期刊文献+
共找到8,103篇文章
< 1 2 250 >
每页显示 20 50 100
Effects of water tables and nitrogen application on soil bacterial community diversity, network structure, and function in an alpine wetland, China
1
作者 HAN Yaoguang CHEN Kangyi +7 位作者 SHEN Zhibo LI Keyi CHEN Mo HU Yang WANG Jiali JIA Hongtao ZHU Xinping YANG Zailei 《Journal of Arid Land》 SCIE CSCD 2024年第11期1584-1603,共20页
Nitrogen deposition and water tables are important factors to control soil microbial community structure.However,the specific effects and mechanisms of nitrogen deposition and water tables coupling on bacterial divers... Nitrogen deposition and water tables are important factors to control soil microbial community structure.However,the specific effects and mechanisms of nitrogen deposition and water tables coupling on bacterial diversity,abundance,and community structure in arid alpine wetlands remain unclear.The nitrogen deposition(0,10,and 20 kg N/(hm^(2)•a))experiments were conducted in the Bayinbulak alpine wetland with different water tables(perennial flooding,seasonal waterlogging,and perennial drying).The 16S rRNA(ribosomal ribonucleic acid)gene sequencing technology was employed to analyze the changes in bacterial community diversity,network structure,and function in the soil.Results indicated that bacterial diversity was the highest under seasonal waterlogging condition.However,nitrogen deposition only affected the bacterial Chao1 and beta diversity indices under seasonal waterlogging condition.The abundance of bacterial communities under different water tables showed significant differences at the phylum and genus levels.The dominant phylum,Proteobacteria,was sensitive to soil moisture and its abundance decreased with decreasing water tables.Although nitrogen deposition led to changes in bacterial abundance,such changes were small compared with the effects of water tables.Nitrogen deposition with 10 kg N/(hm^(2)•a)decreased bacterial edge number,average path length,and robustness.However,perennial flooding and drying conditions could simply resist environmental changes caused by 20 kg N/(hm^(2)•a)nitrogen deposition and their network structure remain unchanged.The sulfur cycle function was dominant under perennial flooding condition,and carbon and nitrogen cycle functions were dominant under seasonal waterlogging and perennial drying conditions.Nitrogen application increased the potential function of part of nitrogen cycle and decreased the potential function of sulfur cycle in bacterial community.In summary,composition of bacterial community in the arid alpine wetland was determined by water tables,and diversity of bacterial community was inhibited by a lower water table.Effect of nitrogen deposition on bacterial community structure and function depended on water tables. 展开更多
关键词 nitrogen application alpine wetland bacterial community bacterial network water tables
下载PDF
Advancing 5G Network Applications Lifecycle Security:An ML-Driven Approach
2
作者 Ana Hermosilla Jorge Gallego-Madrid +3 位作者 Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1447-1471,共25页
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa... As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security. 展开更多
关键词 network application network function virtualization machine learning SECURITY 5G
下载PDF
Distributed Application Addressing in 6G Network
3
作者 Liu Jie Chen Sibo +4 位作者 Liu Yuqin Mo Zhiwei Lin Yilin Zhu Hongmei He Yufeng 《China Communications》 SCIE CSCD 2024年第4期193-207,共15页
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development... To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification. 展开更多
关键词 application addressing CNC(Computing&network Convergence) DNS(Domain Name System) ICN(Information-Centric network) 6G
下载PDF
Quality of Service and Security on Cisco Network Devices, Coupled with the Development of a Mobile Application Prototype Software for Server Room Temperature Monitoring
4
作者 Desire Mudenda Charles Smart Lubobya 《Journal of Computer and Communications》 2024年第8期123-140,共18页
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge... In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study. 展开更多
关键词 Quality of Service (QoS) network Security Temperature Monitoring Mobile application Cisco Devices
下载PDF
Dynamic channel estimation-aware routing protocol in mobile cognitive radio networks for smart IIoT applications
5
作者 Qusay M.Salih Md Arafatur Rahman +4 位作者 A.Taufiq Asyhari Muhammad Kamran Naeem Mohammad Patwary Ryan Alturki Mohammed Abdulaziz Ikram 《Digital Communications and Networks》 SCIE CSCD 2023年第2期367-382,共16页
Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient co... Cognitive Radio Networks(CRNs)have become a successful platform in recent years for a diverse range of future systems,in particularly,industrial internet of things(IIoT)applications.In order to provide an efficient connection among IIoT devices,CRNs enhance spectrum utilization by using licensed spectrum.However,the routing protocol in these networks is considered one of the main problems due to node mobility and time-variant channel selection.Specifically,the channel selection for routing protocol is indispensable in CRNs to provide an adequate adaptation to the Primary User(PU)activity and create a robust routing path.This study aims to construct a robust routing path by minimizing PU interference and routing delay to maximize throughput within the IIoT domain.Thus,a generic routing framework from a cross-layer perspective is investigated that intends to share the information resources by exploiting a recently proposed method,namely,Channel Availability Probability.Moreover,a novel cross-layer-oriented routing protocol is proposed by using a time-variant channel estimation technique.This protocol combines lower layer(Physical layer and Data Link layer)sensing that is derived from the channel estimation model.Also,it periodically updates and stores the routing table for optimal route decision-making.Moreover,in order to achieve higher throughput and lower delay,a new routing metric is presented.To evaluate the performance of the proposed protocol,network simulations have been conducted and also compared to the widely used routing protocols,as a benchmark.The simulation results of different routing scenarios demonstrate that our proposed solution outperforms the existing protocols in terms of the standard network performance metrics involving packet delivery ratio(with an improved margin of around 5–20%approximately)under varying numbers of PUs and cognitive users in Mobile Cognitive Radio Networks(MCRNs).Moreover,the cross-layer routing protocol successfully achieves high routing performance in finding a robust route,selecting the high channel stability,and reducing the probability of PU interference for continued communication. 展开更多
关键词 Channel selection Cross-layer design Mobile cognitive radio networks Routing protocol IIoT applications
下载PDF
Progress in the Application of Network Pharmacology in Mongolian Medicine Research 被引量:1
6
作者 Meiling Hongfei ZHANG +1 位作者 Baojia LIU Wulangerile 《Medicinal Plant》 2023年第6期11-18,共8页
This paper summarizes the status quo of Mongolian medicine research,the basic research ideas and contents of network pharmacology,the latest development of network pharmacology technology in the field of Mongolian med... This paper summarizes the status quo of Mongolian medicine research,the basic research ideas and contents of network pharmacology,the latest development of network pharmacology technology in the field of Mongolian medicine research,the application progress,future development direction and existing problems in the research of Mongolian medicine,so as to provide new ideas and new methods for the scientific research of traditional medicine. 展开更多
关键词 Mongolian medicine network pharmacology RESEARCH application PROGRESS
下载PDF
Meteorological applications of precipitable water vapor measurements retrieved by the national GNSS network of China 被引量:8
7
作者 Liang Hong Cao Yunchang +3 位作者 Wan Xiaomin Xu Zhifang Wang Haishen Hu Heng 《Geodesy and Geodynamics》 2015年第2期135-142,共8页
In this study, the Global Navigation Satellite System (GNSS) network of China is discussed, which can be used to monitor atmospheric precipitable water vapor (PWV). By the end of 2013, the network had 952 GNSS sit... In this study, the Global Navigation Satellite System (GNSS) network of China is discussed, which can be used to monitor atmospheric precipitable water vapor (PWV). By the end of 2013, the network had 952 GNSS sites, including 260 belonging to the Crustal Movement Observation Network of China (CMONOC) and 692 belonging to the China Meteorological Administration GNSS network (CMAGN). Additionally, GNSS observation collecting and data processing procedures are presented and PWV data quality control methods are investigated. PWV levels as determined by GNSS and radiosonde are compared. The results show that GNSS estimates are generally in good agreement with measurements of radio- sondes and water vapor radiometers (WVR). The PWV retrieved by the national GNSS network is used in weather forecasting, assimilation of data into numerical weather prediction models, the validation of PWV estimates by radiosonde, and plum rain monitoring. The network is also used to monitor the total ionospheric electron content. 展开更多
关键词 Precipitable water vapor (PWV) Global navigation satellite system(GNSS) Crustal Movement Observationnetwork of China (CMONOC)China meteorological administra-tion GNSS network (CMAGN) Water vapor radiometers (WVR) Quality control Meteorological application Assimilation
下载PDF
Dependable Deployment Method for Multiple Applications in Cloud Services Delivery Network 被引量:1
8
作者 史佩昌 王怀民 +3 位作者 尹浩 丁博 刘雪宁 王淼 《China Communications》 SCIE CSCD 2011年第4期65-75,共11页
