期刊文献+
共找到1,748篇文章
< 1 2 88 >
每页显示 20 50 100
A Diagnostic Approach to Diseases in Pig's Respiratory System Based upon SVM Binary Tree 被引量:3
1
作者 文斌 徐顺来 罗爱民 《Agricultural Science & Technology》 CAS 2011年第3期394-396,399,共4页
[Objective]To study a diagnostic approach to diseases in pig's respiratory system based upon SVM binary tree. [Method] First with the help of clustering theory,the degree of separation based upon the characteristics ... [Objective]To study a diagnostic approach to diseases in pig's respiratory system based upon SVM binary tree. [Method] First with the help of clustering theory,the degree of separation based upon the characteristics of diseases is defined. Each time the type of highest degree of separation is isolated to get a decision tree with smaller accumulated errors and SVM binary tree is applied in the diagnostic experiment of four common respiratory diseases. [Result] The method is practicable and can be applied in the diagnosis of pig's respiratory diseases at the early stage. [Conclusion] It provides references to the healthy development of pig husbandry in China and increases in breeders' incomes. 展开更多
关键词 SVM binary tree Respiratory diseases Disease diagnosis
在线阅读 下载PDF
Binary Tree Petersen网络性质及算法研究
2
作者 纪鸿飞 马英红 《山东师范大学学报(自然科学版)》 CAS 2010年第1期26-28,38,共4页
基于Petersen图,提出了Binary Tree Petersen的网络结构,并对其特性进行了研究,证明了Binary Tree Petersen网络具有正则性以及良好的可扩展性,同时还具有比RP(k)、2-DToms更短的直径和良好的并行能力.另外,还基于Binary Tree P... 基于Petersen图,提出了Binary Tree Petersen的网络结构,并对其特性进行了研究,证明了Binary Tree Petersen网络具有正则性以及良好的可扩展性,同时还具有比RP(k)、2-DToms更短的直径和良好的并行能力.另外,还基于Binary Tree Petersen网络分别给出了其上的单播和广播路由算法,证明了通信效率都为2j+4. 展开更多
关键词 PETERSEN图 binary tree Petersen网络 路由算法
在线阅读 下载PDF
Bi-slotted Binary Tree Algorithm with Stack for Radio Frequency Identification Tag Anti-Collision 被引量:2
3
作者 田芸 陈恭亮 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第2期173-179,共7页
A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the per... A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the performance of binary tree algorithm (BTA). In BSBTA, the reader detects collisions by Manchester code and stores colliding prefixes in a stack. The query is composed of a two-bit prefix and an index value. Following every reader query, there are two timeslots for tags whose pointers and identities (IDs) match the query to respond, one for the tag whose next bit is 0 and the other for the tag with 1 as its next bit. Performance analysis and evaluation are also given. The time complexity and the communication complexity of BTA and BSBTA are derived. The simulation results compare the performance of BSBTA with several related anti-collision algorithms. It is shown that BSBTA outperforms BTA in terms of the average number of responded bits and timeslots for one tag identification. 展开更多
关键词 radio frequency identification (RFID) ANTI-COLLISION binary tree tag identification
原文传递
An Assessment of Snow Cover Duration Variability Among Three Basins of Songhua River in Northeast China Using Binary Decision Tree 被引量:1
4
作者 YANG Qian SONG Kaishan +2 位作者 HAO Xiaohua CHEN Shengbo ZHU Bingxue 《Chinese Geographical Science》 SCIE CSCD 2018年第6期946-956,共11页
The dynamics of snow cover differs greatly from basin to basin in the Songhua River of Northeast China, which is attributable to the differences in the topographic shift as well as changes in the vegetation and climat... The dynamics of snow cover differs greatly from basin to basin in the Songhua River of Northeast China, which is attributable to the differences in the topographic shift as well as changes in the vegetation and climate since the hydrological year(HY) 2003. Daily and flexible multi-day combinations from the HY 2003 to 2014 were produced using Moderate Resolution Imaging Spectroradiometer(MODIS) from Terra and Aqua remote sensing satellites for the snow cover products in the three basins including