期刊文献+
共找到1,086篇文章
< 1 2 55 >
每页显示 20 50 100
A Review on the Application of Deep Learning Methods in Detection and Identification of Rice Diseases and Pests
1
作者 Xiaozhong Yu Jinhua Zheng 《Computers, Materials & Continua》 SCIE EI 2024年第1期197-225,共29页
In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the s... In rice production,the prevention and management of pests and diseases have always received special attention.Traditional methods require human experts,which is costly and time-consuming.Due to the complexity of the structure of rice diseases and pests,quickly and reliably recognizing and locating them is difficult.Recently,deep learning technology has been employed to detect and identify rice diseases and pests.This paper introduces common publicly available datasets;summarizes the applications on rice diseases and pests from the aspects of image recognition,object detection,image segmentation,attention mechanism,and few-shot learning methods according to the network structure differences;and compares the performances of existing studies.Finally,the current issues and challenges are explored fromthe perspective of data acquisition,data processing,and application,providing possible solutions and suggestions.This study aims to review various DL models and provide improved insight into DL techniques and their cutting-edge progress in the prevention and management of rice diseases and pests. 展开更多
关键词 Deep learning rice diseases and pests image recognition object detection
下载PDF
Application of improved virtual sample and sparse representation in face recognition 被引量:1
2
作者 Yongjun Zhang Zewei Wang +4 位作者 Xuexue Zhang Zhongwei Cui Bob Zhang Jinrong Cui Lamin LJanneh 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1391-1402,共12页
Sparse representation plays an important role in the research of face recognition.As a deformable sample classification task,face recognition is often used to test the performance of classification algorithms.In face ... Sparse representation plays an important role in the research of face recognition.As a deformable sample classification task,face recognition is often used to test the performance of classification algorithms.In face recognition,differences in expression,angle,posture,and lighting conditions have become key factors that affect recognition accuracy.Essentially,there may be significant differences between different image samples of the same face,which makes image classification very difficult.Therefore,how to build a robust virtual image representation becomes a vital issue.To solve the above problems,this paper proposes a novel image classification algorithm.First,to better retain the global features and contour information of the original sample,the algorithm uses an improved non‐linear image representation method to highlight the low‐intensity and high‐intensity pixels of the original training sample,thus generating a virtual sample.Second,by the principle of sparse representation,the linear expression coefficients of the original sample and the virtual sample can be calculated,respectively.After obtaining these two types of coefficients,calculate the distances between the original sample and the test sample and the distance between the virtual sample and the test sample.These two distances are converted into distance scores.Finally,a simple and effective weight fusion scheme is adopted to fuse the classification scores of the original image and the virtual image.The fused score will determine the final classification result.The experimental results show that the proposed method outperforms other typical sparse representation classification methods. 展开更多
关键词 REPRESENTATION SAMPLE IMAGE
下载PDF
Single Image Desnow Based on Vision Transformer and Conditional Generative Adversarial Network for Internet of Vehicles
3
作者 Bingcai Wei Di Wang +1 位作者 Zhuang Wang Liye Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第11期1975-1988,共14页
With the increasing popularity of artificial intelligence applications,machine learning is also playing an increasingly important role in the Internet of Things(IoT)and the Internet of Vehicles(IoV).As an essential pa... With the increasing popularity of artificial intelligence applications,machine learning is also playing an increasingly important role in the Internet of Things(IoT)and the Internet of Vehicles(IoV).As an essential part of the IoV,smart transportation relies heavily on information obtained from images.However,inclement weather,such as snowy weather,negatively impacts the process and can hinder the regular operation of imaging equipment and the acquisition of conventional image information.Not only that,but the snow also makes intelligent transportation systems make the wrong judgment of road conditions and the entire system of the Internet of Vehicles adverse.This paper describes the single image snowremoval task and the use of a vision transformer to generate adversarial networks.The residual structure is used in the algorithm,and the Transformer structure is used in the network structure of the generator in the generative adversarial networks,which improves the accuracy of the snow removal task.Moreover,the vision transformer has good scalability and versatility for larger models and has a more vital fitting ability than the previously popular convolutional neural networks.The Snow100K dataset is used for training,testing and comparison,and the peak signal-to-noise ratio and structural similarity are used as evaluation indicators.The experimental results show that the improved snow removal algorithm performs well and can obtain high-quality snow removal images. 展开更多
