期刊文献+
共找到274篇文章
< 1 2 14 >
每页显示 20 50 100
Phase Ⅱ open-label study of recombinant circularly permuted TRAIL as a single-agent treatment for relapsed or refractory multiple myeloma 被引量:5
1
作者 Yun Leng Lugui Qiu +7 位作者 Jian Hou Yaozhong Zhao Xuejun Zhang Shifang Yang Hao Xi Zhongxia Huang Ling Pan Wenming Chen 《Chinese Journal of Cancer》 SCIE CAS CSCD 2016年第12期699-705,共7页
Background: Despite the recent development of new therapies, multiple myeloma(MM) remains an incurable disease. Thus, new, efective treatments are urgently needed, particularly for relapsed or refractory MM(RRMM). In ... Background: Despite the recent development of new therapies, multiple myeloma(MM) remains an incurable disease. Thus, new, efective treatments are urgently needed, particularly for relapsed or refractory MM(RRMM). In an earlier phase I study, a novel form of recombinant human Apo2L/tumor necrosis factor-related apoptosis-inducing ligand(TRAIL) that is currently in clinical development for the treatment of hematologic malignancies, i.e., circularly permuted TRAIL(CPT), was well tolerated at a dose of 2.5 mg/kg per day and showed promising preliminary activity in patients with RRMM. This phase II, open-label, multicenter study further investigated the eicacy and safety of 2.5-mg/kg per day CPT as single-agent therapy for patients with RRMM.Methods: Patients with RRMM were treated once daily with CPT(2.5 mg/kg, intravenously) for 14 consecutive days for each 21-day cycle. Clinical response and toxicity were assessed after each treatment cycle.Results: Twenty-seven patients received CPT. Using the European Group for Blood and Marrow Transplantation criteria, we calculated the overall response rate of 33.3% with 1 near-complete response(n CR) and 8 partial responses(PRs). The clinical beneit rate(48.1%) included 1 nCR, 8 PRs, and 4 minimal responses. The most common treatmentrelated adverse events(TRAEs) were fever, aspartate aminotransferase elevation, alanine aminotransferase elevation, leucopenia, rash, neutropenia, and thrombocytopenia. We graded toxicity using the Common Toxicity Criteria for Adverse Events, version 3.0, and determined that 37.0% of patients had at least 1 grade 3–4 TRAE.Conclusions: CPT as a single agent can elicit a response in patients with RRMM and is well tolerated. Further clinical investigation is warranted. 展开更多
关键词 Recombinant human circularly permuted TRAIL Phase trial Relapsed or refractory multiple myeloma Efficacy Safety
暂未订购
Blind-restoration-based blind separation method for permuted motion blurred images 被引量:2
2
作者 方勇 王伟 《Journal of Shanghai University(English Edition)》 CAS 2011年第2期79-84,共6页
A novel single-channel blind separation algorithm for permuted motion blurred images is proposed by using blind restoration in this paper. Both the motion direction and the length of the point spread function (PSF) ... A novel single-channel blind separation algorithm for permuted motion blurred images is proposed by using blind restoration in this paper. Both the motion direction and the length of the point spread function (PSF) are estimated by Radon transformation and extrema a detection. Using the estimated blur parameters, the permuted image is restored by performing the L-R blind restoration method. The permutation mixing matrices can be accurately estimated by classifying the ringing effect in the restored image, thereby the source images can be separated. Simulation results show a better separation efficiency for the permuted motion blurred image with various permutation operations. The proposed algorithm indicates a better performance on the robustness against Gaussian noise and lossy JPEG compression. 展开更多
关键词 permuted image blind source separation (BSS) motion blur blind restoration SINGLE-CHANNEL
