首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 9 毫秒
1.
In this paper, cyclic codes are studied over some finite quaternion integer rings with respect to the quaternion Mannheim distance.  相似文献   

2.
由于无线链路易受到外界干扰,导致数据传输的误码率较高,从而使得数据包成功传输概率降低。而误码所造成的丢包会使无线链路上的TCP传输自动降速,从而对正常的TCP数据传输造成较大影响。针对上述问题,本文在802.11协议的MAC层提出了一种新的校验机制,采用动态分块校验的方法对数据包进行验证,并采用新的方法来计算重传次数。实验表明,本校验机制可以有效提高数据包成功传输概率,进而改善了无线链路上的TCP传输性能,同时保证了多个数据流传输的公平性和数据的正确性。  相似文献   

3.
在采用空时码的无线通信系统中,收发2端较差的路径会降低系统的性能.提出了多速率线性离散码(LDC),并对其进行了分析,给出了一种基于矩阵扩展方法的设计算法.多速率LDC是传统LDC和LDC-TAS的BER性能的折中.进而提出了一种性能优于传统LDC-A-TAS算法的多速率LDC自适应发送天线选择(A.TAS)算法.  相似文献   

4.
This paper presents a new method for the performance evaluation of bit decoding algorithms. The method is based on estimating the probability density function (pdf) of the bit log likelihood ratio (LLR) by using an exponential model. It is widely known that the pdf of the bit LLR is close to the normal density. The proposed approach takes advantage of this property to present an efficient algorithm for the pdf estimation. The moment matching method is combined with the maximum entropy principle to estimate the underlying parameters. We present a simple method for computing the probabilities of the point estimates for the estimated parameters, as well as for the bit error rate. The corresponding results are used to compute the number of samples that are required for a given precision of the estimated values. It is demonstrated that this method requires significantly fewer samples as compared to the conventional Monte-Carlo simulation.  相似文献   

5.
Similarity search with hashing has become one of the fundamental research topics in computer vision and multimedia. The current researches on semantic-preserving hashing mainly focus on exploring the semantic similarities between pointwise or pairwise samples in the visual space to generate discriminative hash codes. However, such learning schemes fail to explore the intrinsic latent features embedded in the high-dimensional feature space and they are difficult to capture the underlying topological structure of data, yielding low-quality hash codes for image retrieval. In this paper, we propose an ordinal-preserving latent graph hashing (OLGH) method, which derives the objective hash codes from the latent space and preserves the high-order locally topological structure of data into the learned hash codes. Specifically, we conceive a triplet constrained topology-preserving loss to uncover the ordinal-inferred local features in binary representation learning. By virtue of this, the learning system can implicitly capture the high-order similarities among samples during the feature learning process. Moreover, the well-designed latent subspace learning is built to acquire the noise-free latent features based on the sparse constrained supervised learning. As such, the latent under-explored characteristics of data are fully employed in subspace construction. Furthermore, the latent ordinal graph hashing is formulated by jointly exploiting latent space construction and ordinal graph learning. An efficient optimization algorithm is developed to solve the resulting problem to achieve the optimal solution. Extensive experiments conducted on diverse datasets show the effectiveness and superiority of the proposed method when compared to some advanced learning to hash algorithms for fast image retrieval. The source codes of this paper are available at https://github.com/DarrenZZhang/OLGH .  相似文献   

6.
企业知识资本评估新方法探析--标杆瞄准评估法   总被引:3,自引:0,他引:3  
本文在总结了企业知识资本评估方法的基础上,提出了一种全新的企业知识资本评估方法,即标杆瞄准评估法。该方法立足于企业之间的对比分析,更易于企业的应用。  相似文献   

