首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
Two-base numeration systems are introduced in the paper. They are generalizations of standard numeration systems, which are based on powers of a given radix. The results are reviewed and applications for encoding numbers and trees are given. Further research fields are outlined. A new parallel algorithm for modular exponentiation and new classes of prefix codes are presented.  相似文献   

2.
多传感器数据最优融合   总被引:2,自引:0,他引:2  
利用可信区间估计的概念,检验传感器测量值偏差,描述传感器间的支持关系,确定传感器数据的取舍,提出两种最优融合算法,仿真给果表明两种最优融合方法是有效的,其精度高于简单平均法。  相似文献   

3.
文章主要对元计算环境中任务调度进行了深入分析与研究。先概述了元计算系统对于科学领域的贡献,分析了元计算环境的特点;然后对元计算环境中的调度算法进行了分类说明,并对几种典型的调度算法行了具体的分析,评价了其特点与不足之处;最后分析了新兴的元计算环境—校园级元计算环境面临的挑战,借鉴各种调度算法,提出了与之相适应的任务调度策略,对其可行性进行了分析,并简要概括了其创新性。  相似文献   

4.
1 引言小波理论在图像压缩中已有成功的应用。在小波压缩系统中,有两个因素是至关重要的:一是小波滤波器,二是压缩编码算法。随着小波变换进入JPEG2000,与小波变换相配套的零树编码算法写进MPEG-4,小波理论在图像压缩中也占有越来越重要的地位。基于提升算法的第二代小波变换也日益受到研究者的广泛关注。与第一代小波变换相比,提升算法具有快速、高效的优点,并且提升滤波器的设计可直接在空域中完成。第一代小波变换可通过因数分解转换为提升方案,例如著名的Cohen和  相似文献   

5.
Data communications facilities are vital if essential banking operations are to be computerized; branches and head offices that are dependent upon terminals and corporate data to fulfil their functions must have access to such facilities. Back-up facilities are also essential if normal bank functions are not to be disrupted should a fault develop. Investigations that led to the installation of Hyperchannel at the Royal Bank of Scotland are described and the problems to which Hyperchannel provided the solutions are examined. The implementation of the system and plans for future development are discussed.  相似文献   

6.
基于粘贴模型的巨大并行性,分别给出了线性全排列和圆周全排列问题的粘贴DNA算法;分析了两类问题的DNA算法的不同之处;通过一个实例给出了实验操作步骤,并对生化实验进行了模拟,得出了正确的结果,从而证明了算法的可行性。最后,对算法的操作复杂度进行了分析。  相似文献   

7.
K-winner networks.   总被引:2,自引:0,他引:2  
A special class of mutually inhibitory networks is analyzed, and parameters for reliable K-winner performance are presented. The network dynamics are modeled using interactive activation, and results are compared with the sigmoid model. For equal external inputs, network parameters that select the units with the larger initial activations (the network converges to the nearest stable state) are derived. Conversely, for equal initial activations, networks that select the units with larger external inputs (the network converges to the lowest energy stable state) are derived. When initial activations are mixed with external inputs, anomalous behavior results. These discrepancies are analyzed with several examples. Restrictions on initial states are derived which ensure accurate K-winner performance when unequal external inputs are used.  相似文献   

8.
Three-dimensional object reconstruction from orthogonal projections   总被引:2,自引:0,他引:2  
Techniques for the reconstruction of three-dimensional objects from orthogonal projections are described. When two projections are available, the object is divided into thin slices and the slices are individually reconstructed. When three projections are available, heuristic reconstruction techniques are discussed.  相似文献   

9.
The fundamentals of hierarchical data structures are reviewed and it is shown how they are used in the implementation of some basic operations in computer graphics. The properties of hierarchical structures are discussed, focusing on quadtrees and octrees. The latter are defined, some of the more common ways in which they are implemented are examined, and an explanation of the quadtree/octree complexity theorem is provided. Vector quadtrees and vector octrees are discussed. The performance of basic operations using quadtrees is considered  相似文献   

10.
知识库的异常是影响整个知识系统性能的重要因素之一,因此必须对获取的知识进行校验。本文综述了知识库异常检测和验证的相关研究,给出了异常知识的分类及其危害性,分析了知识库验证困难的原因,介绍了用于知识库验证的静态和动态方法,列举了国际上几个著名的知识库验证工具,并对知识库验证的研究进行了展望。  相似文献   

11.
基于FPGA及FLASH的数据采集存储系统设计   总被引:1,自引:0,他引:1  
提出了一种多路数据采集存储系统的设计方法。介绍了闪存和现场可编程门阵列FPGA的功能特性,并利用外围接口电路及上述芯片设计并实现数据采集存储系统。介绍并口EPP模式控制的读数操作过程。给出了采集存储系统的接口电路,并阐述了它的实现原理。  相似文献   

12.
A class of simplified background neural networks model with a large number of neurons is proposed. Continuous attractors of the simplified model are studied in this paper. It contains: (1) When the background inputs are set to zero and the excitatory connections are in Gaussian shape, continuous attractors of the new network are obtained under some condition. (2) When the background inputs are nonzero and the excitatory connections are still in Gaussian shape, continuous attractors are achieved under some appropriately selected condition. (3) Discussions and examples are used to illustrate the theories developed.  相似文献   

