期刊文献+
共找到269篇文章
< 1 2 14 >
每页显示 20 50 100
CMOS Design of Ternary Arithmetic Devices Wu Xunwei Dept.of Electronic Engineering,Hangzhou University,Hangzhou 310028F.P rosser Dept.of Computer Science,Indiana University,U.S.A.
1
作者 吴训威 F.Prosser 《Journal of Computer Science & Technology》 SCIE EI CSCD 1991年第4期376-382,共7页
This paper presents CMOS circuit designs of a ternary adder and a ternary multiplier,formulated using transmission function theory.Binary carry signals appearing in these designs allow conventional look-ahead carry te... This paper presents CMOS circuit designs of a ternary adder and a ternary multiplier,formulated using transmission function theory.Binary carry signals appearing in these designs allow conventional look-ahead carry techniques to be used.Compared with previous similar designs,the circuits proposed in this paper have advantages such as low dissipation,low output impedance,and simplicity of construction. 展开更多
关键词 CMOS Design of Ternary Arithmetic Devices Wu Xunwei Dept.of Electronic Engineering Hangzhou University Hangzhou 310028F.P rosser Design
原文传递
A real-time fault-tolerant scheduling algorithm with low dependability cost in on-board computer system
2
作者 王培东 魏振华 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第3期361-364,共4页
To make the on-board computer system more dependable and real-time in a satellite, an algorithm of the fault-tolerant scheduling in the on-board computer system with high priority recovery is proposed in this paper. T... To make the on-board computer system more dependable and real-time in a satellite, an algorithm of the fault-tolerant scheduling in the on-board computer system with high priority recovery is proposed in this paper. This algorithm can schedule the on-board fault-tolerant tasks in real time. Due to the use of dependability cost, the overhead of scheduling the fault-tolerant tasks can be reduced. The mechanism of the high priority recovery will improve the response to recovery tasks. The fault-tolerant scheduling model is presented simulation results validate the correctness and feasibility of the proposed algorithm. 展开更多
关键词 on-board computer system fault-tolerant scheduling dependability cost PRIORITY
在线阅读 下载PDF
澳大利亚高校计算机房的建设与管理 被引量:3
3
作者 成耀 Cao Jinli 《实验室研究与探索》 CAS 2006年第10期1299-1301,1312,共4页
通过研究澳大利亚高校在计算机房建设与管理方面的特色,找出与我国高校计算机房建设与管理方面的差异,发现有许多东西有所启迪,值得学习,这对改进我们的机房工作具有积极的意义。
关键词 计算机房 建设 管理 启示
在线阅读 下载PDF
Learning algorithm and application of quantum BP neural networks based on universal quantum gates 被引量:26
4
作者 Li Panchi Li Shiyong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第1期167-174,共8页
A quantum BP neural networks model with learning algorithm is proposed. First, based on the universality of single qubit rotation gate and two-qubit controlled-NOT gate, a quantum neuron model is constructed, which is... A quantum BP neural networks model with learning algorithm is proposed. First, based on the universality of single qubit rotation gate and two-qubit controlled-NOT gate, a quantum neuron model is constructed, which is composed of input, phase rotation, aggregation, reversal rotation and output. In this model, the input is described by qubits, and the output is given by the probability of the state in which (1) is observed. The phase rotation and the reversal rotation are performed by the universal quantum gates. Secondly, the quantum BP neural networks model is constructed, in which the output layer and the hide layer are quantum neurons. With the application of the gradient descent algorithm, a learning algorithm of the model is proposed, and the continuity of the model is proved. It is shown that this model and algorithm are superior to the conventional BP networks in three aspects: convergence speed, convergence rate and robustness, by two application examples of pattern recognition and function approximation. 展开更多
关键词 quantum computing universal quantum gate quantum neuron quantum neural networks
在线阅读 下载PDF
Real-time moving object detection for video monitoring systems 被引量:18
5
作者 Wei Zhiqiang Ji Xiaopeng Wang Peng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期731-736,共6页
Moving object detection is one of the challenging problems in video monitoring systems, especially when the illumination changes and shadow exists. Amethod for real-time moving object detection is described. Anew back... Moving object detection is one of the challenging problems in video monitoring systems, especially when the illumination changes and shadow exists. Amethod for real-time moving object detection is described. Anew background model is proposed to handle the illumination varition problem. With optical flow technology and background subtraction, a moving object is extracted quickly and accurately. An effective shadow elimination algorithm based on color features is used to refine the moving obj ects. Experimental results demonstrate that the proposed method can update the background exactly and quickly along with the varition of illumination, and the shadow can be eliminated effectively. The proposed algorithm is a real-time one which the foundation for further object recognition and understanding of video mum'toting systems. 展开更多
关键词 video monitoring system moving object detection background subtraction background model shadow elimination.
