首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
《水浒传》是独著还是合著、施耐庵和罗贯中是何关系一直存在争议。该文将其作者争议粗略归纳为施耐庵作、罗贯中作、施作罗续、罗作他续、施作罗改五种情况,以罗贯中的《平妖传》为参照,用假设检验、文本聚类、文本分类、波动风格计量等方法,结合对文本内容的分析,考察《水浒传》的写作风格,试图为其作者身份认定提供参考。结果显示,只有罗作他续的可能性大,即前70回为罗贯中所作,后由他人续写,其他四种情况可能性都较小。  相似文献   

2.
《Computers & Education》1998,31(3):329-347
The study examines the development of ICT capability by associate-trainees on a postgraduate certificate of education course. The course involves the promotion of ICT use during three classroom placements by in-school teacher-mentors. Data for the study were collected by a survey of mentors, four surveys of associate-trainees, and by the collation of associate-trainees' profiles. The study considers the perceived effects upon the trainees development of ICT capability by the course generally and the examples of ICT use provided by teacher-mentors in particular. The study indicates the beneficial effects upon the attitudes of trainees who observe ICT use by teacher-mentors on early school placements, and the coincidence of impoverished ICT use by teacher-mentors on early school placements with restricted use of ICT by associate-trainees on later placements.  相似文献   

3.
本文论述了Learning by Doing,Learning by Abstracting,Learning by Analogy,Learning byTeaching以及Learing by Simulating等教学模式。分析了其优点,并介绍了我们将其应用于嵌入式软件开发导论和系统结构等课程的效果。文中尤其强调了Learning by Abstracting的重要性。  相似文献   

4.
微信接警系统   总被引:1,自引:1,他引:0  
李莎  宋凯 《计算机系统应用》2015,24(10):276-280
本文提出了微信报警、省上统一接警与三台合一系统联动处警的综合解决方案, 并进行了系统模型研究及可行性实现验证. 微信报警与接警主要是借助微信APP公众号服务, 基于微信开放平台和移动网络通信技术实现, 而联动处警依靠消息推送并以事件触发方式实现. 微信报警简单易用, 易于被多数人接受, 是有效的报警方式.  相似文献   

5.
刘丹  金志刚  刘蕾 《计算机应用》2006,26(6):1311-1314
提出了Ad Hoc 网络上多路径传输流媒体的框架,在Ad Hoc 网络中多路径同时传输流媒体以提高吞吐量并减小传输延迟。在发送端,采用部分解压缩算法对图像进行自适应分割,并通过多径源路由(MSR)协议根据负载均衡算法选择多条路由传输被拆分的数据;在接收端对数据进行缓存、图像重建恢复、JPEG解压缩及实时显示。实验表明,流媒体多路径传输实现了较好的图像传输质量和实时性。  相似文献   

6.
采用面向对象程序设计方法对三维点云数据进行分析,研究以Visual C++6.0为开发平台利用图像法对激光扫描获取的城市建筑物点云数据进行组织的计算机实现方法。通过扫描关系确定点云数据中有效目标点的全局唯一索引值,将点云数据看作一幅深度图像,确定全局索引值对应的图像行列值,再利用该行列值计算每个点对应的法向量,分类和组织点云数据。实验结果表明,利用面向对象的图像处理技术可以方便、快捷地实现三维点云数据的加载和组织。  相似文献   

7.
A criterion is presented for the automatic selection of a sensor measurement aimed at observing the state of a system which is described both by discrete variables and by continuous ones. The criterion is based on the expected value of the entropy variation associated to the sensor observation. This criterion is then applied to object recognition and localization tasks, in which the observed system is characterized by the object class, represented by a discrete variable, and by the object pose, i.e., position and orientation, represented by a vector of continuous parameters. The proposed criterion also accounts for the information obtained in the case the observed object is missed by the measurement.  相似文献   

8.
左森  郭晓松  万敬  杨必武 《计算机工程》2007,33(10):175-177
针对两幅视差图像的拼接问题,提出了一种新算法,即利用Hessian仿射不变检测算子检测出特征区域,利用SIFT特征描述算子提取特征区域特征矢量,根据特征矢量的欧几里德距离来建立图像间的稀疏对应关系;由这些对应点稀疏地确定场景中的一些点,以这些点为顶点建立场景的三角面片近似,再据此将重叠区域重投影生成推扫式成像的中间部分图像。将中间部分推扫式成像图像和原左图像的左半部分以及原右图像的右半部分一起拼接生成大图像。利用实际图像进行的拼接实验表明该算法是一个有效的视差图像拼接算法。  相似文献   

