期刊文献+
共找到36篇文章
< 1 2 >
每页显示 20 50 100
基于Topic Signature的动态文摘更新方法 被引量:2
1
作者 张祯 樊兴悦 +1 位作者 郭禹田 吴国华 《计算机工程》 CAS CSCD 北大核心 2018年第6期169-175,共7页
目前针对动态文摘的研究关注对象主要是多文档集合,其中内容随时间而更新演化,但动态文摘中存在高冗余、新颖信息丢失等问题,会影响文摘提取质量。为此,研究Topic Signature模型,并在其基础上提出一种新的整数规划动态文摘更新方法。根... 目前针对动态文摘的研究关注对象主要是多文档集合,其中内容随时间而更新演化,但动态文摘中存在高冗余、新颖信息丢失等问题,会影响文摘提取质量。为此,研究Topic Signature模型,并在其基础上提出一种新的整数规划动态文摘更新方法。根据句间相似度对每条语句的主题代表性和信息多样性进行评分,利用Topic Signature模型评估语句的新颖性,以提取事件中的更新演进信息。在此基础上,依据摘要生成策略,缩小解的可行域,以保证在短时间内生成高质量的文摘。实验结果表明,该方法无需进行模型训练和语言匹配,能够有效降低时间复杂度,提高文摘提取效率。 展开更多
关键词 动态文摘 TOPIC signature模型 密度峰值 整数规划模型 自然语言处理
在线阅读 下载PDF
模块化可靠性系统的Signature计算方法研究 被引量:3
2
作者 贾旭杰 马瑞宏 +1 位作者 李玉杰 松雪莹 《运筹与管理》 CSSCI CSCD 北大核心 2018年第12期95-99,共5页
系统Signature是体现结构设计优良性的一组向量,描述系统设计对系统故障率的影响,在诸如系统可靠性指标分析、系统设计、系统寿命比较、寿命极限行为以及系统设计优化等方面展现出了强大的功能,成为可靠性研究领域越来越强有力的研究工... 系统Signature是体现结构设计优良性的一组向量,描述系统设计对系统故障率的影响,在诸如系统可靠性指标分析、系统设计、系统寿命比较、寿命极限行为以及系统设计优化等方面展现出了强大的功能,成为可靠性研究领域越来越强有力的研究工具。而如何求解一个系统的Signature往往成为分析的关键一步,当系统庞大而复杂时,Signature计算难度将随着元件数目的增加呈指数增加,出现维数爆炸问题,这无疑对后续的分析造成巨大的障碍.本文为了解决此问题,建立了基于模块化思想的系统Signature求解方法,并给出了基于模块化思想的模块化串、并联系统与模块化备份系统的求解方法,对比于传统算法,运用模块化思想大大减少了计算Signature的复杂度,能够有效减小计算量,缩减计算时间,并拓展了可求解Signature的系统范围。 展开更多
关键词 可靠性 系统signature 模块化 备份系统
在线阅读 下载PDF
多状态可靠性系统动态signature及其剩余寿命分析
3
作者 徐凡启 贾旭杰 +1 位作者 松雪莹 苏傲雪 《运筹与管理》 CSSCI CSCD 北大核心 2021年第9期38-42,共5页
系统signature是分析系统可靠性的一个强有力的工具。本文研究了多状态系统的动态signature。Signature概念被拓展到多维的情形,并将其应用于两状态元件下多态关联系统的分析,得到系统在每一状态下的联合生存函数的表达式,探究了系统在... 系统signature是分析系统可靠性的一个强有力的工具。本文研究了多状态系统的动态signature。Signature概念被拓展到多维的情形,并将其应用于两状态元件下多态关联系统的分析,得到系统在每一状态下的联合生存函数的表达式,探究了系统在时刻的动态signature,为处于工作状态的多状态系统在时刻t接受检查,发现其处于l(t)状态并且恰好已发生了q(t)次元件失效,分别给出了两状态元件多态关联系统动态signature及其剩余寿命的表达式。 展开更多
关键词 系统可靠性 signature 动态signature 多状态系统 剩余寿命
在线阅读 下载PDF
A~160区奇奇核signature反转的系统性初探
4
作者 文家焱 杨增红 +2 位作者 文学义 程南璞 郑仁蓉 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2001年第4期55-57,共3页
利用粒子转子模型对A~160质量区奇奇核的signature反转现象的系统性进行了初步的研究,计算结果与实验值符合得很好,并巨表明质子-中子相互作用的逐渐变化对该区奇奇核的signature反转点的系统变化起着主要作用.