7.
This paper presents a size reduction method for the inverted file, the most suitable indexing structure for an information retrieval system (IRS). We notice that in an inverted file the document identifiers for a given word are usually clustered. While this clustering property can be used in reducing the size of the inverted file, good compression as well as fast decompression must both be available. In this paper, we present a method that can facilitate coding and decoding processes for interpolative coding using recursion elimination and loop unwinding. We call this method the unique-order interpolative coding. It can calculate the lower and upper bounds of every document identifier for a binary code without using a recursive process, hence the decompression time can be greatly reduced. Moreover, it also can exploit document identifier clustering to compress the inverted file efficiently. Compared with the other well-known compression methods, our method provides fast decoding speed and excellent compression. This method can also be used to support a self-indexing strategy. Therefore our research work in this paper provides a feasible way to build a fast and space-economical IRS.  相似文献   

8.
提出了一种新的相似视频快速检索方法.根据视频的时空分布统计得到图像特征码和视频单元,通过统计视频单元数量度量视频相似性.为了适应可扩展计算的需要,提出了基于聚类索引表的检索方法.通过对大规模数据库的查询测试证明该相似性检索算法快速有效.  相似文献   

9.
一种基于关键词的创新度评价方法   总被引:2,自引:1,他引:1  
本文提出基于关键词句频度及其他因素的文献创新度评价。这是一种基于语义的评价方法,可以促进某些学科总结出自己的关键词句词频表,便于用户更好地了解某个领域的发展态势。  相似文献   

10.
In this paper, the subspace identification based robust fault prediction method which combines optimal track control with adaptive neural network compensation is presented for prediction the fault of unknown nonlinear system. At first, the local approximate linear model based on input-output of unknown system is obtained by subspace identification. The optimal track control is adopted for the approximate model with some unknown uncertainties and external disturbances. An adaptive RBF neural network is added to the track control in order to guarantee the robust tracking ability of the observation system. The effect of the system nonlinearity and the error caused by subspace modeling can be overcome by adaptive tuning of the weights of the RBF neural network online without any requisition of constraint or matching conditions. The stability of the designed closed-loop system is thus proved. A density function estimation method based on state forecasting is then used to judge the fault. The proposed method is applied to fault prediction of model-unknown fighter F-8II of China airforce and the simulation results show that the proposed method can not only predict the fault, but has strong robustness against uncertainties and external disturbances.  相似文献   

11.
The electro-optic crystal holds great promise for extensive applications in optoelectronics and optical communication. However, the discovery of novel electro-optic crystals is sporadic due to the difficulties of large-sized crystal growth for electro-optic coefficient measurement. Herein, to address this issue, a high-efficacy evaluation method using accessible powder samples is proposed in which the second-harmonic-generation effect, infrared reflectance spectrum and Raman spectrum are introduced to predict the magnitude of the electro-optic coefficient. The calculated electro-optic coefficients of numerous reported electro-optic crystals through this approach give universal agreement to the experimental values, evidencing the validity of the strategy. Based on this method, CsLiMoO4 is screened as a novel potential electro-optic crystal and a high-quality crystal is grown by the Czochralski technique for electro-optic coefficient measurement using the half-wave voltage method, the result of which is also comparable to the calculated value. Consequently, the evaluation strategy presented here will pave a new way to explore promising electro-optic crystals efficiently.  相似文献   

12.
提出了一种快速干涉滤波算法,解决了传统干涉滤波方法速度较慢的问题.首先对2天线的单视复图像共轭相乘产生干涉复数据,进而对该数据进行方位向多视处理,并对实部和虚部分别快速均值滤波产生干涉条纹,最后对干涉条纹进行快速准中值和均值滤波.在滤波过程中,充分利用了相邻像素滤波时的窗口信息来最大程度减少运算量进而提高滤波速度,保证了滤波质量.通过对实测数据滤波结果的分析比较,证明了该算法的有效性.  相似文献   

13.
针对现有电子商务质量评估中存在的问题,提出了将静态质量概念模型与贝叶斯网络相结合的电子商务质量动态评估方法。并通过数据仿真建立了电子商务质量模型实例,对贝叶斯网络在B2C电子商务质量动态评估中的应用进行了探讨;最后将该评估方法与BP神经网络、决策树模型的评估结果进行比较,验证了使用该动态评估方法进行质量评估的准确性和优越性。  相似文献   

