期刊文献+
共找到566篇文章
< 1 2 29 >
每页显示 20 50 100
HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things
1
作者 Amjad Khan Rahim Khan +1 位作者 Fahad Alturise Tamim Alkhalifah 《Computers, Materials & Continua》 2025年第2期3161-3178,共18页
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These in... The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the critical issues, which is the prediction of fraudulent devices, i.e., adversaries, preferably as early as possible in the IoT. In this paper, a hybrid communication mechanism is presented where the Hidden Markov Model (HMM) predicts the legitimacy of the requesting device (both source and destination), and the Advanced Encryption Standard (AES) safeguards the reliability of the transmitted data over a shared communication medium, preferably through a secret shared key, i.e., , and timestamp information. A device becomes trusted if it has passed both evaluation levels, i.e., HMM and message decryption, within a stipulated time interval. The proposed hybrid, along with existing state-of-the-art approaches, has been simulated in the realistic environment of the IoT to verify the security measures. These evaluations were carried out in the presence of intruders capable of launching various attacks simultaneously, such as man-in-the-middle, device impersonations, and masquerading attacks. Moreover, the proposed approach has been proven to be more effective than existing state-of-the-art approaches due to its exceptional performance in communication, processing, and storage overheads, i.e., 13%, 19%, and 16%, respectively. Finally, the proposed hybrid approach is pruned against well-known security attacks in the IoT. 展开更多
关键词 Internet of Things information security AUTHENTICATION hidden Markov model MULTIMEDIA
在线阅读 下载PDF
Anti-Control of Hopf Bifurcation for a Chaotic System with Infinite Equilibria
2
作者 HAN Qin 《Wuhan University Journal of Natural Sciences》 2025年第5期497-507,共11页
One method to change the bifurcation characteristics of chaotic systems is anti-control,which can either delay or advance bifur-cation and transform an unstable state into a stable one.The chaotic system with infinite... One method to change the bifurcation characteristics of chaotic systems is anti-control,which can either delay or advance bifur-cation and transform an unstable state into a stable one.The chaotic system with infinite equilibria exhibits complex bifurcation characteris-tics.The Hopf bifurcation and hidden attractors with symmetric coexistence of the system are analyzed.An improved dynamic state feed-back control method is adopted to reduce the tedious calculation process to prevent the Hopf bifurcation from being controlled.A hybrid controller that includes both nonlinear and linear controllers is set up for the system.With the method,the delay and stability of the Hopf bifurcation of the system are studied and the goal of anti-control is achieved.Numerical analysis verified the correctness. 展开更多
关键词 chaotic system infinite equilibria hidden attractors anti-control the Hopf bifurcation
原文传递
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
3
作者 Yousheng Zhou Rundong Peng +2 位作者 Yuanni Liu Pandi Vijayakumar Brij Gupta 《Digital Communications and Networks》 2025年第2期455-464,共10页
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the... With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every day.How to securely share data between the IoV operator and various value-added service providers becomes one of the critical issues.Due to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in IoV.However,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key misuse.This paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy exposure.In addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key misuse.Since the main computation task is outsourced to the cloud,the burden of the user side is relatively low.Analysis of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV. 展开更多
关键词 PRIVACY-PRESERVING Attribute-based encryption Partially hidden policy Traceability User revocation Internet of vehicles
在线阅读 下载PDF
“Becoming a family”—the effects of the hidden curriculum in transferring institutional mission:An experience from a century-old nursing school
4