关键词 Artificial intelligence Internet of Things vision transformer deep learning image desnow
下载PDF
A Survey of Web Information Technology and Application 被引量:1
4
作者 MENG Xiao-feng XU Bao-wen +4 位作者 LIU Qing YU Ge SHEN Jun-yi LU Zheng-ding HE Yan-xiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第1期1-5,共5页
关键词 WEB 信息技术 信息系统 计算机网络
下载PDF
A Time Series Short-Term Prediction Method Based on Multi-Granularity Event Matching and Alignment
5
作者 Haibo Li Yongbo Yu +1 位作者 Zhenbo Zhao Xiaokang Tang 《Computers, Materials & Continua》 SCIE EI 2024年第1期653-676,共24页
Accurate forecasting of time series is crucial across various domains.Many prediction tasks rely on effectively segmenting,matching,and time series data alignment.For instance,regardless of time series with the same g... Accurate forecasting of time series is crucial across various domains.Many prediction tasks rely on effectively segmenting,matching,and time series data alignment.For instance,regardless of time series with the same granularity,segmenting them into different granularity events can effectively mitigate the impact of varying time scales on prediction accuracy.However,these events of varying granularity frequently intersect with each other,which may possess unequal durations.Even minor differences can result in significant errors when matching time series with future trends.Besides,directly using matched events but unaligned events as state vectors in machine learning-based prediction models can lead to insufficient prediction accuracy.Therefore,this paper proposes a short-term forecasting method for time series based on a multi-granularity event,MGE-SP(multi-granularity event-based short-termprediction).First,amethodological framework for MGE-SP established guides the implementation steps.The framework consists of three key steps,including multi-granularity event matching based on the LTF(latest time first)strategy,multi-granularity event alignment using a piecewise aggregate approximation based on the compression ratio,and a short-term prediction model based on XGBoost.The data from a nationwide online car-hailing service in China ensures the method’s reliability.The average RMSE(root mean square error)and MAE(mean absolute error)of the proposed method are 3.204 and 2.360,lower than the respective values of 4.056 and 3.101 obtained using theARIMA(autoregressive integratedmoving average)method,as well as the values of 4.278 and 2.994 obtained using k-means-SVR(support vector regression)method.The other experiment is conducted on stock data froma public data set.The proposed method achieved an average RMSE and MAE of 0.836 and 0.696,lower than the respective values of 1.019 and 0.844 obtained using the ARIMA method,as well as the values of 1.350 and 1.172 obtained using the k-means-SVR method. 展开更多
关键词 Time series short-term prediction multi-granularity event ALIGNMENT event matching
下载PDF
Improved simulation of winter wheat yield in North China Plain by using PRYM-Wheat integrated dry matter distribution coefficient
6
作者 Xuan Li Shaowen Wang +6 位作者 Yifan Chen Danwen Zhang Shanshan Yang Jingwen Wang Jiahua Zhang Yun Bai Sha Zhang 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第4期1381-1392,共12页
The accurate simulation of regional-scale winter wheat yield is important for national food security and the balance of grain supply and demand in China.Presently,most remote sensing process models use the“biomass... The accurate simulation of regional-scale winter wheat yield is important for national food security and the balance of grain supply and demand in China.Presently,most remote sensing process models use the“biomass×harvest index(HI)”method to simulate regional-scale winter wheat yield.However,spatiotemporal differences in HI contribute to inaccuracies in yield simulation at the regional scale.Time-series dry matter partition coefficients(Fr)can dynamically reflect the dry matter partition of winter wheat.In this study,Fr equations were fitted for each organ of winter wheat using site-scale data.These equations were then coupled into a process-based and remote sensingdriven crop yield model for wheat(PRYM-Wheat)to improve the regional simulation of winter wheat yield over the North China Plain(NCP).The improved PRYM-Wheat model integrated with the fitted Fr equations(PRYM-Wheat-Fr)was validated using data obtained from provincial yearbooks.A 3-year(2000-2002)averaged validation showed that PRYM-Wheat-Fr had a higher coefficient of determination(R^(2)=0.55)and lower root mean square error(RMSE=0.94 t ha^(-1))than PRYM-Wheat with a stable HI(abbreviated as PRYM-Wheat-HI),which had R^(2) and RMSE values of 0.30 and 1.62 t ha^(-1),respectively.The PRYM-Wheat-Fr model also performed better than PRYM-Wheat-HI for simulating yield in verification years(2013-2015).In conclusion,the PRYM-Wheat-Fr model exhibited a better accuracy than the original PRYM-Wheat model,making it a useful tool for the simulation of regional winter wheat yield. 展开更多