在线阅读 下载PDF
Rules-based object-relational databases ontology construction 被引量:6
6
作者 Chen Jia Wu Yue 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第1期211-215,共5页
To solve the problems of shaving and reusing information in the information system, a rules-based ontology constructing approach from object-relational databases is proposed. A 3-tuple ontology constructing model is p... To solve the problems of shaving and reusing information in the information system, a rules-based ontology constructing approach from object-relational databases is proposed. A 3-tuple ontology constructing model is proposed first. Then, four types of ontology constructing rules including class, property, property characteristics, and property restrictions ave formalized according to the model. Experiment results described in Web ontology language prove that our proposed approach is feasible for applying in the semantic objects project of semantic computing laboratory in UC Irvine. Our approach reduces about twenty percent constructing time compared with the ontology construction from relational databases. 展开更多
关键词 ontology constructing semantic objects object-relational databases RULES ONTOLOGY Web ontologylanguage.
在线阅读 下载PDF
Improved method for the feature extraction of laser scanner using genetic clustering 被引量:6
7
作者 Yu Jinxia Cai Zixing Duan Zhuohua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期280-285,共6页
Feature extraction of range images provided by ranging sensor is a key issue of pattern recognition. To automatically extract the environmental feature sensed by a 2D ranging sensor laser scanner, an improved method b... Feature extraction of range images provided by ranging sensor is a key issue of pattern recognition. To automatically extract the environmental feature sensed by a 2D ranging sensor laser scanner, an improved method based on genetic clustering VGA-clustering is presented. By integrating the spatial neighbouring information of range data into fuzzy clustering algorithm, a weighted fuzzy clustering algorithm (WFCA) instead of standard clustering algorithm is introduced to realize feature extraction of laser scanner. Aimed at the unknown clustering number in advance, several validation index functions are used to estimate the validity of different clustering algorithms and one validation index is selected as the fitness function of genetic algorithm so as to determine the accurate clustering number automatically. At the same time, an improved genetic algorithm IVGA on the basis of VGA is proposed to solve the local optimum of clustering algorithm, which is implemented by increasing the population diversity and improving the genetic operators of elitist rule to enhance the local search capacity and to quicken the convergence speed. By the comparison with other algorithms, the effectiveness of the algorithm introduced is demonstrated. 展开更多
关键词 laser scanner feature extraction weighted fuzzy clustering validation index genetic algorithm.
在线阅读 下载PDF
New mixed broadcast scheduling approach using neural networks and graph coloring in wireless sensor network 被引量:5
8
作者 Zhang Xizheng Wang Yaonan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第1期185-191,共7页
Due to the mutual interference and sharing of wireless links in TDMA wireless sensor networks, conflicts will occur when data messages are transmitting between nodes. The broadcast scheduling problem (BSP) is aimed ... Due to the mutual interference and sharing of wireless links in TDMA wireless sensor networks, conflicts will occur when data messages are transmitting between nodes. The broadcast scheduling problem (BSP) is aimed to schedule each node in different slot of fixed length frame at least once, and the objective of BSP is to seek for the optimal feasible solution, which has the shortest length of frame slots, as well as the maximum node transmission. A two-stage mixed algorithm based on a fuzzy Hopfield neural network is proposed to solve this BSP in wireless sensor network. In the first stage, a modified sequential vertex coloring algorithm is adopted to obtain a minimal TDMA frame length. In the second stage, the fuzzy Hopfleld network is utilized to maximize the channel utilization ratio. Experimental results, obtained from the running on three benchmark graphs, show that the algorithm can achieve better performance with shorter frame length and higher channel utilizing ratio than other exiting BSP solutions. 展开更多
关键词 wireless sensor network broadcast scheduling fuzzy Hopfield network graph coloring.
在线阅读 下载PDF
Distributed QoS multicast routing in networks with imprecise state information 被引量:4
9
作者 Yan Xin Li Layuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第4期866-874,共9页
The goal of quality-of-service (QoS) multicast routing is to establish a multicast tree which satisfies certain constraints on bandwidth, delay and other metrics. The network state information maintained at every no... The goal of quality-of-service (QoS) multicast routing is to establish a multicast tree which satisfies certain constraints on bandwidth, delay and other metrics. The network state information maintained at every node is often im- precise in a dynamic environment because of non-negligible propagation delay of state messages, periodic updates due to overhead concern, and hierarchical state aggregation. The existing QoS multicast routing algorithms do not provide satisfactory performance with imprecise state information. We propose a distributed QoS multicast routing scheme based on traffic lights, called QMRI algorithm, which can probe multiple feasible tree branches, and select the optimal or near-optimal branch through the UR or TL mode for constructing a multicast tree with QoS guarantees if it exists. The scheme is designed to work with imprecise state information. The proposed algorithm considers not only the QoS requirements but also the cost optimality of the multicast tree. The correctness proof and the complexity analysis about the QMRI algorithm are also given. In addition, we develop NS2 so that it is able to simulate the imprecise network state information. Extensive simulations show that our algorithm achieves high call-admission ratio and low-cost multicast trees with modest message overhead. 展开更多
关键词 QUALITY-OF-SERVICE muting MULTICAST imprecise state traffic lights simulation.