在线阅读 下载PDF
Analysis of Influencing Factors of Academic Warning in Higher Vocational Colleges Based on the Importance of Machine Learning Features and Paths to Improve Learning Ability 被引量:1
3
作者 Meimei Huang Lei Zhang Xifeng Fan 《Journal of Contemporary Educational Research》 2025年第5期75-80,共6页
The traditional academic warning methods for students in higher vocational colleges are relatively backward,single,and have many influencing factors,which have a limited effect on improving their learning ability.A da... The traditional academic warning methods for students in higher vocational colleges are relatively backward,single,and have many influencing factors,which have a limited effect on improving their learning ability.A data set was established by collecting academic warning data of students in a certain university.The importance of the school,major,grade,and warning level for the students was analyzed using the Pearson correlation coefficient,random forest variable importance,and permutation importance.It was found that the characteristic of the major has a great impact on the academic warning level.Countermeasures such as dynamic adjustment of majors,reform of cognitive adaptation of courses,full-cycle academic support,and data-driven precise intervention were proposed to provide theoretical support and practical paths for universities to improve the efficiency of academic warning and enhance students’learning ability. 展开更多
关键词 Academic warning Pearson correlation coefficient Random forest variable importance Permutation importance
在线阅读 下载PDF
An Iterated Greedy Algorithm with Memory and Learning Mechanisms for the Distributed Permutation Flow Shop Scheduling Problem
4
作者 Binhui Wang Hongfeng Wang 《Computers, Materials & Continua》 SCIE EI 2025年第1期371-388,共18页
The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because o... The distributed permutation flow shop scheduling problem(DPFSP)has received increasing attention in recent years.The iterated greedy algorithm(IGA)serves as a powerful optimizer for addressing such a problem because of its straightforward,single-solution evolution framework.However,a potential draw-back of IGA is the lack of utilization of historical information,which could lead to an imbalance between exploration and exploitation,especially in large-scale DPFSPs.As a consequence,this paper develops an IGA with memory and learning mechanisms(MLIGA)to efficiently solve the DPFSP targeted at the mini-malmakespan.InMLIGA,we incorporate a memory mechanism to make a more informed selection of the initial solution at each stage of the search,by extending,reconstructing,and reinforcing the information from previous solutions.In addition,we design a twolayer cooperative reinforcement learning approach to intelligently determine the key parameters of IGA and the operations of the memory mechanism.Meanwhile,to ensure that the experience generated by each perturbation operator is fully learned and to reduce the prior parameters of MLIGA,a probability curve-based acceptance criterion is proposed by combining a cube root function with custom rules.At last,a discrete adaptive learning rate is employed to enhance the stability of the memory and learningmechanisms.Complete ablation experiments are utilized to verify the effectiveness of the memory mechanism,and the results show that this mechanism is capable of improving the performance of IGA to a large extent.Furthermore,through comparative experiments involving MLIGA and five state-of-the-art algorithms on 720 benchmarks,we have discovered that MLI-GA demonstrates significant potential for solving large-scale DPFSPs.This indicates that MLIGA is well-suited for real-world distributed flow shop scheduling. 展开更多
