首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
I. INTRODUCTION Automatic words extraction is always the hotspot and difficulty in methods which research Chinese information processing. Since 1980, domestic researching scholars have developed a great deal of study, and put forward many methods about automatic words extraction[1~5]. Seen from the form, phrase is the combination of the stable words, so in the context, the more times that close words appear at the same time, the more possibility they constitute a phrase. Therefore the fr…  相似文献   

2.
We consider a generalization of the Cauchy–Poisson method to an n-dimensional Euclidean space and its application to the construction of hyperbolic approximations. In Euclidean space, constraints on derivatives are introduced. The principle of hyperbolic degeneracy in terms of parameters is formulated and its implementation in the form of necessary and sufficient conditions is given. As the particular case of a four-dimensional space with preserving operators up to the sixth order a generalized hyperbolic equation is obtained for bending vibrations of plates with coefficients dependent only on the Poisson number. As special cases, this equation includes all the well-known Bernoulli–Euler, Kirchhoff, Rayleigh, and Timoshenko equations. As a development of Maxwell’s and Einstein’s research on the propagation of perturbations with finite velocity in a continuous medium, Tymoshenko’s non-trivial construction of the equation for bending vibrations of a beam is noted.  相似文献   

3.
In this paper the conflict between the null constraints and the set of functional dependencies is defined.Some rules for determining the conflicts and a method for processing the conflicts are obtained.  相似文献   

4.
I. INTRODUCTION Transactions are a serial of atomic operations that have the character of ACID (Atomicity, Consistency, Isolation, Durability). After stepping into distributed computing environment of network, transactions will resolve problems derived from distributing. Transactions don’t concentrate on a single node, but distribute on more nodes of network in large area. We use the term-distributed transaction to refer to a transaction that accesses objects managed by multiple serve…  相似文献   

5.
The Bayesian method is widely used in image processing and computer vision to solve ill-posed problems. This is commonly achieved by introducing a prior which, together with the data constraints, determines a unique and hopefully stable solution. Choosing a “correct” prior is however a well-known obstacle. This paper demonstrates that in a certain class of motion estimation problems, the Bayesian technique of integrating out the “nuisance parameters” yields stable solutions even if a flat prior on the motion parameters is used. The advantage of the suggested method is more noticeable when the domain points approach a degenerate configuration, and/or when the noise is relatively large with respect to the size of the point configuration.  相似文献   

6.
Leonard K. Eaton resurrects the reputation of Hardy Cross, developer of the “moment distribution method” and one of America’s most brilliant engineers. The structural calculation of a large reinforced concrete building in the nineteen fifties was a complicated affair. It is a tribute to the engineering profession, and to Hardy Cross, that there were so few failures. When architects and engineers had to figure out what was happening in a statically indeterminate frame, they inevitably turned to what was generally known as the “moment distribution” or “Hardy Cross” method. Although the Cross method has been superseded by more powerful procedures such as the Finite Element Method, the “moment distribution method” made possible the efficient and safe design of many reinforced concrete buildings during an entire generation.  相似文献   

7.
The Shortley–Weller method is a standard central finite-difference-method for solving the Poisson equation in irregular domains with Dirichlet boundary conditions. It is well known that the Shortley–Weller method produces second-order accurate solutions and it has been numerically observed that the solution gradients are also second-order accurate; a property known as super-convergence. The super-convergence was proved in the \(L^{2}\) norm in Yoon and Min (J Sci Comput 67(2):602–617, 2016). In this article, we present a proof for the super-convergence in the \(L^{\infty }\) norm.  相似文献   

8.
The Phase Plane Divisional Control (PPDC) applies different actions in the phase plane, according to error and error rate, to make the control system satisfy the control requirement. This control structure makes the system possess the characteristics of closed-open loop. Furthermore, just as the PID control, it's unnecessary to build up a mathematical model for the controlled object. This paper combines Neural Network (NN) inverse model with PPDC to generate a new kind of intelligent controller--NN-PPDC. This controller is established in the phase plane, real time corresponding relationships between the basic performance of the system response, not only the action logic division but also acting magnitude. Thus the control parameters in each divisional area can make automatic on-line regulation in accordance with the changes in the controlled object possessing adaptive ability. The simulation and its application in the feed-supporting system for the Square Kilometre Array (SKA) show that the controller designed with this method has better close-loop performance and robustness.  相似文献   

9.
A brief introduction to the characteristic set method is given for solving algebraic equation systems and then the method is extended to algebraic difference systems. The method can be used to decompose the zero set for a difference polynomial set in general form to the union of difference polynomial sets in triangular form. Based on the characteristic set method, a decision procedure for the first order theory over an algebraically closed field and a procedure to prove certain difference identities are proposed.  相似文献   

10.
This paper presents a prediction method using a parallel–hierarchical (PH) network and hyperbolic smoothing of empirical data. The average prediction error is 0.55% for the developed method and 1.62% for neural networks; therefore, this method is more efficient as applied to real-time systems than traditional neural networks due to the use of the PH network and hyperbolic smoothing in implementing the operation of predicting the positions of energy centers of laser beam spot images for optical communication systems.  相似文献   

11.
Map recognition is an essential data input means of Geographic Information System (GIS). How to solve the problems in the procedure, such as recognition of maps with crisscross pipeline networks, classification of buildings and roads, and processing of connected text, is a critical step for GIS keeping high-speed development. In this paper, a new recognition method of pipeline maps is presented, and some common patterns of pipeline connection and component labels are established. Through pattern matching, pipelines and component labels are recognized and peeled off from maps. After this approach, maps simply consist of buildings and roads, which are recognized and classified with fuzzy classification method. In addition, the Double Sides Scan (DSS) technique is also described, through which the effect of connected text can be eliminated.  相似文献   

