期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
A Personified Annealing Algorithm for Circles Packing Problem 被引量:5
1
作者 ZHANGDe-Fu LIXin 《自动化学报》 EI CSCD 北大核心 2005年第4期590-595,共6页
Circles packing problem is an NP-hard problem and is di?cult to solve. In this paper, ahybrid search strategy for circles packing problem is discussed. A way of generating new configurationis presented by simulating t... Circles packing problem is an NP-hard problem and is di?cult to solve. In this paper, ahybrid search strategy for circles packing problem is discussed. A way of generating new configurationis presented by simulating the moving of elastic objects, which can avoid the blindness of simulatedannealing search and make iteration process converge fast. Inspired by the life experiences of people,an e?ective personified strategy to jump out of local minima is given. Based on the simulatedannealing idea and personification strategy, an e?ective personified annealing algorithm for circlespacking problem is developed. Numerical experiments on benchmark problem instances show thatthe proposed algorithm outperforms the best algorithm in the literature. 展开更多
关键词 包装问题 模拟技术 退火算法 弹性物体
在线阅读 下载PDF
OPEN-LOOP FOG SIGNAL TESTING AND WAVELET ELIMINATING NOISE 被引量:3
2
作者 ZHUYun-zhao WANGShun-ring MIAOLing-juan WANGBo 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2005年第2期103-106,共4页
An open-loop fiber optic gyro (FOG) testing system is designed. The noise characteristic of open-loop fiber optic gyro signals is analyzed. The wavelet eliminating noise method is discussed and compared with other met... An open-loop fiber optic gyro (FOG) testing system is designed. The noise characteristic of open-loop fiber optic gyro signals is analyzed. The wavelet eliminating noise method is discussed and compared with other methods, such as smoothing and low-pass filter methods. Results indicate that the wavelet eliminating noise method can satisfy the measuring demand of the FOG weak output signal with noise disturbing. The wavelet analysis method can efficiently eliminate the noise and reserve the information of the signal. The eliminating noise effect of using different wavelet base functions is compared. The effectiveness of multiresolution wavelet analyses of eliminating noise is proved by experimental results. 展开更多
关键词 光纤光学陀螺仪 噪声消除 小波变换 性能测试
在线阅读 下载PDF
An Improved Heuristic Ant-Clustering Algorithm 被引量:2
3
作者 YunfeiChen YushuLiu JihaiZhao 《计算机工程与应用》 CSCD 北大核心 2004年第29期133-134,158,共3页
An improved heuristic ant-clustering algorithm(HAC)is presented in this paper.A device of ’memory bank’ is proposed,which can bring forth heuristic knowledge guiding ant to move in the bi-dimension grid space.The de... An improved heuristic ant-clustering algorithm(HAC)is presented in this paper.A device of ’memory bank’ is proposed,which can bring forth heuristic knowledge guiding ant to move in the bi-dimension grid space.The device lowers the randomness of ants’ moving and avoids the producing of"un-assigned data object".We have made some experiments on real data sets and synthetic data sets.The results demonstrate that HAC has superiority in misclassification error rate and runtime over the classical algorithm. 展开更多
关键词 蚁群聚类算法 记忆存储体 人工智能 启发式知识引导
在线阅读 下载PDF
Specific Nucleotide Contexts Enhance the Chance of Single Nucleotide Mutation
4
作者 CAIJun LIYan-da 《Acta Genetica Sinica》 SCIE CAS CSCD 北大核心 2004年第9期1009-1010,共2页
Genomes are dynamic entities that evolve over time where the cumulative effects of small-scale sequence alterations caused by mutation play an important role. Mutations result either from errors in DNA replication or ... Genomes are dynamic entities that evolve over time where the cumulative effects of small-scale sequence alterations caused by mutation play an important role. Mutations result either from errors in DNA replication or from the damaging effects of mutagens such as chemicals and radiation that react with DNA and change 展开更多
关键词 突变 基因 单核苷酸 蛋白质 细胞
在线阅读 下载PDF
Symbols detection for frequency-selective V-BLAST OFDM systems
5
作者 WuXiaojun LiXing WangJilong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期418-425,共8页
As the combining form of the orthogonal frequency-division multiplexing (OFDM) technique and the vertical Bell Labs layered space-time (V-BLAST) architecture, the V-BLAST OFDM system can better meet the demand of next... As the combining form of the orthogonal frequency-division multiplexing (OFDM) technique and the vertical Bell Labs layered space-time (V-BLAST) architecture, the V-BLAST OFDM system can better meet the demand of next-generation (NextG) broadband mobile wireless multimedia communications. The symbols detection problem of the V-BLAST OFDM system is investigated under the frequency-selective fading environment. The joint space-frequency demultiplexing operation is proposed in the V-BLAST OFDM system. Successively, one novel half-rate rotational invariance joint space-frequency coding scheme for the V-BLAST OFDM system is proposed. By elegantly exploiting the above rotational invariance property, we derive one direct symbols detection scheme without knowing channels state information (CSI) for the frequency-selective V-BLAST OFDM system. Extensive simulation results demonstrate the validity of the novel half-rate rotational invariance joint space-frequency coding scheme and the performance of the direct symbols detection scheme. 展开更多
关键词 orthogonal frequency-division multiplexing vertical Bell Labs layered space-time architecture symbols detection frequency-selective fading joint space-frequency demultiplexing rotational invariance joint space-frequency coding.
