期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Program evaluation and its application to equipment based on super-efficiency DEA and gray relation projection method 被引量:5
1
作者 Linbing Tang Dong Guo +1 位作者 Jie Wu Qingmei Tan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第6期1037-1042,共6页
For the gray attributes of the equipment program and its difficulty to carry out the quantitative assessment of the equipment program information, the gray relation projection method is simply reviewed. Combining the ... For the gray attributes of the equipment program and its difficulty to carry out the quantitative assessment of the equipment program information, the gray relation projection method is simply reviewed. Combining the super-data envelopment analysis(DEA) model and the gray system theory, a new super-DEA for measuring the weight is proposed, and a gray relation projection model is established to rank the equipment programs. Finally, this approach is used to evaluate the equipment program. The results are verified valid and can provide a new way for evaluating the equipment program. 展开更多
关键词 index weight discriminate coefficient gray relation projection method program evaluation
在线阅读 下载PDF
Numerical Simulation of Ionospheric Electron Concentration Depletion by Rocket Exhaust 被引量:2
2
作者 黄勇 时家明 袁忠才 《Plasma Science and Technology》 SCIE EI CAS CSCD 2011年第4期446-450,共5页
In terms of the diffusive process of the gases injected from rocket exhaust into the ionosphere and the relevant chemical reactions between the gases and the composition of ionosphere, the modifications in ionosphere ... In terms of the diffusive process of the gases injected from rocket exhaust into the ionosphere and the relevant chemical reactions between the gases and the composition of ionosphere, the modifications in ionosphere caused by the injected hydrogen and carbon dioxide gas from the rocket exhaust are investigated. The results show that the diffusive process of the injected gases at the ionospheric height is very fast, and the injected gases can lead to a local depletion of electron concentration in the F-region. Furthermore, the plasma 'hole' caused by carbon dioxide is larger, deeper and more durable than that by the hydrogen. 展开更多
关键词 ionospheric modification rocket exhaust ionospheric hole diffusion process
在线阅读 下载PDF
Faraday Angle of Linearly Polarized Waves Along Magnetic Field in Magnetized Collisional Plasmas
3
作者 袁忠才 时家明 +1 位作者 黄勇 许波 《Plasma Science and Technology》 SCIE EI CAS CSCD 2010年第5期519-522,共4页
In magnetized collisional plasmas, owing to the differences between attenuations of left- and right-handed polarized waves, the Faraday rotation angle differs from that in collision- aless plasmas. In this paper, the ... In magnetized collisional plasmas, owing to the differences between attenuations of left- and right-handed polarized waves, the Faraday rotation angle differs from that in collision- aless plasmas. In this paper, the attenuation rates of left- and right-handed polarized waves are analyzed, and the Faraday angle is expressed by the real and imaginary parts of refractive index of the magnetized plasma, with clear physics meaning. Furthermore, the dependence of Faraday angle on collision frequency is calculated and discussed. 展开更多
关键词 linearly polarized wave magnetized collisional plasmas Faraday angle ATTENUATION
在线阅读 下载PDF
PIC/MCC Simulation of Glow Discharge Plasma in Four-Anode Device
4
作者 袁忠才 时家明 许波 《Plasma Science and Technology》 SCIE EI CAS CSCD 2007年第1期62-66,共5页
Numerical simulations by the code of Object-Oriented PIC (Particle-in-Cell) and the Monte Carlo Collision (MCC) method were carried out in order to obtain an insight into the characteristics of plasmas generated b... Numerical simulations by the code of Object-Oriented PIC (Particle-in-Cell) and the Monte Carlo Collision (MCC) method were carried out in order to obtain an insight into the characteristics of plasmas generated by glow discharges in low pressure helium in a four-anode DC glow discharge device. The results show that, the pressure, the external mirror magnetic field, and the virtual breadth of the annular electrode affect the radial distribution of the plasma density and temperature. The simulations are instructive for further experiments. 展开更多
关键词 numerical simulation four-anode device PIC MCC
在线阅读 下载PDF
Effect of Mirror Magnetic Field on Abnormal Glow Discharge of Four-Anode Device
5
作者 袁忠才 时家明 +1 位作者 许波 马柳 《Plasma Science and Technology》 SCIE EI CAS CSCD 2008年第4期446-449,共4页