9.
谢瑞  李钢  张仁斌 《计算机应用》2016,36(4):1151-1155
针对目前液晶显示器斑痕(LCD-Mura)缺陷背景抑制检测中重建的背景存在引入性噪声干扰和目标缺损的问题,提出一种基于奇异值分解(SVD)和最大熵的缺陷图像背景建模方法:通过SVD图像像素矩阵,求得奇异值序列;借助矩阵范式推导出图像分量与奇异值的对应关系,进而以图像各分量奇异值所占比率计算各分量的熵值,以此利用最大熵确定重建背景的有效奇异值;再由矩阵重构得到背景,并进一步提出关于背景重建效果评价的一般方法。相比双三次B样条曲线拟合方法,该方法将区域Mura的对比度最少提升0.59倍,提升线Mura对比度最多达到7.71倍;相比离散余弦变换(DCT)方法,该方法将点Mura的噪声最少降低33.8%,将线Mura噪声降低76.76%。仿真结果表明,该模型具有低噪、低损和高亮的优点,能够更为准确地构建出缺陷图像的背景信息。  相似文献   

10.
邓洪  龙昭华  杨令 《微计算机信息》2007,23(24):130-132
介绍一种基于多信道Ad Hoc网络的思想来实现无线分布式传感/控制网络(WDSCN)。网络节点硬件主要使用UBICOM公司的IP2022作为MCU、Nordic公司的nRF905作为射频芯片。软件以C语言和汇编语言编制,采用多层次结构设计。由于采用多信道的具有自动跳频功能的Ad Hoc网络,该WDSCN具有较强的抗干扰能力,具有较高的实用价值。  相似文献   

11.
由若干个多边形通过组合产生的具有多个连通域的多连通域图形识别问题是工程图纸识别与理解所要解决的重要问题。首先,通过建立包围多边形、连通多边形概念,完成对多连通域图形的表示;然后,依据最近距离、无遮挡、包含原则添加辅助线,实现三角划分,解决了包含连通的定位问题。在匹配过程中,首先通过匹配包围多边形实现多连通域图形的外轮廓定位;然后通过匹配连通多边形删除连通域,逐步收缩图形,实现图形匹配。应用此方法,解决了多连通域图形的旋转、缩放匹配问题,在汽车线束图纸识别中取得了良好的应用效果。  相似文献   

12.
本文提出一种基于时空混沌系统的图像加密算法。首先对明文图像进行Zigzag方式扫描置乱,再对置乱后的图像分块;然后用Logistic混沌系统生成的伪随机序列对其进行置乱,置乱结束后对其进行整数小波变换,利用基于耦合映像格子CML的混沌系统生成三个伪随机序列对低频小波系数进行置乱操作,同时对低频小波系数进行扩散,然后进行整数小波逆变换;最后再由基于CML的混沌系统生成两个伪随机序列对图像像素值进行扩散操作,得到最终的加密图像。经测试,该算法具有良好的加密性能,可以有效抵挡差分、明文等攻击。  相似文献   

13.
Measurement in many industrial and practical contexts is done by human judgement. These judgements group the possible measures into about seven categories, such as large, medium and small in relation to the expected average and range of the values. The number of categories used in judgement can be increased by allowing more time for judgement, by using multi-dimensional representations, by giving knowledge of results, and by providing a constant comparison value. The discriminating accuracy of judgement can be improved by reducing the range of values to be judged. The use of these judgements in scale reading and personal ratings is discussed.  相似文献   

14.
超空泡航行器稳定性分析及其非线性切换控制   总被引:1,自引:0,他引:1  
范辉  张宇文 《控制理论与应用》2009,26(11):1211-1217
超空泡航行器在航行过程中绝大部分被超空泡包裹,必然面临着航行器与空泡剧烈非线性作用力带来的稳定控制困难.针对超空泡航行器的控制问题,本文以Dzielski提出的航行器模型为研究对象.首先通过一系列系统变换使其成为线性系统环节和非线性环节反馈连接的形式,运用圆判据定理利用系统Nyquist曲线给出了系统绝对稳定的充分条件;而后结合工程实际,分析了极点约束对系统性能的影响,为进一步改善系统性能,提出了加入非线性激励来削弱系统固有非线性特性的切换控制策略.仿真结果表明,超空化航行器在极点约束情况下完全可以通过非线性切换控制达到系统对所有非线性特性的绝对稳定,且对于滑行力存在不确定性的情况切换控制依然有效.  相似文献   

15.
The Public Cryptography Study Group was created by the American Council on Education in the spring of 1980 to examine concerns expressed by the Director of NSA caused by the rapid growth of interest in cryptology as a means for the protection of data files. Written by a participant in the study, this paper discusses many of the issues that came before the committee, including the danger to security systems produced by inadvertent or malicious disclosure of weak points in the system which would render it ineffective. It concludes by summarizing the recommendations in the final report of the PCSG, and describes the implementation of the voluntary review procedure recently announced by the Director of NSA. The procedures are designed to decrease the danger to public, private and governmental national security, without impeding the growth of nongovernmental research.  相似文献   

