首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
基于本体的语义查询系统模型   总被引:1,自引:0,他引:1  
李渝  罗军 《信息技术》2010,(2):52-55
由于网络的快速发展,人们每天被大量的信息包围。如何从中找出有价值的信息成为急需解决的问题。而现在大多数搜索引擎采用的是关键词匹配的方式,无法从语义的层面上理解用户的需求,导致查不准和查不全的情况,最终不能满足用户的需求。提出了基于本体的语义查询系统模型,通过本体来组织知识,让计算机能读懂查询条件,同时用wordnet来辅助查询,从而提高信息的查准率和查全率。还提出借助wordnet实现本体自我完善的方法,并增加了关键词快速查找表来加快查询的速度。  相似文献   

2.
语义网因具有对网络空间所储存的数据进行智能评估的能力,使其从诞生之日起便成为计算机研究的热点领域。OWL2是一个本体语言,用于带有形式化定义含义的语义网。本文是对OWL2 Web本体语言新特性的介绍,同时包含了对OWL2与OWL初始版本之间不同点的解释,也介绍了激发设计主要新特性的需求,并从理论和实现的角度阐述了这些新特性的原理。  相似文献   

3.
This letter presents an efficient and simple image segmentation method for semantic object spatial segmentation.First,the image is filtered using contour-preserving filters.Then it is quasi-flat labeled.The small regions near the contour are classified as uncertain regions and are eliminated by region growing and merging.Further region merging is used to reduce the region number.The simulation results show its efficiency and simplicity,It can preserve the semantic object shape while emphasize on the perceptual complex part of the object.So it conforms to the humann visual perception very well.  相似文献   

4.
基于本体的信息检索技术能够提高在复杂环境中的信息检索效率,而语义相似度计算是基于本体的信息检索技术的关键技术。在医疗领域本体的基础上,通过分析讨论了概念间的语义相似度与相关度,并对概念间的语义相似度与相关度的影响因素进行研究,提出了一种计算医疗概念间的语义相似度及相关度的数值,并得到两者综合值的计算模型。实验结果表明,该模型能够提高相似度数值的有效性,并通过对相似度数值的计算体现出医疗领域概念间的复杂关系。  相似文献   

5.
6.
Context-aware semantic discovery for next generation mobile systems   总被引:3,自引:0,他引:3  
  相似文献   

7.
基因本体是一个被广泛使用的生物数据资源,主要用于描述基因和基因产物的属性,包括分子功能、生物过程和细胞组件三个方面.基于基因本体的术语相似度及基因功能相似度计算对基因功能分析、比较和预测等生物学研究热门领域具有非常重要的意义.本文综述了基于基因本体的语义相似度算法,主要包括基因本体同一分支中的术语相似度计算法和基因本体跨分支术语相似度算法两大部分内容,并对这些方法的优缺点做了一定的分析总结.  相似文献   

8.
张军艳  罗军  赵应秋 《信息技术》2010,34(8):112-117,120
随着企业内部、企业间异构数据的增多,如何高速有效实现数据之间的互操作成为了一个热点问题。讨论了基于本体的异构数据集成方法,给出了系统框架。重点研究了本体的提取和查询分解,给出了详细的提取规则,并通过引入类源映射表来提高查询分解速度,实现查询优化,解决了语义异构。  相似文献   

9.
冉婕  漆丽娟 《电子设计工程》2015,23(5):12-14,17
基于语义检索的目的,结合成语典故本体的构建,设计了一个基于成语典故本体的语义检索模型,阐述了检索模型中用户界面模块、数据存储模块、查询分析模块和检索分析模块的功能;分析了系统中的本体构建技术、分词技术及检索技术,设计并实现了词语相似度及概念相似度算法;通过语义检索系统的实验,得到较高的查全率和查准率.  相似文献   

10.
Automatic semantic video object extraction is an important step for providing content-based video coding, indexing and retrieval. However, it is very difficult to design a generic semantic video object extraction technique, which can provide variant semantic video objects by using the same function. Since the presence and absence of persons in an image sequence provide important clues about video content, automatic face detection and human being generation are very attractive for content-based video database applications. For this reason, we propose a novel face detection and semantic human object generation algorithm. The homogeneous image regions with accurate boundaries are first obtained by integrating the results of color edge detection and region growing procedures. The human faces are detected from these homogeneous image regions by using skin color segmentation and facial filters. These detected faces are then used as object seed for semantic human object generation. The correspondences of the detected faces and semantic human objects along time axis are further exploited by a contour-based temporal tracking procedure.  相似文献   

11.
用本体实现智能交通系统的语义集成   总被引:1,自引:6,他引:1  
李阳  翟军  陈燕 《信息技术》2005,29(6):10-13
智能交通系统整体效益的发挥,很大程度上取决于各个分系统的协调和整合,而集成是提高ITS系统性能的有效手段。面向中国智能交通系统的语义集成问题,建立了基本本体、领域本体、应用本体的三层本体体系结构,根据中国智能交通系统体系框架(National Intelligent Transport System Architecture)给出了本体系统的本体分类。研究了本体的表示方法,并提出了基于本体的语义集成框架。  相似文献   