作者 Aimei Mao Hon-Lon Tam +1 位作者 Pak-Leng Cheong Iat-Kio Van 《International Journal of Nursing Sciences》 2025年第3期293-300,I0006,I0007,共10页
Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded the... Objectives This study aimed to examine the role of the hidden curriculum in transmitting the educational mission and its impacts on nursing students’professional socialization.Methods This constructivist grounded theory study involved twenty-six students and five faculty members from a century-old nursing school in Macao.Semi-structured interviews examined the factors influencing nursing students’choice of a specific nursing school and their general learning experiences in nursing studies.Open and focused coding was employed to develop categories and concepts that capture the nuances of how the hidden curriculum influences students’personal experiences,perceptions,and values related to developing their professional identities.The data analysis was guided by the“Community of Practice”model.Results The educational mission fostered a hidden curriculum that emphasized nurturing qualities and social responsibilities,creating a family-like learning environment that positively influenced the professional socialization of nursing students.Under the core theme of“becoming a family,”two sub-themes emerged:“student-peer interactions-fostering sisterly/brotherly learning partnerships”and“student-faculty interactions–faculty’s acting as parenting instructors.”While the hidden curriculum promoted a democratic and egalitarian learning atmosphere among student-peers,it simultaneously reinforced hierarchical power dynamics among senior-junior students and student-faculty relationships,mirroring the power-based interpersonal dynamics often found in traditional Chinese families.Conclusions Explicating the educational mission can help shape a hidden curriculum that benefits nursing students’professional socialization.Faculty members should reflect on the power inequalities reproduced by the hidden curriculum and establish appropriate boundaries in student-faculty relationships. 展开更多
关键词 Community of practice Educational mission Hidden curriculum Nurse students Professional socialization Qualitative study
在线阅读 下载PDF
Rise of China’s Manufacturing Hidden Champions:A Resource Allocation Perspective--An Explorative Case Study of Hailiya Group
5
作者 Shan Yu Chen Jinlong 《China Economist》 2025年第1期78-100,共23页
Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapmen... Hidden champions play a critical role in China’s efforts to overcome technological and industrial“chokepoints”.These enterprises are pivotal for breaking free from Western technological embargoes,avoiding entrapment in low-value-added production,and driving industrial upgrading.Given the distinct market environment in which China’s hidden champions have emerged,it is both timely and practically significant to examine their growth trajectories and underlying mechanisms.This study adopts a resource allocation perspective to investigate the development path of Chinese manufacturing enterprises into hidden champions,using a vertical case study of Hailiya Group.The findings reveal that such enterprises achieve hidden champion status by vertically concentrating on niche markets while harnessing technological potential and horizontally diversifying their technology application scenarios.Their growth follows a“T-shaped”strategy,combining vertical specialization in a focused market with horizontal expansion into new applications.Four critical mechanisms underpin the rise of manufacturing hidden champions:market niche positioning,innovation-driven focus,application scenario expansion,and ecosystem development.Specifically,these enterprises strategically target niche markets,establish a technology-oriented competitive edge,broaden technology applications to unlock new profit opportunities,and develop collaborative ecosystems to share resources and drive industrial advancement.This paper not only extends the interpretive boundaries of resource allocation theory but also offers fresh insights into the emergence of Chinese manufacturing enterprises as hidden champions,enriching our understanding of their unique growth dynamics. 展开更多
关键词 Hidden champions resource allocation innovation assets customer assets growth mechanism
在线阅读 下载PDF
