共查询到20条相似文献,搜索用时 0 毫秒
1.
结合断言与覆盖率为导向的验证方法 总被引:3,自引:2,他引:3
伴随着半导体工艺的不断发展,可以将更多的功能集成到单系统芯片上.这对传统的验证方法和验证途径提出了种种挑战.以覆盖率为导向的验证方法中,覆盖率模型是在外部通过DUT执行的功能来统计覆盖率,很难侦测到DUT内部的工作状态,存在对功能"遗漏点"的侦测.基于断言的验证方法可以将断言加入到DUT内部,通过断言覆盖加强覆盖率检测.阐述了将断言和覆盖率为导向相结合的验证方法,并用此种方法对USB2.0系统进行了验证.讨论了如何将两种验证方法有效地结合,并且通过比较覆盖率为导向的验证方法与结合断言与覆盖率为导向的验证方法的结果,说明结合断言与覆盖率为导向的验证方法提高了验证过程中的观测性,减少了验证周期. 相似文献
2.
数据挖掘中分类方法的研究 总被引:2,自引:0,他引:2
分类是数据挖掘中的最重要的技术之一。目前实现分类的方法有统计方法、机器学习方法和人工智能方法等,常用的技术有决策树分类、贝叶斯分类、神经网络分类等。通过对当前具有代表性的分类算法原理进行分析、比较,总结出每种算法的性能特征,既便于使用者了解掌握各种分类算法、更好地选择合适的算法,又便于研究者对算法进行研究改进,提出性能更好的分类算法。 相似文献
3.
针对大规模日志数据的聚类问题,提出了DBk-means算法.该算法使用Hadoop对原始日志数据进行预处理,并结合了k-means和DBSCAN聚类算法各自的优势.实验结果表明,相比k-means算法进行聚类分析,文中使用DBk-means算法进行聚类,能够取得更好的聚类效果,正确率可以达到83%以上. 相似文献
4.
5.
6.
Youngblood G.M. Cook D.J. 《IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews》2007,37(4):561-572
In this paper, we examine the problem of learning inhabitant behavioral models in intelligent environments. We maintain that inhabitant interactions in smart environments can be automated using a data-driven approach to generate hierarchical inhabitant models and learn decision policies. To validate this hypothesis, we have designed the ProPHeT decision-learning algorithm that learns a strategy for controlling a smart environment based on sensor observation, power line control, and the generated hierarchical model. The performance of the algorithm is evaluated using real data collected from our MavHome smart home and smart office environments. 相似文献
7.
决策离不开知识,从数据库中采掘知识、是解决信息爆炸和知识贫乏的有效途径。文中就当前数据开采的几种新方法,即粗集、语气理论和云模型等方法的研究现状进行了评述,指出其存在的问题,最后指出数据开采方法面临的挑战。 相似文献
8.
The main driving force for the rapid acceptance rate of small sized mobile devices is the capability to perform e-commerce transactions at any time and at any place, especially while on the move. There are, however, also weaknesses of this type of e-commerce, often called mobile e-commerce, or m-commerce. Due to their small size and easy portability mobile devices can easily be lost or stolen. Whereas the economic values and privacy threats protected with Personal Identification Numbers (PIN) are not particularly high for normal voice-enabled mobile phones, this is not true any more when phones have developed to Personal Trusted Devices (PTDs). Still, PINs are used also in this new context for authorization and identification purposes. PINs are currently used both for protection of the devices and for authentication, as well as authorization of the users. It is commonly recognized that not many techniques of storing the PINs into the memory of the device or on the SIM card are safe. Even less sophisticated thieves might uncover the PIN inside the stolen mobile devices and for sophisticated thieves uncovering the PIN stored safely might be possible. In this paper we propose a new scheme to cope with the problem of uncovering the PIN that reduces the risks of m-commerce. The basic idea is that instead of storing the entire PIN digits (or some hash value) in the mobile device, we store part of the PIN in a remote machine in the network. The PIN verification then involves both the mobile device and the remote machine, which must verify their respective parts of the PIN. Also, the improvements of the security over the existing schemes are shown using a probabilistic model. In the best case, where the probability of discovering the PIN irrespective of the storage scheme is negligible in relation to directly uncovering it, the increase in security is over 1000%. 相似文献
9.