关键词 Distributed permutation flow shop scheduling MAKESPAN iterated greedy algorithm memory mechanism cooperative reinforcement learning
在线阅读 下载PDF
Sign-Balanced Pattern-Avoiding Permutation Classes
5
作者 Junyao PAN Pengfei GUO 《Journal of Mathematical Research with Applications》 2025年第4期427-436,共10页
A set of permutations is called sign-balanced if the set contains the same number of even permutations as odd permutations.Let S_(n)(σ_(1),σ_(2),...,σ_(r))denote the set of permutations in the symmetric group S_(n)... A set of permutations is called sign-balanced if the set contains the same number of even permutations as odd permutations.Let S_(n)(σ_(1),σ_(2),...,σ_(r))denote the set of permutations in the symmetric group S_(n)which avoid patternsσ_(1),σ_(2),...,σ_(r).The aim of this paper is to investigate when,for certain patternsσ_(1),σ_(2),...,σ_(r),S_(n)(σ_(1),σ_(2),...,σ_(r))is sign-balanced for every integer n>1.We prove that for any{σ_(1),σ_(2),...,σ_(r)}?S_3,if{σ_(1),σ_(2),...,σ_(r)}is sign-balanced except for{132,213,231,312},then S_(n)(σ_(1),σ_(2),...,σ_(r))is sign-balanced for every integer n>1.In addition,we give some results in the case of avoiding some patterns of length 4. 展开更多
关键词 PERMUTATION sign-balanced symmetric group avoid patterns
原文传递
Research on the rapid diagnosis method for hunting of high-speed trains
6
作者 Wanru Xie Yixin Zhao +3 位作者 Gang Zhao Fei Yang Zilong Wei Jinzhao Liu 《Railway Sciences》 2025年第1期1-21,共21页
Purpose–High-speed turnouts are more complex in structure and thus may cause abnormal vibration of highspeed train car body,affecting driving safety and passenger riding experience.Therefore,it is necessary to analyz... Purpose–High-speed turnouts are more complex in structure and thus may cause abnormal vibration of highspeed train car body,affecting driving safety and passenger riding experience.Therefore,it is necessary to analyze the data characteristics of continuous hunting of high-speed trains passing through turnouts and propose a diagnostic method for engineering applications.Design/methodology/approach–First,Complete Ensemble Empirical Mode Decomposition with Adaptive Noise(CEEMDAN)is performed to determine the first characteristic component of the car body’s lateral acceleration.Then,the Short-Time Fourier Transform(STFT)is performed to calculate the marginal spectra.Finally,the presence of a continuous hunting problem is determined based on the results of the comparison calculations and diagnostic thresholds.To improve computational efficiency,permutation entropy(PE)is used as a fast indicator to identify turnouts with potential problems.Findings–Under continuous hunting conditions,the PE is less than 0.90;the ratio of the maximum peak value of the signal component to the original signal peak value exceeded 0.7,and there is an energy band in the STFT time-frequency map,which corresponds to a frequency distribution range of 1–2 Hz.Originality/value–The research results have revealed the lateral vibration characteristics of the high-speed train’s car body during continuous hunting when passing through turnouts.On this basis,an effective diagnostic method has been proposed.With a focus on practical engineering applications,a rapid screening index for identifying potential issues has been proposed,significantly enhancing the efficiency of diagnostic processes. 展开更多
关键词 High-speed railway Periodic hunting Rapid diagnosis CEEMDAN STFT Permutation entropy
在线阅读 下载PDF
A Note on a Class of Permutation Quadrinomials of F_(q^(2))
7
作者 QIN Xiaoer GUO Xiaonan +1 位作者 QIU Yinuo YAN Li 《Wuhan University Journal of Natural Sciences》 2025年第3期231-234,共4页