在线阅读 下载PDF
Apriori and N-gram Based Chinese Text Feature Extraction Method 被引量:5
10
作者 王晔 黄上腾 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第4期11-14,20,共5页
A feature extraction, which means extracting the representative words from a text, is an important issue in text mining field. This paper presented a new Apriori and N-gram based Chinese text feature extraction method... A feature extraction, which means extracting the representative words from a text, is an important issue in text mining field. This paper presented a new Apriori and N-gram based Chinese text feature extraction method, and analyzed its correctness and performance. Our method solves the question that the exist extraction methods cannot find the frequent words with arbitrary length in Chinese texts. The experimental results show this method is feasible. 展开更多
关键词 Apriori algorithm N-GRAM Chinese words segmentation feature extraction
在线阅读 下载PDF
Information compression and speckle reduction for multifrequency polarimetric SAR images based on kernel PCA 被引量:4
11
作者 Li Ying Lei Xiaogang Bai Bendu Zhang Yanning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期493-498,共6页
Multifrequency polarimetric SAR imagery provides a very convenient approach for signal processing and acquisition of radar image. However, the amount of information is scattered in several images, and redundancies exi... Multifrequency polarimetric SAR imagery provides a very convenient approach for signal processing and acquisition of radar image. However, the amount of information is scattered in several images, and redundancies exist between different bands and polarizations. Similar to signal-polarimetric SAR image, multifrequency polarimetric SAR image is corrupted with speckle noise at the same time. A method of information compression and speckle reduction for multifrequency polarimetric SAR imagery is presented based on kernel principal component analysis (KPCA). KPCA is a nonlinear generalization of the linear principal component analysis using the kernel trick. The NASA/JPL polarimetric SAR imagery of P, L, and C bands quadpolarizations is used for illustration. The experimental results show that KPCA has better capability in information compression and speckle reduction as compared with linear PCA. 展开更多
关键词 kernel PCA multifrequency polarimetric SAR imagery information compression despeckling.
在线阅读 下载PDF
Scale invariant features extraction for stereo vision 被引量:4
12
作者 Liu Li Peng Fuyuan +1 位作者 Tian Yani Wan Yaping 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第1期50-54,共5页
Stable local feature detection is a fundamental component of many stereo vision problems such as 3-D reconstruction, object localization, and object tracking. A robust method for extracting scale-invariant feature poi... Stable local feature detection is a fundamental component of many stereo vision problems such as 3-D reconstruction, object localization, and object tracking. A robust method for extracting scale-invariant feature points is presented. First, the Harris corners in three-level pyramid are extracted. Then, the points detected at the highest level of the pyramid are correctly propagated to the lower level by pyramid based scale invariant (PBSI) method. The corners detected repeatedly in different levels are chosen as final feature points. Finally, the characteristic scale is obtained based on maximum entropy method. The experimental results show that the algorithm has low computation cost, strong antinoise capability, and excellent performance in the presence of significant scale changes. 展开更多
关键词 pyramid matching scale invariant Harris corners characteristics scale.
在线阅读 下载PDF
An Adaptive Scheme for Neighbor Discovery in Mobile Ad Hoc Networks 被引量:5
13
作者 沈耀 蔡云泽 许晓鸣 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期602-609,617,共9页
The neighbor knowledge in mobile ad hoc networks is important information. However, the accuracy of neighbor knowledge is paid in terms of energy consumption. In traditional schemes for neighbor discovery, a mobile no... The neighbor knowledge in mobile ad hoc networks is important information. However, the accuracy of neighbor knowledge is paid in terms of energy consumption. In traditional schemes for neighbor discovery, a mobile node uses fixed period to send HELLO messages to notify its existence. An adaptive scheme was proposed. The objective is that when mobile nodes are distributed sparsely or move slowly, fewer HELLO messages are needed to achieve reasonable accuracy, while in a mutable network where nodes are dense or move quickly, they can adaptively send more HELLO messages to ensure the accuracy. Simulation results show that the adaptive scheme achieves the objective and performs effectively. 展开更多
关键词 ad hoc network neighbor discovery energy efficiency
在线阅读 下载PDF
Random walk search in unstructured P2P 被引量:4
14
作者 Jia Zhaoqing You Jinyuan +1 位作者 Rao Ruonan Li Minglu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期648-653,共6页
Unstructured P2P has power-law link distribution, and the random walk in power-law networks is analyzed. The analysis results show that the probability that a random walker walks through the high degree nodes is high ... Unstructured P2P has power-law link distribution, and the random walk in power-law networks is analyzed. The analysis results show that the probability that a random walker walks through the high degree nodes is high in the power-law network, and the information on the high degree nodes can be easily found through random walk. Random walk spread and random walk search method (RWSS) is proposed based on the analysis result. Simulation results show that RWSS achieves high success rates at low cost and is robust to high degree node failure. 展开更多
关键词 unstructured P2P search random walk search random walk spread power-law network.