12.
A new method for recognizing Chinese characters is proposed. It is based on the so-called featurepoints of Chinese characters. The feature points we use include those on the stroke of a character, i.e., endpoints, turning points, fork points and cross points, and the key points on the background of character. Thismethod differs from the previous ones for it combines the feature points on stroke with those on back-ground and it uses feature points to recognize Chinese characters directly. A Chinese character recognitionsystem based on top-down dynamical matching of feature point is developed. The system can recognizenot only 6763 printed sample Song font Chinese characters of size 5.6×5.6mm~2 with high recognition rate,but also the general printed books, magazines and documents with a satisfactory recognition rate andspeed.  相似文献   

13.
We prove in this paper the second-order super-convergence in \(L^{\infty }\)-norm of the gradient for the Shortley–Weller method. Indeed, this method is known to be second-order accurate for the solution itself and for the discrete gradient, although its consistency error near the boundary is only first-order. We present a proof in the finite-difference spirit, using a discrete maximum principle to obtain estimates on the coefficients of the inverse matrix. The proof is based on a discrete Poisson equation for the discrete gradient, with second-order accurate Dirichlet boundary conditions. The advantage of this finite-difference approach is that it can provide pointwise convergence results depending on the local consistency error and the location on the computational domain.  相似文献   

14.
In this article, we are interested in the simulation of phase transition in compressible flows, with the isothermal Euler system, closed by the van-der-Waals model. We formulate the problem as an hyperbolic system, with a source term located at the interface between liquid and vapour. The numerical scheme is based on (Abgrall and Saurel, J. Comput. Phys. 186(2):361?C396, 2003; Le Métayer et al., J. Comput. Phys. 205(2):567?C610, 2005). Compared with previous discretizations of the van-der-Waals system, the novelty of this algorithm is that it is fully conservative. Its Godunov-type formulation allows an easy implementation on multi-dimensional unstructured meshes.  相似文献   

15.
This paper presents a parallel implementation of the hybrid BiCGStab(2) (bi-conjugate gradient stabilized) iterative method in a GPU (graphics processing unit) for solution of large and sparse linear systems. This implementation uses the CUDA-Matlab integration, in which the method operations are performed in a GPU core using Matlab built-in functions. The goal is to show that the exploitation of parallelism by using this new technology can provide a significant computational performance. For the validation of the work, we compared the proposed implementation with a BiCGStab(2) sequential and parallelized implementation in the C and CUDA-C languages. The results showed that the proposed implementation is more efficient and can be viable for simulations being carried out with quality and in a timely manner. The gains in computational efficiency were 76x and 6x compared to the implementation in C and CUDA-C, respectively.  相似文献   

16.
In a class of categories, including E. Manes's assertional ones, the control structures if-then-else and repeat-until are modeled as natural transformations of suitable functors. This context show how the three basic pieces of any structured programming language (concatenation, conditional and recursion) share naturality.  相似文献   

17.
A method, called Two-Dimensional Extended Attribute Grammars (2-DEAGs). for the recognition ofhand-printed Chinese characters is presented. This method uses directly two dimensional information, and pro-vides a scheme for dealing with various kinds of specific cases in a uniform way. In this method, componentsare drawn in guided and redundant way and reductions are made level by level just in accordance with the com-ponent combination relations of Chinese characters. The method provides also polysemous grammars,coexisting grammars and structure inferrings which constrain redundant recognition by comparison among similarcharacters or components and greatly increase the tolerance ability to distortion.  相似文献   

18.
The present invention allows even small-size verificationdevices to authenticate rights and qualifications without leakingauthentication characteristic information to third parties A ticketissuance device computes document private information mufrom a private function f of an interaction device owned by auser and document m to be transferred to the interaction device when generating interaction,and issues ticket t generated fromauthentication characteristic information x and the documentprivate information .mu. to the user.The interaction device,when document m is input,generates document private infor-mation mu using a private function f specific to the interactiondevice,and performs interaction based on the document privateinformation.The interaction comprises output of commitment r.input of challenge chi,output of response .sigma.,andmessage M output.The user converts interaction(r, .chi.,M,.sigma.)into interaction(r,.chi.,M,s)using ticket t toperform Guillou-Quisquater authentication.  相似文献   

19.
A method,called Two-Dimensional Extended Attribute Grammars(2-D EAGs) for the recognition of hand-printed Chinese characters is presented.This method uses directly two dimensional information,and provides a scheme for dealing with various kinds of specific cases in a uniform way.In this method,components are drawn in guided and redundant way and reductions are made level by leve just in accordance with the component combination relations of Chinese characters.The method provids also polysemous grammars,coexisting grammars and structure inferrings whih constrain redundant recognition by comparison among similar characters of components and greatly increase the tolerance ability to distortion.  相似文献   

20.
A leak detection plays a key role in the overall integrity monitoring for a oil pipeline system.A fuzzy decision-making approach to pipeline leak localization is proposed in this paper. The two main methods,pressure gradient localization and negative pressure wave localization,are combined with fuzzy logical decision-making method to form a novel fault diagnosis scheme.The combination scheme can improve the precision of localization.An application example,14km long oil pipeline leak detection and localization,is illustrated.This method is compared with others through practical experiments and its validity is confirmed by the results.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号