embedded server is as a server endpoint. Users can easily acquire various sensors information through writing Internet protocol address of remote node on the computer browser. Compared with client / server( C / S) mode,B / S model needs less maintain and can be applicable to large user group. In addition,a simple network management protocol( SNMP) is used for management of devices in Internet protocol( IP) networks. The results of the demonstration experiment show that the proposed system gives good support to manage the network from different user terminals and allows the users to better interact with the ambient environment. 展开更多
关键词 muhi-interface remote monitoring and control embedded server simple network management protocol (SNMP)CLC number:TP216+.1 Document code:AArticle id:1005-9113(2013)06-0067-10
下载PDF
High-speed broadband data acquisition system based on FPGA 被引量:2
9
作者 刘军智 《Journal of Measurement Science and Instrumentation》 CAS 2013年第3期223-227,共5页
A field-programmable gate array(FPGA)based high-speed broadband data acquisition system is designed.The system has a dual channel simultaneous acquisition function.The maximum sampling rate is 500 MSa/s and bandwidth ... A field-programmable gate array(FPGA)based high-speed broadband data acquisition system is designed.The system has a dual channel simultaneous acquisition function.The maximum sampling rate is 500 MSa/s and bandwidth is200 MHz,which solves the large bandwidth,high-speed signal acquisition and processing problems.At present,the data acquisition system is successfully used in broadband receiver test systems. 展开更多
关键词 high-speed data acquisition FPGA WidEBAND cross collection data combinationCLC number:TP274+.2 Document code:AArticle id:1674-8042(2013)03-0223-05
下载PDF
A new algorithm for wireless sensor network based on NS-2 被引量:2
10
作者 焦国太 孟庆丰 《Journal of Measurement Science and Instrumentation》 CAS 2013年第3期272-275,共4页
Considering wireless sensor network characteristics,this paper uses network simulator,version2(NS-2)algorithm to improve Ad hoc on-demand distance vector(AODV)routing algorithm,so that it can be applied to wireless se... Considering wireless sensor network characteristics,this paper uses network simulator,version2(NS-2)algorithm to improve Ad hoc on-demand distance vector(AODV)routing algorithm,so that it can be applied to wireless sensor networks.After studying AODV routing protocol,a new algorithm called Must is brought up.This paper introduces the background and algorithm theory of Must,and discusses the details about how to implement Must algorithm.At last,using network simulator(NS-2),the performance of Must is evaluated and compared with that of AODV.Simulation results show that the network using Must algorithm has perfect performance. 展开更多
关键词 wireless sensor networks routing protocol network simulator version 2 (NS-2) Must algorithmCLC number:TN926 Document code:AArticle id:1674-8042(2013)03-0272-04
下载PDF
Particle-filter-based walking prediction model for occlusion situations 被引量:1
11
作者 Yoonchang Sung Woojin Chung 《Journal of Measurement Science and Instrumentation》 CAS 2013年第3期263-266,共4页
In the field of mobile robotics,human tracking has emerged as an important objective for facilitating human-robot interaction.In this paper,we propose a particle-filter-based walking prediction model that will address... In the field of mobile robotics,human tracking has emerged as an important objective for facilitating human-robot interaction.In this paper,we propose a particle-filter-based walking prediction model that will address an occlusion situation.Since the target being tracked is a human leg,a motion model for a leg is required.The validity of the proposed model is verified experimentally. 展开更多
关键词 human-following particle filter motion modelCLC number:TP242.6 Document code:AArticle id:1674-8042(2013)03-0263-04
下载PDF
Risk Assessment M ode of Sale-Leaseback——Based on Fuzzy Analytic Hierarchy Process 被引量:1
12
作者 陈俊宇 李智 张佳煌 《Journal of Donghua University(English Edition)》 EI CAS 2013年第4期343-348,共6页
Sale-leaseback is paid special focus on for its great application in China in recent years.By giving a detailed analysis,an analysis of the features of sale-leaseback and a study of the risks of it are given in this p... Sale-leaseback is paid special focus on for its great application in China in recent years.By giving a detailed analysis,an analysis of the features of sale-leaseback and a study of the risks of it are given in this paper.Then a quantitative analysis of commercial real estate sale-leaseback is carried out.The scientific theoretical analysis is provided in this paper for risk assessment in commercial real estate sale-leaseback mode in China.An effective approach is put forward for sale-leaseback project evaluation and prevention of risk.A useful means is given to supervise commerciai real estate sale-leaseback mode for relevant departments and a certain contribution is made to a further sound development of commercial real estate sale-leaseback mode. 展开更多
关键词 sale-leaseback fuzzy analytic hierarchy process(FAHP) risk assessment modeCLC number:F830.9Document code:AArticle id:1672-5220(2013)04-0343-06