关键词 粒子转子模型 奇奇核 signature反转 系统性 质子-中子相互作用 反转机制 反转点
在线阅读 下载PDF
Authentication based on feature of hand-written signature 被引量:1
5
作者 朱树人 《Journal of Central South University of Technology》 EI 2007年第4期563-567,共5页
The typical features of the coordinate and the curvature as well as the recorded time information were analyzed in the hand-written signatures.In the hand-written signature process 10 biometric features were summarize... The typical features of the coordinate and the curvature as well as the recorded time information were analyzed in the hand-written signatures.In the hand-written signature process 10 biometric features were summarized:the amount of zero speed in direction x and direction y,the amount of zero acceleration in direction x and direction y,the total time of the hand-written signatures,the total distance of the pen traveling in the hand-written process,the frequency for lifting the pen,the time for lifting the pen,the amount of the pressure higher or lower than the threshold values.The formulae of biometric features extraction were summarized.The Gauss function was used to draw the typical information from the above-mentioned biometric features,with which to establish the hidden Markov mode and to train it.The frame of double authentication was proposed by combing the signature with the digital signature.Web service technology was applied in the system to ensure the security of data transmission.The training practice indicates that the hand-written signature verification can satisfy the needs from the office automation systems. 展开更多
关键词 behavioral biostatistics feature hand-written signature hidden Markov mode signature verification
在线阅读 下载PDF
面向危险、安全失效模式的安全保障系统Signature可靠性分析 被引量:6
6
作者 马瑞宏 贾旭杰 李玉杰 《运筹与管理》 CSSCI CSCD 北大核心 2017年第6期58-61,共4页
安全保障系统是指功能一旦失效将引起生命、财产的重大损失以及使环境遭到严重破坏的系统,通过对其性能的全面分析和指标的精确计算可以有效降低风险,提升系统安全性。本文利用系统Signature建立数学模型,对该系统的危险失效Signature... 安全保障系统是指功能一旦失效将引起生命、财产的重大损失以及使环境遭到严重破坏的系统,通过对其性能的全面分析和指标的精确计算可以有效降低风险,提升系统安全性。本文利用系统Signature建立数学模型,对该系统的危险失效Signature和安全失效Signature进行定义和算法求解,探索两种失效模式下的系统性能。同时定义了危险、安全失效概率指数,精确计算系统失效时每种失效发生的可能性。最后以数值算例形式给出其算法求解和过程。 展开更多
关键词 系统signature 安全保障系统 危险失效 安全失效
在线阅读 下载PDF
Review of Infrared signature suppression systems using optical blocking method 被引量:17
7
作者 Nidhi Baranwal Shripad P. Mahulikar 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2019年第3期432-439,共8页
With rapid advancements in Infra-Red (IR) detection techniques, the range from where the IR-guided missiles are able to lock the target aircraft has increased. To avoid the detection and tracking by modern IR-guided m... With rapid advancements in Infra-Red (IR) detection techniques, the range from where the IR-guided missiles are able to lock the target aircraft has increased. To avoid the detection and tracking by modern IR-guided missiles, the aircraft and helicopters also demand progress in its stealth techniques. Hence, study of Infra-Red Signature Suppression (IRSS) systems in aircraft and helicopters has become vital even in design stage. Optical blocking (masking) is one of the effective IRSS techniques used to block the Line- Of-Sight (LOS) of the hot engine parts of the exhaust geometry. This paper reviews the various patents on IR signature suppression systems based on the optical blocking method or a combination of IRSS techniques. The performance penalties generated due to installation of various IRSS methods in aircraft and helicopters are also discussed. 展开更多
关键词 IR signature SUPPRESSION OPTICAL BLOCKING Performance PENALTY IR signature level Engine back-pressure
在线阅读 下载PDF
Traffic sign recognition algorithm based on shape signature and dual-tree complex wavelet transform 被引量:8
8
作者 蔡自兴 谷明琴 《Journal of Central South University》 SCIE EI CAS 2013年第2期433-439,共7页
