首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
1.引言从60年代“软件危机“出现以来,为了提高软件质量和软件开发的效率,人们提出了各种各样的软件开发方法。这些方法大致上可分为三类:结构化方法、面向对象方法和形式方法。在过去的三十多年中,人们在结构化方法和面向对象方法的研究及其应用上做了大量的工作。结构化方法最为成熟,影响也最大。直到现在,仍有60-70%的系统是用结构化方法开发的。面向对象方法近十年发展比较快,大有取代结构化方法的趋势。对于形式方法,一直有人在研究,但由于种种原因,投入的人力和物力很不够,还未形成规模,应用也不  相似文献   

2.
采用遗传算法、模式搜索法和Powell法进行多方法协作构成多方法协作优化方法,进行多方法协作优化方法的结构设计,分析多方法协作优化方法的优化性能。实例证明了多方法协作优化方法相对于遗传算法的优越性。  相似文献   

3.
基于ICA和FLD相结合的人脸识别   总被引:1,自引:0,他引:1  
ICA作为一种传统的人脸识别方法,虽然识别效果较好,但却没有考虑类别信息。为了将类别信息融入ICA方法中,尝试利用FLD和ICA相结合的方法对人脸进行识别处理,即在使用ICA方法获得训练模式的统计独立基向量的基础上,对基向量张成的子空间使用FLD方法。利用几个人脸数据库对该方法进行了实验。实验结果表明,使用上述方法进行人脸识别,其效果优于传统的PCA方法、FLD方法和ICA方法。  相似文献   

4.
快速获取遥感信息对图像语义分割方法在遥感影像解译应用发展具有重要的研究意义。随着卫星遥感影像记录的数据种类越来越多,特征信息越来越复杂,精确有效地提取遥感影像中的信息,成为图像语义分割方法解译遥感图像的关键。为了探索快速高效解译遥感影像的图像语义分割方法,对大量关于遥感影像的图像语义分割方法进行了总结。首先,综述了传统的图像语义分割方法,并将其划分为基于边缘检测的分割方法、基于区域的分割方法、基于阈值的分割方法和结合特定理论的分割方法,同时分析了传统图像语义分割方法的局限性。其次,详细阐述了基于深度学习的语义分割方法,并以每种方法的基本思想和技术特点作为划分标准,将其分为基于FCN的方法、基于编解码器的方法、基于空洞卷积的方法和基于注意力机制的方法四类,概述了每类方法中包含的子方法,并对比分析了这些方法的优缺点。然后,简单介绍了遥感图像语义分割常用数据集和性能评价指标,给出了经典网络模型在不同数据集上的实验结果,同时对不同模型的性能进行了评估。最后,分析了图像语义分割方法在高分辨率遥感图像解译上面临的挑战,并对未来的发展趋势进行了展望。  相似文献   

5.
归纳了目前信任管理领域中声誉建立的方法,分析其不足之处并提出了一种新的声誉建立方法。该方法综合利用了拓扑信息和反馈信息,用于开放式计算环境中声誉的建立。将该方法与当前的方法进行了分析和对比。该方法可以有效地处理开放式计算环境中反馈信息少和动态性的问题,与当前方法相比,该方法更为有效。  相似文献   

6.
在软件工程的理论中,软件开发的方法非常重要。软件开发的方法灵活多样,非常强调创新意识。本文以面向对象方法和结构化方法为例,对这两种比较成熟的软件开发方法的创新发展过程进行了总结,并研究了软件开发方法的创新发展过程,由此对软件开发方法的创新发展过程规律进行了研究。  相似文献   

7.
一种改进的可区分矩阵与求核方法   总被引:3,自引:0,他引:3       下载免费PDF全文
本文针对Hu方法存在的问题,提出了一种改进的可区分矩阵与求核方法,并证明了该方法的正确性。该方法不仅克服了Hu方法的不足,而且指出了Hu方法出错的根本原因。  相似文献   