Abstract In the four-anode device, the mirror magnetic field affects the characteristics of charged particles motion, so that the current-voltage relations of glow discharge are changed. Firstly, the discharge device ... Abstract In the four-anode device, the mirror magnetic field affects the characteristics of charged particles motion, so that the current-voltage relations of glow discharge are changed. Firstly, the discharge device is introduced, and the distribution of mirror magnetic field generated by the loops surrounding the discharge chamber is presented. Both the discharge current-voltage characteristics and the radial distributions of electron density are measured, respectively, with/without the magnetic field. When the discharge occurs in a 99.99% helium with a pressure ranging from 100 Pa to 800 Pa without magnetic field, the voltage, sustaining a certain abnormal glow discharge current, decreases with the increase in gas pressure. With a mirror magnetic field of certain intensity, the discharge voltage increases with the current in a rate slower than that without the magnetic field. Moreover, when the magnetic field intensity increases, the discharge voltage first decreases then increases. Simultaneously, the mirror magnetic field affects the moving characteristics of charged particles, and causes a more inhomogeneous electron density. 展开更多
关键词 current-voltage relations abnormal glow discharge four-anode device mirror magnetic field
在线阅读 下载PDF
The Improved Design of Multi-channel Thin Gap Chamber Simulation Signal Source for the ATLAS Detector Upgrade
6
作者 胡坤 路后兵 +3 位作者 王旭 李锋 韩良 金革 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期35-39,共5页
We develop an improved design of thin gap chamber (TGC) simulation signal source. To further simulate the feature of TGC detector, a novel thought is proposed. The TGC source has 256 channels. Every channel can rand... We develop an improved design of thin gap chamber (TGC) simulation signal source. To further simulate the feature of TGC detector, a novel thought is proposed. The TGC source has 256 channels. Every channel can randomly output the signal in 25 ns. The design is based on true random number generator (TRNG). Considering the electrical connection between the TGC source and the developing trigger electronics, the GFZ connector is used. The experimental results show that the improved TGC simulation signal source can uniformly output the random signal in every channel. The output noise is less than 3 mVrms. 展开更多
关键词 TGC The Improved Design of Multi-channel Thin Gap Chamber Simulation Signal Source for the ATLAS Detector Upgrade ATLAS
原文传递
Secret Data-Driven Carrier-Free Secret Sharing Scheme Based on Error Correction Blocks of QR Codes
7
作者 Song Wan Yuliang Lu +2 位作者 Xuehu Yan Hanlin Liu Longdan Tan 《国际计算机前沿大会会议论文集》 2017年第1期56-57,共2页
In this paper,a novel secret data-driven carrier-free(semi structural formula)visual secret sharing(VSS)scheme with(2,2)threshold based on the error correction blocks of QR codes is investigated.The proposed scheme is... In this paper,a novel secret data-driven carrier-free(semi structural formula)visual secret sharing(VSS)scheme with(2,2)threshold based on the error correction blocks of QR codes is investigated.The proposed scheme is to search two QR codes that altered to satisfy the secret sharing modules in the error correction mechanism from the large datasets of QR codes according to the secret image,which is to embed the secret image into QR codes based on carrier-free secret sharing.The size of secret image is the same or closest with the region from the coordinate of(7,7)to the lower right corner of QR codes.In this way,we can find the QR codes combination of embedding secret information maximization with secret data-driven based on Big data search.Each output share is a valid QR code which can be decoded correctly utilizing a QR code reader and it may reduce the likelihood of attracting the attention of potential attackers.The proposed scheme can reveal secret image visually with the abilities of stacking and XOR decryptions.The secret image can be recovered by human visual system(HVS)without any computation based on stacking.On the other hand,if the light-weight computation device is available,the secret image can be lossless revealed based on XOR operation.In addition,QR codes could assist alignment for VSS recovery.The experimental results show the effectiveness of our scheme. 展开更多
关键词 Visual SECRET sharing QR code Error correction BLOCKS Carrier-free Big data DATA-DRIVEN Multiple decryptions
在线阅读 下载PDF
Security Analysis of Secret Image Sharing
8
作者 Xuehu Yan Yuliang Lu +3 位作者 Lintao Liu Song Wan Wanmeng Ding Hanlin Liu 《国际计算机前沿大会会议论文集》 2017年第1期75-78,共4页
Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image... Differently from pure data encryption,secret image sharing(SIS)mainly focuses on image protection through generating a secret image into n shadow images(shares)distributed to n associated participants.The secret image can be reconstructed by collecting sufficient shadow images.In recent years,many SIS schemes are proposed,among which Shamir’s polynomial-based SIS scheme and visual secret sharing(VSS)also called visual cryptography scheme(VCS)are the primary branches.However,as the basic research issues,the security analysis and security level classification of SIS are rarely discussed.In this paper,based on the study of image feature and typical SIS schemes,four security levels are classified as well as the security of typical SIS schemes are analyzed.Furthermore,experiments are conducted to evaluate the efficiency of our analysis by employing illustrations and evaluation metrics. 展开更多
关键词 SECRET IMAGE SHARING Shamir’s polynomial-based SECRET IMAGE SHARING Visual CRYPTOGRAPHY Security analysis Linear CONGRUENCE
