期刊文献+
共找到268篇文章
< 1 2 14 >
每页显示 20 50 100
LOW-COST HIGH PERFORMANCE CLUSTER OF WORK-STATIONS BASED ON DYNAMIC LOAD BALANCING FOR PARALLEL DEPTH-FIRST SEARCH(DFS)
1
作者 Mohammed A. +2 位作者 M.Ibrahim(加力) LU Xin-da(陆鑫达) 《Journal of Shanghai Jiaotong university(Science)》 EI 2002年第2期223-226,共4页
This paper presented an idea to replace the traditionally expensive parallel machines by heterogeneous cluster of workstations. To emphasise the usability of cluster of workstations platform for parallel and distribut... This paper presented an idea to replace the traditionally expensive parallel machines by heterogeneous cluster of workstations. To emphasise the usability of cluster of workstations platform for parallel and distributed computing, also the paper presented the status report on the effort and experiences for the implementation of a dynamic load balancing for parallel tree computation depth first search(DFS) on the cluster of a workstations project. It compared the speedup performance obtained from our platform with that obtained from the traditional one. The speedup results show that cluster of workstations can be a serious alternative to the expensive parallel machines. 展开更多
关键词 heterogeneous CLUSTERS of WORKSTATION PARALLEL tree computation DFS dynamic load balancing strategy PARALLEL performance
下载PDF
Learning algorithm and application of quantum BP neural networks based on universal quantum gates 被引量:26
2
作者 Li Panchi Li Shiyong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第1期167-174,共8页
A quantum BP neural networks model with learning algorithm is proposed. First, based on the universality of single qubit rotation gate and two-qubit controlled-NOT gate, a quantum neuron model is constructed, which is... A quantum BP neural networks model with learning algorithm is proposed. First, based on the universality of single qubit rotation gate and two-qubit controlled-NOT gate, a quantum neuron model is constructed, which is composed of input, phase rotation, aggregation, reversal rotation and output. In this model, the input is described by qubits, and the output is given by the probability of the state in which (1) is observed. The phase rotation and the reversal rotation are performed by the universal quantum gates. Secondly, the quantum BP neural networks model is constructed, in which the output layer and the hide layer are quantum neurons. With the application of the gradient descent algorithm, a learning algorithm of the model is proposed, and the continuity of the model is proved. It is shown that this model and algorithm are superior to the conventional BP networks in three aspects: convergence speed, convergence rate and robustness, by two application examples of pattern recognition and function approximation. 展开更多
关键词 quantum computing universal quantum gate quantum neuron quantum neural networks
下载PDF
Improved method for the feature extraction of laser scanner using genetic clustering 被引量:6
3
作者 Yu Jinxia Cai Zixing Duan Zhuohua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期280-285,共6页
Feature extraction of range images provided by ranging sensor is a key issue of pattern recognition. To automatically extract the environmental feature sensed by a 2D ranging sensor laser scanner, an improved method b... Feature extraction of range images provided by ranging sensor is a key issue of pattern recognition. To automatically extract the environmental feature sensed by a 2D ranging sensor laser scanner, an improved method based on genetic clustering VGA-clustering is presented. By integrating the spatial neighbouring information of range data into fuzzy clustering algorithm, a weighted fuzzy clustering algorithm (WFCA) instead of standard clustering algorithm is introduced to realize feature extraction of laser scanner. Aimed at the unknown clustering number in advance, several validation index functions are used to estimate the validity of different clustering algorithms and one validation index is selected as the fitness function of genetic algorithm so as to determine the accurate clustering number automatically. At the same time, an improved genetic algorithm IVGA on the basis of VGA is proposed to solve the local optimum of clustering algorithm, which is implemented by increasing the population diversity and improving the genetic operators of elitist rule to enhance the local search capacity and to quicken the convergence speed. By the comparison with other algorithms, the effectiveness of the algorithm introduced is demonstrated. 展开更多
关键词 laser scanner feature extraction weighted fuzzy clustering validation index genetic algorithm.