The mutual-interference phenomenon among multiple applications delivered as services through Cloud Services Delivery Network(CSDN)influences their QoS seriously.In order to deploy multiple applications dependably and ... The mutual-interference phenomenon among multiple applications delivered as services through Cloud Services Delivery Network(CSDN)influences their QoS seriously.In order to deploy multiple applications dependably and efficiently,we propose the Multiple Applications Co-Exist(MACE)method.MACE classifies multiple applications into different types and deploys them using isolation to some extent.Meanwhile,resource static allocation,dynamic supplement and resource reserved mechanism to minimize mutual-interference and maximize resource utilization are designed.After MACE is applied to a real large-scale CSDN and evaluated through 6-month measurement,we find that the CSDN load is more balanced,the bandwidth utilization increases by about 20%,the multiple applications'potential statistical multiplexing ratio decreases from 12% to 5%,and the number of complaint events affecting the dependability of CSDN services caused by multiple applications'mutual-interference has dropped to 0.Obviously,MACE offers a tradeoff and improvement for the dependability and efficiency goals of CSDN. 展开更多
关键词 cloud computing dependable deployment multiple applications co-exist content delivery networks
下载PDF
Networking Observation and Applications of Chinese Ocean Satellites
9
作者 ZOU Bin LIU Yuxin 《空间科学学报》 CAS CSCD 北大核心 2024年第4期722-730,共9页
This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural la... This paper presents the networking observation capabilities of Chinese ocean satellites and their diverse applications in ocean disaster prevention,ecological monitoring,and resource development.Since the inaugural launch in 2002,China has achieved substantial advancements in ocean satellite technology,forming an observation system composed of the HY-1,HY-2,and HY-3 series satellites.These satellites are integral to global ocean environmental monitoring due to their high resolution,extensive coverage,and frequent observations.Looking forward,China aims to further enhance and expand its ocean satellite capabilities through ongoing projects to support global environmental protection and sustainable development. 展开更多
关键词 Chinese ocean satellites networking observation Ocean forecasting Ocean disaster prevention and mitigation Ocean ecological monitoring Ocean resource development Polar monitoring Terrestrial applications
下载PDF
Artificial Neural Network Application to the Friction Stir Welding of Al 6061 Alloy to Stainless Steel 304 被引量:1
10
作者 HASSAN Nassef 《Computer Aided Drafting,Design and Manufacturing》 2008年第1期26-31,共6页
The joining of a 6-mm thickness Al 6061 to Stainless steel 304 has been performed by solid state welding. A selection method of optimum friction welding condition using neural networks is proposed. The data used for a... The joining of a 6-mm thickness Al 6061 to Stainless steel 304 has been performed by solid state welding. A selection method of optimum friction welding condition using neural networks is proposed. The data used for analyses are the friction stir welding condition, the input parameters of the model consist of welding speed and tool rotation speed. The outputs of the ANN (Artificial Neural Network)model includes resulting parameters, namely, maximum reached temperature,and heating rate for both aluminum alloy 6061 and stainless steel 304 during friction stir welding process.The results of analysis suggest that the proposed method is an effective one to select an optimum welding condition.Good performance of the ANN model was achieved. The combined influence of welding speed and tool rotation speed on the maximum reached temperature and heating rate for both aluminum alloy 6061and stainless steel 304 friction stir welding was simulated. A comparison was made between the output of the ANN program and finite element model. The calculated results were in good agreement with that of finite element model. 展开更多
关键词 friction stir welding artificial neural network application welding parameters
下载PDF
Cross-Layer Scheduling Design for Multimedia Applications over Cognitive Ad Hoc Networks
11
作者 YANG Libiao ZHAO Honglin JIA Min 《China Communications》 SCIE CSCD 2014年第7期99-109,共11页
In this paper,we study cross-layer scheduling scheme on multimedia application which considers both streaming traffic and data traffic over cognitive ad hoc networks.A cross-layer design is proposed to optimize SU'... In this paper,we study cross-layer scheduling scheme on multimedia application which considers both streaming traffic and data traffic over cognitive ad hoc networks.A cross-layer design is proposed to optimize SU's utility,which is used as an approach to balance the transmission efficiency and heterogeneous traffic in cognitive ad hoc networks.A framework is provided for utility-based optimal subcarrier assignment,power allocation strategy and corresponding modulation scheme,subject to the interference threshold to primary user(PU) and total transmit power constraint.Bayesian learning is adopted in subcarrier allocation strategy to avoid collision and alleviate the burden of information exchange on limited common control channel(CCC).In addition,the M/G/l queuing model is also introduced to analyze the expected delay of streaming traffic.Numerical results are given to demonstrate that the proposed scheme significantly reduces the blocking probability and outperforms the mentioned single-channel dynamic resource scheduling by almost 8%in term of system utility. 展开更多