关键词 dry matter partition remote sensing model winter wheat yield North China Plain
下载PDF
Fuzzing:Progress,Challenges,and Perspectives
7
作者 Zhenhua Yu Zhengqi Liu +2 位作者 Xuya Cong Xiaobo Li Li Yin 《Computers, Materials & Continua》 SCIE EI 2024年第1期1-29,共29页
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target progr... As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the system.In recent years,considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing,so there aremore and more methods and forms,whichmake it difficult to have a comprehensive understanding of the technique.This paper conducts a thorough survey of fuzzing,focusing on its general process,classification,common application scenarios,and some state-of-the-art techniques that have been introduced to improve its performance.Finally,this paper puts forward key research challenges and proposes possible future research directions that may provide new insights for researchers. 展开更多
关键词 FUZZING VULNERABILITY software testing software security
下载PDF
Identification of Important FPGA Modules Based on Complex Network
8
作者 Senjie Zhang Jinbo Wang +3 位作者 Shan Zhou Jingpei Wang Zhenyong Zhang Ruixue Wang 《Computers, Materials & Continua》 SCIE EI 2024年第1期1027-1047,共21页
The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,exi... The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,existing defense or detection approaches often require additional circuitry to perform security verification,and are thus constrained by time and resource limitations.Considering the scale of actual engineering tasks and tight project schedules,it is usually difficult to implement designs for all modules in field programmable gate array(FPGA)circuits.Some studies have pointed out that the failure of key modules tends to cause greater damage to the network.Therefore,under limited conditions,priority protection designs need to be made on key modules to improve protection efficiency.We have conducted research on FPGA designs including single FPGA systems and multi-FPGA systems,to identify key modules in FPGA systems.For the single FPGA designs,considering the topological structure,network characteristics,and directionality of FPGA designs,we propose a node importance evaluationmethod based on the technique for order preference by similarity to an ideal solution(TOPSIS)method.Then,for the multi-FPGA designs,considering the influence of nodes in intra-layer and inter-layers,they are constructed into the interdependent network,and we propose a method based on connection strength to identify the important modules.Finally,we conduct empirical research using actual FPGA designs as examples.The results indicate that compared to other traditional indexes,node importance indexes proposed for different designs can better characterize the importance of nodes. 展开更多
关键词 Hardware security FPGA circuits node importance interdependent network
下载PDF
Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks
9
作者 Shiyan Zhang Ruohan Xu +3 位作者 Zhangbo Xu Cenhua Yu Yuyang Jiang Yuting Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第2期2287-2308,共22页
The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections an... The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections and convergence.In this paper,with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness,this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration.Due to the conflict between the utility of different flows,the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions.Regarding the tradeoff between fairness and utility,this paper deals with the corresponding reward functions for the cases where the flows undergo abrupt changes and smooth changes in the flows.In addition,to accommodate the Quality of Service(QoS)requirements for multiple types of flows,this paper proposes a multi-domain autonomous routing algorithm called LSTM+MADDPG.Introducing a Long Short-Term Memory(LSTM)layer in the actor and critic networks,more information about temporal continuity is added,further enhancing the adaptive ability changes in the dynamic network environment.The LSTM+MADDPG algorithm is compared with the latest reinforcement learning algorithm by conducting experiments on real network topology and traffic traces,and the experimental results show that LSTM+MADDPG improves the delay convergence speed by 14.6%and delays the start moment of packet loss by 18.2%compared with other algorithms. 展开更多
关键词 MULTI-DOMAIN data center networks AUTONOMOUS ROUTING
下载PDF
Coverage of communication-based sensor nodes deployed location and energy efficient clustering algorithm in WSN 被引量:6
10
作者 Xiang Gao Yintang Yang Duan Zhou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第4期698-704,共7页