13.
引入了扰动模糊有限转换状态机和扰动模糊有限状态机的(强)同态的概念,研究了它们的相关性质。给出了[Σ]的元素构成所有长度有限的词集上的两种同余关系,讨论商结构问题,证明了相应的所有等价类构成具有单位元的有限半群,并且这两个有限半群是同态的。给出了[Q]上容许关系及强同态的核的概念,研究了它们的相关性质。  相似文献   

14.
基于贝叶斯滤波理论的自主机器人自定位方法研究   总被引:2,自引:0,他引:2  
针对自主机器人定位问题,研究了基于贝叶斯滤波理论的自定位方法,从概率表达的角度介绍了贝叶斯滤波方法各种不同的实现形式,分析了各种不同定位方法的性能,指出了它们的优缺点,并对每种方法的改进方法进行了探讨和分析,最后总结了定位方法的基本特点,并对贝叶斯滤波理论在自主机器人领域中的应用前景进行了展望,探讨了未来的发展方向。  相似文献   

15.
根据安全协议的Horn逻辑扩展模型和相应的安全协议验证方法,提出了自动构造不满足安全性质的安全协议反例的求解策略,并给出了重要定理的证明,设计了一系列自动构造协议攻击的构造算法,并在基于函数式编程语言Objective Caml开发的安全协议验证工具SPVT中实现了这些算法,给出了主要算法的优化方法,详细分析了主要算法的时间复杂度,从理论上证明了算法是线性时间算法.最后,用SPVT对一些典型的安全协议进行了验证,得到了不安全协议的反例,并对反例进行了分析.得到的反例非常方便于阅读,与Alice-Bob标记非常接近,从而使任何领域的专家都可以用这种形式化的方法检查安全协议是否存在真实的反例.  相似文献   

16.
磁盘加密模式分析   总被引:1,自引:1,他引:0       下载免费PDF全文
基于国内外磁盘加密产品的研究成果,通过跟踪IEEE存储安全工作组(SISWG)制定的块存储设备加密标准P1619,分析磁盘加密的特定需求,指出其在国内研究的欠缺。选取目前主流的加密模式进行安全性分析,根据其在应用中的优缺点,给出相应建议,并总结磁盘加密算法研究的发展方向。  相似文献   

17.
常见模糊蕴涵算子的模糊系统及其响应函数   总被引:9,自引:3,他引:9  
详细讨论了较常见的21种模糊蕴涵算子构成的模糊控制器及其响应函数.主要结果是,异常蕴涵算子模糊控制算法都可归结为某种插值方法,它们相应的模糊控制器均具有函数逼近的泛性且彼此等效;而正常蕴涵算子(包括正规蕴涵算子的导出算子)模糊控制算法均非插值方法,其模糊控制器都不具有函数逼近的泛性,除Zadeh蕴涵算子外,这些正常蕴涵算子的模糊控制器均只具备阶跃输出功能且在一定意义下相互等效.  相似文献   

18.
本文综述了生物/化学微传感器的技术和应用,详细描述了起源于半导体技术的标准工艺流程和制造三维机械结构的特殊微细机加工工艺,给出了基本化学传感器原理和对应的化学/生物传感器应用实例,最后提出了单片集成化学/生物微传感器系统,包括单一芯片上传感器结构和运转电路。  相似文献   

19.
Concerns the 3D interpretation of image sequences showing multiple objects in motion. Each object exhibits smooth motion except at certain time instants when a motion discontinuity may occur. The objects are assumed to contain point features which are detected as the images are acquired. Estimating feature trajectories in the first two frames amounts to feature matching. As more images are acquired, existing trajectories are extended. Both initial detection and extension of trajectories are done by enforcing pertinent constraints from among the following: similarity of the image plane arrangement of neighboring features, smoothness of the 3D motion and smoothness of the image plane motion. The constraints are incorporated into energy functions which are minimized using 2D Hopfield networks. Wrong matches that result from convergence to local minima are eliminated using a 1D Hopfield-like network. Experimental results on several image sequences are shown.  相似文献   

20.
Comparison of thinning algorithms on a parallel processor   总被引:1,自引:0,他引:1  
A number of parallel algorithms for thinning elongated shapes are contrasted and compared on a Clip 4 parallel processor. These algorithms all work in rectangular tessellation and they thin elongated objects to lines one pixel thick while retaining their connectivity. Existing algorithms for use on binary pictures are considered first and new algorithms are proposed which produce more satisfactory results, but are more expensive in terms of speed and space requirements. Two methods of extending these algorithms to grey pictures are then considered. In one method, binary algorithms are used but are directed by the grey pixels; in the other the binary algorithms are generalized to the grey case. Both methods result in arcs which are not wholly determined by the original boundary of the object but lie along darker ridges. The former is faster and produces results which are easier to interpret, but the results from the latter contain more information.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号