the Nenjiang River Basin(NJ), Downstream Songhua River Basin(SD) and Upstream Songhua River Basin(SU). Snow cover duration(SCD) was derived from flexible multiday combination each year. The results showed that SCD was significantly associated with elevation, and higher SCD values were found out in the mountainous areas. Further, the average SCDs of NJ, SU and SD basins were 69.43, 98.14 and 88.84 d with an annual growth of 1.36, 2.04 and 2.71 d, respectively. Binary decision tree was used to analyze the nonlinear relationships between SCD and six impact factors, which were successfully applied to simulate the spatial distribution of depth and water equivalent of snow. The impact factors included three topographic factors(elevation, aspect and slope), two climatic factors(precipitation and air temperature) and one vegetation index(Normalized Difference Vegetation Index, NDVI). By treating yearly SCD values as dependent variables and six climatic factors as independent variables, six binary decision trees were built through the combination classification and regression tree(CART) with and without the consideration of climate effect. The results from the model show that elevation, precipitation and air temperature are the three most influential factors, among which air temperature is the most important and ranks first in two of the three studied basins. It is suggested that SCD in the mountainous areas might be more sensitive to climate warming, since precipitation and air temperature are the major factors controlling the persistence of snow cover in the mountainous areas. 展开更多
关键词 binary decision tree MODIS snow cover duration topography climate changes
在线阅读 下载PDF
A Novel Binary Firefly Algorithm for the Minimum Labeling Spanning Tree Problem 被引量:1
5
作者 Mugang Lin Fangju Liu +1 位作者 Huihuang Zhao Jianzhen Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第10期197-214,共18页
Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different labels.TheMLST is anNP-hard combinatoria... Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different labels.TheMLST is anNP-hard combinatorial optimization problem,which is widely applied in communication networks,multimodal transportation networks,and data compression.Some approximation algorithms and heuristics algorithms have been proposed for the problem.Firefly algorithm is a new meta-heuristic algorithm.Because of its simplicity and easy implementation,it has been successfully applied in various fields.However,the basic firefly algorithm is not suitable for discrete problems.To this end,a novel discrete firefly algorithm for the MLST problem is proposed in this paper.A binary operation method to update firefly positions and a local feasible handling method are introduced,which correct unfeasible solutions,eliminate redundant labels,and make the algorithm more suitable for discrete problems.Computational results show that the algorithm has good performance.The algorithm can be extended to solve other discrete optimization problems. 展开更多
关键词 Minimum labeling spanning tree problem binary firefly algorithm META-HEURISTICS discrete optimization
在线阅读 下载PDF
THE NEW METHOD OF GENERATION OF BINARY TREES FROM ZER0(0) AND ONE(1) CODES
6
作者 蔡恒 《Journal of China Textile University(English Edition)》 EI CAS 1995年第2期94-99,共6页
A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-no... A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-nodes is proposed. It differs from the coding scheme generally used and makes no distinction between internal nodes and terminal nodes. A code of a regular binary tree with nnodes is formed by labeling the left branches by O’s and the right branches by l’s and then traversing these branches in pre-order. Root is always assumed to be on a left branch. 展开更多
关键词 code TRAVERSAL MONOTONIC order binary tree RECURSION backtrack approach algorithm design.