下载PDF
Integrated management system of agro-fishery products based on QR-code 被引量:1
13
作者 Namjin Bae Yongyun Cho +1 位作者 Jongsun Choi Jaeyoung Choi 《Journal of Measurement Science and Instrumentation》 CAS 2013年第3期252-255,共4页
Recently,both the importance and awareness relating to food safety relating to agrochemicals,chemical fertilizers,the pollution of ecosystem and unwholesome foods are growing rapidly.For the same reason,the purchaser&... Recently,both the importance and awareness relating to food safety relating to agrochemicals,chemical fertilizers,the pollution of ecosystem and unwholesome foods are growing rapidly.For the same reason,the purchaser's curiosity increases to know about the production process which can be accomplished by production traceability system.The traceability system can store and superintend the specific attribute information about products regarding the productive centre,producer and production finish data.The products undergo various circulation processes and they are being managed by individually constructed traceability system.Thus,it is difficult for the producer and the consumer to guarantee the safety from transpirable issues about the falsification of production traceability because the traceability information can be re-produced by forging through various ways.So in this paper,we proposed a system for integrated management of agro-fishery products based on quick response code(QR-code)for forgery prevention which may help to solve these issues.The proposed system makes QR-code using production information provided by producer.And then it is provided to the distributor and the consumer through integrated service model using the QR-code.Therefore,this system make sure to provide the same production traceability about the products to the distributor and the consumer and always keeps both updated with the same information. 展开更多
关键词 quick response code (QR-code) production traceability traceability systemCLC number:TP391.44 Document code:AArticle id:1674-8042(2013)03-0252-04
下载PDF
Design and implementation of self-protection agent for network-based intrusion detection system 被引量:3
14
作者 ZHU Shu-ren(朱树人) LI Wei-qin(李伟琴) 《Journal of Central South University of Technology》 2003年第1期69-73,共5页
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection ag... Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively. 展开更多
关键词 INTRUSION DETECTION SYSTEM (idS) network-based INTRUSION DETECTION system(NidS) SELF-PROTECTION AGENT IP filter
下载PDF
SELECTING CLUSTER MODEL IN Sn - BASED SOLDER ALLOY DESIGN WITH DV - X_α CALCULATION METHOD
15
作者 C. Q. Wang and W. F. Feng National ho. of Advanced welding Technolgy, HIT, Harbin 150001,China 《Acta Metallurgica Sinica(English Letters)》 SCIE EI CAS CSCD 2000年第1期84-88,共5页
Applying calculation method in alloy design should be an important tendency due to its characters of inexpensive cost, high efficiency and prediction. DOS calculations of AuSn, AsSn and SbSn Sn- based alloys have ... Applying calculation method in alloy design should be an important tendency due to its characters of inexpensive cost, high efficiency and prediction. DOS calculations of AuSn, AsSn and SbSn Sn- based alloys have been investigated by employing DV - Xa method, in which different cluster models were adopted to calculate electron structure.It is proved that some regulations must be taken into ac- count in order to carry out alloy design calculation successfully,which are described in this paper in detail. 展开更多
关键词 Cluster model Sn - based alloy design DV - X_a calculation method DOS
下载PDF
Preparation and the Pore Structure of Viscose-based Activated Carbon Fibers Treated with Pretreatment Reagents
16
作者 罗艳 黄永辉 《Journal of China Textile University(English Edition)》 EI CAS 2000年第2期16-18,共3页
The viscose rayon was pretreated with four different pre-treatment reagents respectively, and the preparation ofactivated carbon fibers (ACF) was performed undersame carbonizing and activating conditions. The poresize... The viscose rayon was pretreated with four different pre-treatment reagents respectively, and the preparation ofactivated carbon fibers (ACF) was performed undersame carbonizing and activating conditions. The poresize distribution, the specific surface area, and the porestructure parameter of these viscose - based ACF werestudied by using quartz spring balance BET- weightmethod. The experiment result indicates that the poresize distribution and the pore structure parameter ofACF is varied by using different pretreatment reagents. 展开更多
关键词 PRETREATMENT REAGENT VISCOSE - based ACF PORE size PORE structure specific surface area
下载PDF
Signature-Based Intrusion Detection System in Wireless 6G IoT Networks
17
作者 Mansoor Farooq Mubashir Hassan Khan 《Journal on Internet of Things》 2022年第3期155-168,共14页