关键词 cognitive ad hoc networks CROSS-LAYER multimedia application common controlchannel
下载PDF
DESIGN OF MULTI-SERVICE SDH NETWORKS: FORMULATION AND HEURISTICS
12
作者 Xi Kang Ge Ning Feng Chongxi (Department of Electronic Engineering, Tsinghua University, Beijing 100084) 《Journal of Electronics(China)》 2003年第3期215-219,共5页
Multi-service SDH networks support both packet- and circuit-switched traffic. Optimal design of such a network means to guarantee the circuit connections and configure a logical packet-switched topology with lowest co... Multi-service SDH networks support both packet- and circuit-switched traffic. Optimal design of such a network means to guarantee the circuit connections and configure a logical packet-switched topology with lowest congestion. This letter first formulates the problem as a mixed integer linear programming, which achieves optimal solution but has high computation. Then a heuristic algorithm is proposed to yield near-optimal solution efficiently. Performance of the algorithm is verified by an example. 展开更多
关键词 Multi-service networks Logical topology design sdh
下载PDF
ZTE's Softswitch Networking and Application Cases
13
作者 Jiang Lihua (Network Division of ZTE Corporation,Nanjing 210012,China) 《ZTE Communications》 2003年第2期36-39,共4页
The article introduces ZTE's Softswitch-based NGN solutions. such as the long distance VolP service solution over data back- bone,and local voice and data service solution over MAN.Three application cases are anal... The article introduces ZTE's Softswitch-based NGN solutions. such as the long distance VolP service solution over data back- bone,and local voice and data service solution over MAN.Three application cases are analyzed,and NGN's features in aspects of network architecture,service provision and network management are summarized. 展开更多
关键词 ZTE’s Softswitch networking and application Cases of in work for NGN IAD
下载PDF
Wireless Network Technologies Supporting M2M Applications
14
作者 Lei Zhenzhou (China Academy of Telecommunications Research of Mil, Beijing 100083, China) 《ZTE Communications》 2005年第1期6-9,共4页
When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) commun... When computers and communication devices are available everywhere in the future, the categories of communication will expand to cover not only the man-man and the man-machine, but also the machine-machine (M2M) communication. Someday, the traffic generated by machines will greatly exceed those of man-machine and man-man applications. Large numbers of M2M applications will need various wireless networks to support them. This paper introduces the characteristics, advantages and disadvantages of the currently available various wireless network technologies, including WiFi, Bluetooth, ZigBee, passive RFID and the 802.15 standard networks. 展开更多
关键词 ZIGBEE UWB Wireless network Technologies Supporting M2M applications RFID WiFi
下载PDF
Call for papers Journal of Control Theory and Applications Special issue on Wireless sensor networks:from theory to practices and applications
15
《控制理论与应用(英文版)》 EI 2010年第1期123-123,共1页
Wireless Sensor Network (WSN) is characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. The main advantages of WSN include its low cost, rapid deployment, self-organizat... Wireless Sensor Network (WSN) is characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. The main advantages of WSN include its low cost, rapid deployment, self-organization, and fault tolerance. WSN has received tremendous interests of various research communities, 展开更多
关键词 WSNS Call for papers Journal of Control Theory and applications Special issue on Wireless sensor networks
下载PDF
Discussion on the Application of Complex Power Network to Software Engineering
16
作者 Jiayan SONG 《International Journal of Technology Management》 2015年第1期92-93,共2页
Along with the further development of science and technology, computer hardware and the Intemet are in a rapid development, and information technology has been widely used in all fields so that complex problems are si... Along with the further development of science and technology, computer hardware and the Intemet are in a rapid development, and information technology has been widely used in all fields so that complex problems are simply solved. Because of the needs for the development, software starts to mutually integrate with complex power network, making the scale of software increase greatly. Such a growing trend of software promotes soft-ware development to go beyond a general understanding and control and thus a complex system is formed. It is necessary to strengthen the research of complex network theory, and this is a new way to help people study the complexity of software systems. In this paper, the development course of complex dynamic network is introduced simply and the use of complex power network in the software engineering is summarized. Hopefully, this paper can help the crossover study of complex power network and software engineering in the future. 展开更多