Hydrothermal Control by Deep Hidden Faults on Geothermal Systems in Sedimentary Basins:A Case Study of the Cangdong Fault in the North China Basin
6
作者 YIN Xiaoxiao LIN Jianwang +5 位作者 LI Hu LI Huanqing DONG Lufei YAN Jiaxian ZHANG Sen LI Zheng 《Acta Geologica Sinica(English Edition)》 2025年第1期243-257,共15页
Large basins are currently the global focus for geothermal development,with their hydrothermal system being controlled by a variety of factors,such as basement relief and fracture development.Donglihu is located at th... Large basins are currently the global focus for geothermal development,with their hydrothermal system being controlled by a variety of factors,such as basement relief and fracture development.Donglihu is located at the north of the Cangxian uplift in the North China Basin,the concentrated geothermal resource development zone in North China.This study systematically collects temperature logging data and long-term dynamic monitoring of water level and water quality as well as group well tracer test data carried out in this area in recent years,on the basis of which the hydrothermal controlling role of the deep hidden faults is systematically analyzed.The results show that the Cangdong fault communicates with different geothermal reservoirs in the shallow part and plays a specific role in the water-heat channel of the local area.As a result,the high-value area of the geothermal temperature gradient in the sedimentary layer of the Donglihu area is distributed around the Cangdong fault.The geothermal reservoir temperature of the Minghuazhen Formation within the influence of the fault is also significantly higher than the regional average,the hydraulic head of different geothermal reservoirs showing a consistent and synergistic trend.However,the water quality has been stable for many years without any apparent changes.This understanding has a particular significance for further deepening understanding of the geothermal genesis mechanism in sedimentary basins and guiding future geothermal exploration and development in the Donglihu area. 展开更多
关键词 sedimentary basin geothermal system hidden fault hydrothermal channel Cangdong fault
在线阅读 下载PDF
Ocean exploration journey
7
作者 易静 《疯狂英语(新读写)》 2025年第8期69-70,80,共3页
Dr Emily Thompson decided it was time to set sail on her first major maritime research expedition.She had always been fascinated by the mysteries of the ocean and wanted to uncover the secrets hidden beneath the waves... Dr Emily Thompson decided it was time to set sail on her first major maritime research expedition.She had always been fascinated by the mysteries of the ocean and wanted to uncover the secrets hidden beneath the waves.Her team boarded the research vessel early in the morning,excited at the adventure that awaited them. 展开更多
关键词 secrets sea mysteries ocean research vessel maritime research uncover secrets hidden beneath ocean exploration
在线阅读 下载PDF
DH-LDA:A Deeply Hidden Load Data Attack on Electricity Market of Smart Grid
8
作者 Yunhao Yu Meiling Dizha +6 位作者 Boda Zhang Ruibin Wen FuhuaLuo Xiang Guo Junjie Song Bingdong Wang Zhenyong Zhang 《Computers, Materials & Continua》 2025年第11期3861-3877,共17页
The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastr... The load profile is a key characteristic of the power grid and lies at the basis for the power flow control and generation scheduling.However,due to the wide adoption of internet-of-things(IoT)-based metering infrastructure,the cyber vulnerability of load meters has attracted the adversary’s great attention.In this paper,we investigate the vulnerability of manipulating the nodal prices by injecting false load data into the meter measurements.By taking advantage of the changing properties of real-world load profile,we propose a deeply hidden load data attack(i.e.,DH-LDA)that can evade bad data detection,clustering-based detection,and price anomaly detection.The main contributions of this work are as follows:(i)We design a stealthy attack framework that exploits historical load patterns to generate load data with minimal statistical deviation from normalmeasurements,thereby maximizing concealment;(ii)We identify the optimal time window for data injection to ensure that the altered nodal prices follow natural fluctuations,enhancing the undetectability of the attack in real-time market operations;(iii)We develop a resilience evaluation metric and formulate an optimization-based approach to quantify the electricity market’s robustness against DH-LDAs.Our experiments show that the adversary can gain profits from the electricity market while remaining undetected. 展开更多