8.
图像轮廓提取方法研究   总被引:10,自引:0,他引:10       下载免费PDF全文
对现有的轮廓提取现状进行分析,把主要的轮廓提取方法划分为先验知识法、数学形态法、基于梯度的方法、水平集方法、活动轮廓模型方法、以及神经动力学方法六大类,并研究这些方法的主要特点。对轮廓提取方法研究进行展望,提出神经动力学方法是轮廓提取方法的发展方向。  相似文献   

9.
一种混合的中文文本校对方法   总被引:12,自引:3,他引:12  
本文以模式匹配的方法和3 元文法分析的方法为基础,结合语法属性标注和分 析的方法,提出了一种混合的中文文本校对方法,其结果优于任何一种方法的单独应用。 本文描述了这种方法并将它和其它两种方法进行了分析对比。  相似文献   

10.
已有的CAVLC解码方法包括二叉树解码方法、全码表解码方法和Hashem ian解码方法等,但是这些解码方法都只关注解码性能的一个方面:解码速度或存储空间,因而无法有效地提高整体性能。针对这一问题提出了一种快速的解码方法。该方法通过自动码表分配技术和码表地址转移技术来提高限定存储空间条件下的解码速度。实验结果表明,使用相同的存储空间,该方法的速度是传统解码方法的1.5倍,更加适用于H.264标准。  相似文献   

11.
混合动态系统及其应用综述   总被引:27,自引:0,他引:27  
在概述混合动态系统产生背景与发展近况的基础上, 主要综述了混合动态系统研究中的若干重要问题, 包括描述混合动态系统的常见工具, 如自动机和Petri网, 以及混合动态系统的模型描述方法及用于描述混合动态系统的递阶结构模型和混合逻辑动态模型, 对混合动态系统控制器的设计和验证及其在故障诊断等方面的应用研究也作了介绍, 同时对混合动态系统的一些主要研究成果进行初步评价.  相似文献   

12.
基于混合自动机的PSL模型研究   总被引:1,自引:1,他引:1  
基于SPICE的计算机仿真方法在混合信号电路验证应用中具有较大的计算开销,讨论基于属性描述的建模方法减小计算开销的问题。通过分析PSL(property specification language)对系统属性的形式化描述方法,并分析混合自动机理论对混合信号系统抽象能力,提出了适合于混合信号电路系统快速验证的PSL模型。结合混合自动机对PSL进行了基于混合自动机语义特点的扩展,使用巴克斯—诺尔范式对其拓展后语法进行规范,提出具有描述混合信号电路行为特性的HAPSL(hybrid automata-base  相似文献   

13.
针对一类非线性混成系统的可达性问题,提出了一种基于多面体包含的分析方法。首先介绍了混成系统及其可达性,讨论了如何应用多面体包含对多项式混成系统进行线性近似,并采用量词消去和非线性优化方法来构造相应的线性混成系统,然后运用验证工具SpaceEx求得原非线性混成系统的过近似可达集,并应用于验证系统的安全性。  相似文献   

14.
System level verification of cyber-physical systems has the goal of verifying that the whole (i.e., software + hardware) system meets the given specifications. Model checkers for hybrid systems cannot handle system level verification of actual systems. Thus, Hardware In the Loop Simulation (HILS) is currently the main workhorse for system level verification. By using model checking driven exhaustive HILS, System Level Formal Verification (SLFV) can be effectively carried out for actual systems.We present a parallel random exhaustive HILS based model checker for hybrid systems that, by simulating all operational scenarios exactly once in a uniform random order, is able to provide, at any time during the verification process, an upper bound to the probability that the System Under Verification exhibits an error in a yet-to-be-simulated scenario (Omission Probability).We show effectiveness of the proposed approach by presenting experimental results on SLFV of the Inverted Pendulum on a Cart and the Fuel Control System examples in the Simulink distribution. To the best of our knowledge, no previously published model checker can exhaustively verify hybrid systems of such a size and provide at any time an upper bound to the Omission Probability.  相似文献   