An effective algorithm based on signal coverage of effective communication and local energy-consumption saving strategy is proposed for the application in wireless sensor networks.This algorithm consists of two sub-al... An effective algorithm based on signal coverage of effective communication and local energy-consumption saving strategy is proposed for the application in wireless sensor networks.This algorithm consists of two sub-algorithms.One is the multi-hop partition subspaces clustering algorithm for ensuring local energybalanced consumption ascribed to the deployment from another algorithm of distributed locating deployment based on efficient communication coverage probability(DLD-ECCP).DLD-ECCP makes use of the characteristics of Markov chain and probabilistic optimization to obtain the optimum topology and number of sensor nodes.Through simulation,the relative data demonstrate the advantages of the proposed approaches on saving hardware resources and energy consumption of networks. 展开更多
关键词 无线传感器网络 聚类算法 传感器节点 覆盖概率 高效节能 部署 基础 位置
下载PDF
Seepage law and permeability calculation of coal gas based on Klinkenberg effect 被引量:6
11
作者 王登科 魏建平 +2 位作者 付启超 刘勇 夏玉玲 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第5期1973-1978,共6页
Focused on the Klinkenberg effect on gas seepage, the independently developed triaxial experimental system of gas seepage was applied to conduct research on the seepage characteristics of coal seam gas. By means of ex... Focused on the Klinkenberg effect on gas seepage, the independently developed triaxial experimental system of gas seepage was applied to conduct research on the seepage characteristics of coal seam gas. By means of experimental data analysis and theoretical derivation, a calculation method of coal seam gas permeability was proposed, which synthesized the respective influences of gas dynamic viscosity, compressibility factor and Klinkenberg effect. The study results show that the Klinkenberg effect has a significant influence on the coal seam gas seepage, the permeability estimated with the method considering the Klinkenberg effect is correct, and this permeability can fully reflect the true seepage state of the gas. For the gas around the standard conditions, the influences of dynamic viscosity and compressibility factor on the permeability may be ignored. For the gas deviating far away from the standard conditions, the influences of dynamic viscosity and compressibility factor on the permeability must be considered. The research results have certain guiding significance in forming a correct understanding of the Klinkenberg effect and selecting a more accurate calculation method for the permeability of coal containing gas. 展开更多
关键词 coalbed gas seepage law Klinkenberg effect gas adsorption-desorption PERMEABILITY
下载PDF
Systematic analyses of glutamine and glutamate metabolisms across different cancer types 被引量:5
12
作者 Yuan Tian Wei Du +4 位作者 Sha Cao Yue Wu Ning Dong Yan Wang Ying Xu 《Chinese Journal of Cancer》 SCIE CAS CSCD 2017年第12期712-725,共14页
Background: Glutamine and glutamate are known to play important roles in cancer biology. However, no detailed information is available in terms of their levels of involvement in various biological processes across dif... Background: Glutamine and glutamate are known to play important roles in cancer biology. However, no detailed information is available in terms of their levels of involvement in various biological processes across different cancer types, whereas such knowledge could be critical for understanding the distinct characteristics of different cancer types. Our computational study aimed to examine the functional roles of glutamine and glutamate across different cancer types.Methods: We conducted a comparative analysis of gene expression data of cancer tissues versus normal control tissues of 11 cancer types to understand glutamine and glutamate metabolisms in cancer. Specifically, we developed a linear regression model to assess differential contributions by glutamine and/or glutamate to each of seven biological processes in cancer versus control tissues.Results: While our computational predictions were consistent with some of the previous observations, multiple novel predictions were made:(1) glutamine is generally not involved in purine synthesis in cancer except for breast cancer, and is similarly not involved in pyridine synthesis except for kidney cancer;(2) glutamine is generally not involved in ATP production in cancer;(3) glutamine's contribution to nucleotide synthesis is minimal if any in cancer;(4) glutamine is not involved in asparagine synthesis in cancer except for bladder and lung cancers; and(5) glutamate does not contribute to serine synthesis except for bladder cancer.Conclusions: We comprehensively predicted the roles of glutamine and glutamate metabolisms in selected metabolic pathways in cancer tissues versus control tissues, which may lead to novel approaches to therapeutic development targeted at glutamine and/or glutamate metabolism. However, our predictions need further functional validation. 展开更多
关键词 GLUTAMINE METABOLISM Glutamate METABOLISM Nucleotide SYNTHESIS Lipid SYNTHESIS URIDINE diphosphate N-ACETYLGLUCOSAMINE (UDP-GlcNAc) METABOLISM
下载PDF
Simulation and Field Testing of Multiple Vehicles Collision Avoidance Algorithms 被引量:6
13
作者 Chaoyue Zu Chao Yang +3 位作者 Jian Wang Wenbin Gao Dongpu Cao Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第4期1045-1063,共19页