在线阅读 下载PDF
Proposals from binary tree and spatio-temporal tunnel for temporal segmentation of rough videos
7
作者 ZHANG Yunzuo GUO Kaina 《Optoelectronics Letters》 EI 2022年第12期763-768,共6页
Existing temporal segmentation methods suffer from the problems of high computational complexity and complicated steps. To address this issue, we present a method that combines the binary tree and spatio-temporal tunn... Existing temporal segmentation methods suffer from the problems of high computational complexity and complicated steps. To address this issue, we present a method that combines the binary tree and spatio-temporal tunnel(STT) for temporal segmentation of rough videos. First, we compute initial cumulative spatio-temporal flow to determine flow overflow of sub-video which is divided from a rough video. Second, the decision tree is generated by combining binary tree and balance factor to dynamically adjust the sampling line of the STT. Finally, pixels on the sampling line are extracted to generate an adaptive STT for temporal proposals. Experimental results show that the computational complexity of the proposed method is significantly better than that of the comparison methods while ensuring accuracy. 展开更多
关键词 binary tree video
原文传递
Binary Tree’s Recursion Traversal Algorithm and Its Improvement
8
作者 Hua Li 《Journal of Computer and Communications》 2016年第7期42-47,共6页
Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvement... Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvements in programming are proposed. 展开更多
关键词 binary tree TRAVERSAL STACK
在线阅读 下载PDF
Recursive and Nonrecursive Traversal Algorithms for Dynamically Created Binary Trees
9
作者 Robert Logozar 《Computer Technology and Application》 2012年第5期374-382,共9页
The modeling of dynamical systems from a time series implemented by our DSA program introduces binary trees of height D with all leaves on the same level, and the related subtrees of height L 〈 D. These are called e-... The modeling of dynamical systems from a time series implemented by our DSA program introduces binary trees of height D with all leaves on the same level, and the related subtrees of height L 〈 D. These are called e-trees and e-subtrees. The recursive and nonrecursive versions of the traversal algorithms for the trees with dynamically created nodes are discussed. The original nonrecursive algorithms that return the pointer to the next node in preorder, inorder and postorder traversals are presented. The space-time complexity analysis shows and the execution time measurements confirm that for these O(2D) algorithms, the recursive versions have approximately 10-25% better time constants. Still, the use of nonrecursive algorithms may be more appropriate in several occasions. 展开更多
