期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Maximum two-dimensional (u×v,4,1,3)-OOCs 被引量:2
1
作者 HUANG Yue-mei CHANG Yan-xun 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2013年第3期279-289,共11页
Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λ... Let Ф(u ×v, k, Aa, Ac) be the largest possible number of codewords among all two- dimensional (u ×v, k, λa, λc) optical orthogonal codes. A 2-D (u× v, k, λa, λ)-OOC with Ф(u× v, k, λa, λc) codewords is said to be maximum. In this paper, the number of codewords of a maximum 2-D (u × v, 4, 1, 3)-OOC has been determined. 展开更多
关键词 MAXIMUM two-dimensional optical orthogonal code orbit.
下载PDF
三角诈骗处分行为的反思与重释
2
作者 陈志慧 《北京警察学院学报》 2024年第1期9-16,共8页
传统三角诈骗理论在其基本构造上设置了限制性要素,这些要素的作用侧重此罪与彼罪的区分功能,在司法适用过程中出现难以化解的困境,不具有必要性。三角诈骗之所以值得处罚是因为与两者间诈骗具有同质性,即受骗人的行为能规范评价为被害... 传统三角诈骗理论在其基本构造上设置了限制性要素,这些要素的作用侧重此罪与彼罪的区分功能,在司法适用过程中出现难以化解的困境,不具有必要性。三角诈骗之所以值得处罚是因为与两者间诈骗具有同质性,即受骗人的行为能规范评价为被害人的处分行为。三角诈骗的认定,应从被害人处分行为的分析入手,对受骗人的行为进行实质性解释。具体解释路径:当受骗人的处分行为一方面能实现“占有转移”的法律效果,一方面能实现“法益侵害”的实质结果,且处分结果能归属于被害人时,受骗人是“适格处分人”。 展开更多
关键词 三角诈骗 处分行为 诈骗 盗窃 偷换二维码
下载PDF
Multiple bit upsets mitigation in memory by using improved hamming codes and parity codes 被引量:1
3
作者 祝名 肖立伊 田欢 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第5期726-730,共5页
This paper combines improved Hamming codes and parity codes to assure the reliability of memory in presence of multiple bit upsets with low cost overhead.The redundancy bits of improved Hamming codes will be appended ... This paper combines improved Hamming codes and parity codes to assure the reliability of memory in presence of multiple bit upsets with low cost overhead.The redundancy bits of improved Hamming codes will be appended at the end of data bits,which eliminates the overhead of interspersing the redundancy bits at the encoder and decoder.The reliability of memory is further enhanced by the layout architecture of redundancy bits and data bits.The proposed scheme has been implemented in Verilog and synthesized using the Synopsys tools.The results reveal that the proposed method has about 19% less area penalties and 13% less power consumption comparing with the current two-dimensional error codes,and its latency of encoder and decoder is 63% less than that of Hamming codes. 展开更多
关键词 MEMORY multiple bit upsets improved hamming codes two-dimensional error codes
下载PDF
Multi-line code: A low complexity revocable fingerprint template for cancelable biometrics 被引量:1
4
作者 WONG Wei-jing WONG Mou-ling Dennis KHO Yau-hee 《Journal of Central South University》 SCIE EI CAS 2013年第5期1292-1297,共6页
A low computational cost cancelable fingerprint template, namely the multi-line codes was proposed. The formulation of a single-line code involves the inspection of minutiae distribution along a straight line construc... A low computational cost cancelable fingerprint template, namely the multi-line codes was proposed. The formulation of a single-line code involves the inspection of minutiae distribution along a straight line constructed based on the reference minutia. Multi-line code is introduced to elevate the performance by combining several single-line codes. Experiments were carried out on a few FVC databases. It has been proven that the proposed method yields relatively low computational complexity as compared to existing minutiae distribution-based methods, while preserving the performance. The equal error rate obtained for FVC2002 DB1 is 4.69% in stolen-key case, and the total arithmetic operations utilized are 14 520 additions and zero multiplication. 展开更多
关键词 指纹模板 低复杂度 代码 撤销 生物 计算成本 算术运算 数据库
下载PDF
Emergence of Plastidial Intergenic Spacers as Suitable DNA Barcodes for Arid Medicinal Plant <i>Rhazya stricta</i>
5
作者 Samia A. Khan Mohammed N. Baeshen +1 位作者 Hassan A. Ramadan Nabih A. Baeshen 《American Journal of Plant Sciences》 2017年第8期1774-1789,共16页
The desert plant Rhazya stricta has anticancer and antimicrobial properties, and is widely used in indigenous medicines of Saudi Arabia. However, the therapeutic benefits rely on an accurate identification of this spe... The desert plant Rhazya stricta has anticancer and antimicrobial properties, and is widely used in indigenous medicines of Saudi Arabia. However, the therapeutic benefits rely on an accurate identification of this species. The authenticity of R. stricta and other medicinal plants and herbs procured from local markets can be questionable due to a lack of clear phenotypic traits. DNA barcoding is an emerging technology for rapid and accurate species identification. In this study, six candidate chloroplastid barcodes were investigated for the authentication of R. stricta. We compared the DNA sequences from fifty locally collected and five market samples of R. stricta with database sequences of R. stricta and seven closely related species. We found that the coding regions matK, rbcL, rpoB, and rpoC1 were highly similar among the taxa. By contrast, the intergenic spacers psbK-psbI and atpF-atpH were variable loci distinct for the medicinal plant R. stricta. psbK-psbI clearly discriminated R. stricta samples as an efficient single locus marker, whereas a two-locus marker combination comprising psbK-psbI + atpF-atpH was also promising according to results from the Basic Local Alignment Search Tool and a maximum likelihood gene tree generated using PHyML. Two-dimensional DNA barcodes (i.e., QR codes) for the psbK-psbI and psbK-psbI + atpF-atpH regions were created for the validation of fresh or dried R. stricta samples. 展开更多