A novel traffic sign recognition system is presented in this work. Firstly, the color segmentation and shape classifier based on signature feature of region are used to detect traffic signs in input video sequences. S... A novel traffic sign recognition system is presented in this work. Firstly, the color segmentation and shape classifier based on signature feature of region are used to detect traffic signs in input video sequences. Secondly, traffic sign color-image is preprocessed with gray scaling, and normalized to 64×64 size. Then, image features could be obtained by four levels DT-CWT images. Thirdly, 2DICA and nearest neighbor classifier are united to recognize traffic signs. The whole recognition algorithm is implemented for classification of 50 categories of traffic signs and its recognition accuracy reaches 90%. Comparing image representation DT-CWT with the well-established image representation like template, Gabor, and 2DICA with feature selection techniques such as PCA, LPP, 2DPCA at the same time, the results show that combination method of DT-CWT and 2DICA is useful in traffic signs recognition. Experimental results indicate that the proposed algorithm is robust, effective and accurate. 展开更多
关键词 traffic sign recognition signature DT-CWT 2DICA nearest neighbor classifier
在线阅读 下载PDF
Digital signature systems based on smart card and fingerprint feature 被引量:3
9
作者 You Lin Xu Maozhi Zheng Zhiming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期825-834,共10页
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one. 展开更多
关键词 digital signature fingerprint feature error-correcting code cryptographic key smart card
在线阅读 下载PDF
Automatic recognition of sonar targets using feature selection in micro-Doppler signature 被引量:2
10
作者 Abbas Saffari Seyed-Hamid Zahiri Mohammad Khishe 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第2期58-71,共14页
Currently,the use of intelligent systems for the automatic recognition of targets in the fields of defence and military has increased significantly.The primary advantage of these systems is that they do not need human... Currently,the use of intelligent systems for the automatic recognition of targets in the fields of defence and military has increased significantly.The primary advantage of these systems is that they do not need human participation in target recognition processes.This paper uses the particle swarm optimization(PSO)algorithm to select the optimal features in the micro-Doppler signature of sonar targets.The microDoppler effect is referred to amplitude/phase modulation on the received signal by rotating parts of a target such as propellers.Since different targets'geometric and physical properties are not the same,their micro-Doppler signature is different.This Inconsistency can be considered a practical issue(especially in the frequency domain)for sonar target recognition.Despite using 128-point fast Fourier transform(FFT)for the feature extraction step,not all extracted features contain helpful information.As a result,PSO selects the most optimum and valuable features.To evaluate the micro-Doppler signature of sonar targets and the effect of feature selection on sonar target recognition,the simplest and most popular machine learning algorithm,k-nearest neighbor(k-NN),is used,which is called k-PSO in this paper because of the use of PSO for feature selection.The parameters measured are the correct recognition rate,reliability rate,and processing time.The simulation results show that k-PSO achieved a 100%correct recognition rate and reliability rate at 19.35 s when using simulated data at a 15 dB signal-tonoise ratio(SNR)angle of 40°.Also,for the experimental dataset obtained from the cavitation tunnel,the correct recognition rate is 98.26%,and the reliability rate is 99.69%at 18.46s.Therefore,the k-PSO has an encouraging performance in automatically recognizing sonar targets when using experimental datasets and for real-world use. 展开更多
