期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
面向地学过程的计算可视化研究——以洪水演进模拟为例 被引量:8
1
作者 龚建华 林珲 张健挺 《地理学报》 EI CSCD 北大核心 2002年第B12期37-43,共7页
在对包含过程事件的地理系统进行分析的基础上,区分并定义地理系统动态变化中的两类对象:基座对象和事件对象,并对两类对象的特征,进行了讨论。依据两类对象的划分,探讨了基座对象数据模型和事件对象数据模型的特征,并从人与模型... 在对包含过程事件的地理系统进行分析的基础上,区分并定义地理系统动态变化中的两类对象:基座对象和事件对象,并对两类对象的特征,进行了讨论。依据两类对象的划分,探讨了基座对象数据模型和事件对象数据模型的特征,并从人与模型计算、人与三维图形图象的实时互动要求,提出建立视景数据模型的必要性,并说明对象数据模型和视景数据模型的相互关系。在此基础上,对计算可视化环境系统进行了框架设计,并应用Visual C++和OpenGL,自行开发了一个原型系统GeoVision,以洪水演进模型的计算与可视化为案例,进行了初步试验。 展开更多
关键词 计算可视化 地理信息系统 地学过程 洪水模拟 引导计算 实时互动
在线阅读 下载PDF
金融市场预测的神经网络方法
2
作者 余先川 程晓春 +2 位作者 钟绍春 苏文田 俞晨 《计算机科学》 CSCD 北大核心 2004年第B07期49-53,共5页
作者运用神经网络技术开发了一种对金融市场的现状与未来趋势进行评估的决策支持系统,并用道一琼斯工业股票价格平均指数的数据对系统进行了洲试。然后将预测的结果与传统的市场分析方法所作的预测指数进行对比。所测试的神经网络模型... 作者运用神经网络技术开发了一种对金融市场的现状与未来趋势进行评估的决策支持系统,并用道一琼斯工业股票价格平均指数的数据对系统进行了洲试。然后将预测的结果与传统的市场分析方法所作的预测指数进行对比。所测试的神经网络模型包括不同训练阶段(例如10、20天)的信号模型和△收盘价模型。市场原始数据取自所选阶段的每日报表,并经预处理和标准化后转换为相对强度指数(RSI)、威廉指数(W%R)、净成交量(OBV)、动力指标(MOM)&移动平均线(MA)等金融指数。在所选的交易阶段用这些模型所预测的道一琼斯工业股票价格平均指数与实际指数的变化趋势能很好地吻合。为了改进模型的预测精度,采取了如下几种措施,比如通过均衡补偿学习过程来改进准确性。要改进这一神经网络技术,还需做进一步研究,包括多网络训练法、多任务学习程序研究等。 展开更多
关键词 金融市场 神经网络方法 道-琼斯指数 均衡补偿学习法
在线阅读 下载PDF
Performance analysis of an iSCSI-based unified storage network 被引量:2
3
作者 傅湘林 张琨 谢长生 《Journal of Zhejiang University Science》 EI CSCD 2004年第1期1-7,共7页
In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devic... In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devices and provides the block I/O services as SAN. To overcome the drawbacks from FC, we employ iSCSI to implement the USN( Unified Storage Network) . To evaluate whether iSCSI is more suitable for implementing the USN, we analyze iSCSI protocol and compare it with FC protocol from several components of a network protocol which impact the performance of the network. From the analysis and comparison, we can conclude that the iSCSI is more suitable for implementing the storage network than the FC under condition of the wide-area network. At last, we designed two groups of experiments carefully. 展开更多
关键词 ISCSI Network Attached Channel (NAC) Unified Storage Networks (USN) NAS (Network Attached Storage) SAN (Storage Area Network)
在线阅读 下载PDF
Research on Algorithm for Generating Min-Area Rectangle Encasing Box for Closed Contour 被引量:2
4
作者 LiQinghua DaiGuangming WangMaocai 《Journal of China University of Geosciences》 SCIE CSCD 2003年第4期381-384,共4页
In many engineering applications, it is necessary to calculate the min-area encasing box of a circumscription. In this paper, an algorithm for generating the min-area rectangle encasing box, based on revolving angle, ... In many engineering applications, it is necessary to calculate the min-area encasing box of a circumscription. In this paper, an algorithm for generating the min-area rectangle encasing box, based on revolving angle, is investigated and hence put forward. The algorithm computes the areas of the outer rectangular bounds of a closed contour in different revolving angles θ by dispersing approach where 0< θ < π/2 because of the axial symmetry. It is very simple, straight forward and highly efficient. The complexity of its computing time reaches O(n·k ). Practical applications suggest its usefulness and efficiency. 展开更多
关键词 ALGORITHM closed contour minimum rectangle encasing box.