下载PDF
Formalization of P Systems by Maude 被引量:3
4
作者 戚正伟 尤晋元 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期260-264,共5页
Rewriting logic is a unified model of concurrency, which provides a formal commo n framework of well-known models of concurrent systems. A new formal method of t he specification and execution of P systems using rewri... Rewriting logic is a unified model of concurrency, which provides a formal commo n framework of well-known models of concurrent systems. A new formal method of t he specification and execution of P systems using rewriting logic was proposed. The powerful tool Ma ude 2.0 is used to implement this specification. In order to present the general ideas in a concr ete case study, a simple and classical example from the literature is adopted to present how to formally spe cify and execute a P system. 展开更多
关键词 逻辑学 语义结构 P系统 计算机 自动译码器
下载PDF
Stochastic stabilization analysis of networked control systems 被引量:4
5
作者 Ma Changlin Fang Huajing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期137-141,共5页
Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the m... Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the mathematical model of such a system is established. A stochastic stabilization condition for the system is given. The maximum delay can be derived from the stabilization condition. 展开更多
关键词 Networked control system Asymptotically stable Maximum delay
下载PDF
Modeling of C^3I system in laser countermeasure weapon system 被引量:3
6
作者 陈长喜 郭立红 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第2期261-265,共5页
With the spectrum extended in modern Electronic War, Laser Countermeasure Weapon will be requested in order to snatch up and keep the Electromagnetism-Power in war field. If Command, Control, Communications and Intell... With the spectrum extended in modern Electronic War, Laser Countermeasure Weapon will be requested in order to snatch up and keep the Electromagnetism-Power in war field. If Command, Control, Communications and Intelligence called Double-Army-Power-Implement is applied to general design of Laser Countermeasure Weapon System, the efficiency of Weapon System can be greatly improved. The Object-Oriented analysis and design approach based on UML for C3I system architecture was put forward, by which logical architecture described by class diagrams and behavior diagrams can be developed through Object-Oriented analysis, and physical architecture described by component diagrams and deployment diagrams can be developed through Object-Oriented design. The framework of Modeling based UML was firstly set forth, the high process of Command, Control, Intelligence, Surveillance, Reconnaissance and UML Architecture was utilized., Then the Modeling process was particularly discussed through following the core ideology and basic principle of RUP (Rational Unified Process). Next, a series of diagrams of UML diagram which include Activity diagrams, Use Case diagrams, Sequence diagrams, Package diagrams and Class diagrams of system analysis, Component diagrams, and Deployment diagrams of system design are illustrated in the process of Modeling of C3I system software. Lastly, some problems that should be noticed in the Modeling process, merit and demerit of model, next works were also put forward. 展开更多
关键词 模型化 信息处理 反雷达武器 激光发射
下载PDF
S-rough sets and the discovery of F-hiding knowledge 被引量:2
7
作者 Hao Xiumei Fu Haiyan Shi Kaiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第6期1171-1177,共7页
Singular rough sets (S-rough sets) have three classes of forms: one-directional S-rough sets, dual of onedirectional S-rough sets, and two-directional S-rough sets. Dynamic, hereditary, mnemonic, and hiding propert... Singular rough sets (S-rough sets) have three classes of forms: one-directional S-rough sets, dual of onedirectional S-rough sets, and two-directional S-rough sets. Dynamic, hereditary, mnemonic, and hiding properties are the basic characteristics of S-rough sets. By using the S-rough sets, the concepts of f-hiding knowledge, F-hiding knowledge, hiding degree, and hiding dependence degree are given. Then, both the hiding theorem and the hiding dependence theorem of hiding knowledge are proposed. Finally, an application of hiding knowledge is discussed. 展开更多
关键词 one-direction S-rough sets f-hiding knowledge hiding degree hiding dependence degree hiding theorem hiding dependence theorem application
下载PDF
Web Page Watermarking for Tamper-Proof 被引量:2
8
作者 赵启军 卢宏涛 蒋晓华 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期280-284,共5页
This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after e... This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after each word and each line. When a watermarked web page is tampered, the extracted watermark can detect and locate the modifications to the web page. Besides, the framework of watermarked Web Server system was given. Compared with traditional digital signature methods, this watermarking method is more transparent in that there is no necessary to detach the watermark before displaying web pages. The e xperimental results show that the proposed scheme is an effective tool for tamper-proof of web pages. 展开更多
关键词 环球网 水印法 HTML 网页 计算机网络
下载PDF
Multicast routing algorithm of multiple QoS based on widest-bandwidth 被引量:4
9
作者 Chen Niansheng Li Layuan Dong Wushi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期642-647,共6页
A multicast routing algorithm of multiple QoS constraints based on widest-bandwidth (MRQW) which takes available bandwidth as the prime metric, considering the constraints of the surplus energy of the node, delay an... A multicast routing algorithm of multiple QoS constraints based on widest-bandwidth (MRQW) which takes available bandwidth as the prime metric, considering the constraints of the surplus energy of the node, delay and delay jitter, is presented. The process of routing based on MRQW is provided for as well. Correctness proof and the complexity analysis of the MRQW are also given in the paper. Simulation results show that the MRQW has a good performance in creating multicast trees. It not only satisfys multiple QoS constraints but also makes multicast links have larger available bandwidth 展开更多
关键词 computer network Ad hoc networks QoS multicast routing available bandwidth.