16.
Abstract

Convective instability can be induced by unstable vertical temperature profiles and can be supported by the release of latent heat of water vapour provided by a large quantity of moisture in the air. It can also be released by the presence of gravity waves. Large amplitude gravity waves have been linked to the onset of convective storm systems. In this study, the vertical velocity of convection initiated by gravity waves was investigated. The study of Ardmore, Oklahoma, storms showed that weak convection was initiated by gravity waves having wave periods of 35 min and the convection was enhanced by gravity waves having wave periods of 20 min. Evidence for cloud formation, due to the condensation of water vapour through convection initiated by the gravity waves, was obtained from rapid-scan satellite imagery and radar summaries. In this particular case, the convective motion, initiated and supported by the gravity-wave-induced activity (excluding contributions made by other mechanisms), reached its maximum value about one hour before the production of the funnel clouds. In this study, we did not rule out the contributions made by other mechanisms, such as low-level convergence and others, toward the initiation of convection; however, our main purpose is to discuss the role of gravity waves in wave-induced convection contributing to the fractions of formation and development of severe convective storms.  相似文献   

17.
Two-way, two-tape automata were first considered in Rabin and Scott [1]. We show how surprisingly powerful these machines are by describing some programming techniques that can be implemented on them, and by proving, by means of these techniques, that there exists a universal two-symbol, two-way, two-tape automaton. We then argue that in contradiction to an assertion by Rabin and Scott, the class of sets of pairs of tapes definable by two-way, two-tape automata is not closed under most Boolean operations.This work was supported by the National Science Foundation under grant GJ-596.  相似文献   

18.
针对多指标综合评价问题中主客观权重相悖时客观权重淹没主观权重的问题,以G1法和客观赋权法为基础,提出了复合幂函数修正G1法的组合赋权模型。首先,建立指标体系并通过G1法确定各指标主观排序和主观初始向量;然后,利用客观赋权法计算各指标客观向量;其次,在不改变主观排序的情况下利用复合幂函数算出主客观结合的综合权重;最后,利用各指标标准化后的值和综合权重计算综合评价值。采用大众点评网的商户数据进行综合评价实验:该模型的均方根误差(RMSE)为3.891,均低于G1-熵权法的8.818和标准差修正G1法的4.752,且覆盖率优于两种对比方法;分别修改主观初始向量和主观排序进行对比实验,修改主观排序的均方根误差为5.430,高于修改主观初始向量的1.17。实验结果表明,该模型得到的评价值与大众点评网官方的评分的一致性较高,且该模型弱化了主观初值对评分结果的影响,体现了主观排序的基础作用。  相似文献   

19.
张弢  康缘  任帅  柳雨农 《计算机应用》2017,37(9):2581-2584
针对基于秘密信息置乱方法等类型的信息隐藏算法不可见性低和抗攻击性弱这一问题,提出了一种基于压缩感知和GHM多小波变换的信息隐藏算法。首先,将载体图像进行一次GHM多小波变换,再对所得到的中间能量区域进行一次小波变换得到HH分量,将HH分量进行奇异值分解;其次,将秘密图像进行小波变换,将得到的小波系数进行压缩感知得到观测矩阵,再对观测矩阵元素进行奇异值分解;最后,利用秘密图像的奇异值替换掉载体图像的奇异值来完成秘密信息的嵌入。实验结果表明,相比两种加密算法,算法不可见性(PSNR值)分别提高5.99%和22.11%;对低通滤波、椒盐噪声、高斯噪声、JPEG压缩等常见攻击具有良好的鲁棒性,相关系数(NC)平均增强了4.11%和11.53%。  相似文献   

20.
针对Shearlet收缩去噪引入的Gibbs伪影和"裂痕"现象,提出一种结合非局部自相似的Shearlet自适应收缩图像去噪方法.首先,对噪声图像进行多方向多尺度的Shearlet分解;然后,基于高斯比例混合(GSM)模型的Shearlet系数分布建模,利用贝叶斯最小二乘估计对Shearlet系数进行自适应收缩去噪,重构得到初始去噪图像;最后,利用非局域自相似模型对初始去噪图像进行滤波处理,得到最终的去噪图像.实验结果表明,所提方法在更好地保留边缘特征的同时,有效地去除噪声和收缩去噪引入的Gibbs伪影,该方法获得的峰值信噪比(PSNR)和结构自相似指标(SSIM)比基于非抽样剪切波变换(NSST)的硬阈值去噪方法提高1.41 dB和0.08;比非抽样Shearlet域GSM模型去噪方法提高1.04 dB和0.045;比基于三变量模型的剪切波去噪方法提高0.64 dB和0.025.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号