Constructing permutation polynomials is a hot topic in finite fields,and permutation polynomials have many applications in dif‐ferent areas.In this paper,by using monomials on the cosets of a subgroup to characterize... Constructing permutation polynomials is a hot topic in finite fields,and permutation polynomials have many applications in dif‐ferent areas.In this paper,by using monomials on the cosets of a subgroup to characterize the permutational property of rational functions onμq+1,we construct a class of permutation quadrinomials with the form f_(r,a,b,c,s,t,u)(x)=x^(r)(1+ax^(s(q-1))+bx^(t(q-1))+cxu(q-1))of F_(q^(2)). 展开更多
关键词 permutation quadrinomials MONOMIALS finite fields
原文传递
Testing independence in Hilbert spaces using random projection
8
作者 HU Zhi-ming JIANG Tao XU Jin-feng 《Applied Mathematics(A Journal of Chinese Universities)》 2025年第3期666-686,共21页
As data becomes increasingly complex,measuring dependence among variables is of great interest.However,most existing measures of dependence are limited to the Euclidean setting and cannot effectively characterize the ... As data becomes increasingly complex,measuring dependence among variables is of great interest.However,most existing measures of dependence are limited to the Euclidean setting and cannot effectively characterize the complex relationships.In this paper,we propose a novel method for constructing independence tests for random elements in Hilbert spaces,which includes functional data as a special case.Our approach is using distance covariance of random projections to build a test statistic that is computationally efficient and exhibits strong power performance.We prove the equivalence between testing for independence expressed on the original and the projected covariates,bridging the gap between measures of testing independence in Euclidean spaces and Hilbert spaces.Implementation of the test involves calibration by permutation and combining several p-values from different projections using the false discovery rate method.Simulation studies and real data examples illustrate the finite sample properties of the proposed method under a variety of scenarios. 展开更多
关键词 computational efficiency distance covariance false discovery rate functional data Hilbert space permutation calibration random projection
在线阅读 下载PDF
Efficient implementation of quantum permutation algorithm using a polar SrO molecule in pendular states
9
作者 Jie-Ru Hu Zuo-Yuan Zhang Jin-Ming Liu 《Communications in Theoretical Physics》 2025年第2期39-51,共13页
Quantum algorithms offer more enhanced computational efficiency in comparison to their classical counterparts when solving specific tasks.In this study,we implement the quantum permutation algorithm utilizing a polar ... Quantum algorithms offer more enhanced computational efficiency in comparison to their classical counterparts when solving specific tasks.In this study,we implement the quantum permutation algorithm utilizing a polar molecule within an external electric field.The selection of the molecular qutrit involves the utilization of field-dressed states generated through the pendular modes of SrO.Through the application of multi-target optimal control theory,we strategically design microwave pulses to execute logical operations,including Fourier transform,oracle U_(f)operation,and inverse Fourier transform within a three-level molecular qutrit structure.The observed high fidelity of our outcomes is intricately linked to the concept of the quantum speed limit,which quantifies the maximum speed of quantum state manipulation.Subsequently,we design the optimized pulse sequence to successfully simulate the quantum permutation algorithm on a single SrO molecule,achieving remarkable fidelity.Consequently,a quantum circuit comprising a single qutrit suffices to determine permutation parity with just a single function evaluation.Therefore,our results indicate that the optimal control theory can be well applied to the quantum computation of polar molecular systems. 展开更多