在线阅读 下载PDF
Design and Implementation of A Bi-Directional Proxy Server
6
作者 GAOFu-xiang YAOYu LIUQiong LIANGLiang YAOLan ZHAOZhi-bin 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期760-764,共5页
In this paper, a mechanism of bi-directional proxy is proposed, which supports authentication based on identity, and endue different users with different network access permissions. This technology is purposed with a ... In this paper, a mechanism of bi-directional proxy is proposed, which supports authentication based on identity, and endue different users with different network access permissions. This technology is purposed with a new idea towards the implementation of network security, which has a promising future in applications. Key words network security - firewall - bi-directional proxy server - identity authentication CLC number TP 368.5 Foundation item: Supported by the National Natural Science Foundation of China (60173051), The National Research Foundation for the Doctoral Program of Higher Education of China (20030145029). Teaching and Research Award Program for Outstanding Young Teachers in Higher Education Institution of the Ministry of Education; National 863 High-tech Program (2003AA414210)Biography: GAO Fu-xiang (1961-), male, Professor, Master, research direction: computer network security. 展开更多
关键词 network security FIREWALL bi-directional proxy server identity authentication
在线阅读 下载PDF
The Refinement Algorithm Consideration in Text Clustering Scheme Based on Multilevel Graph
7
作者 CHENJian-bin DONGXiang-jun SONGHan-tao 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期671-675,共5页
To construct a high efficient text clustering algorithm the multilevel graph model and the refinement algorithm used in the uncoarsening phase is discussed. The model is applied to text clustering. The performance of ... To construct a high efficient text clustering algorithm the multilevel graph model and the refinement algorithm used in the uncoarsening phase is discussed. The model is applied to text clustering. The performance of clustering algorithm has to be improved with the refinement algorithm application. The experiment result demonstrated that the multilevel graph text clustering algorithm is available. Key words text clustering - multilevel coarsen graph model - refinement algorithm - high-dimensional clustering CLC number TP301 Foundation item: Supported by the National Natural Science Foundation of China (60173051)Biography: CHEN Jian-bin(1970-), male, Associate professor, Ph. D., research direction: data mining. 展开更多
关键词 text clustering multilevel coarsen graph model refinement algorithm high-dimensional clustering
在线阅读 下载PDF
A Model for Slicing JAVA Programs Hierarchically 被引量:5
8
作者 Bi-XinLi Xiao-CongFan +1 位作者 JunPang Jian-JunZhao 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期848-858,共11页
Program slicing can be effectively used to debug, test, analyze, understand and maintain objectoriented software. In this paper, a new slicing model is proposed to slice Java programs based on their inherent hierarchi... Program slicing can be effectively used to debug, test, analyze, understand and maintain objectoriented software. In this paper, a new slicing model is proposed to slice Java programs based on their inherent hierarchical feature. The main idea of hierarchical slicing is to slice programs in a stepwise way, from package level, to class level, method level, and finally up to statement level. The stepwise slicing algorithm and the related graph reachability algorithms are presented, the architecture of the Java program Analyzing TOol (JATO) based on hierarchical slicing model is provided, the applications and a small case study are also discussed. Keywords software engineering - hierarchical model - program slicing - JAVA - stepwise algorithm - JATO This work is supported by the National Natural Science Foundation of China under Grant No.60473065 and the Outstanding Youth Teacher Support Foundation of Southeast University under Grant No.4009001011.Bi-Xin Li is a professor in Southeast University from Jan., 2004. He received the Ph.D. degree in computer software and theory from Nanjing University in 2001. From Apr. 2001 to Apr. 2002, he worked at TUCS (Turku Center for Computer Science) for one year as a post-doctoral researcher. From Apr. 2002 to Dec. 2003, he worked. at Department of Computer and Information Science, NTNU (Norwegian University of Science and Technology), and CWI (the Centrum voor Wiskunde en Informatica), both as an ERCIM Fellow. His current research interests include software construction, software testing, SQA techniques, software architecture and component techniques, safety-critical system and formal verification, etc.Xiao-Cong Fan is a senior researcher in the Inteligent Agent Lab of the Pennsylvania State University from 2002. He received the Ph.D. degree from Nanjing University in 1999. From 2000 to 2002, he worked at the turku Centre for Computer Science and the Computer Science Department of Abo Akademi University in Finland, where he participated in the projects SOCOS and SPROUT, which developed a methodology for software platform construction based on the