10.
在线签名识别的数据采集与通信 总被引:3,自引:0,他引:3
笔迹信息的数据采集是在线签名识别算法的基础。设计由四线电阻式触摸屏,触摸屏控制器ADS7846,单片机AT89S52构成的采集系统实现在线签名识别的数据采集。采用USB接口芯片PDIUSBD12实现与PC机的通信。实现了对签名笔迹的坐标、速度及压力信息的采集与传输,并对采集的数据进行预处理。实验结果表明签名采集系统采集精度高,稳定可靠,抗干扰能力强。 相似文献
11.
12.
数据仓库和数据挖掘语言初探 总被引:1,自引:0,他引:1
着重阐述了数据仓库的基本概念、特征和体系结构,并介绍了使DW作用得以发挥的决策支持工具。还介绍了几种数据挖掘语言及其标准化方面的研究进展,提出了数据挖掘语言分类的方法,在此基础上,对数据挖掘语言的结构和组成进行了探讨和研究,最后指出了数据挖掘语言的发展趋势,以及若干待解决的问题。 相似文献
13.
14.
数据挖掘助力精细化流量经营 总被引:1,自引:0,他引:1
移动互联网时代,移动数据流量正以前所未有的速度在增长,电信运营商面临着增量不增收、流量套餐渗透率不高、自有移动互联网业务推广难等问题.本文结合电信运营商的实际案例,介绍运用协同式过滤、社交网络分析、决策树等数据挖掘技术在流量套餐精确营销、移动互联网业务个性化推荐等流量经营重点工作中的应用和效果. 相似文献
15.
In ad hoc networks, due to frequent network partition, data accessibility is lower than that in conventional fixed networks. In this paper, we solve this problem by replicating data items on mobile hosts. First, we propose three replica allocation methods assuming that each data item is not updated. In these three methods, we take into account the access frequency from mobile hosts to each data item and the status of the network connection. Then, we extend the proposed methods by considering aperiodic updates and integrating user profiles consisting of mobile users' schedules, access behavior, and read/write patterns. We also show the results of simulation experiments regarding the performance evaluation of our proposed methods 相似文献
16.
Web数据挖掘技术研究 总被引:5,自引:0,他引:5
Web数据挖掘就是利用数据挖掘技术从网络文档和服务中发现和提取信息。Web数据挖掘是一种新兴的边缘科学技术,他涉及到机器学习、数据挖掘、信息检索、自然语言处理、数据库以及人工智能等技术,可用于网络检索、网站建设以及电子商务等方面。根据数据挖掘对象的不同可以将Web数据挖掘分为3类:Web内容挖掘、Web结构挖掘和Web访问信息挖掘。 相似文献
17.
18.
Video tracking is a complex problem because the environment, in which video motion needs to be tracked, is widely varied based on the application and poses several constraints on the design and performance of the tracking system. Current datasets that are used to evaluate and compare video motion tracking algorithms use a cumulative performance measure without thoroughly analyzing the effect of these different constraints imposed by the environment. But it needs to analyze these constraints as parameters. The objective of this paper is to identify these parameters and define quantitative measures for these parameters to compare video datasets for motion tracking. 相似文献
19.
Wireless Personal Communications - In transform based image denoising methods, how to modify the transform coefficients is an important problem. In wavelet image denoising, two-dimensional tensor... 相似文献
20.
现场核查中,各种核查数据通常需要在公开信道中进行远程传输才能到达核查方,因此,数据很容易被篡改.为保证数据的真实性和完整性,本文首先建立了一种多重数据认证协议,其中采用的关键技术是数字签名和验证技术[1~2].最后,对协议进行了全面的评估. 相似文献