关键词 polar molecule optimal control quantum permutation algorithm pendular states
原文传递
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
10
作者 Ibtisam A.Taqi Sarab M.Hameed 《Computers, Materials & Continua》 2025年第10期1653-1674,共22页
The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information.Due to high processing requirements,tr... The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information.Due to high processing requirements,traditional encryption algorithms demand considerable computational effort for real-time audio encryption.To address these challenges,this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps.The audio data is first shuffled using Tent map for the random permutation.The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map.Finally,the Exclusive OR(XOR)operation is applied between the generated key and the shuffled audio to yield the cipher audio.The experimental results prove that the proposed method surpassed the other techniques by encrypting two types of audio files,as mono and stereo audio files with large sizes up to 122 MB,different sample rates 22,050,44,100,48,000,and 96,000 for WAV and 44,100 sample rates for MP3 of size 11 MB.The results show high Mean Square Error(MSE),low Signal-to-Noise Ratio(SNR),spectral distortion,100%Number of Sample Change Rate(NSCR),high Percent Residual Deviation(PRD),low Correlation Coefficient(CC),large key space 2^(616),high sensitivity to a slight change in the secret key and that it can counter several attacks,namely brute force attack,statistical attack,differential attack,and noise attack. 展开更多
关键词 Wave protection 1D logistic map Tent map random permutation key generation
在线阅读 下载PDF
Layer-2 transferable belief model:Manage uncertainty on random permutation sets
11
作者 Qian-Li Zhou Yong Deng 《Journal of Electronic Science and Technology》 2025年第2期52-64,共13页
In this paper,the transferable belief model established on power sets is extended to the permutation event space(PES)and is referred to as the layer-2 transferable belief model.Our goal is to provide a comprehensive a... In this paper,the transferable belief model established on power sets is extended to the permutation event space(PES)and is referred to as the layer-2 transferable belief model.Our goal is to provide a comprehensive approach for handling and modeling uncertainty,capable of representing both quantitative and qualitative information.First,the motivation for proposing the layer-2 transferable belief model and its information processing principles are explored from the perspective of weak propensity.Then,based on these principles,the corresponding information processing methods for the credal and pignistic levels are developed.Finally,the advantages of this model are validated through a classifier that leverages attribute fusion to enhance performance and decision-making accuracy. 展开更多
关键词 Evidence theory Information processing Information fusion Layer-2 belief structure Random permutation set
在线阅读 下载PDF
日间手术和择期手术的手术相关时长差异性分析 被引量:4
12
作者 罗利 罗永 +2 位作者 杨建超 马洪升 李楠 《统计与信息论坛》 CSSCI 2014年第12期104-107,共4页
对腹腔镜胆囊切除术(以下简称LC)日间手术病人和择期手术病人的手术时长、术后恢复时长、占用手术间时长和术后住院时长分别进行了K-S检验和Permutation检验。结果显示LC日间手术和择期手术病人的手术时长、术后恢复时长、占用手术间时... 对腹腔镜胆囊切除术(以下简称LC)日间手术病人和择期手术病人的手术时长、术后恢复时长、占用手术间时长和术后住院时长分别进行了K-S检验和Permutation检验。结果显示LC日间手术和择期手术病人的手术时长、术后恢复时长、占用手术间时长和术后住院时长均值不相等,分布不相同,样本均来自不同的总体。科研工作者在研究过程中如果涉及到手术时长、术后恢复时长、占用手术间时长和术后住院时长,应考虑是否需要根据是日间手术还是择期手术加以区别对待。 展开更多
关键词 日间手术 择期手术 K-S检验 permutation检验
在线阅读 下载PDF
两个一维总体分布相等性的permutation检验 被引量:4
13
作者 黄群 林洁梅 赵佳因 《辽宁工程技术大学学报(自然科学版)》 CAS 北大核心 2012年第6期929-932,共4页
