期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
NEW METHOD FOR MEASURING FUZZINESS IN ROUGH SETS 被引量:4
1
作者 何亚群 胡寿松 魏崇辉 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2004年第1期31-35,共5页
A method with the fuzzy entropy for measuring fuzziness to fuzzy problem in rough sets is proposed. A new sort of the fuzzy entropy is given. The calculating formula and the equivalent expression method with the fuzzy... A method with the fuzzy entropy for measuring fuzziness to fuzzy problem in rough sets is proposed. A new sort of the fuzzy entropy is given. The calculating formula and the equivalent expression method with the fuzzy entropy in rough sets based on equivalence relation are provided, and the properties of the fuzzy entropy are proved. The fuzzy entropy based on equivalent relation is extended to generalize the fuzzy entropy based on general binary relation, and the calculating formula and the equivalent expression of the generalized fuzzy entropy are also given. Finally, an example illustrates the way for getting the fuzzy entropy. Results show that the fuzzy entropy can conveniently measure the fuzziness in rough sets. 展开更多
关键词 rough sets FUZZINESS fuzzy entropy generalized fuzzy entropy
在线阅读 下载PDF
土地功能混合利用的探索与建议——以福建省厦门市为例 被引量:1
2
作者 林意 陈伟 罗斓 《中国土地》 2023年第3期50-51,共2页
本文分析了福建省厦门市通过留足弹性使用空间、合理确定用途清单、创新土地测算模式等举措,推进土地混合利用的实践做法,并提出了完善建议。
关键词 土地功能 福建省厦门市 土地混合利用 实践做法 探索与建议 合理确定 测算模式
在线阅读 下载PDF
Modeling and Global Conflict Analysis of Firewall Policy 被引量:2
3
作者 LIANG Xiaoyan XIA Chunhe +2 位作者 JIAO Jian HU Junshun LI Xiaojian 《China Communications》 SCIE CSCD 2014年第5期124-135,共12页
The global view of firewall policy conflict is important for administrators to optimize the policy.It has been lack of appropriate firewall policy global conflict analysis,existing methods focus on local conflict dete... The global view of firewall policy conflict is important for administrators to optimize the policy.It has been lack of appropriate firewall policy global conflict analysis,existing methods focus on local conflict detection.We research the global conflict detection algorithm in this paper.We presented a semantic model that captures more complete classifications of the policy using knowledge concept in rough set.Based on this model,we presented the global conflict formal model,and represent it with OBDD(Ordered Binary Decision Diagram).Then we developed GFPCDA(Global Firewall Policy Conflict Detection Algorithm) algorithm to detect global conflict.In experiment,we evaluated the usability of our semantic model by eliminating the false positives and false negatives caused by incomplete policy semantic model,of a classical algorithm.We compared this algorithm with GFPCDA algorithm.The results show that GFPCDA detects conflicts more precisely and independently,and has better performance. 展开更多
关键词 firewall policy semantic model conflict analysis conflict detection
在线阅读 下载PDF
Study on Health Monitoring Systems Based on Correction Mode
4
作者 ZHU Tianyang ZHANG Yajun +1 位作者 ZHOU Junliang ZHOU Aotu 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第2期325-332,共8页
Current health monitoring systems often do not concern about the needs of the elderly,leading to inaccurate health status monitoring and delayed treatment for emergency health conditions.Similarly,they do not consider... Current health monitoring systems often do not concern about the needs of the elderly,leading to inaccurate health status monitoring and delayed treatment for emergency health conditions.Similarly,they do not consider the variable factors affecting each patient,resulting in discrepancies between the measured values and real health status.To solve the problems,we propose a new health monitoring system with physiological parameter measurement,correction,and feedback.The study collects clinical samples of the elderly to formulate regression equations and statistical models for analyzing the relationship between gender,age,measurement time,and physical signs.After multiple adjustments to measurements of physical signs,the correction algorithm compares the data with a standard value.The process significantly reduces the risk of misjudgment while matching users’health status more accurately.The application case of this paper proves the validity of the method for measuring and correcting heart rate results in the elderly and presents a specific correction procedure.Additionally,the correction algorithm provides a scientific basis for eliminating or modifying other influencing factors in future health monitoring studies. 展开更多
