期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
江西明月山马尾松种群的空间分布格局 被引量:1
1
作者 刘沐生 吕爱清 《贵州农业科学》 CAS 北大核心 2011年第7期180-182,共3页
为了解明月山旅游活动对建群种群的影响,采用T-square距离方法研究了明月山马尾松种群的空间分布格局。结果表明:海拔400 m、700 m和1 500 m的马尾松种群空间分布格局为集聚型,海拔1 000 m和1 300 m马尾松种群的空间分布格局为随机型。... 为了解明月山旅游活动对建群种群的影响,采用T-square距离方法研究了明月山马尾松种群的空间分布格局。结果表明:海拔400 m、700 m和1 500 m的马尾松种群空间分布格局为集聚型,海拔1 000 m和1 300 m马尾松种群的空间分布格局为随机型。马尾松种群空间分布格局随着海拔高度发生规律性变化。说明,明月山的旅游开发活动已对低海拔的种群产生一定干扰。因此,应制定合理的明月山开发保护规划,促进明月山旅游开发的良性发展。 展开更多
关键词 明月山 马尾松种群 空间格局 t-square距离方法 江西
在线阅读 下载PDF
Improvement and upgrade of mine fire simulation program MFIRE 被引量:1
2
作者 ZHOU Li-hong LUO Yi 《Journal of Coal Science & Engineering(China)》 2011年第3期275-280,共6页
MFIRE, an underground mine fire simulation program developed in 1980's, is a tool that can be used to simulate the impacts of a mine fire event to a mine ventilation network. However, the lack of the abilities to sim... MFIRE, an underground mine fire simulation program developed in 1980's, is a tool that can be used to simulate the impacts of a mine fire event to a mine ventilation network. However, the lack of the abilities to simulate some of the important mine fire phenomena realistically hindered its wide applications. This research carried out to improve and upgrade the MFIRE 2.20 program to MFIRE 2.30. The new additions of MFIRE 2.30 including a time dependent fire model, smoke rollback prediction, the incorporation of a moving fire source, and a rewriting of MFIRE in Microsoft Visual C++ were interpreted. 展开更多
关键词 mine fire simulation MFIRE t-square fire smoke rollback conveyor belt fire
在线阅读 下载PDF
Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication 被引量:1
3
作者 张勇东 唐胜 李锦涛 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第4期618-625,共8页
In this paper, a secure and incidental distortion tolerant signature method for image authentication is proposed. The generation of authentication signature is based on Hotelling's T-square Statistic (HTS) via Prin... In this paper, a secure and incidental distortion tolerant signature method for image authentication is proposed. The generation of authentication signature is based on Hotelling's T-square Statistic (HTS) via Principal Component Analysis (PCA) of block DCT coefficients. HTS values of all blocks construct a unique and stable "block-edge image", i.e, Structural and Statistical Signature (SSS). The characteristic of SSS is that it is short, and can tolerate contentpreserving manipulations while keeping sensitive to content-changing attacks, and locate tampering easily. During signature matching, the Fisher criterion is used to obtain optimal threshold for automatically and universally distinguishing incidental manipulations from malicious attacks. Moreover, the security of SSS is achieved by encryption of the DCT coefficients with chaotic sequences before PCA. Experiments show that the novel method is effective for authentication. 展开更多
关键词 image authentication digital signature PCA (Principal Component Analysis) Hotelling's t-square statistic
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部