期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
浅析RFID技术在实验室设备管理中的应用
1
作者 朱萍 《中国教育技术装备》 2015年第16期43-45,共3页
随着我国高校实验室建设的快速发展,实验室里仪器设备的日益增多,增加了实验室资产管理的运作负荷,而以往传统的管理方法逐渐不能适应目前的现实情况。通过引进RFID技术,利用电子标签采集实验室仪器设备基础数据,实现电子化、去人工化... 随着我国高校实验室建设的快速发展,实验室里仪器设备的日益增多,增加了实验室资产管理的运作负荷,而以往传统的管理方法逐渐不能适应目前的现实情况。通过引进RFID技术,利用电子标签采集实验室仪器设备基础数据,实现电子化、去人工化的管理模式。简单阐述RFID系统在实验室设备管理中的架构模型,真正提高实验室信息化管理水平。 展开更多
关键词 RFID技术 电子标签 实验室设备 信息化管理
下载PDF
Multi-Level Cross-Lingual Attentive Neural Architecture for Low Resource Name Tagging 被引量:2
2
作者 Xiaocheng Feng Lifu Huang +3 位作者 Bing Qin Ying Lin Heng Ji Ting Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第6期633-645,共13页
Neural networks have been widely used for English name tagging and have delivered state-of-the-art results. However, for low resource languages, due to the limited resources and lack of training data, taggers tend to ... Neural networks have been widely used for English name tagging and have delivered state-of-the-art results. However, for low resource languages, due to the limited resources and lack of training data, taggers tend to have lower performance, in comparison to the English language. In this paper, we tackle this challenging issue by incorporating multi-level cross-lingual knowledge as attention into a neural architecture, which guides low resource name tagging to achieve a better performance. Specifically, we regard entity type distribution as language independent and use bilingual lexicons to bridge cross-lingual semantic mapping. Then, we jointly apply word-level cross-lingual mutual influence and entity-type level monolingual word distributions to enhance low resource name tagging. Experiments on three languages demonstrate the effectiveness of this neural architecture: for Chinese,Uzbek, and Turkish, we are able to yield significant improvements in name tagging over all previous baselines. 展开更多
关键词 name tagging deep learning recurrent neural network cross-lingual information extraction
原文传递
Security analysis of two recently proposed RFID authentication protocols
3
作者 Chao LV Hui LI +1 位作者 Jianfeng MA Meng ZHAO 《Frontiers of Materials Science》 SCIE CSCD 2011年第3期335-340,共6页
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authe... Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol successfully, the adversary may execute a series of carefully designed challenges to determine the tag's identification. 展开更多
关键词 radio frequency identification (RFID) protocol tag information leakage untraceability attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部