关键词 Rhazya STRICTA Medicinal Plant DNA BARCODING matK rbcl rpoB rpoC1 atpF-atpH psbK-psbI two-dimensional DNA Barcode QR code
下载PDF
民法典视阈下盗赃物善意取得之探析 被引量:2
6
作者 曹影 《河北工业大学学报(社会科学版)》 2019年第4期61-66,共6页
善意取得肇源于"应以手护手"原则,借鉴了罗马法上的时效取得制度,在物权法中发挥着不容小觑的作用。随着商品经济的发展,域外愈多的立法成例对盗赃物适用善意取得给予了肯定性评价。通过梳理我国对于盗赃物善意取得制度的立... 善意取得肇源于"应以手护手"原则,借鉴了罗马法上的时效取得制度,在物权法中发挥着不容小觑的作用。随着商品经济的发展,域外愈多的立法成例对盗赃物适用善意取得给予了肯定性评价。通过梳理我国对于盗赃物善意取得制度的立法态度,可以发现我国相关立法零散且态度反复变动,2007年制定的《物权法》对此存在立法缺漏,民法典物权编草案亦未回应该问题。为了维护静态物权保护与动态交易安全之间的平衡,在民法典物权编立法时应明确规定盗赃物适用善意取得,增添回复请求权,完善除斥期间的起算点等。 展开更多
关键词 盗赃物 善意取得 民法典 物权法
下载PDF
Very Low Bit-Rate Video Coding by Combining H.264/AVC Standard and 2-D Discrete Wavelet Transform
7
作者 Ali Aghagolzadeh Saeed Meshgini +1 位作者 Mehdi Nooshyar Mehdi Aghagolzadeh 《Wireless Sensor Network》 2010年第4期328-336,共9页
In this paper, we propose a new method for very low bit-rate video coding that combines H.264/AVC standard and two-dimensional discrete wavelet transform. In this method, first a two dimensional wavelet transform is a... In this paper, we propose a new method for very low bit-rate video coding that combines H.264/AVC standard and two-dimensional discrete wavelet transform. In this method, first a two dimensional wavelet transform is applied on each video frame independently to extract the low frequency components for each frame and then the low frequency parts of all frames are coded using H.264/AVC codec. On the other hand, the high frequency parts of the video frames are coded by Run Length Coding algorithm, after applying a threshold to neglect the low value coefficients. Experiments show that our proposed method can achieve better rate-distortion performance at very low bit-rate applications below 16 kbits/s compared to applying H.264/AVC standard directly to all frames. Applications of our proposed video coding technique include video telephony, video-conferencing, transmitting or receiving video over half-rate traffic channels of GSM networks. 展开更多
关键词 Video CODING H.264/AVC STANDARD RUN Length CODING two-dimensional WAVELET Transform
下载PDF
A framework to express variant and invariant functional spaces for binary logic 被引量:1
8
作者 Jeffrey Zhi J.ZHENG Christian H.ZHENG 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2010年第2期163-172,共10页
A new framework has been developed to express variant and invariant properties of functions operating on a binary vector space.This framework allows for manipulation of dynamic logic using basic operations and permuta... A new framework has been developed to express variant and invariant properties of functions operating on a binary vector space.This framework allows for manipulation of dynamic logic using basic operations and permutations.Novel representations of binary functional spaces are presented.Current ideas of binary functional spaces are extended and additional conditions are added to describe new function representation schemes:F code and C code.Sizes of the proposed functional space representation schemes were determined.It was found that the complete representation for any set of functions operating on a binary sequence of numbers is larger than previously thought.The complete representation can only be described using a structure having a space of size 2^(2n)×2^(n)!for any given space of functions acting on a binary sequence of length n.The framework,along with the proposed coding schemes provides a foundational theory of variant and invariant logic in software and electricelectronic technology and engineering,and has uses in the analysis of the stability of rule-based,dynamic binary systems such as cellular automata. 展开更多
关键词 two-dimensional(2D)organization conjugate symmetry cellular automata(CA) permutation meta-state vector space truth table(TT) variant table(VT) invariant table(IVT) variant logic optimization global coding vector function space
原文传递
以壳解壳——对ASProtect加壳程序的脱壳和破解
9
作者 Fly 《黑客防线》 2004年第10期124-128,共5页
Icefire:“以壳解壳”这个名字是作者自己起的,私下和他交流的时候他曾介绍过这个名字。这个方法来源于AsprStripperXP脱壳机,在壳把所有的代码解压之后,处理Stolen Code之前,把进程Durrp出来,补上那段壳代码,模仿构造当时的堆栈... Icefire:“以壳解壳”这个名字是作者自己起的,私下和他交流的时候他曾介绍过这个名字。这个方法来源于AsprStripperXP脱壳机,在壳把所有的代码解压之后,处理Stolen Code之前,把进程Durrp出来,补上那段壳代码,模仿构造当时的堆栈和寄存器值环境,这样就由壳自己来解决Stolen Code的问题啦。推而广之,这个Stolen Code简便解决方案也适用于某些其它壳。 展开更多
关键词 ASPROTECT 加壳程序 stolen code OLLYDBG “以壳解壳”
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部