关键词 Smart grid security load redistribution data electricity market deeply hidden attack
在线阅读 下载PDF
Uncovering Hidden Spin of Scalar Fields with Higher-Order Derivative Lagrangian:On the Wave Spin in Drifted and Dissipative Fields
9
作者 Shuo Xin Mengxiang Xie Jie Ren 《Chinese Physics Letters》 2025年第6期70-77,共8页
Scalar fields should have no spin angular momentum according to conventional textbook understandings inclassical field theory.Yet,recent studies demonstrate the undoubted existence of wave spin endowed by acousticand ... Scalar fields should have no spin angular momentum according to conventional textbook understandings inclassical field theory.Yet,recent studies demonstrate the undoubted existence of wave spin endowed by acousticand elastic longitudinal waves,which are of irrotational curl-free nature without vorticity and can be describedby scalar fields.Moreover,the conventional theory cannot even answer the question of whether wave spin existsin dissipative fields,given the ubiquitous dissipation in reality.Here,to resolve the seeming paradox and answerthe challenging question,we uncover the origin of wave spin in scalar fields beyond traditional formalism byclarifying that the presence of higher-order derivatives in scalar field Lagrangians can give rise to non-vanishingwave spin.For“spinless”scalar fields of only first-order derivatives,we can make the hidden wave spin emergeby revealing a latent field that leads to the original field through a time derivative,thus giving higher-order termsin Lagrangian.Based on the standard Noether theorem approach,we exemplify the wave spin for unconventionaldrifted acoustic fields,and even for dissipative media,in scalar fields with higher-order derivative Lagrangian.The results would prompt people to build more comprehensive and fundamental understandings of structuralwave spin in classical fields. 展开更多
关键词 higher order derivative Lagrangian hidden spin acousticand elastic longitudinal waveswhich acoustic waves wave spin spin angular momentum scalar fields
原文传递
Non-intrusive anomaly detection for carving machine systems based on CAE-GMHMM under multiple working conditions
10
作者 QIU Xiang CHEN Wei +2 位作者 WU Qi HU Fo LU Kangdi 《High Technology Letters》 2025年第1期1-11,共11页
This paper is concerned with a non-intrusive anomaly detection method for carving machine systems with variant working conditions,and a novel unsupervised detection framework that integrates convolutional autoencoder(... This paper is concerned with a non-intrusive anomaly detection method for carving machine systems with variant working conditions,and a novel unsupervised detection framework that integrates convolutional autoencoder(CAE)and Gaussian mixture hidden Markov model(GMHMM)is proposed.Firstly,the built-in sensor information under normal conditions is recorded,and a 1D convolutional autoencoder is employed to compress high-dimensional time series,thereby transforming the anomaly detection problem in high-dimensional space into a density estimation problem in a latent low-dimensional space.Then,two separate estimation networks are utilized to predict the mixture memberships and state transition probabilities for each sample,enabling GMHMM to handle low-dimensional representations and multi-condition information.Furthermore,a cost function comprising CAE reconstruction and GMHMM probability assessment is constructed for the low-dimensional representation generation and subsequent density estimation in an end-to-end fashion,and the joint optimization effectively enhances the anomaly detection performance.Finally,experiments are carried out on a self-developed multi-axis carving machine platform to validate the effectiveness and superiority of the proposed method. 展开更多
关键词 non-intrusive detection variant working condition rotating machinery motion control system hidden Markov model(HMM)
在线阅读 下载PDF
The rediscovery of Mozart's hidden gem
11
作者 孙启禄 《疯狂英语(新悦读)》 2025年第4期25-28,76,共5页