Refinement Calculus. He currently works on formal agent theories in teamwork, and projects for applying these theories.Jun Pang is now a Ph.D. candidate in CWI, the Netherlands. He received the B.Sc. and M.Sc. degrees in computer science from Nanjing University, China, in 1997 and 2000. His research interests include protocol verification, process algebra, safety critical systems, security, testing, software architecture etc.Jian-Jun Zhao is an associate professor of computer science at Fukuoka Institute of Technology, Japan. He received the B.S. degree in computer science from Tsinghua University, China, in 1987, and the Ph.D. degree in computer science from Kyushu University, Japan, in 1997. His research interests include program analysis and compiler, software architecture analysis, aspect-oriented software development, and ubiquitous computing environment. 展开更多
关键词 software engineering hierarchical model program slicing JAVA stepwise algorithm JATO
原文传递
Authenticating Tripartite Key Agreement Protocol with Pairings 被引量:5
9
作者 Sheng-LiLiu Fang-GuoZhang Ke-FeiChen 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第2期169-176,共8页
In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special si... In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well. 展开更多
关键词 key agreement bilinear pairing identity-based cryptography
原文传递
CLIFFORD MARTINGALES Φ-EQUIVALENCE BETWEEN S(f)AND f 被引量:2
10
作者 LONGRULIN QIANTAO 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 1994年第4期507-516,共10页
Required by the application in the investigation of the Cauchy integral operators on Lipschitzsurfaces, the classical martingales are generalized to ones defined with respect to Clifford algebravalued measures. Meanwh... Required by the application in the investigation of the Cauchy integral operators on Lipschitzsurfaces, the classical martingales are generalized to ones defined with respect to Clifford algebravalued measures. Meanwhile, very general Φ-equivalences between S(f) and f* , the same as inthe classical case, are established too. 展开更多
关键词 Clifford algebra MARTINGALE Square function Maximal function Good λ-inequality.
原文传递
Integration of IoT and DRAGON-lab in cloud environment 被引量:2
11
作者 FANTong-rang GAOFeng +1 位作者 ZHANGXuan ⅥANGXu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第2期87-91,共5页
Distributed research & academic gigabits open network lab (DRAGON-lab) is the only test-bed for research purpose related to next generation interact (NGI) which based on the confederation network using three laye... Distributed research & academic gigabits open network lab (DRAGON-lab) is the only test-bed for research purpose related to next generation interact (NGI) which based on the confederation network using three layers cloud structure. As an essential part of NGI, the research related to the Internet of things (loT) devices should be applied on the DRAGON-lab platform. This paper proposes an approach to converging the IoT devices to confederation network by integrating each layer of cloud structure between DRAGON-lab and IoT. This research activity extends the use of DRAGON-lab, makes the IoT and wireless sensor network (WSN) devices working well in the confederation network. It was also a foundational research for three layers cloud structure, which could be reused for other related research. Finally, it finishes the preparation work for IoT internet protocol version 6 (IPv6) devices research in DRAGON-Jab, which is essential for the NGI. 展开更多
关键词 DRAGON-lab loT cloud computing confederation network
原文传递
TWO-DIMENSIONAL MODEL OF TRAFFIC FLOW CONTAINING ROAD SECTIONS
12
作者 GUGuo-qing ZHANGWei +1 位作者 QIANXin-jian ZHANGYong 《Journal of Hydrodynamics》 SCIE EI CSCD 2004年第1期45-51,共7页
Both the cross and road section are basic components in traffic systems. Ageneral cellular automaton model of two-dimensional traffic flow containing road section wasestablished. The model was simulated with respect t... Both the cross and road section are basic components in traffic systems. Ageneral cellular automaton model of two-dimensional traffic flow containing road section wasestablished. The model was simulated with respect to various section lengths and the randomdistribution of section lengths. The effect of road sections on the performance of traffic flow wasdiscussed based on simulation results 展开更多
关键词 traffic flow model CELLULAR AUTOMATON traffic simulation
原文传递
MODELING CHARGE RELAXATION ON SURFACES OF PARTICLES SUSPENDED IN LIQUID
13
作者 GuoqingGu KinWahYu 《China Particuology》 SCIE EI CAS CSCD 2005年第1期47-51,共5页
A general theory on charges relaxation process in particle-fluid systems is introduced in this article. The method to derive analytical solutions for the charge relaxation equation is illustrated, and some respects fo... A general theory on charges relaxation process in particle-fluid systems is introduced in this article. The method to derive analytical solutions for the charge relaxation equation is illustrated, and some respects for this theory are discussed in detail. 展开更多
关键词 particle-fluid systems charge relaxation process SUSPENSION complex fluid
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部