A global planning algorithm for intelligent vehicles is designed based on the A* algorithm, which provides intelligent vehicles with a global path towards their destinations. A distributed real-time multiple vehicle c... A global planning algorithm for intelligent vehicles is designed based on the A* algorithm, which provides intelligent vehicles with a global path towards their destinations. A distributed real-time multiple vehicle collision avoidance(MVCA)algorithm is proposed by extending the reciprocal n-body collision avoidance method. MVCA enables the intelligent vehicles to choose their destinations and control inputs independently,without needing to negotiate with each other or with the coordinator. Compared to the centralized trajectory-planning algorithm, MVCA reduces computation costs and greatly improves the robustness of the system. Because the destination of each intelligent vehicle can be regarded as private, which can be protected by MVCA, at the same time MVCA can provide a real-time trajectory planning for intelligent vehicles. Therefore,MVCA can better improve the safety of intelligent vehicles. The simulation was conducted in MATLAB, including crossroads scene simulation and circular exchange position simulation. The results show that MVCA behaves safely and reliably. The effects of latency and packet loss on MVCA are also statistically investigated through theoretically formulating broadcasting process based on one-dimensional Markov chain. The results uncover that the tolerant delay should not exceed the half of deciding cycle of trajectory planning, and shortening the sending interval could alleviate the negative effects caused by the packet loss to an extent. The cases of short delay(< 100100 ms) and low packet loss(< 5%) can bring little influence to those trajectory planning algorithms that only depend on V2 V to sense the context, but the unpredictable collision may occur if the delay and packet loss are further worsened. The MVCA was also tested by a real intelligent vehicle, the test results prove the operability of MVCA. 展开更多
关键词 Collision avoidance intelligent vehicles intervehicle communication SIMULATION TESTING trajectory planning
下载PDF
MULTI-RESOLUTION MOTION ESTIMATION AND COMPENSATION BASED ON ADJACENT PREDICTION OF FRAME DIFFERENCE IN WAVELET DOMAIN 被引量:3
14
作者 Tang Guowei Gu Guochang 《Journal of Electronics(China)》 2009年第3期412-416,共5页
Aiming at the higher bit-rate occupation of motion vector encoding and more time load of full-searching strategies, a multi-resolution motion estimation and compensation algorithm based on adjacent prediction of frame... Aiming at the higher bit-rate occupation of motion vector encoding and more time load of full-searching strategies, a multi-resolution motion estimation and compensation algorithm based on adjacent prediction of frame difference was proposed.Differential motion detection was employed to image sequences and proper threshold was adopted to identify the connected region.Then the motion region was extracted to carry out motion estimation and motion compensation on it.The experiment results show that the encoding efficiency of motion vector is promoted, the complexity of motion estimation is reduced and the quality of the reconstruction image at the same bit-rate as Multi-Resolution Motion Estimation(MRME) is improved. 展开更多
关键词 运动估计 多分辨率 补偿算法 预测 帧差 小波域 矢量编码 运动检测
下载PDF
Least Privileges and Role’s Inheritance of RBAC 被引量:3
15
作者 HAN Lan-sheng HONG Fan Asiedu Baffour Kojo 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期185-187,共3页
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles’ inheritance. But for there remains a lack of specific definition and the necessary formalizati... The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles’ inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and data closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles’ inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools. 展开更多
关键词 存取控制 最小特权 安全法则 任务继承
下载PDF
Trust Degree of Web Services and Its Evaluation with Neural Network 被引量:2
16
作者 HUANG Baohua HU Heping LU Zhengding YAO Hanbing LI Ruixuan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1302-1305,共4页
The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the... The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the method, applicable neural network structure, neural network constructing, input standardization, training sample constructing, and the procedure of evaluating trust degree of Web services with trained neural network are described. Experiments show that it is feasible and effective to evaluate trust degree of Web Service with neural network. 展开更多
关键词 WEB服务器 信任度 神经网络 信用评估
下载PDF
Ultrasonic Scattered Field Distribution of One and Two Cylindrical Solids with Phased Array Technique 被引量:2
17
作者 Xiaozhou Liu Jian Ma +3 位作者 Haibin Wang Sha Gao Yifeng Li Jiehui Liu 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2019年第6期101-112,共12页