下载PDF
Impact of small-world topologies on broadcasting for wireless sensor networks 被引量:2
10
作者 Jiang Nan Yang Shuqun +1 位作者 Zhou Liang Ding Qiulin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第1期192-196,共5页
Broadcasting is an important operation and been widely used in wireless sensor networks (WSNs). These networks are power constrained as nodes operate with limited battery power. Wireless sensor networks are spatial ... Broadcasting is an important operation and been widely used in wireless sensor networks (WSNs). These networks are power constrained as nodes operate with limited battery power. Wireless sensor networks are spatial graphs that have much more clustered and much high path-length characteristics. After considering energy- efficient broadcasting in such networks, by combining the small-world characteristic of WSNs and the properties of ant algorithm to quickly identify an optimal path, small-world power-aware broadcast algorithm is introduced and evaluated. Given different densities of network, simulation results show that our algorithm significantly improves life of networks and also reduces communication distances and power consumption. 展开更多
关键词 small world ant colony algorithm BROADCASTING wireless sensor networks.
下载PDF
Detection of text in images using SUSAN edge detector 被引量:2
11
作者 毛文革 张田文 王力 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第1期34-40,共7页
Text embedded in images is one of many important cues for indexing and retrieval of images and videos. In the paper, we present a novel method of detecting text aligned either horizontally or vertically, in which a py... Text embedded in images is one of many important cues for indexing and retrieval of images and videos. In the paper, we present a novel method of detecting text aligned either horizontally or vertically, in which a pyramid structure is used to represent an image and the features of the text are extracted using SUSAN edge detector. Text regions at each level of the pyramid are identified according to the autocorrelation analysis. New techniques are introduced to split the text regions into basic ones and merge them into text lines. By evaluating the method on a set of images, we obtain a very good performance of text detection. 展开更多
关键词 检波器 数字电视 数字图象 信号 文字
下载PDF
VCN & Its Role of Engineering in Human Society 被引量:3
12
作者 Ye Qiusun 《Engineering Sciences》 EI 2008年第1期23-30,共8页
A novel broad concept of numbers was given out based upon the analyzing of numbers′ carrying rule. In international mathematics & computer science, all researches on numbers are only confined to same varying rule... A novel broad concept of numbers was given out based upon the analyzing of numbers′ carrying rule. In international mathematics & computer science, all researches on numbers are only confined to same varying rule of the FCN (fixed carrying numbers). The concept of VCN (variable carrying numbers) was presented, and some applied examples of practice were given out. So the engineering application of VCN for n-figures is wider than that of FCN in human society. 展开更多
关键词 VCN 规则分析 图像处理 数据库理论
下载PDF
Community discovery method with uncertainty measure of overlapping nodes based on topological potential 被引量:1
13
作者 张健沛 李泓波 +3 位作者 杨静 白劲波 初妍 张乐君 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第2期16-22,共7页
Community discovery of complex networks,esp.of social networks,has been a hotly debated topic in academic circles in recent years.Since actual networks usually contain some overlapping nodes that are difficult to assi... Community discovery of complex networks,esp.of social networks,has been a hotly debated topic in academic circles in recent years.Since actual networks usually contain some overlapping nodes that are difficult to assign to a certain community,overlapping community discovery is under great demand in practical applications.However,at present network community discovery is mainly done by non-overlapping community discovery methods,overlapping discovery methods are not common.In this context,an overlapping community discovery method is proposed hereby based on topological potential and specific algorithms are also provided.This method not only considers the spread of the uncertainty of community identity of the overlapping nodes in the network,but also realizes a quantified representation,i.e.,uncertainty measure,of the community identity of the overlapping nodes.The experiment results show that this method yields the results that are consistent with those by the classic methods and are more reasonable. 展开更多
关键词 SOCIAL NETWORK complex NETWORK OVERLAPPING COMMUNITY discovery uncertainty measure TOPOLOGICAL potential
下载PDF
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography 被引量:1
14
作者 Richard E Overill Jantje A M Silomon +1 位作者 Kam-Pui Chow Hayson Tse 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期9-15,共7页