在线阅读 下载PDF
SLID: A Secure Lowest-ID Clustering Algorithm 被引量:2
5
作者 HUGuang-ming HUANGZun-guo HUHua-ping GONGZheng-hu 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期39-42,共4页
In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (... In order to solve security problem of clustering algorithm, we proposed amethod to enhance the security of the well-known lowest-ID clustering algorithm. This method isbased on the idea of the secret sharing and the (k, n) threshold cryptography, Each node, whetherclusterhead or ordinary member, holds a share of the global certificate, and any k nodes cancommunicate securely. There is no need for any clusterhead to execute extra functions more thanrouting. Our scheme needs some prior configuration before deployment, and can be used in criticalenvironment with small scale. The security-enhancement for Lowest-ID algorithm can also be appliedinto other clustering approaches with minor modification. The feasibility of this method wasverified bythe simulation results. 展开更多
关键词 clustering algorithm secret sharing threshold cryptography
在线阅读 下载PDF
Fingerprint Matching Based on Local Relative Orientation Field 被引量:1
6
作者 ZHUEn YINJian-ping ZHANGGuo-min 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第4期435-438,共4页
A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to ... A fingerprint matching method based on local relative orientation field is proposed. It extracts local relative orientation field around each minutia for minutiae matching. Local orientation features are also used to sorting minutiae in order to speed up searching a minutia when pairing minutiae. The experimental result reveals that this method achieves improved recognition accuracy. Key words fingerprint matching - ridge-based minutiae matching - local relative orientation field - sorting minutiae CLC number TP 391 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: ZHU En (1976-), male, Ph. D candidate, research direction: pattern recognition, image processing and information security. 展开更多
关键词 fingerprint matching ridge-based minutiae matching local relative orientation field sorting minutiae
在线阅读 下载PDF
The Distributed Network Monitoring Model with Bounded Delay Constraints 被引量:1
7
作者 LIUXiang-hui YINJian-ping +2 位作者 LUXi-cheng CAIZhi-ping ZHAOJian-min 《Wuhan University Journal of Natural Sciences》 CAS 2004年第4期429-434,共6页
We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subje... We address the problem of optimizing a distributed monitoring system and the goal of the optimization is to reduce the cost of deployment of the monitoring infrastructure by identifying a minimum aggregating set subject to delay constraint on the aggregating path. We show that this problem is NP-hard and propose approximation algorithm proving the approximation ratio with lnm+1, where is the number of monitoring nodes. At last we extend our modal with more constraint of bounded delay variation. Key words network - distributed monitoring - delay constraint - NP-hard CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60373023)Biography: LIU Xiang-hui(1973-), male, Ph. D. candidate, research direction: algorithm complexity analysis, QoS in Internet. 展开更多
关键词 NETWORK distributed monitoring delay constraint NP-HARD
在线阅读 下载PDF
Access Request Trustworthiness in Weighted Access Control Framework 被引量:1
8
作者 WANGLun-wei LIAOXiang-ke WANGHuai-min 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期65-69,共5页
Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess ... Weighted factor is given to access eontrol policies to express the importanceof policy and its effect on access control decision. According to this weighted access controlframework, a trustworthiness model for aceess request is also given. In this model, we give themeasure of trustworthiness factor to access request- by using some idea of uncertainty reasoning ofexpert system, present and prove the parallel propagation formula of request trustworthiness factoramong multiple policies, and get thefinal trustworthiness factor to decide whether authorizing. Inthis model, authorization decision is given according to the calculation of request trustworthinessfactor, which is more understandable, more suitable for real requirement and more powerfulforsecurity enhancement than traditional methods. Meanwhile the finer access control granularity isanother advantage. 展开更多
关键词 weighted factor access control framework access request trustworthiness
在线阅读 下载PDF
Efficient Generation of Conforming Voronoi Polygonal Surface Mesh 被引量:1