14.
The calculation of critical buckling loads of planar curved bars, subjected to a general co-planar continuous external load (or a general co-planar terminal loading), leads to the solution of transcendental (nonlinear) equations. In this investigation a new method for the closed-form solution of such types of equations is presented. In particular, the transcendental equation u tan γ cot uγ = 1, corresponding to the buckling problem of a cantilever circular bar of high curvature loaded by two co-planar forces acting along its chord, is solved in a closed-form. Finally, several numerical results are presented, based on the Gauss integration rule.  相似文献   

15.
银行系统风险评估方法研究   总被引:7,自引:0,他引:7  
陈耀辉 《科研管理》2003,24(2):16-20
考虑银行系统风险评估的复杂性,以模糊综合评价法为基本出发点,通过选择几个主观权和若干个客观权得到一个最优组合赋权模型,同时提出了最优组合赋权的模糊综合评价模型。在银行系统风险的评价中,利用该模型既可以考虑政策、经验等主观因素的影响,又可以充分利用客观数据所带来的信息,使评价结果既符合客观实际又符合主观要求,从而达到有效地防范和控制金融风险的目的。  相似文献   

16.
基于贝叶斯网络的脆弱性状态评估方法   总被引:1,自引:0,他引:1  
对网络安全性的量化评估问题是目前网络安全领域的研究热点之一。通过对现有的网络安全模型及量化分析方法的研究和比较,针对影响网络安全性的各项因素的全面脆弱性评估,提出了网络可靠度、脆弱点关键度、脆弱性状态图最低阶最小路集和最低阶最小割集4个具体的评估指标,将基于贝叶斯网络的计算方法引入脆弱性评估中,提出了量化评估计算方法。在此基础上构建了网络实例,使用SPIN验证工具对网络攻击进行模拟并对提出的评估指标及算法进行了分析验证。实验结果表明,文中提出的算法和评估指标集能够正确地量化反映网络的安全状态。  相似文献   

17.
企业创新界面有效性状态的评价方法研究   总被引:2,自引:0,他引:2  
本文运用和谐理论及和谐分析矩阵,从界面和谐态的角度分析了影响企业创新界面状态有效性的四个主要因素,建立了企业创新界面有效性状态测度模型,;最后对陕西省Q公司的界面状态有效性(和谐性)问题进行案例研究。  相似文献   

18.
The Community of Practice (CoP) within an organization is a practical way to manage knowledge as systematically as other critical assets to deploy and share it. The availability of the right information at the right time based on performance evaluations is critical. However, there have been few attempts to identify Critical Success Factor (CSFs) based on evaluations to foster knowledge sharing activities in CoPs. Therefore, we developed not only a holistic and systematic method to understand and assess the current state of the CoP but also a method to extract the main CSFs of the CoP based on a performance evaluation. A method for the elementary expression of performance measures and the global performance expression of strategies and CSF was developed using a desirability function to provide information useful in grasping the whole picture of the CoP. The relative importance of strategy and CSFs was extracted based on the cause and effect relationships within the Balanced Scorecard using the Analytic Network Process. In addition, an Importance–Performance Analysis (IPA) is applied based on the relative importance and global performance expression of the CSFs.  相似文献   

19.
科技文献是科学研究的基础,展示文献中主题的演化过程有助于科研人员把握研究的脉络。针对某领域的科技文献,以构建时序主题链的方式来展现主题随时间变化的事实。为此,提出了主题间转移概率的计算方法和时序主题链的构建方法。实证研究选定国内管理科学领域三个核心期刊在2000-2011年间发表的4244篇论文进行实验,结果表明,时序主题链可以有效地展示主题随时间变化的过程,并能揭示主题演化过程中不同主题间的隐含关系。此外,通过分析时序主题链中的结构特征,还可揭示不同主题间的交叉融合特性。  相似文献   

20.
Selecting the correct method for routine analysis by ‘method evaluation’ is an important component of quality assurance. It is a step-wise procedure that evaluates various analytical parameters like accuracy, precision etc of the given method. Finally reference intervals are established for selected population. We evaluated an enzymatic method for serum creatinine. The results show that it is an acceptable method based on the above mentioned criteria.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号