关键词 binary e-trees algorithms tree traversal PREORDER inorder postorder RECURSIVE nonrecursive space-time complexity.
在线阅读 下载PDF
Design and implementation of binary tree data structure based on DNA computing
10
作者 YANG Chun-de WEI Guo-hui 《重庆邮电大学学报(自然科学版)》 北大核心 2009年第2期292-295,共4页
The designing,encodings and an instance of simulation of a binary tree for DNA computer were proposed,which utilizes the method of biology to complete inserting and deleting of the binary tree. Firstly,DNA encodings f... The designing,encodings and an instance of simulation of a binary tree for DNA computer were proposed,which utilizes the method of biology to complete inserting and deleting of the binary tree. Firstly,DNA encodings for storage and all elements of the binary tree were completely given out. Then, the implementations of all bio-operations in DNA computer were described. Finally, to prove the feasibility of this method, an actual binary tree with detailed nucleotide encodings was introduced. The process of an algorithm implemented on this binary tree was demonstrated. Based on this method, more other data structures in DNA computer can be developed. 展开更多
关键词 DNA计算机 完全二叉树 数据结构 设计 生物学方法 基因编码 核苷酸 证明
在线阅读 下载PDF
Efficient Binary Tree Multiclass SVM Using Genetic Algorithms for Vowels Recognition
11
作者 Boutkhil Sidaoui Kaddour Sadouni 《通讯和计算机(中英文版)》 2012年第10期1116-1123,共8页
关键词 元音识别 遗传算法 SVM 二叉树 支持向量机 多类分类 测试阶段 训练时间
在线阅读 下载PDF
BTreeU-Topk:基于二叉树的不确定数据上的Top-k查询算法 被引量:2
12
作者 张慧 郑吉平 韩秋廷 《计算机研究与发展》 EI CSCD 北大核心 2012年第10期2095-2105,共11页
应用需求的发展衍生各种查询类型,Top-k查询是交互环境下一种重要查询类型.由于数据的不确定性,传统数据上的Top-k查询技术和方法不能直接应用于不确定数据查询.在已有不确定数据上Top-k查询算法的基础上,提出基于二叉树的不确定数据上T... 应用需求的发展衍生各种查询类型,Top-k查询是交互环境下一种重要查询类型.由于数据的不确定性,传统数据上的Top-k查询技术和方法不能直接应用于不确定数据查询.在已有不确定数据上Top-k查询算法的基础上,提出基于二叉树的不确定数据上Top-k查询算法BTreeU-Topk;为了提高算法执行效率,对二叉树进行修剪操作进而提出BTreeOPTU-Topk和BTreePU-Topk算法.实验结果表明,BTreeU-Topk,BTreeOPTU-Topk以及BTreePU-Topk算法在不同数据分布以及k值增长时均优于现有算法. 展开更多
关键词 不确定数据 可能世界语义 二叉树 Top—k BtreeU—Topk U—Topk
在线阅读 下载PDF
基于函数拆分对抗二进制代码相似性检测
13
作者 魏然 舒辉 《信息工程大学学报》 2026年第1期64-71,共8页
二进制代码相似性检测能够识别软件中的同源函数,进而定位关键模块。攻击者将其应用于逆向工程,给软件安全带来了风险。代码混淆可以增加软件的复杂程度,增强其抗检测能力。传统代码混淆主要在函数内部实现,存在空间开销和运行时开销大... 二进制代码相似性检测能够识别软件中的同源函数,进而定位关键模块。攻击者将其应用于逆向工程,给软件安全带来了风险。代码混淆可以增加软件的复杂程度,增强其抗检测能力。传统代码混淆主要在函数内部实现,存在空间开销和运行时开销大的问题。为此,提出了基于函数拆分的方法进行代码混淆,进而对抗二进制代码相似性检测。该方法在程序的中间表示层实现。首先,基于支配树将原函数的基本块集合划分为多个子集。其次,通过“定义—使用”链识别子集间的数据依赖关系。接着,引入控制变量以修复子集间的控制流。最后,通过代码重写生成子函数。实验结果表明,经过函数拆分混淆后的程序,使二进制相似性检测模型的召回率降至1.3%(函数池大小为1 024),代码膨胀率为原始模型的2.06倍。 展开更多