检验两个一维总体分布的相等性,采用理论证明和数值模拟的方法,在Prastgaard提出的Kolmogorov-Smirnov统计量T1及相应的permutation统计量T 1基础上,提出了基于K-S统计量的新统计量T2及相应的permutation统计量T 2,研究了在一维的情形... 检验两个一维总体分布的相等性,采用理论证明和数值模拟的方法,在Prastgaard提出的Kolmogorov-Smirnov统计量T1及相应的permutation统计量T 1基础上,提出了基于K-S统计量的新统计量T2及相应的permutation统计量T 2,研究了在一维的情形下T2与T 2的分布,并进行了数值模拟.结果表明:新统计量在原假设下有相同的极限分布,数值模拟结果优于原统计量.该方法对检验两总体分布的相等性有一定的参考价值. 展开更多
关键词 permutation方法 K-S统计量 permutation统计量 假设检验 统计推断 经验分布函数 极限分布 数值模拟
在线阅读 下载PDF
新疆喀什-乌恰交汇区潮汐触发地震活动的统计检验 被引量:7
14
作者 李金 蒋海昆 +3 位作者 桂荣 宋金 冀战波 温少妍 《中国地震》 北大核心 2014年第1期64-73,共10页
基于Schuster检验及Permutation检验方法,对喀什-乌恰交汇区地震活动受固体潮触发情况进行日尺度及月尺度检验。其中日尺度分别选取引潮力南北分量、东西分量及潮汐体应力作为潮汐曲线。研究结果显示,该地区地震活动均较多的发生于3种... 基于Schuster检验及Permutation检验方法,对喀什-乌恰交汇区地震活动受固体潮触发情况进行日尺度及月尺度检验。其中日尺度分别选取引潮力南北分量、东西分量及潮汐体应力作为潮汐曲线。研究结果显示,该地区地震活动均较多的发生于3种潮汐的最大值(相位0°)附近,优势发震相位分别为-5.86°、6.60°以及-15.52°,且发生地震的频次随潮汐力的增大而增加;利用3种潮汐曲线(引潮力日尺度南北分量、东西分量以及潮汐体应力)对所有地震进行Schuster检验所得pS值分别为10.52%、2.40%以及2.06%,Permutation检验所得pP值分别为10.90%、2.40%以及2.06%,其中基于引潮力东西分量及潮汐体应力的pS、pP值均低于潮汐触发地震的阈值0.05。月尺度Schuster检验pS值及Permutation检验pP值结果均非常小(接近于0),远低于潮汐触发地震阈值0.05,优势发震相位φ为-1.91°,较为接近月尺度下的固体潮最大值0°(即农历朔、望)。对潮汐触发地震的统计学检验结果即东西向潮汐触发效应大于南北向触发效应的原因进行了初步解释。 展开更多
关键词 喀什-乌恰交汇区 固体潮触发 Schuster检验 Permutation检验
在线阅读 下载PDF
REVERSIBLE LOGIC GATE NETWORK CASCADE BASED ON PERMUTATION GROUP 被引量:1
15
作者 管致锦 秦小麟 戴华 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第3期219-223,共5页
The cascade of reversible logic gate network with n inputs and n outputs forms a group isomorphic to the symmetric group S2^n. Characteristics of a number of gates from the set of all generalized Toffoli gates are stu... The cascade of reversible logic gate network with n inputs and n outputs forms a group isomorphic to the symmetric group S2^n. Characteristics of a number of gates from the set of all generalized Toffoli gates are studied. Any permutation Sn is proved to be generated by a n-cycle 9 and a permutation τ= (ij,ik) together. It shows that any neighboring 2-cycle permutation can be generated by at most two NOT gates without ancilla bit. Based on the above theory, a cascade algorithm for reversible logic gate networks is proposed. A reversible example of logic gate network cascade is given to show the correctness of the algorithm. 展开更多
关键词 logic gates cascade connection permutation group
在线阅读 下载PDF
Bootstrap和Permutation方法在样本率多重比较中的应用 被引量:3
16
作者 钱俊 陈平雁 《中国医院统计》 2008年第1期43-45,共3页
目的介绍Bootstrap和Permutation方法在样本率多重比较中的应用。方法调用SAS中的MULTTEST过程,编写程序实现样本率的两两比较和与控制组比较,并通过实例说明效果。结果运用Bootstrap和Permutation方法能较好解决样本率的多重比较问题... 目的介绍Bootstrap和Permutation方法在样本率多重比较中的应用。方法调用SAS中的MULTTEST过程,编写程序实现样本率的两两比较和与控制组比较,并通过实例说明效果。结果运用Bootstrap和Permutation方法能较好解决样本率的多重比较问题。结论使用Bootstrap和Permutation方法的SAS程序,简单明了,结果准确,使用方便。 展开更多
关键词 BOOTSTRAP PERMUTATION 样本率 多重比较
暂未订购
Feature Selection for Intrusion Detection Using Random Forest 被引量:13
17
作者 Md. Al Mehedi Hasan Mohammed Nasser +1 位作者 Shamim Ahmad Khademul Islam Molla 《Journal of Information Security》 2016年第3期129-140,共12页
An intrusion detection system collects and analyzes information from different areas within a computer or a network to identify possible security threats that include threats from both outside as well as inside of the... An intrusion detection system collects and analyzes information from different areas within a computer or a network to identify possible security threats that include threats from both outside as well as inside of the organization. It deals with large amount of data, which contains various ir-relevant and redundant features and results in increased processing time and low detection rate. Therefore, feature selection should be treated as an indispensable pre-processing step to improve the overall system performance significantly while mining on huge datasets. In this context, in this paper, we focus on a two-step approach of feature selection based on Random Forest. The first step selects the features with higher variable importance score and guides