关键词 health monitoring correction mode algorithm design heart rate
在线阅读 下载PDF
An H.264/AVC Video Watermarking Scheme in VLC Domain for Content Authentication 被引量:1
5
作者 Sun Tanfeng Jiang Xinghao +3 位作者 Lin Zhigao Zhou Yue Lu Huan Wang Shilin 《China Communications》 SCIE CSCD 2010年第6期30-36,共7页
A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses tho... A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses those macro-blocks from which the signature is extracted and constructs content signature at macro-block level according to the relationship among the energies of quantized low-frequency coefficients of sub-macroblocks. The signature is embedded by modifying the trailing coefficients. The experimental results show that the proposed algorithm performs well in visual quality impact and keep the bit-rate basically unchanged. In addition, the algorithm can embed signatures into I, P, B slices simultaneously and remarkably enhances the watermark capacity. By verifying the extracted signature, the algorithm can detect and locate video tampering efficiently. 展开更多
关键词 H.264/AVC video watermarking content authentication VLC domain semi-fragile watermarking
在线阅读 下载PDF
Prediction of Planing Craft Motion Based on Grey System Theory 被引量:3
6
作者 沈继红 张长斌 +1 位作者 柴艳有 邹劲 《Journal of Marine Science and Application》 2011年第2期240-245,共6页
In order to minimize the harm caused by the instability of a planing craft, a motion prediction model is essential. This paper analyzed the feasibility of using an MGM(1,N) model in grey system theory to predict pla... In order to minimize the harm caused by the instability of a planing craft, a motion prediction model is essential. This paper analyzed the feasibility of using an MGM(1,N) model in grey system theory to predict planing craft motion and carried out the numerical simulation experiment. According to the characteristics of planing craft motion, a recurrence formula was proposed of the parameter matrix of an MGMfl,N) model. Using this formula, data can be updated in real-time without increasing computational complexity significantly. The results of numerical simulation show that using an MGM(1,N) model to predict planing motion is feasible and useful for prediction. So the method proposed in this study can reflect the planing craft motion mechanism successfully, and has rational and effective functions of forecasting and analyzing trends. 展开更多
关键词 planing craft MGM(1 N) model recurrence formula short-time prediction
在线阅读 下载PDF
Behavior Clustering for Anomaly Detection 被引量:1
7
作者 Zhu Xudong Li Hui Liu Zhijing 《China Communications》 SCIE CSCD 2010年第6期17-23,共7页
We presented a novel framework for automatic behavior clustering and unsupervised anomaly detection in a large video set. The framework consisted of the following key components: 1 ) Drawing from natural language pr... We presented a novel framework for automatic behavior clustering and unsupervised anomaly detection in a large video set. The framework consisted of the following key components: 1 ) Drawing from natural language processing, we introduced a compact and effective behavior representation method as a stochastic sequence of spatiotemporal events, where we analyzed the global structural information of behaviors using their local action statistics. 2) The natural grouping of behavior patterns was discovered through a novel clustering algorithm. 3 ) A run-time accumulative anomaly measure was introduced to detect abnormal behavior, whereas normal behavior patterns were recognized when sufficient visual evidence had become available based on an online Likelihood Ratio Test (LRT) method. This ensured robust and reliable anomaly detection and normal behavior recognition at the shortest possible time. Experimental results demonstrated the effectiveness and robustness of our approach using noisy and sparse data sets collected from a real surveillance scenario. 展开更多
关键词 computer vision anomaly detection Hidden Markov Model Latent Dirichlet Allocation
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部