在线阅读 下载PDF
A General(k,n)Threshold Secret Image Sharing Construction Based on Matrix Theory
9
作者 Wanmeng Ding Kesheng Liu +1 位作者 Xuehu Yan Lintao Liu 《国际计算机前沿大会会议论文集》 2017年第1期82-84,共3页
Shamir proposed a classic polynomial-based secret sharing(SS)scheme,which is also widely applied in secret image sharing(SIS).However,the following researchers paid more attention to the development of properties,such... Shamir proposed a classic polynomial-based secret sharing(SS)scheme,which is also widely applied in secret image sharing(SIS).However,the following researchers paid more attention to the development of properties,such as lossless recovery,rather than the principle of Shamir’s polynomial-based SS scheme.In this paper,we introduce matrix theory to analyze Shamir’s polynomial-based scheme as well as propose a general(k,n)threshold SIS construction based on matrix theory.Besides,it is proved that Shamir’s polynomial-based SS scheme is a special case of our construction method.Both experimental results and analyses are given to demonstrate the effectiveness of the proposed construction method. 展开更多
关键词 SECRET image sharing Shamir’s POLYNOMIAL VANDERMONDE MATRIX MATRIX theory·Linear space THRESHOLD CONSTRUCTION
在线阅读 下载PDF
A Novel Progressive Secret Image Sharing Method with Better Robustness
10
作者 Lintao Liu Yuliang Lu +1 位作者 Xuehu Yan Wanmeng Ding 《国际计算机前沿大会会议论文集》 2017年第2期126-128,共3页
Secret image sharing (SIS) can be utilized to protect a secret image during transmit in the public channels. However, classic SIS schemes, e.g., visual secret sharing (VSS) and polynomial-based scheme, are not suitabl... Secret image sharing (SIS) can be utilized to protect a secret image during transmit in the public channels. However, classic SIS schemes, e.g., visual secret sharing (VSS) and polynomial-based scheme, are not suitable for progressive encryption of greyscale images in noisy environment, since they will result in different problems, such as lossy recovery, pixel expansion, complex computation, "All-or-Nothing"and robustness. In this paper, a novel progressive secret sharing (PSS)method based on the linear congruence equation, namely LCPSS, is proposed to solve these problems. LCPSS is simple designed and easy to realize, but naturally has many great properties, e.g., (k, n) threshold,progressive recovery, lossless recovery, lack of robustness and simple computation. 展开更多
关键词 SECRET SHARING PROGRESSIVE SECRET SHARING Greyscale image Linear CONGRUENCE ROBUSTNESS
在线阅读 下载PDF
Clarity Corresponding to Contrast in Visual Cryptography
11
作者 Xuehu Yan Yuliang Lu +2 位作者 Hui Huang Lintao Liu Song Wan 《国际计算机前沿大会会议论文集》 2016年第1期65-67,共3页
The visual quality of the recovered secret image is usually evaluated by contrast in visual cryptography (VC). Precisely, the reconstructed secret image can be recognized as the original secret image when contrast is ... The visual quality of the recovered secret image is usually evaluated by contrast in visual cryptography (VC). Precisely, the reconstructed secret image can be recognized as the original secret image when contrast is greater than zero. It is important for the user to know the clarity of the revealed secret image corresponding to different contrast values. In this paper, the clarity corresponding to contrast is investigated through conducting subjective evaluation scores and objective evaluation indexes, which can be extended to general applications. 展开更多
关键词 VISUAL CRYPTOGRAPHY VISUAL quality CONTRAST CLARITY SOCIAL computing
在线阅读 下载PDF
Predicting Big-Five Personality for Micro-blog Based on Robust Multi-task Learning
12
作者 Shuguang Huang Jinghua Zheng +1 位作者 Di Xue Nan Zhao 《国际计算机前沿大会会议论文集》 2017年第1期122-125,共4页
Personality prediction on social network has become a hot topic.At present,most studies are using single-task classification/regression machine learning.However,this method ignores the potential association between mu... Personality prediction on social network has become a hot topic.At present,most studies are using single-task classification/regression machine learning.However,this method ignores the potential association between multiple tasks.Also an ideal prediction result is difficult to achieve based on the small scale training data,since it is not easy to get a lot of social network data with personality label samples.In this paper,a robust multi-task learning method(RMTL)is proposed to predict Big-Five personality on Micro-blog.We aim to learn five tasks simultaneously by extracting and utilizing appropriate shared information among multiple tasks as well as identifying irrelevant tasks.For a set of Sina Micro-blog users’information and personality labeled data retrieved by questionnaire,we validate the RMTL method by comparing it with 4 single-task learning methods and the mere multi-task learning.Our experiment demonstrates that the proposed RMTL can improve the precision rate,recall rate of the prediction and F value. 展开更多
关键词 SINA Micro-blog PERSONALITY PREDICTION MULTI-TASK learning PREDICTION ACCURACY
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部