The scattered fields of plane waves in a solid from a cylinder or sphere are critical in determining its acoustic characteristics as well as in engineering applications. This paper investigates the scattered field dis... The scattered fields of plane waves in a solid from a cylinder or sphere are critical in determining its acoustic characteristics as well as in engineering applications. This paper investigates the scattered field distributions of different incident waves created by elastic cylinders embedded in an elastic isotropic medium. Scattered waves, including longitudinal and transverse waves both inside and outside the cylinder, are described with specific modalities under an incident plane wave. A model with a scatterer embedded in a structural steel matrix and filled with aluminum is developed for comparison with the theoretical solution. The frequency of the plane wave ranged from 235 kHz to 2348 kHz, which corresponds to scaling factors from 0.5 to 5. Scattered field distributions in matrix materials blocked by an elastic cylindrical solid have been obtained by simulation or calculated using existing parameters. The simulation results are in good agreement with the theoretical solution, which supports the correctness of the simulation analysis. Furthermore, ultrasonic phased arrays are used to study scattered fields by changing the characteristics of the incident wave. On this foundation, a partial preliminary study of the scattered field distribution of double cylinders in a solid has been carried out, and the scattered field distribution at a given distance has been found to exhibit particular behaviors at different moments. Further studies on directivities and scattered fields are expected to improve the quantification of scattered images in isotropic solid materials by the phased array technique. 展开更多
关键词 Ultrasonic phased array Scattered field distribution DIRECTIVITY Quantification of scattered image
下载PDF
Construction and Resource Locating of Semantic P2P Grid Based on Description Logics 被引量:1
18
作者 SUN Xiao-lin LU Zheng-ding LI Yu-hua WEN Kun-mei Li Rui-xuan 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期78-82,共5页
This paper proposes an algorithm applied in semantic P2P network based on the description logics with the purpose for realizing the concepts distribution of resources, which makes the resources semantic locating easy.... This paper proposes an algorithm applied in semantic P2P network based on the description logics with the purpose for realizing the concepts distribution of resources, which makes the resources semantic locating easy. With the idea of the consistent hashing in the Chord, our algorithm stores the addresses and resources with the values of the same type to select instance. In addition, each peer has its own ontology, which will be completed by the knowledge distributed over the network during the exchange of CHGs (classification hierarchy graphs). The hierarchy classification of concepts allows to find matching resource by querying to the upper level concept because the all concepts described in the CHG have the same 展开更多
关键词 语义WEB 存在论 P2P栅格 描述逻辑 分层次图表
下载PDF
A Cooperative Schema between Web Sever and Search Engine for Improving Freshness of Web Repository 被引量:1
19
作者 WEN Kun-mei LU Zheng-ding LI Yu-hua SUN Xiao-lin 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期11-14,共4页
Because the web is huge and web pages are updated frequently, the index maintained by a search engine has to refresh web pages periodically. This is extremely resource consuming because the search engine needs to craw... Because the web is huge and web pages are updated frequently, the index maintained by a search engine has to refresh web pages periodically. This is extremely resource consuming because the search engine needs to crawl the web and download web pages to refresh its index. Based on present technologies of web refreshing, we present a cooperative schema between web server and search engine for maintaining freshness of web repository. The web server provides meta-data defined through XML standard to describe web sites. Before updating the web page the crawler visits the meta-data files. If the meta-data indicates that the page is not modified, then the crawler will not update it. So this schema can save bandwidth resource. A primitive model based on the schema is implemented. The cost and efficiency of the schema are analyzed. 展开更多
关键词 Web服务 搜索引擎 合作计划 知识库
下载PDF
A Survey of Web Information Systems and Applications 被引量:1
20
作者 WANG Guoren XU Lizhe +4 位作者 XU Baowe YU Ge MENG Xiaofeng HE Yanxiang LI Ruixuan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1059-1064,共6页
WISA 2006 has received 581 submissions and has accepted 65 papers for publication of this issue. These papers are involved in 8 research areas, including Web Information Mining and Retrieval, Semantic Web and Intellig... WISA 2006 has received 581 submissions and has accepted 65 papers for publication of this issue. These papers are involved in 8 research areas, including Web Information Mining and Retrieval, Semantic Web and Intelligent Web, Web Data Management and Information Integration, Web Application Framework and Architecture, Web Information Security, Web Services and Workflow Models, Text Processing and Decision Support, and Grid and Networking Technology. This paper gives an introduction to previous WISA conferences and a survey on the papers to be published in this issue. 展开更多
关键词 WEB 信息系统 信息综合 信息安全 工作流模型
下载PDF
上一页 1 2 55 下一页 到第
使用帮助 返回顶部