9
作者 LIJi-gang YANGQin +2 位作者 MENGXian-hai CHENQi-ming CAIQiang 《Computer Aided Drafting,Design and Manufacturing》 2005年第1期1-8,共8页
A novel construction algorithm is presented to generate a conforming Voronoi mesh for any planar straight line graph (PSLG). It is also extended to tesselate multiple-intersected PSLGs. All the algorithms are guarante... A novel construction algorithm is presented to generate a conforming Voronoi mesh for any planar straight line graph (PSLG). It is also extended to tesselate multiple-intersected PSLGs. All the algorithms are guaranteed to converge. Examples are given to illustrate its efficiency. 展开更多
关键词 Voronoi diagram delaunay triangulation conforming Voronoi tessellation conforming Voronoi mesh control-volume FINITE-DIFFERENCE
在线阅读 下载PDF
Tongue Image Feature Extraction in TCM
10
作者 LIDong DULian-xiang +1 位作者 LUFu-ping DUJun-ping 《上海大学学报(自然科学版)》 CAS CSCD 2004年第B10期113-115,共3页
In this paper, digital image processing and computer vision techniques are applied to study tongue images for feature extraction with VC++ and Matlab. Extraction and analysis of the tongue surface features are based o... In this paper, digital image processing and computer vision techniques are applied to study tongue images for feature extraction with VC++ and Matlab. Extraction and analysis of the tongue surface features are based on shape, color, edge, and texture. The developed software has various functions and good user interface and is easy to use. Feature data for tongue image pattern recognition is provided, which form a sound basis for the future tongue image recognition. 展开更多
关键词 数字图像处理 VC++ 舌头图像 MATLAB 舌诊
在线阅读 下载PDF
An Application of Mobile Agent System in Network Management
11
作者 YANGChen-xiang DUJun-ping YINYi-xin 《上海大学学报(自然科学版)》 CAS CSCD 2004年第B10期93-96,共4页
This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method,... This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method, an agent can change its route dynamically without making any change to its specific behavior. By classifying mobile agents into two categories, the task agent can be reusable in different networks. In this way, a mobile agent system can easily carry out network management tasks. 展开更多
关键词 人工智能系统 网络管理 导航系统 计算机管理
在线阅读 下载PDF
A Formal Method to Model Early Requirement of Multi-Agent System
12
作者 MAOXin-jun YUEric 《Wuhan University Journal of Natural Sciences》 CAS 2004年第4期439-443,共5页
A formal specification language iFL based on i* framework is presented in this paper to formally specify and analyze the early requirment of multi-agent system. It is a branching temporal logic which defines the conce... A formal specification language iFL based on i* framework is presented in this paper to formally specify and analyze the early requirment of multi-agent system. It is a branching temporal logic which defines the concepts and models in i* framework in a rigorous way. The method to transform the i* models to iFL formal specification is also put forward. Key words Agent - early requirement - logic - requirement engineering CLC number TP 18 Foundation item: Supported by the National Natural Science Foundation of China (60373022)Biography: MAO Xin-jun (1970-), male, Ph. D, Associate professor, research direction: object-agent software engineering, Agent theory. 展开更多
关键词 AGENT early requirement LOGIC requirement engineering
在线阅读 下载PDF
New Hybrid Genetic Algorithm for Vertex Cover Problems
13
作者 HuoHongwei XuJin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2003年第4期90-94,共5页
This paper presents a new hybrid genetic algorithm for the vertex cover problems in which scan-repair and local improvement techniques are used for local optimization. With the hybrid approach, genetic algorithms are ... This paper presents a new hybrid genetic algorithm for the vertex cover problems in which scan-repair and local improvement techniques are used for local optimization. With the hybrid approach, genetic algorithms are used to perform global exploration in a population, while neighborhood search methods are used to perform local exploitation around the chromosomes. The experimental results indicate that hybrid genetic algorithms can obtain solutions of excellent quality to the problem instances with different sizes. The pure genetic algorithms are outperformed by the neighborhood search heuristics procedures combined with genetic algorithms. 展开更多
关键词 vertex cover hybrid genetic algorithm scan-repair local improvement.