An“Intrusion Detection System”(IDS)is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network.Signature-based IDSs employ an attack signature... An“Intrusion Detection System”(IDS)is a security measure designed to perceive and be aware of unauthorized access or malicious activity on a computer system or network.Signature-based IDSs employ an attack signature database to identify intrusions.This indicates that the system can only identify known attacks and cannot identify brand-new or unidentified assaults.In Wireless 6G IoT networks,signature-based IDSs can be useful to detect a wide range of known attacks such as viruses,worms,and Trojans.However,these networks have specific requirements and constraints,such as the need for real-time detection and low-power operation.To meet these requirements,the IDS algorithm should be designed to be efficient in terms of resource usage and should include a mechanism for updating the attack signatures to keep up with evolving threats.This paper provides a solution for a signature-based intrusion detection system in wireless 6G IoT Networks,in which three different algorithms were used and implemented by using python and JavaScript programming languages and an accuracy of 98.9%is achieved. 展开更多
关键词 idS IOT 6G Wireless Networks Signature based idS CIC-idS2018
下载PDF
Performance Degradation Alarming M ethod Based on Local Flexural Stiffness Identification for Beams
18
作者 马中军 杨庆年 张铟 《Journal of Donghua University(English Edition)》 EI CAS 2013年第4期311-315,共5页
Uncertain local flexural stiffness is recognized as one of the main barriers against the application of existing damage detection and performance degradation alarming techniques to real-world beams.Therefore,damage lo... Uncertain local flexural stiffness is recognized as one of the main barriers against the application of existing damage detection and performance degradation alarming techniques to real-world beams.Therefore,damage localization of beams with original uncertainty has been investigated to ensure their safety.For the beam before serving,it should be simply supported and subject to static load.Based on the concept of suppositional partition,a new loading pattern and mid-span displacement data processing method has been proposed.Actual local flexural stiffness value of each partition can be obtained by solving a set of linear equations.The obtained stiffness data can be used to establish the finite element model of beams.Subsequently,dynamic excitation and mode identification should be carried out for the beam in service.Mode shape curvature index is employed to detect the position of damage.It was validated by example that actual damage and original uncertainty of local flexural stiffness can be differentiated by this new method effectively.The combination of static load and dynamic excitation can keep the serviceability of beam. 展开更多
关键词 BEAM DAMAGE STIFFNESS uncertainty curvatureCLC number:TU317Document code:AArticle id:1672-5220(2013)04-0311-05
下载PDF
GRAPHICAL COMPUTING METHOD ON FOUR-BAR LINKAGE(1)——Inflexion Circle,Focal Axis,Ball's Point,Centering-point Curve and Circling-point Curve For Four ISPs,Coupler Curves Based on Ball's Points——
19
作者 周晋康 《苏州大学学报(工科版)》 CAS 1992年第S2期27-34,共8页
By means of programs GTMPAC based- on generalized triangle method,analysis and synthesis of mechanism design in accordance with absolutely graphicalmethod( absolutely germetrical method) are developed.In this paper,we... By means of programs GTMPAC based- on generalized triangle method,analysis and synthesis of mechanism design in accordance with absolutely graphicalmethod( absolutely germetrical method) are developed.In this paper,we make aspecial study about centering- point curve and circling- point curve and couplercurves based on Ball’s points. 展开更多
关键词 Ball’s POINT centering - POINT CURVE and CIRCLING CURVE four ISPS Coupler curves based on BALLS Points
下载PDF
Study of TSP based on self-organizing map
20
作者 宋锦娟 白艳萍 胡红萍 《Journal of Measurement Science and Instrumentation》 CAS 2013年第4期353-360,共8页
Self-organizing map(SOM) proposed by Kohonen has obtained certain achievements in solving the traveling salesman problem(TSP).To improve Kohonen SOM,an effective initialization and parameter modification method is dis... Self-organizing map(SOM) proposed by Kohonen has obtained certain achievements in solving the traveling salesman problem(TSP).To improve Kohonen SOM,an effective initialization and parameter modification method is discussed to obtain a faster convergence rate and better solution.Therefore,a new improved self-organizing map(ISOM)algorithm is introduced and applied to four traveling salesman problem instances for experimental simulation,and then the result of ISOM is compared with those of four SOM algorithms:AVL,KL,KG and MSTSP.Using ISOM,the average error of four travelingsalesman problem instances is only 2.895 0%,which is greatly better than the other four algorithms:8.51%(AVL),6.147 5%(KL),6.555%(KG) and 3.420 9%(MSTSP).Finally,ISOM is applied to two practical problems:the Chinese 100 cities-TSP and102 counties-TSP in Shanxi Province,and the two optimal touring routes are provided to the tourists. 展开更多
关键词 self-organizing maps (SOM) traveling salesman problem (TSP) neural networkDocument code:AArticle id:1674-8042(2013)04-0353-08
下载PDF
上一页 1 2 26 下一页 到第
使用帮助 返回顶部