关键词 Complex Power network Software Engineering Computer application network Model
下载PDF
Research on the Application of Big Data and Artificial Intelligence Technology in Computer Network
17
作者 Hongfei Wang 《Modern Electronic Technology》 2020年第2期21-25,共5页
With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development ... With the continuous development of social economy,science and technology are also in continuous progress,relying on the Internet technology of big data era has come in an all-round way.On the basis of the development of cloud computing and Internet technology,artificial intelligence technology has emerged as the times require.It also has more advantages.Applying it to computer network technology can effectively improve the data processing efficiency and quality of computer network technology,and improve the convenience for people’s life and production.This paper studies and analyzes the practical application requirements of computer network,and discusses the application characteristics and timeliness of artificial intelligence technology. 展开更多
关键词 Big data era Artificial intelligence Computer network technology Practical application
下载PDF
Study on the Research and Application of Network Teaching Courseware in Aerobics in Colleges and Universities
18
作者 Xiangxin Meng Huanxiang Ding +1 位作者 Yongjun Zhao Xueqin Zhuang 《International English Education Research》 2014年第11期41-45,共5页
Aerobics teaching in colleges and universities is the most important part of higher education, and the important means to carry out quality-oriented education and cultivate all-round developed talents. The reform of a... Aerobics teaching in colleges and universities is the most important part of higher education, and the important means to carry out quality-oriented education and cultivate all-round developed talents. The reform of aerobics teaching in colleges and universities should be geared to the demands of the times, and explore new innovation and continual development. In this paper, using the research methods of documentation, courseware development, teaching experiment and mathematical statistics, we study on the making and application of college aerobics network teaching courseware. It is revealed that, with the combination of modem network technology and college aerobics teaching, the resulted college aerobics network teaching courseware is the important media to not only upgrades college aerobics teaching quality, but also help develop students' habits of doing physical exercise, and promote physical health. Therefore, this is meaningful and practical in promoting the education of college students in physical quality development. 展开更多
关键词 Colleges and Universities Aerobics the network Teaching Courseware Prepare Test application
下载PDF
A Research on the Application of Virtual Network Technology in Computer Network Security
19
作者 Kun Qi 《Journal of Electronic Research and Application》 2022年第4期1-6,共6页
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2... In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference. 展开更多
关键词 Virtual network technology Computer network security application research
下载PDF
Artificial Neural Network Method Based on Expert Knowledge and Its Application to Quantitative Identification of Potential Seismic Sources
20
作者 Hu Yinlei and Zhang YumingInstitute of Geology,SSB,Beijing 100029,China 《Earthquake Research in China》 1997年第2期64-72,共9页
In this paper,an approach is developed to optimize the quality of the training samples in the conventional Artificial Neural Network(ANN)by incorporating expert knowledge in the means of constructing expert-rule sampl... In this paper,an approach is developed to optimize the quality of the training samples in the conventional Artificial Neural Network(ANN)by incorporating expert knowledge in the means of constructing expert-rule samples from rules in an expert system,and through training by using these samples,an ANN based on expert-knowledge is further developed.The method is introduced into the field of quantitative identification of potential seismic sources on the basis of the rules in an expert system.Then it is applied to the quantitative identification of the potential seismic sources in Beijing and its adjacent area.The result indicates that the expert rule based on ANN method can well incorporate and represent the expert knowledge in the rules in an expert system,and the quality of the samples and the efficiency of training and the accuracy of the result are optimized. 展开更多
关键词 Artificial Neural network Method Based on Expert Knowledge and Its application to Quantitative Identification of Potential Seismic Sources LENGTH
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部