期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Kernel method-based fuzzy clustering algorithm 被引量:2
1
作者 WuZhongdong GaoXinbo +1 位作者 XieWeixin YuJianping 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第1期160-166,共7页
The fuzzy C-means clustering algorithm(FCM) to the fuzzy kernel C-means clustering algorithm(FKCM) to effectively perform cluster analysis on the diversiform structures are extended, such as non-hyperspherical data, d... The fuzzy C-means clustering algorithm(FCM) to the fuzzy kernel C-means clustering algorithm(FKCM) to effectively perform cluster analysis on the diversiform structures are extended, such as non-hyperspherical data, data with noise, data with mixture of heterogeneous cluster prototypes, asymmetric data, etc. Based on the Mercer kernel, FKCM clustering algorithm is derived from FCM algorithm united with kernel method. The results of experiments with the synthetic and real data show that the FKCM clustering algorithm is universality and can effectively unsupervised analyze datasets with variform structures in contrast to FCM algorithm. It is can be imagined that kernel-based clustering algorithm is one of important research direction of fuzzy clustering analysis. 展开更多
关键词 fuzzy clustering analysis kernel method fuzzy C-means clustering.
下载PDF
A Nominative Multi-Proxy Signature Scheme Based on ECC 被引量:1
2
作者 MAChuan-gui GAOFeng-xiu WANGYan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期223-226,共4页
A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the... A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the corresponding one based on traditional discrete logarithm. 展开更多
关键词 proxy signature nominative proxy signature multi-proxy signature elliptic curve cryptosystem (ECC)
下载PDF
State feedback design for singularly perturbed system using unified approach 被引量:1
3
作者 ChenxiaoCAI YunZOU DuanjinZHANG 《控制理论与应用(英文版)》 EI 2004年第3期276-280,共5页
The state feedback design for singularly perturbed systems described in Delta operator is considered. The composite state feedback controller for slow and fast subsystems is designed by using the direct method. The ob... The state feedback design for singularly perturbed systems described in Delta operator is considered. The composite state feedback controller for slow and fast subsystems is designed by using the direct method. The obtained results can bring previous conclusions of continuous and discrete time systems into the unified Delta framework. A simulation example is presented to demonstrate the validity and efficiency of the design. 展开更多
关键词 Singularly perturbed systems Delta operator State feedback
下载PDF
A Preliminary Study on Soft Tissue Cutting in Virtual Surgery Simulation
4
作者 JIAShi-yu PANZhen-kuan 《上海大学学报(自然科学版)》 CAS CSCD 2004年第B10期177-183,共7页
A method for simulation of cutting virtual soft tissue objects made of tetrahedron elements is developed. A linear isotropic elastic model is used for the soft tissue material properties and a tensor-mass model chosen... A method for simulation of cutting virtual soft tissue objects made of tetrahedron elements is developed. A linear isotropic elastic model is used for the soft tissue material properties and a tensor-mass model chosen for the physical deformation. The Verlet leapfrog method is used to perform time integration in solving the dynamic equations. Cutting is simulated by simply removing the tetrahedron elements that are intersected with the virtual scalpel. By making use of the spatial coherence, collision detection between soft tissue objects and the virtual scalpel is sped up. To facilitate the simulation, the soft tissue object is represented by linked lists of vertices, edges and tetra elements with pointers to the related neighboring features. The established software framework can serve as a base for the future development. Results of virtual experiments are shown and discussed. Possible future directions are also given. 展开更多
关键词 外科手术模拟 软组织模型 张量模型 软组织开切
下载PDF
Upper and lower bounds on PMEPR in OFDM systems and application
5
作者 YanBiao XuZongze 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第4期476-478,共3页
Upper and lower bounds on peak-to-mean envelope power ratio (PMEPR) in OFDM systems are derived in this paper. The derivation results show that the upper bound on PMEPR only depends on the aperiodic autocorrdation fun... Upper and lower bounds on peak-to-mean envelope power ratio (PMEPR) in OFDM systems are derived in this paper. The derivation results show that the upper bound on PMEPR only depends on the aperiodic autocorrdation functions of the data sequences and is quite useful for rapid elimination of sequences that have PMEPR exceeding a given threshold. According to the lower bound on PMEPR,it has a great change as N (number of subcarriers) varies only for a very small N. For a 16-subcarrier BPSK-OFDM system, a selective mapping (SLM) way to reduce PMEPR is investigated with the upper bound on PMEPR and the distribution of PMEPR for all possible message sequences is given. The analytic results show that the maximal PMEPR is about 6.5 dB which is 5.5 dB less than that in worst situation. 展开更多
关键词 PMEPR OFDM 副载波 自相关函数 平均峰值包络功率 无线通信
下载PDF
Robust adaptive neural network control with supervisory controller 被引量:1
6
作者 ZhangTianping MeiJiandong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第4期628-631,共4页