12.
对海量数据进行聚类,从中获取有价值的隐含知识,已经成为一项迫切的需求。传统的基于词频或距离的文本聚类技术在准确度方面存在较大差距。引入文本语义信息的聚类方法,提高了聚类的准确度。实验结果表明,基于语义特征的模糊聚类算法具有较好的聚类效果。  相似文献   

13.
This paper proposes a methodology, implemented in a tool, to automatically generate the main classes of error control codes (ECC's) widely applied in computer memory systems to increase reliability and data integrity. New code construction techniques extending the features of previous single error correcting (SEC)-double error detecting (DED)-single byte error detecting (SBD) codes have been integrated in the tool. The proposed techniques construct systematic odd-weight-column SEC-DED-SBD codes with odd-bit-per-byte error correcting (OBC) capabilities to enhance reliability in high speed memory systems organized as multiple-bit-per-chip or card  相似文献   

14.
A method to automatically create low order state-space models for magnetic devices is set forth. The method begins with geometrical and materials data from which the finite element analysis (FEA) is used to build a high order state-space model. It is shown that this model contains far more state variables than are necessary to achieve the nearly the same results in the frequency band of interest. It is shown that the full-order model can be reduced methodically without additional physical assumptions. The reduction method is applicable directly to magnetically linear systems, but applies to a wide range of power electronics applications and can be a basis for future nonlinear device modeling. The method reduced an example inductor model from 882 state variables to two. To confirm correct model derivation, the full-order model is checked against and agrees with experimental data to the extent that the FEA and materials data are accurate. The reduced-order model agrees very well with the full-order model, particularly in computing impedance.  相似文献   

15.
针对广义模糊增强算法中参数选择的主观性,提出了一种模糊参数自动调整的方法。通过分析实验得出模糊参数对图像增强效果的重要性,给出一种用图像可检测边缘度和图像熵的熵值作为图像增强的评价标准,并根据这个标准实现了原来模糊增强算法中参数的自动选择,达到图像的自动增强,提高图像中弱边缘对比度的目的。最后通过实验证明算法的有效性。  相似文献   

16.
Given a set of memory array faults, the problem of computing a compact March test that detects all specified memory array faults is addressed. In this paper, we propose a novel approach in which every memory array fault is modeled by a set of primitive memory faults. A primitive March test is defined for each primitive memory fault. We show that March tests that detect the specified memory array faults are composed of primitive March tests. A method to compact the March tests for the specified memory array faults is described. A set of examples to illustrate the approach is presented. Experimental results demonstrate the productivity gained using the proposed framework  相似文献   

17.
The long awaited cloud computing concept is a reality now due to the transformation of computer generations. However, security challenges have become the biggest obstacles for the advancement of this emerging technology. A well-established policy framework is defined in this paper to generate security policies which are compliant to requirements and capabilities. Moreover, a federated policy management schema is introduced based on the policy definition framework and a multi-level policy application to create and manage virtual clusters with identical or common security levels. The proposed model consists in the design of a well-established ontology according to security mechanisms, a procedure which classifies nodes with common policies into virtual clusters, a policy engine to enhance the process of mapping requests to a specific node as well as an associated cluster and matchmaker engine to eliminate inessential mapping processes. The suggested model has been evaluated according to performance and security parameters to prove the efficiency and reliability of this multi-layered engine in cloud computing environments during policy definition, application and mapping procedures.  相似文献   

18.
Automatic generation of object recognition programs   总被引:1,自引:0,他引:1  
Issues and techniques are discussed to automatically compile object and sensor models into a visual recognition strategy for recognizing and locating an object in three-dimensional space from visual data. Automatic generation of recognition programs by compilation, in an attempt to automate this process, is described. An object model describes geometric and photometric properties of an object to be recognized. A sensor model specifies the sensor characteristics in predicting object appearances and variations of feature values. It is emphasized that the sensors, as well as objects, must be explicitly modeled to achieve the goal of automatic generation of reliable and efficient recognition programs. Actual creation of interpretation trees for two objects and their execution for recognition from a bin of parts are demonstrated  相似文献   

19.
高飞  张英  陈辉强  魏鑫 《信息技术》2011,35(1):100-102,105
通过分析装备保障方案的一般生成过程,对装备保障方案的需求信息进行了分类,并根据装备保障方案的拟制特点对装备保障方案生成系统进行了设计,以要地防空联合作战装备保障方案为例进行了介绍说明。  相似文献   

20.
The arrival of fourth generation mobile networks, based on IP core networks, lead us to the development of certain services, such as: Quality of service, mobility and AAA. This paper proposes architecture to supply quality of service support based in the differentiated services technique, known as Diffserv. In the same way we analyze the main components of this architecture: QoS Broker (central policy broker of quality of service, whose goal is the appropriate configuration of the routers in the network), Access Router (in charge of the management of the queuing system in order to provide QoS) and the AAA server (management of QoS user profiles).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号