the initialization of search process for the second step whose outputs the final feature subset for classification and in-terpretation. The effectiveness of this algorithm is demonstrated on KDD’99 intrusion detection datasets, which are based on DARPA 98 dataset, provides labeled data for researchers working in the field of intrusion detection. The important deficiency in the KDD’99 data set is the huge number of redundant records as observed earlier. Therefore, we have derived a data set RRE-KDD by eliminating redundant record from KDD’99 train and test dataset, so the classifiers and feature selection method will not be biased towards more frequent records. This RRE-KDD consists of both KDD99Train+ and KDD99Test+ dataset for training and testing purposes, respectively. The experimental results show that the Random Forest based proposed approach can select most im-portant and relevant features useful for classification, which, in turn, reduces not only the number of input features and time but also increases the classification accuracy. 展开更多
关键词 Feature Selection KDD’99 Dataset RRE-KDD Dataset Random Forest permuted Importance Measure
在线阅读 下载PDF
Matching spatial relation graphs using a constrained partial permutation strategy
18
作者 徐晓刚 孙正兴 刘文印 《Journal of Southeast University(English Edition)》 EI CAS 2003年第3期236-239,共4页
A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship amon... A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship among the components of a graphic object. Using two kinds of matching constraints dynamically generated in the matching process, the proposed approach can prune most improper mappings between SRGs during the matching process. According to our theoretical analysis in this paper, the time complexity of our approach is O(n 2) in the best case, and O(n!) in the worst case, which occurs infrequently. The spatial complexity is always O(n) for all cases. Implemented in Smart Sketchpad, our proposed strategy is of good performance. 展开更多
关键词 spatial relation graph graph matching constrained partial permutation graphics recognition
在线阅读 下载PDF
流水车间排列排序专家系统—PFSCH
19
作者 陈荣秋 聂磊 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 1989年第S1期97-99,共3页
流水车间排列排序问题可以简单表示为:n/m/p/F<sub>max</sub>,其含义为,n个不同的工件(J<sub>1</sub>,J<sub>2</sub>,…,J<sub>n</sub>)要经m台机器(M<sub>1</sub>,M&l... 流水车间排列排序问题可以简单表示为:n/m/p/F<sub>max</sub>,其含义为,n个不同的工件(J<sub>1</sub>,J<sub>2</sub>,…,J<sub>n</sub>)要经m台机器(M<sub>1</sub>,M<sub>2</sub>…,M<sub>m</sub>)加工;加工路线为M<sub>1</sub>—M<sub>2</sub>—…—M<sub>m</sub>,n个工件在每台机器上的加工顺序都一样;p表示排列排序;目标函数是使最长流程时间F<sub>max</sub>(加工周期)最短.n个工件有n!种不同的加工顺序.现已证明,n/m/p/F<sub>max</sub>(m≥3)问题属于NP难题,找不到多项式时间算法.因此,人们提出了若干个启发式算法,其中最著名的是Campbell等人提出的启发式算法(简称为CDS法).Dannenbring曾比较过11种不同的启发式算法的效果,指出“快速接近扩展搜索法(RAES法)”的结果最好.但是,RAES法实质上还是一种列举法,它不从问题本身的结构出发,具有很大的盲目性. 展开更多
关键词 PERMUTATION FLOW-SHOP SCHEDULING PROBLEM HEURISTIC algorithm EXPERT System
在线阅读 下载PDF
On the Julia Sets of Permutable Transcendental Entire Functions
20
作者 朱玲妹 杨德贵 王小灵 《Journal of Southeast University(English Edition)》 EI CAS 2002年第3期270-273,共4页
Let f and g be two permutable transcendental entire functions. In this paper, we first prove that J(fg)=J(f n g m) for any positive integers n and m . Then we prove that the function h(p(z))+az ∈/ B , where h(z) is... Let f and g be two permutable transcendental entire functions. In this paper, we first prove that J(fg)=J(f n g m) for any positive integers n and m . Then we prove that the function h(p(z))+az ∈/ B , where h(z) is any transcendental entire function with h′(z)=0 having infinitely many solutions, p(z) is a polynomial with deg p ≥2 and a(≠0) ∈ C . 展开更多
关键词 singular value Fatou component permutable transcendental entire function
在线阅读 下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部