在线阅读 下载PDF
Stochastic stabilization analysis of networked control systems 被引量:4
15
作者 Ma Changlin Fang Huajing 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第1期137-141,共5页
Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the m... Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the mathematical model of such a system is established. A stochastic stabilization condition for the system is given. The maximum delay can be derived from the stabilization condition. 展开更多
关键词 Networked control system Asymptotically stable Maximum delay
在线阅读 下载PDF
Verifiably Encrypted Signatures Without Random Oracles 被引量:3
16
作者 李祥学 陈克非 +1 位作者 刘胜利 李世群 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期230-235,共6页
Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satis... Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption. 展开更多
关键词 PAIRINGS verifiably encrypted signatures short signatures tight security reduction
在线阅读 下载PDF
A new decision tree learning algorithm 被引量:3
17
作者 方勇 戚飞虎 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第6期684-689,共6页
In order to improve the generalization ability of binary decision trees, a new learning algorithm, the MMDT algorithm, is presented. Based on statistical learning theory the generalization performance of binary decisi... In order to improve the generalization ability of binary decision trees, a new learning algorithm, the MMDT algorithm, is presented. Based on statistical learning theory the generalization performance of binary decision trees is analyzed, and the assessment rule is proposed. Under the direction of the assessment rule, the MMDT algorithm is implemented. The algorithm maps training examples from an original space to a high dimension feature space, and constructs a decision tree in it. In the feature space, a new decision node splitting criterion, the max-min rule, is used, and the margin of each decision node is maximized using a support vector machine, to improve the generalization performance. Experimental results show that the new learning algorithm is much superior to others such as C4. 5 and OCI. 展开更多
关键词 machine learning decision tree statistical learning theory splitting criteria
在线阅读 下载PDF
Two Modifications on IKE Protocol with Pre-shared Key Authentication 被引量:3
18
作者 刘东喜 张连华 白英彩 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第2期142-145,共4页
This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder genera... This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly. 展开更多
关键词 IKE protocol message authentication authenticated key agreement
在线阅读 下载PDF
Formalization of P Systems by Maude 被引量:3
19
作者 戚正伟 尤晋元 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期260-264,共5页
Rewriting logic is a unified model of concurrency, which provides a formal commo n framework of well-known models of concurrent systems. A new formal method of t he specification and execution of P systems using rewri... Rewriting logic is a unified model of concurrency, which provides a formal commo n framework of well-known models of concurrent systems. A new formal method of t he specification and execution of P systems using rewriting logic was proposed. The powerful tool Ma ude 2.0 is used to implement this specification. In order to present the general ideas in a concr ete case study, a simple and classical example from the literature is adopted to present how to formally spe cify and execute a P system. 展开更多
关键词 rewriting logic P systems MAUDE
在线阅读 下载PDF
S-rough sets and the discovery of F-hiding knowledge 被引量:2
20
作者 Hao Xiumei Fu Haiyan Shi Kaiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第6期1171-1177,共7页
Singular rough sets (S-rough sets) have three classes of forms: one-directional S-rough sets, dual of onedirectional S-rough sets, and two-directional S-rough sets. Dynamic, hereditary, mnemonic, and hiding propert... Singular rough sets (S-rough sets) have three classes of forms: one-directional S-rough sets, dual of onedirectional S-rough sets, and two-directional S-rough sets. Dynamic, hereditary, mnemonic, and hiding properties are the basic characteristics of S-rough sets. By using the S-rough sets, the concepts of f-hiding knowledge, F-hiding knowledge, hiding degree, and hiding dependence degree are given. Then, both the hiding theorem and the hiding dependence theorem of hiding knowledge are proposed. Finally, an application of hiding knowledge is discussed. 展开更多
关键词 one-direction S-rough sets f-hiding knowledge hiding degree hiding dependence degree hiding theorem hiding dependence theorem application
在线阅读 下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部