共查询到20条相似文献,搜索用时 15 毫秒
1.
基于本体的语义查询系统模型 总被引:1,自引:0,他引:1
由于网络的快速发展,人们每天被大量的信息包围。如何从中找出有价值的信息成为急需解决的问题。而现在大多数搜索引擎采用的是关键词匹配的方式,无法从语义的层面上理解用户的需求,导致查不准和查不全的情况,最终不能满足用户的需求。提出了基于本体的语义查询系统模型,通过本体来组织知识,让计算机能读懂查询条件,同时用wordnet来辅助查询,从而提高信息的查准率和查全率。还提出借助wordnet实现本体自我完善的方法,并增加了关键词快速查找表来加快查询的速度。 相似文献
2.
3.
ChenXiaotang YuYinglin 《电子科学学刊(英文版)》2002,19(4):420-425
This letter presents an efficient and simple image segmentation method for semantic object spatial segmentation.First,the image is filtered using contour-preserving filters.Then it is quasi-flat labeled.The small regions near the contour are classified as uncertain regions and are eliminated by region growing and merging.Further region merging is used to reduce the region number.The simulation results show its efficiency and simplicity,It can preserve the semantic object shape while emphasize on the perceptual complex part of the object.So it conforms to the humann visual perception very well. 相似文献
4.
基于本体的信息检索技术能够提高在复杂环境中的信息检索效率,而语义相似度计算是基于本体的信息检索技术的关键技术。在医疗领域本体的基础上,通过分析讨论了概念间的语义相似度与相关度,并对概念间的语义相似度与相关度的影响因素进行研究,提出了一种计算医疗概念间的语义相似度及相关度的数值,并得到两者综合值的计算模型。实验结果表明,该模型能够提高相似度数值的有效性,并通过对相似度数值的计算体现出医疗领域概念间的复杂关系。 相似文献
5.
6.
《Communications Magazine, IEEE》2006,44(9):62-71
7.
基因本体是一个被广泛使用的生物数据资源,主要用于描述基因和基因产物的属性,包括分子功能、生物过程和细胞组件三个方面.基于基因本体的术语相似度及基因功能相似度计算对基因功能分析、比较和预测等生物学研究热门领域具有非常重要的意义.本文综述了基于基因本体的语义相似度算法,主要包括基因本体同一分支中的术语相似度计算法和基因本体跨分支术语相似度算法两大部分内容,并对这些方法的优缺点做了一定的分析总结. 相似文献
8.
9.
基于语义检索的目的,结合成语典故本体的构建,设计了一个基于成语典故本体的语义检索模型,阐述了检索模型中用户界面模块、数据存储模块、查询分析模块和检索分析模块的功能;分析了系统中的本体构建技术、分词技术及检索技术,设计并实现了词语相似度及概念相似度算法;通过语义检索系统的实验,得到较高的查全率和查准率. 相似文献
10.
《Signal Processing: Image Communication》2002,17(2):145-164
Automatic semantic video object extraction is an important step for providing content-based video coding, indexing and retrieval. However, it is very difficult to design a generic semantic video object extraction technique, which can provide variant semantic video objects by using the same function. Since the presence and absence of persons in an image sequence provide important clues about video content, automatic face detection and human being generation are very attractive for content-based video database applications. For this reason, we propose a novel face detection and semantic human object generation algorithm. The homogeneous image regions with accurate boundaries are first obtained by integrating the results of color edge detection and region growing procedures. The human faces are detected from these homogeneous image regions by using skin color segmentation and facial filters. These detected faces are then used as object seed for semantic human object generation. The correspondences of the detected faces and semantic human objects along time axis are further exploited by a contour-based temporal tracking procedure. 相似文献
11.
12.
13.