在线阅读 下载PDF
Filtering images contaminated with pep and salt type noise with pulse-coupled neural networks 被引量:12
14
作者 ZHANGJunying LUZhijun +2 位作者 SHILin DONGJiyang SHIMeihong 《Science in China(Series F)》 2005年第3期322-334,共13页
Pulse coupled neural network (PCNN) has a specific feature that the fire of one neuron can capture its adjacent neurons to fire due to their spatial proximity and intensity similarity. In this paper, it is indicated t... Pulse coupled neural network (PCNN) has a specific feature that the fire of one neuron can capture its adjacent neurons to fire due to their spatial proximity and intensity similarity. In this paper, it is indicated that this feature itself is a very good mechanism for image filtering when the image is damaged with pep and salt (PAS) type noise. An adaptive filtering method, in which the noisy pixels are first located and then filtered based on the output of the PCNN, is presented. The threshold function of a neuron in the PCNN is designed when it is used for filtering random PAS and extreme PAS noise contaminated image respectively. The filtered image has no distortion for noisy pixels and only less mistiness for non-noisy pixels, compared with the conventional window-based filtering method. Excellent experimental results show great effectiveness and efficiency of the proposed method, especially for heavy-noise contaminated images. 展开更多
关键词 image filtering pulse coupled neural networks fire of a neuron firing instant.
原文传递
An effective framework for characterizing rare categories 被引量:1
15
作者 JingruiHE,HanghangTONG,JaimeCARBONELL。 HanghangTONG SJaimeCARBONELL 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第2期154-165,共12页
Rare categories become more and more abundant and their characterization has received little attention thus far. Fraudulent banking transactions, network intrusions, and rare diseases are examples of rare classes whos... Rare categories become more and more abundant and their characterization has received little attention thus far. Fraudulent banking transactions, network intrusions, and rare diseases are examples of rare classes whose detection and characterization are of high value. However, accurate char- acterization is challenging due to high-skewness and non- separability from majority classes, e.g., fraudulent transac- tions masquerade as legitimate ones. This paper proposes the RACH algorithm by exploring the compactness property of the rare categories. This algorithm is semi-supervised in na- ture since it uses both labeled and unlabeled data. It is based on an optimization framework which encloses the rare exam- ples by a minimum-radius hyperball. The framework is then converted into a convex optimization problem, which is in turn effectively solved in its dual form by the projected sub- gradient method. RACH can be naturally kernelized. Experi- mental results validate the effectiveness of RACH. 展开更多
关键词 rare category minority class characterization compactness optimization hyperball SUBGRADIENT
原文传递
StarBus+: Distributed Object Middleware Practice for Internet Computing 被引量:6
16
作者 王怀民 王玉峰 唐扬斌 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第4期542-551,共10页
In the past decade, the booming of Internet challenges the middleware in three aspects: quality of service,balance of changes and stabilization, and across-Internet integration. This paper presents our work on distrib... In the past decade, the booming of Internet challenges the middleware in three aspects: quality of service,balance of changes and stabilization, and across-Internet integration. This paper presents our work on distributed object computing middleware technology for these challenges, as well as the research and development on StarBus+, which is a CORBA standard-compliant middleware suite with the features such as object request broker supporting multi-* quality of service, component model, and integration with Web Service. This paper comprehensively presents the design and characteristics of StarBns+, and demonstrates how StarBus+ is enhanced to address the challenges of Internet computing through three case studies: inter-enterprise integration over Internet, application evolution through dynamic reconfiguration,and great massive information system building. The paper also suggests some research directions which are important for Internet computing. 展开更多
原文传递
An Interlingua—Based Chinese—English MT System
17
作者 齐璇 周会平 《Journal of Computer Science & Technology》 SCIE EI CSCD 2002年第4期464-472,共9页
Chinese-English machine translation is a significant and challenging problem in information processing.The paper presents an interlingua-based Chinese-English natural language translation system(ICENT).It introduces t... Chinese-English machine translation is a significant and challenging problem in information processing.The paper presents an interlingua-based Chinese-English natural language translation system(ICENT).It introduces the realization mechanism of Chinses language analysis,which contains syntactic parsing and semantic analyzing and gives the design of interlingua in details .Experimental results and system evaluation are given .The sesult is satisfying. 展开更多
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部