关键词 代码混淆 二进制代码相似性检测 函数拆分 支配树
在线阅读 下载PDF
基于孤立森林的激光雷达全波形数据分类研究
14
作者 刘玉洁 补冲 唐源 《激光杂志》 北大核心 2026年第2期236-242,共7页
为了获得理想的分类结果,提出基于孤立森林的激光雷达全波形数据分类方法。以后向散射截面为依据,构建激光雷达全波形数据的后向散射截面校正机制,针对校正后的数据,通过二进离散小波簇构成标准正交基和二进正交尺度函数,确定了正交小... 为了获得理想的分类结果,提出基于孤立森林的激光雷达全波形数据分类方法。以后向散射截面为依据,构建激光雷达全波形数据的后向散射截面校正机制,针对校正后的数据,通过二进离散小波簇构成标准正交基和二进正交尺度函数,确定了正交小波包。利用正交小波包对激光雷达全波形数据进行精细分解,从而准确地获取了波形特征,将激光雷达全波形数据特征输入至孤立二叉树中,通过对数据点的路径长度进行统计和分析,实现了对激光雷达全波形数据类别的准确判定。孤立森林通过“孤立”异常点的方式来识别异常数据。实验结果表明,所提方法的脉冲丢失率均控制在0.1%以内,AUC值高达0.93,激光雷达全波形数据的分类性能优异。 展开更多
关键词 激光雷达 全波形数据 数据分类 孤立二叉树 孤立森林
原文传递
不完全无关性覆盖模型下容错系统可靠性分析方法
15
作者 周四维 李奕康 +2 位作者 曾婷 罗瑞奇 李昭 《武汉大学学报(理学版)》 北大核心 2026年第1期125-132,共8页
针对实际工程应用中系统无关部件的检测、定位和隔离可能出现失败的问题,分别探究无关部件隔离成功与失败时其覆盖失效与未覆盖失效对系统可靠性的影响,厘清它们之间的逻辑关系,提出一种不完全无关性覆盖模型(Imperfect Irrelevance Cov... 针对实际工程应用中系统无关部件的检测、定位和隔离可能出现失败的问题,分别探究无关部件隔离成功与失败时其覆盖失效与未覆盖失效对系统可靠性的影响,厘清它们之间的逻辑关系,提出一种不完全无关性覆盖模型(Imperfect Irrelevance Coverage Model,IICM)。在IICM中提出将隔离因子用于量化无关部件隔离的成功率。IICM可以兼容不完全故障覆盖模型(Imperfect Fault Coverage Model,IFCM)与无关性覆盖模型(Irrelevance Coverage Model,ICM)。此外,提出一种基于二元决策图的不完全无关性覆盖下容错系统可靠性组合定量分析方法。案例分析结果表明:1)IICM具有通用性,其组合定量分析方法具有有效性;2)IICM相比IFCM可在不增加冗余的前提下提高系统可靠性,相比ICM在考虑无关性部件隔离效果方面做出了进一步优化。 展开更多
关键词 不完全故障覆盖模型 无关性覆盖模型 故障树 二元决策图 可靠性分析
原文传递
基于K叉树路径传播的Gossip算法
16
作者 邹懿杰 《计算机应用文摘》 2026年第4期91-93,96,共4页
针对Gossip算法在消息同步过程中存在的消息冗余度高、影响同步效率的问题,文章提出一种基于K叉树路径传播的改进Gossip算法——KT Gossip算法。该算法将节点区分为两种类型:负责消息转发的P(Peer)节点与负责消息分发的D(Distribution)... 针对Gossip算法在消息同步过程中存在的消息冗余度高、影响同步效率的问题,文章提出一种基于K叉树路径传播的改进Gossip算法——KT Gossip算法。该算法将节点区分为两种类型:负责消息转发的P(Peer)节点与负责消息分发的D(Distribution)节点。通过引入高性能节点对集群的消息分发路径进行组织,使消息沿K叉树结构传播,从而显著提升消息传播效率,并有效降低冗余消息量。实验结果表明,该算法适用于需要借助Gossip协议实现快速消息传播的应用场景。 展开更多
关键词 Gossip算法 消息冗余 二叉树
在线阅读 下载PDF
郴州市杉木人工林二元立木材积预估模型研究
17
作者 蒋晓晖 刘柄昂 +3 位作者 唐莉玲 廖淑媛 楚晶晶 王小双 《湖南林业科技》 2026年第1期71-76,共6页
本研究以湖南省郴州市人工培育的119株杉木为样本,选取山本和藏式固定参数模型和可变参数模型建立郴州市杉木人工林二元立木材积预估模型并进行验证,为当地林业调查和森林经营提供科学依据。结果表明:两种模型的拟合决定系数均高于0.96... 本研究以湖南省郴州市人工培育的119株杉木为样本,选取山本和藏式固定参数模型和可变参数模型建立郴州市杉木人工林二元立木材积预估模型并进行验证,为当地林业调查和森林经营提供科学依据。结果表明:两种模型的拟合决定系数均高于0.96,总相对偏差和平均系统偏差均在±3%以内,预估精度超过98%,残差分布良好,均满足生产实际需求;与固定参数模型相比,可变参数模型的决定系数和预估精度更高,均方根误差、平均绝对误差、赤池信息准则和贝叶斯信息准则更小,表明可变参数模型的精度更高,性能和质量更优。因此,可变参数模型更适合作为郴州市杉木二元立木材积的预估模型,其表达式为:V=0.00005115 D^((2+0.01672 D-0.07142 h))h^((1-0.0005239 D+0.05599 h))。 展开更多
关键词 杉木 二元立木材积模型 固定参数 可变参数
在线阅读 下载PDF
基于Isabelle的算法程序建模与验证的应用研究
18