Fummi F. Sciuto D. Silvano C. 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》1998,6(3):502-506
This paper proposes a methodology, implemented in a tool, to automatically generate the main classes of error control codes (ECC's) widely applied in computer memory systems to increase reliability and data integrity. New code construction techniques extending the features of previous single error correcting (SEC)-double error detecting (DED)-single byte error detecting (SBD) codes have been integrated in the tool. The proposed techniques construct systematic odd-weight-column SEC-DED-SBD codes with odd-bit-per-byte error correcting (OBC) capabilities to enhance reliability in high speed memory systems organized as multiple-bit-per-chip or card 相似文献
14.
A method to automatically create low order state-space models for magnetic devices is set forth. The method begins with geometrical and materials data from which the finite element analysis (FEA) is used to build a high order state-space model. It is shown that this model contains far more state variables than are necessary to achieve the nearly the same results in the frequency band of interest. It is shown that the full-order model can be reduced methodically without additional physical assumptions. The reduction method is applicable directly to magnetically linear systems, but applies to a wide range of power electronics applications and can be a basis for future nonlinear device modeling. The method reduced an example inductor model from 882 state variables to two. To confirm correct model derivation, the full-order model is checked against and agrees with experimental data to the extent that the FEA and materials data are accurate. The reduced-order model agrees very well with the full-order model, particularly in computing impedance. 相似文献
15.
16.
Zarrineh K. Upadhyaya S.J. Chakravarty S. 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》2001,9(6):845-857
Given a set of memory array faults, the problem of computing a compact March test that detects all specified memory array faults is addressed. In this paper, we propose a novel approach in which every memory array fault is modeled by a set of primitive memory faults. A primitive March test is defined for each primitive memory fault. We show that March tests that detect the specified memory array faults are composed of primitive March tests. A method to compact the March tests for the specified memory array faults is described. A set of examples to illustrate the approach is presented. Experimental results demonstrate the productivity gained using the proposed framework 相似文献
17.
《Digital Communications & Networks》2020,6(1):38-50
The long awaited cloud computing concept is a reality now due to the transformation of computer generations. However, security challenges have become the biggest obstacles for the advancement of this emerging technology. A well-established policy framework is defined in this paper to generate security policies which are compliant to requirements and capabilities. Moreover, a federated policy management schema is introduced based on the policy definition framework and a multi-level policy application to create and manage virtual clusters with identical or common security levels. The proposed model consists in the design of a well-established ontology according to security mechanisms, a procedure which classifies nodes with common policies into virtual clusters, a policy engine to enhance the process of mapping requests to a specific node as well as an associated cluster and matchmaker engine to eliminate inessential mapping processes. The suggested model has been evaluated according to performance and security parameters to prove the efficiency and reliability of this multi-layered engine in cloud computing environments during policy definition, application and mapping procedures. 相似文献
18.
Automatic generation of object recognition programs 总被引:1,自引:0,他引:1
Ikeuchi K. Kanade T. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1988,76(8):1016-1035
Issues and techniques are discussed to automatically compile object and sensor models into a visual recognition strategy for recognizing and locating an object in three-dimensional space from visual data. Automatic generation of recognition programs by compilation, in an attempt to automate this process, is described. An object model describes geometric and photometric properties of an object to be recognized. A sensor model specifies the sensor characteristics in predicting object appearances and variations of feature values. It is emphasized that the sensors, as well as objects, must be explicitly modeled to achieve the goal of automatic generation of reliable and efficient recognition programs. Actual creation of interpretation trees for two objects and their execution for recognition from a bin of parts are demonstrated 相似文献
19.
20.
The arrival of fourth generation mobile networks, based on IP core networks, lead us to the development of certain services, such as: Quality of service, mobility and AAA. This paper proposes architecture to supply quality of service support based in the differentiated services technique, known as Diffserv. In the same way we analyze the main components of this architecture: QoS Broker (central policy broker of quality of service, whose goal is the appropriate configuration of the routers in the network), Access Router (in charge of the management of the queuing system in order to provide QoS) and the AAA server (management of QoS user profiles). 相似文献