关键词 Micro-Doppler signature Automatic recognition Feature selection K-NN PSO
在线阅读 下载PDF
基于有限马尔可夫链嵌入法的智慧路灯系统联合Signature计算
11
作者 易鹤 李想 路靖雯 《运筹与管理》 CSSCI CSCD 北大核心 2023年第9期79-85,共7页
智慧路灯是现代化建设背景下的重要基础设施载体,集照明设备和传感设备于一体,并且可以根据实际应用的场景布放各种功能模块。城市管理部门需要根据不同路段的车道类型,选择适合的路灯型号和铺设方式。为了描述路段上由智慧路灯构成的... 智慧路灯是现代化建设背景下的重要基础设施载体,集照明设备和传感设备于一体,并且可以根据实际应用的场景布放各种功能模块。城市管理部门需要根据不同路段的车道类型,选择适合的路灯型号和铺设方式。为了描述路段上由智慧路灯构成的可靠性系统的结构特性,本文构建了共用部件的线形n中取连续k型冗余系统模型,并针对这类系统给出了基于有限马尔可夫链嵌入法的联合Signature计算方法。和基于定义的方法相比,该方法有统一的表达式,不仅提高了计算效率,还降低了计算的复杂度。最后,本文通过算例演示了该方法的运算效率,并讨论了其可能的应用与改进。 展开更多
关键词 联合signature n中取连续k型系统 有限马尔可夫链嵌入法 智慧路灯
在线阅读 下载PDF
ForenSeq^(TM) DNA Signature Prep试剂盒在浙江畲族人群中的法医学应用 被引量:1
12
作者 屈轶龄 林源 +10 位作者 杨子豪 陶瑞旸 夏若成 曹正军 高瑞祥 于欢 王紫薇 杨琪 张晓春 张素华 李成涛 《法医学杂志》 CAS CSCD 2021年第6期817-824,共8页
目的评估ForenSeq^(TM) DNA Signature Prep试剂盒(以下简称ForenSeq试剂盒)对浙江畲族人群STR序列的解读能力及法医学应用效能。方法应用MiSeq FGx法医基因组学系统和ForenSeq试剂盒对50例浙江畲族人群样本进行大规模平行测序(massivel... 目的评估ForenSeq^(TM) DNA Signature Prep试剂盒(以下简称ForenSeq试剂盒)对浙江畲族人群STR序列的解读能力及法医学应用效能。方法应用MiSeq FGx法医基因组学系统和ForenSeq试剂盒对50例浙江畲族人群样本进行大规模平行测序(massively parallel sequencing,MPS)检测,采用ForenSeq^(TM)通用分析软件分析测序数据,获取58个STR基因座的分型结果及序列结构信息。将MPS与PCR-CE技术的分型结果进行一致性比对,并计算等位基因频率和群体遗传学参数。结果在50例浙江畲族人群样本中,共观察到448种序列多态性等位基因,与PCR-CE技术检测的片段长度多态性结果相比,基于ForenSeq试剂盒的MPS检测增加了82个等位基因,在6个基因座的侧翼区共发现7个SNP变异。22例男性的24个Y染色体STR基因座中共检测到19种单倍型。27个常染色体STR基因座的累积个体识别率为1-8.87×10^(-30),累积二联体非父排除率为0.999999962640657,累积三联体非父排除率为0.999999999999633。结论基于MiSeq FGx法医基因组学系统使用ForenSeq试剂盒进行MPS检测,极大提高了检测效能。58个STR基因座在所调查的浙江畲族人群中具有良好的遗传多态性,可应用于法医学个体识别和亲权鉴定。 展开更多
关键词 法医遗传学 大规模平行测序 短串联重复 多态现象 遗传 ForenSeq^(TM)DNA signature Prep试剂盒 畲族 浙江
在线阅读 下载PDF
GE塑料集团推出新的LiteDesign联机工具箱为汽车照明设计师提供Signature Surfaces解决方案
13
《塑料工业》 CAS CSCD 北大核心 2006年第7期18-18,共1页
GE充满新活力的照明计划新增了用以改善设计优化和材料选择的可预测自助工具。随着消费者对汽车多样化需求的增长,GE塑料集团汽车业务照明部于近日推出了面向Signature Surfaces的最新LiteDesign网络资源,这是公司为高级外部表面所推... GE充满新活力的照明计划新增了用以改善设计优化和材料选择的可预测自助工具。随着消费者对汽车多样化需求的增长,GE塑料集团汽车业务照明部于近日推出了面向Signature Surfaces的最新LiteDesign网络资源,这是公司为高级外部表面所推出的最新资源。自助式LiteDesign资源提供了8个联机工具和计算器,可帮助模拟树脂颜色和效果,预测热性能和流动性,并能估算使用两种不同材料的成本差。GE塑料集团是目前唯一一家为客户提供可预测工程设计工具的工程热塑性塑料供应商。 展开更多
关键词 signature 照明设计师 GE塑料 工具箱 汽车 集团 联机 工程热塑性塑料 网络资源 材料选择
在线阅读 下载PDF
基于Signature和Ⅱ型双删失系统寿命数据的统计推断
14
作者 冯海林 郭甜 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2018年第5期1125-1135,共11页
基于Signature理论和方法,建立Ⅱ型双删失情形下元件寿命的统计推断模型,用极大似然估计及其渐近理论,推导出系统元件寿命分布参数的点估计及渐近置信区间估计的解析表达式,并通过3种优化算法获得相关估计的数值解.仿真结果表明,基于Sig... 基于Signature理论和方法,建立Ⅱ型双删失情形下元件寿命的统计推断模型,用极大似然估计及其渐近理论,推导出系统元件寿命分布参数的点估计及渐近置信区间估计的解析表达式,并通过3种优化算法获得相关估计的数值解.仿真结果表明,基于Signature的似然函数统计推断模型对Ⅱ型双删失情形下元件寿命的推断有效. 展开更多
关键词 系统signature Ⅱ型双删失 极大似然估计 优化算法
在线阅读 下载PDF
安立公司推出“signature”新型号仪表并开拓信号分析仪领域
15
《电子测量与仪器学报》 CSCD 2004年第2期91-91,共1页
关键词 安立公司 新型号 signature 分析仪 仪表 领域
在线阅读 下载PDF
Two Improved Digital Signature Schemes
16
作者 Lin Bogang Dept. of Computer and Technology, Fuzhou University, 350002, P. R. China Qiu Hongduan College of Qiaoxin Light Industry, Fuzhou University, 350002, P. R. China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2001年第1期78-81,共4页
In this paper, two improved digital signature schemes are presented based on the design of directed signature scheme. The peculiarity of the system is that only if the scheme is specific recipient, the signature is au... In this paper, two improved digital signature schemes are presented based on the design of directed signature scheme. The peculiarity of the system is that only if the scheme is specific recipient, the signature is authenticated. Since the scheme adds the screen of some information parameters, the difficulty of deciphered keys and the security of digital signature system are increased. 展开更多
关键词 Digital signature Message authentication Network security.