The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hy... The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time. 展开更多
关键词 Trojan Horse defence child pornography digital forensic evidence complexity quantitative plausibility metrics posterior odds
下载PDF
Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem 被引量:1
15
作者 张龙军 韩玮 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期645-650,共6页
The security of wireless local area network (WLAN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the ... The security of wireless local area network (WLAN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEE802.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WLAN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet. 展开更多
关键词 网络安全 无线电局域网络 椭圆曲线 密码系统
下载PDF
A kind of signature scheme based on class groups of quadratic fields 被引量:1
16
作者 董晓蕾 曹珍富 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第6期583-587,共5页
Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic ... Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic fields remained open, because of the difficulty of computing class numbers of quadratic fields. In this paper, according to our researches on quadratic fields, we construct the first digital signature scheme in ideal class groups of quadratic fields, using q as modulus, which denotes the prime divisors of ideal class numbers of quadratic fields. Security of the new signature scheme is based fully on CL-DLP. This paper also investigates realization of the scheme, and proposes the concrete technique. In addition, the technique introduced in the paper can be utilized to realize signature schemes of other kinds. 展开更多
关键词 数字签名 二次域密码系统 签名模式 理想类群 离散算法
下载PDF
A Heuristic Method of Scalar Multiplication of Elliptic Curve over OEF 被引量:1
17
作者 刘铎 罗平 戴一奇 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期177-183,共7页
Elliptic curve cryptosystem is the focus of public key cryptology nowadays, for it has many advantages RSA lacks. This paper introduced a new heuristic algorithm on computing multiple scalar multiplications of a given... Elliptic curve cryptosystem is the focus of public key cryptology nowadays, for it has many advantages RSA lacks. This paper introduced a new heuristic algorithm on computing multiple scalar multiplications of a given point. Based on this algorithm, a new method of computing scalar multiplication of elliptic curve over optimal extension field (OEF) using Frobenius map was presented. The new method is more efficient than the traditional ones. In the last part of this paper, the comparison was given in the end. 展开更多
关键词 探索方法 标量 增殖方法 椭圆形
下载PDF
Stability condition of FAST TCP in high speed network on the basis of control theory 被引量:1
18
作者 Zhao Fuzhe Zhou Jianzhong +1 位作者 Luo Zhimeng Xiao Yang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期843-850,共8页
Considering the instability of data transferred existing in high speed network, a new method is proposed for improving the stability using control theory. Under this method, the mathematical model of such a network is... Considering the instability of data transferred existing in high speed network, a new method is proposed for improving the stability using control theory. Under this method, the mathematical model of such a network is established. Stability condition is derived from the mathematical model. Several simulation experiments are performed. The results show that the method can increase the stability of data transferred in terms of the congestion window, queue size, and sending rate of the source. 展开更多
关键词 control theory congestion control stability condition FAST TCP
下载PDF
Design for the simulation of space based information network 被引量:1
19
作者 Zeng Bin Li Zitang Wang Wei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期443-449,共7页
Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to dem... Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario. 展开更多
关键词 space based information network network simulation inter-satellite link routing scheduling simulation
下载PDF
Reliability Evaluation Metrics for Open Source Software Selection 被引量:1
20
作者 Jing-shu JIN Hoo-jae LEE Sung-yul RHEW 《Journal of Measurement Science and Instrumentation》 CAS 2010年第3期281-284,共4页
最近,开放源代码软件(OSS ) 被公司那么广泛地为开发而且由普通用户使用而不是商业软件不仅。然而, OSS 的数字是广阔的,并且它的质量变化从对低高。人们怎么能评估 OSS 并且保证它为使用是可靠的,那么变得必要。这份报纸就在早阶... 最近,开放源代码软件(OSS ) 被公司那么广泛地为开发而且由普通用户使用而不是商业软件不仅。然而, OSS 的数字是广阔的,并且它的质量变化从对低高。人们怎么能评估 OSS 并且保证它为使用是可靠的,那么变得必要。这份报纸就在早阶段选择的 OSS 的状态而言建议一套可靠性评估度量标准。象可靠性的亚属性的可理解性,容错与可恢复性和社区成熟被定义,然后为他们中的每的几个评估标准被识别。在我们的学习的可靠性评估的一个过程被建议。为申请,我们选择四个 OSS 工程并且与我们的度量标准评估他们。由于与为 OSS 的另外的评估模型一起的比较,我们的研究为选择可靠 OSS 介绍一个容易、有效、可靠的方法。 展开更多
关键词 开放源码软件 可靠性评估 评价指标 OSS 商业软件 普通用户 早期阶段 评价过程
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部