作者 黄志鹏 陈小强 王鸿 《工业控制计算机》 2026年第1期52-54,共3页
基于定理证明的形式化验证技术不受状态空间限制,对确保软件正确性至关重要。当前二叉搜索树指令式算法的形式化验证尤为困难,尤其在循环不变式构造上。相比之下,函数式程序因递归定义和无需循环不变式而更易于验证。为此,通过研究二叉... 基于定理证明的形式化验证技术不受状态空间限制,对确保软件正确性至关重要。当前二叉搜索树指令式算法的形式化验证尤为困难,尤其在循环不变式构造上。相比之下,函数式程序因递归定义和无需循环不变式而更易于验证。为此,通过研究二叉搜索树类算法的共性,基于二叉搜索树类算法的Isabelle函数式建模框架,在Isabelle中对AVL插入和删除操作进行函数式建模,并验证插入和删除操作维持搜索树性质的正确性。 展开更多
关键词 软件安全 函数式建模 机械化验证 Isabelle定理证明器 二叉搜索树
在线阅读 下载PDF
基于二叉树的电力调度数据网拥塞规避方法
19
作者 曲向华 张传凤 +1 位作者 史雪梅 李博 《电子设计工程》 2026年第1期111-114,119,共5页
为解决电力调度数据网拓扑结构复杂、状态信息获取实时性不佳导致的网络拥塞问题,提出一种基于二叉树的电力调度数据网拥塞规避方法。该方法先根据电力调度数据网实际拓扑结构和实时状态信息,构建并更新二叉树;然后获取二叉树节点的状... 为解决电力调度数据网拓扑结构复杂、状态信息获取实时性不佳导致的网络拥塞问题,提出一种基于二叉树的电力调度数据网拥塞规避方法。该方法先根据电力调度数据网实际拓扑结构和实时状态信息,构建并更新二叉树;然后获取二叉树节点的状态信息,计算其拥塞指数,预测拥塞节点及其路径;最后基于二叉树搜索可行的电力调度数据传输路径,采用拉格朗日乘子法求解网络流量分配模型,动态分配网络流量,从而实现网络拥塞的有效规避。通过实验验证所提方法的先进性,实验结果表明,应用设计方法后,其链路利用率最大值达到98%,时延最小值达到4 ms,丢包率最小值达到1%,应用效果较好。 展开更多
关键词 二叉树构建 拥塞规避 节点定义与属性 电力调度数据网 拥塞预测
在线阅读 下载PDF
Reliability Analysis of Electrical System of CNC Machine Tool Based on Dynamic Fault Tree Analysis Method 被引量:2
20
作者 晏晶 尹珩苏 +2 位作者 周杰 李彦锋 黄洪钟 《Journal of Donghua University(English Edition)》 EI CAS 2015年第6期1042-1046,共5页
The electrical system of CNC machine tool is very complex which involves many uncertain factors and dynamic stochastic characteristics when failure occurs.Therefore,the traditional system reliability analysis method,f... The electrical system of CNC machine tool is very complex which involves many uncertain factors and dynamic stochastic characteristics when failure occurs.Therefore,the traditional system reliability analysis method,fault tree analysis(FTA)method,based on static logic and static failure mechanism is no longer applicable for dynamic systems reliability analysis.Dynamic fault tree(DFT)analysis method can solve this problem effectively.In this method,DFT first should be pretreated to get a simplified fault tree(FT);then the FT was modularized to get the independent static subtrees and dynamic subtrees.Binary decision diagram(BDD)analysis method was used to analyze static subtrees,while an approximation algorithm was used to deal with dynamic subtrees.When the scale of each subtree is smaller than the system scale,the analysis efficiency can be improved significantly.At last,the usefulness of this DFT analysis method was proved by applying it to analyzing the reliability of electrical system. 展开更多
关键词 RELIABILITY dynamic fault tree MODULARIZATION binary decision diagram approximation algorithm CNC machine tool
在线阅读 下载PDF
上一页 1 2 88 下一页 到第
使用帮助 返回顶部