在线阅读 下载PDF
A chaos-based quantum group signature scheme in quantum cryptosystem
17
作者 娄小平 陈志刚 Moon Ho Lee 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第7期2604-2611,共8页
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp... A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers. 展开更多
关键词 group signature chaotic encryption quantum entanglement quantum cryptography
在线阅读 下载PDF
BCDH:Blockchain-based covert Diffie-Hellman key exchange scheme
18
作者 Qinghua Hu Chunxiang Xu Wanpeng Li 《Defence Technology(防务技术)》 2025年第10期24-31,共8页
The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key excha... The purpose of the covert communication scheme is to conceal the communication behavior entirely.In such schemes,the sender and receiver rely on secret keys to establish a covert channel.However,conventional key exchange protocols would expose the key exchange process between them.An adversary who observes the key exchange would be aware of the existence of communication behavior.The keys used in covert communication are not suitable to be generated through conventional key exchange schemes.To address this,we propose a blockchain-based covert elliptic-curve Diffie-Hellman key exchange scheme(BCDH)to conceal the process of the key exchange in blockchain transactions.Following a straightforward setup,BCDH allows the sender and receiver to covertly exchange a secret key on a blockchain without direct communication.Furthermore,we expand the BCDH approach to operate across multiple blockchains,further enhancing its covertness and stability.We analyze BCDH from several perspectives,including covertness,security,randomness,etc.Additionally,we implement a prototype of BCDH on the Ethereum platform to assess its feasibility and performance.Our evaluation demonstrates that BCDH is efficient and well-suited for real-world applications. 展开更多
关键词 Diffie-Hellman key exchange Digital signature Covert communication Blockchain Blockchain-based covert communication
在线阅读 下载PDF
事务存储系统中PGHB冲突检测算法改进 被引量:3
19
作者 窦强 王勇 《电子学报》 EI CAS CSCD 北大核心 2010年第1期195-198,212,共5页
事务存储系统是一种全新的多核体系结构,为并行编程提供了一个简洁高效的编程环境.基于Signa-ture的冲突检测算法是事务存储系统中很有前景的一种冲突检测方法,其误判率直接影响系统性能.PGHB算法是一种优秀的冲突检测算法,具有较低的... 事务存储系统是一种全新的多核体系结构,为并行编程提供了一个简洁高效的编程环境.基于Signa-ture的冲突检测算法是事务存储系统中很有前景的一种冲突检测方法,其误判率直接影响系统性能.PGHB算法是一种优秀的冲突检测算法,具有较低的误判率,和较低的硬件实现开销.本文对PGHB冲突检测算法进行进一步改进,提出一种新的算法,使用单端口的SRAM来实现PGHB算法,并使用HP的CACTI4.2对硅片占用面积进行评估.结果显示,改进的PGHB算法与原算法相比,硅片占用面积节约了71%,使得该算法在硬件开销和误判率之间取得了更好的折衷. 展开更多
关键词 事务存储 signature 冲突检测 误判率
在线阅读 下载PDF
事务存储系统中PGHB冲突检测算法研究 被引量:1
20
作者 窦强 王勇 《计算机工程与科学》 CSCD 北大核心 2010年第1期120-122,131,共4页
事务存储系统是一种全新的多核体系结构,为并行编程提供了一个简洁高效的编程环境。基于Signature的冲突检测算法是事务存储系统中很有前景的一种冲突检测方法,其误判率直接影响系统性能。GHB算法是一种优秀的冲突检测算法,具有较低的... 事务存储系统是一种全新的多核体系结构,为并行编程提供了一个简洁高效的编程环境。基于Signature的冲突检测算法是事务存储系统中很有前景的一种冲突检测方法,其误判率直接影响系统性能。GHB算法是一种优秀的冲突检测算法,具有较低的误判率,但硬件实现开销较大。本文对GHB冲突检测算法进行进一步改进,提出了一种PGHB算法。与GHB算法相比,PGHB算法在硬件开销和误判率两者之间取得了更好的折衷。 展开更多
关键词 事务存储 signature 冲突检测 误判率
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部