The problem of direct adaptive neural network control for a class of uncertain nonlinear systems with unknown constant control gain is studied in this paper. Based on the supervisory control strategy and the approxima... The problem of direct adaptive neural network control for a class of uncertain nonlinear systems with unknown constant control gain is studied in this paper. Based on the supervisory control strategy and the approximation capability of multilayer neural networks (MNNs), a novel design scheme of direct adaptive neural network controller is proposed. The adaptive law of the adjustable parameter vector and the matrix of weights in the neural networks and the gain of sliding mode control term to adaptively compensate for the residual and the approximation error of MNNs is determined by using a Lyapunov method. The approach does not require the optimal approximation error to be square-integrable or the supremum of the optimal approximation error to be known. By theoretical analysis, the closed-loop control system is proven to be globally stable in the sense that all signals involved are bounded, with tracking error converging to zero. Simulation results demonstrate the effectiveness of the approach. 展开更多
下载PDF
A systematic approximate method for the study of evolution problem beyond rotating wave approximation
7
作者 张正阶 汪克林 秦敢 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第7期1317-1322,共6页
下载PDF
Abnormal Visible Luminescence Mechanism of Tb^3+-Yb^3+ Codoped SiOu-Al2O3-CaF2 Glass Studied by Time-Resolved Spectra
8
作者 段倩倩 赵华 +3 位作者 张治国 菅傲群 桑胜波 张文栋 《Chinese Physics Letters》 SCIE CAS CSCD 2014年第8期151-154,共4页
The upconversion energy transfer mechanism in Tb^3+-Yb^3+ co-doped SiO2-Al2O3-CaF2 glass is investigated by time-resolved spectra. The effect of donor ion Yb^3+ is involved in the dynamic decay behavior of acceptor... The upconversion energy transfer mechanism in Tb^3+-Yb^3+ co-doped SiO2-Al2O3-CaF2 glass is investigated by time-resolved spectra. The effect of donor ion Yb^3+ is involved in the dynamic decay behavior of acceptor ion Tb^3+, which provides direct proof for the energy transfer from Yb^3+ to Tb^3+. The pump power dependence curves show that the upconversion luminescence is a two-photon process. The measured decay curves of the 5D4 state (Tb^3+) contain two parts: a slow decay process corresponding to its radiation, and a fast one with a decay parameter approximately twice the lifetime of the ^2F5/2 state (Yb^3+ ). The fast decay process is contradictory to the generally accepted cooperative sensitization upconversion rate equation model. Since the effect of the host environmental is excluded by comparative experiments, we believe that there should be another energy transfer mechanism in Tb^3+-Yb^3+ co-doped SiO2-Al2O3-CaF2 glass in addition to the cooperative sensitization process. 展开更多
下载PDF
Some Results on the Minimal Coverings of Precomplete Classes in Partial k-Valued Logic Functions 被引量:11
9
作者 Ren-RenLiu Song-QiaoChen +1 位作者 Jian-ErChen ShuLi 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期981-985,共5页
In completeness theories of multiple-valued logic, the characterization of Sheffer functions is an important issue. The solution can be reduced to determining the minimal coverings of precomplete classes. In this pape... In completeness theories of multiple-valued logic, the characterization of Sheffer functions is an important issue. The solution can be reduced to determining the minimal coverings of precomplete classes. In this paper, someFull Symmetric Function Sets (m=3) are proved to be components of the minimal covering of precomplete classes inP k * . Keywords multiple-valued logic - completeness - Sheffer function - precomplete class NoteThis work is supported by the National Natural Science Foundation of China (Grant Nos.60083001 and 60375021). 展开更多
关键词 multiple-valued logic COMPLETENESS Sheffer function precomplete class
原文传递
An Improved Proxy Multi-Signature Scheme 被引量:1
10
作者 GULi-ze ZHANGSheng YANGYi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第1期10-14,共5页
Based on the Kim-like's proxy multi-signature scheme, an improved proxymulti-signature scheme is proposed. The new scheme overcomes the two problems in the Kim-like'sproxy multi-signature scheme: (1) Security ... Based on the Kim-like's proxy multi-signature scheme, an improved proxymulti-signature scheme is proposed. The new scheme overcomes the two problems in the Kim-like'sproxy multi-signature scheme: (1) Security issue ( every original signer can forge a valid proxymulti-signature for any message); (2) Efficiency issue ( both the size of the proxy multi-signatureand the efficiency of signature checking are dependent on the number of the original signers). 展开更多
关键词 proxy signature MULTI-SIGNATURE proxy multi-signature SECURITY highefficiency
原文传递
Hiding Information into Palette-Based Image 被引量:1
11
作者 WUHong-tao ZHUBo-cheng YANGYi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第1期5-9,14,共6页
关键词 information hiding palette matrix index image
原文传递
部分K值逻辑函数中准完备集之最小覆盖的一些结果
12
作者 Ren-RenLiu Song-QiaoChen +1 位作者 Jian-ErChen ShuLi 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期100-101,共2页
多值逻辑是计算机科学与技术的一个重要分支。目前的计算机结构和计算机程序大多基于二值逻辑,但由于多值逻辑有着许多独特的功能和广阔的应用前景,随着计算机科学与技术的不断进步,多值逻辑得到了前所未有的发展。
关键词 最小覆盖 多值逻辑 计算机科学与技术 逻辑函数 计算机程序 功能 分支 K值
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部