1 In 2024,audiences were treated to something very special:new music by Wolfgang Amadeus Mozart.That's right-new Mozart music!2 Leipzig Municipal Libraries announced their exciting find.Researchers came across thi... 1 In 2024,audiences were treated to something very special:new music by Wolfgang Amadeus Mozart.That's right-new Mozart music!2 Leipzig Municipal Libraries announced their exciting find.Researchers came across this lost work while updating the Köchel catalogue,a list of Mozart's compositions.The piece is a seven⁃movement string trio,written in the mid to late 1760s,when Mozart was very young.The handwritten manuscript,titled Serenate ex C,uses dark brown ink on off⁃white paper.Now,it's been renamed Ganz kleine Nachtmusik and lasts about 12 minutes. 展开更多
关键词 new music dark brown ink string trio ganz kleine n REDISCOVERY hidden gem k chel cataloguea K chel catalogue
在线阅读 下载PDF
Hidden Concerns and Countermeasures for China’s Green Energy Mineral Resource Supply Security
12
作者 Fang Ruirui Liu Guizhou +3 位作者 Dou Lirong Hu Ning Xia Xiaodi Feng Lianyong 《China Oil & Gas》 2025年第5期47-52,共6页
Achieving the dual carbon goal through energy transition has become a global consensus.The increasingly recognized of mineral resources is increasingly recognized due to their role in determining the pace of energy tr... Achieving the dual carbon goal through energy transition has become a global consensus.The increasingly recognized of mineral resources is increasingly recognized due to their role in determining the pace of energy transition.China has a leading capacity in the production and processing of certain minerals.However,because the major sources are abroad,China still faces certain disadvantages in acquiring upstream resources.In response to the complex international situation and high consumption demand。 展开更多
关键词 mineral resources dual carbon goal COUNTERMEASURES Chinas green energy mineral resource supply security achieving dual carbon goal energy transition hidden concerns
在线阅读 下载PDF
Prediction of Hidden Blood Loss During Posterior Spinal Surgery 被引量:9
13
作者 白冰 田园 +3 位作者 张越伦 马满娇 虞雪融 黄宇光 《Chinese Medical Sciences Journal》 CAS CSCD 2019年第1期38-44,共7页
Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in s... Objective Identification of the risk factors for extraordinary hidden blood loss(HBL) could clarify the underlying causes and provide more appropriate management. This study aims to identify the predictors of HBL in spinal surgery.Methods Medical records were retrospectively retrieved to collect the data of patients who undergoing posterior thoracic and lumbar fusion surgery or scoliosis surgery. Demographic information, perioperative visible blood loss volume, as well as laboratory results were recorded. The patients receiving fusion surgery or scoliosis surgery were further divided into the HBL positive subgroup and the HBL negative subgroup. Differences in the variables between the groups were then analyzed. Binary logistic regression analysis was performed to determine independent risk factors associated with HBL.Results For patients undergoing posterior spinal surgery, the independent risk factors associated with HBL were autologous transfusion(for fusion surgery P = 0.011, OR: 2.627, 95%CI: 1.574-2.782; for scoliosis surgery P < 0.001, OR: 2.268, 95%CI: 2.143-2.504) and allogeneic transfusion(for fusion surgery P < 0.001, OR: 6.487, 95%CI: 2.349-17.915; for scoliosis surgery P < 0.001, OR: 3.636, 95%CI: 2.389-5.231).Conclusion Intraoperative blood transfusion might be an early-warning indicator for perioperative HBL. 展开更多
关键词 SPINAL SURGERY hidden BLOOD LOSS TRANSFUSION PREDICTION
暂未订购
多线程程序时序分析的隐Markov模型 被引量:7
14
作者 孔德光 谭小彬 +2 位作者 奚宏生 帅建梅 宫涛 《软件学报》 EI CSCD 北大核心 2010年第3期461-472,共12页
针对多线程程序数据竞争分析与检测困难的问题,提出一种基于隐Markov模型的多线程程序时序分析方法.用随机变量不确定性刻画不同线程之间时序上的交互关系,分析数据竞争条件下程序不确定结果的概率分布情况;建立多线程程序时序分析的隐M... 针对多线程程序数据竞争分析与检测困难的问题,提出一种基于隐Markov模型的多线程程序时序分析方法.用随机变量不确定性刻画不同线程之间时序上的交互关系,分析数据竞争条件下程序不确定结果的概率分布情况;建立多线程程序时序分析的隐Markov模型,使用Baum-Welch和前向算法仿真上下文对程序实际运行状态的影响.实验结果表明,该模型能够快速有效反映多线程执行时序,用于指导多线程程序时序竞争检测过程. 展开更多
关键词 多线程 数据竞争 hidden MARKOV模型 时序
在线阅读 下载PDF
基于人工免疫算法的离散隐马尔科夫故障诊断模型优化 被引量:8
15
作者 张小强 朱文辉 +1 位作者 康铁宇 黄晋英 《装备环境工程》 CAS 2019年第1期63-67,共5页