15.
This paper presents three hybrid metaheuristic algorithms that further improve the two hybrid differential evolution (DE) metaheuristic algorithms described in Liao [1]. The three improved algorithms are: (i) MDE′–HJ, which is a modification of MA–MDE′ in Liao [1] by replacing the random walk with direction exploitation local search with the Hooke and Jeeves (HJ) method; (ii) MDE′–IHS–HJ, which is constructed by adding the Hooke and Jeeves method to the original cooperative hybrid, i.e., MDE′–IHS; and (iii) PSO–MDE′–HJ, which is a variation of MDE′–IHS–HJ by replacing improved harmony search (IHS) with particle search optimization (PSO). A comprehensive comparative study was carried out to compare the three improved hybrids with the three algorithms presented by Liao [1] in terms of average success rate, average function evaluations taken, average elapsed CPU time, and convergence profiles. A total of 18 problems, 4 more than those used in Liao [1], were selected from different engineering domains for testing. The test results indicate that all three new hybrids can achieve higher success rate in much less CPU time. Among these three hybrids, MDE′–IHS–HJ is the best one in terms of success rate, better than the best hybrid in Liao [1] by over 15% and better than the second best, PSO–MDE′–HJ, by nearly 10%.  相似文献   

16.
The increasing need for hybrid Knowledge-Based Systems (KBS) that accommodate more complex applications has led to the need for new verification concerns that are more specific to the hybrid representation using objects and rule-based inference. Traditionally, verification of expert systems has focused solely on rule-based inference systems. Hybrid KBSs present additional verification problems not found in traditional rule-based systems. This paper is an investigation into the anomalies that may be present in a hybrid representation that warrant detection for the verification of the KBS. Many anomalies are due to the interaction of the component parts of the hybrid KBS. For example, subsumption anomalies arise due to an interaction between inheritance of objects and rule-based inference. In this paper, we extend the context of subsumption anomalies and introduce additional types of anomalies that may be present in the KBS. The goal of this research is to make hybrid KBSs more reliable by detecting such anomalies.  相似文献   

17.
Safety verification of hybrid systems is undecidable, except for very special cases. In this paper, we circumvent undecidability by providing a verification algorithm that provably terminates for all robust problem instances, but need not necessarily terminate for non-robust problem instances. A problem instance x is robust iff the given property holds not only for x itself, but also when x is perturbed a little bit. Since, in practice, well-designed hybrid systems are usually robust, this implies that the algorithm terminates for the cases occurring in practice. In contrast to earlier work, our result holds for a very general class of hybrid systems, and it uses a continuous time model.  相似文献   

18.
刘飞  杨明  王子才 《控制与决策》2006,21(11):1208-1213
针对仿真剧情主观校核不理想这一问题,提出了基于高级Petri网的仿真剧情正规校核方法.首先给出仿真剧情的形式化定义,并分析仿真剧情可能存在的错误类型;其次给出仿真剧情到高级Petri网的映射途径,并给出基于高级Petri网的仿真剧情校核准则和算法,此外,还给出实现仿真剧情动态校核的推理规则和机制;最后给出了一个正规校核工具框架.实际应用已经证明了该方法的有效性.  相似文献   

19.
One of the major drawbacks for the use of formal methods is the excessive size of the state-spaces representing behaviours of industrial-sized specifications of concrete systems. Existing verification algorithms simply are often not applicable to the large systems of practical relevance. One can improve the applicability of verification methods by orders of magnitude by ignoring parts of a behaviour which contain no information with respect to a given verification task. We focus on exactly such an abstraction based way of dealing with large, so called industrial-sized systems and discuss its application in an industrial project aiming at the detection of service interactions in Intelligent Networks on the specification level. The concrete application of the abstraction and verification method is presented mainly by considering an example taken from the service interaction project.  相似文献   

20.
Abstract— An advanced approach to LCOS IC layout verification is presented. It is based on incorporating the results of optical lithography computational models into the verification process. The first section describes an algorithm for the numerical modeling of optical lithography that uses a source integration method for computation of an aerial image. The second section dwells on an application of this algorithm for layout physical verification. A proposed physical verification method uses modeled contours of the manufactured elements to check whether a given layout will be manufacturable. The proposed verification method also considers deviations of manufactured contours from their modeled shapes due to variation of manufacturing parameters to further improve verification quality. At the same time, the method is conservative in terms of the use of a time‐consuming lithographical modeling.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号