目的解决离散隐马尔科夫模型在行星齿轮箱故障诊断中的自适应性和泛化性问题。方法建立人工免疫优化模型,将包含易被误判样本的多样本集作为抗原,以其正确识别率为适应度函数,不断对初始观测矩阵进行增殖、变异和选择,获得识别率最高时... 目的解决离散隐马尔科夫模型在行星齿轮箱故障诊断中的自适应性和泛化性问题。方法建立人工免疫优化模型,将包含易被误判样本的多样本集作为抗原,以其正确识别率为适应度函数,不断对初始观测矩阵进行增殖、变异和选择,获得识别率最高时的初始观测矩阵,利用人工免疫算法对隐马尔科夫故障诊断模型的初始观测矩阵进行优化。结果将该方法应用于行星齿轮箱的故障诊断中,通过不同工况下的对比试验、单样本和多样本优化对比试验,验证了优化后的隐马尔科夫故障诊断模型的诊断效果。结论优化后的隐马尔科夫故障诊断模型具有更好的适应性,诊断精度显著提高。 展开更多
关键词 故障诊断 离散隐马尔科夫模型 Discrete Hidden MARKOV Model(DHMM) 人工免疫优化 行星齿轮箱
在线阅读 下载PDF
基于启发式查询词选择算法的Hidden Web获取研究 被引量:1
16
作者 姚全珠 杨增辉 +1 位作者 张楠 田元 《计算机工程与应用》 CSCD 北大核心 2007年第34期174-176,203,共4页
Hidden Web因为其隐蔽性而难以直接抓取,因此成为信息检索研究的一个新领域。提出了一种获取Hidden Web信息的方法,讨论了实现的关键技术。通过设计提出的启发式查询词选择算法,提高了抓取的效率。实验证明了该模型和算法的有效性。
关键词 信息检索 Hidden WEB 爬虫 启发式算法
在线阅读 下载PDF
井下基于动态指纹更新的指纹定位算法研究 被引量:6
17
作者 崔丽珍 王巧利 +1 位作者 郭倩倩 杨勇 《系统仿真学报》 CAS CSCD 北大核心 2021年第4期818-824,共7页
围绕煤矿井下环境特点,提出一种基于动态指纹更新的指纹定位算法。该算法运用FCM(Fuzzy C-Means Clustering)按信号分布特征划分井下定位区域,在各个子区域建立训练学习模型。在FCM算法基础上提出一种基于移动用户位置的HMM(Hidden Mark... 围绕煤矿井下环境特点,提出一种基于动态指纹更新的指纹定位算法。该算法运用FCM(Fuzzy C-Means Clustering)按信号分布特征划分井下定位区域,在各个子区域建立训练学习模型。在FCM算法基础上提出一种基于移动用户位置的HMM(Hidden Markov Model)运动信息序列模型,通过用户无意识地参与RSSI(Received Signal Strength Indication)序列的采集,实现指纹数据库的动态更新。运用具有自学习能力的ANFIS(Adaptive Network-based Fuzzy Inference System)算法定位未知节点。实验结果表明:所提的井下基于动态指纹更新的指纹定位算法定位精度可达2.6 m,满足煤矿井下巷道的实时定位需求。 展开更多
关键词 煤矿井下 指纹匹配定位 fuzzy C-Means clustering算法 区域划分 指纹库更新 hidden Markov model运动轨迹模型 adaptive network-based fuzzy inference system定位模型 定位精度
原文传递
Ontology mapping based on hidden Markov model 被引量:2
18
作者 尹康银 宋自林 徐平 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期389-393,共5页
The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov mode... The existing ontology mapping methods mainly consider the structure of the ontology and the mapping precision is lower to some extent. According to statistical theory, a method which is based on the hidden Markov model is presented to establish ontology mapping. This method considers concepts as models, and attributes, relations, hierarchies, siblings and rules of the concepts as the states of the HMM, respectively. The models corresponding to the concepts are built by virtue of learning many training instances. On the basis of the best state sequence that is decided by the Viterbi algorithm and corresponding to the instance, mapping between the concepts can be established by maximum likelihood estimation. Experimental results show that this method can improve the precision of heterogeneous ontology mapping effectively. 展开更多
关键词 ontology heterogeneity ontology mapping hidden Markov model semantic web
在线阅读 下载PDF
基于HMM的联机手写哈萨克文字的识别研究 被引量:2
19
作者 达吾勒·阿布都哈依尔 古丽拉·阿东别克 《计算机工程与应用》 CSCD 2014年第1期145-148,共4页
以基于隐马尔可夫模型和统计语言模型的研究作为基础,着重研究联机手写哈萨克文的切分技术、连体段分类和特征参数的独特提取技术。系统先将提取延迟笔划后的连体段主笔划作为HMM识别器的输入,再根据被识别的主笔划的编号和延迟笔划标... 以基于隐马尔可夫模型和统计语言模型的研究作为基础,着重研究联机手写哈萨克文的切分技术、连体段分类和特征参数的独特提取技术。系统先将提取延迟笔划后的连体段主笔划作为HMM识别器的输入,再根据被识别的主笔划的编号和延迟笔划标记从连体段分类词典中查找,找到对应的连体段识别结果。通过去除连体段延迟笔画的方法可以有效地减少需建立的模型数目,进而提高识别速度和避免由字符切分所带来的问题。 展开更多
关键词 哈萨克文 联机手写 隐马尔可夫模型 连体段 连体段分类 Hidden MARKOV Model(HMM)
在线阅读 下载PDF
TONE MODELING BASED ON HIDDEN CONDITIONAL RANDOM FIELDS AND DISCRIMINATIVE MODEL WEIGHT TRAINING 被引量:1
20
作者 黄浩 朱杰 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第1期43-50,共8页
The use of hidden conditional random fields (HCRFs) for tone modeling is explored. The tone recognition performance is improved using HCRFs by taking advantage of intra-syllable dynamic, inter-syllable dynamic and d... The use of hidden conditional random fields (HCRFs) for tone modeling is explored. The tone recognition performance is improved using HCRFs by taking advantage of intra-syllable dynamic, inter-syllable dynamic and duration features. When the tone model is integrated into continuous speech recognition, the discriminative model weight training (DMWT) is proposed. Acoustic and tone scores are scaled by model weights discriminatively trained by the minimum phone error (MPE) criterion. Two schemes of weight training are evaluated and a smoothing technique is used to make training robust to overtraining problem. Experiments show that the accuracies of tone recognition and large vocabulary continuous speech recognition (LVCSR) can be improved by the HCRFs based tone model. Compared with the global weight scheme, continuous speech recognition can be improved by the discriminative trained weight combinations. 展开更多
关键词 speech recognition MODELS hidden conditional random fields minimum phone error
在线阅读 下载PDF
上一页 1 2 29 下一页 到第
使用帮助 返回顶部