期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
A comparison of the effect of alendronate and You-Gui-Wan on osteoporosis in female rats with kidney-yang deficiency
1
作者 Mei-Mei Wu Xing-Peng He +8 位作者 Wan-Ting Wu Wen-Jie Lu Yan-Yang Mai Kun-Cai Xu Yao-Feng Zhi Hai-Xin Mo Jia-Di He Xin Zhang Peng-Fei Li 《Traditional Medicine Research》 2024年第6期31-41,共11页
Background:In traditional Chinese medicine,You-Gui-Wan(YGW)is typically used to treat osteoporosis associated with kidney-yang deficiency.However,there have been few mechanistic studies on the effectiveness of kidney-... Background:In traditional Chinese medicine,You-Gui-Wan(YGW)is typically used to treat osteoporosis associated with kidney-yang deficiency.However,there have been few mechanistic studies on the effectiveness of kidney-yang deficiency-type osteoporosis with YGW.To further clarify the role of YGW in the effect of osteoporosis with kidney-yang deficiency,the study analyzed the therapeutic advantages of YGW by comparing the therapeutic effects of YGW and alendronate(ALN)on osteoporosis with kidney-yang deficiency.Methods:SPF female SD rats were randomly divided into control,osteoporosis,osteoporosis with kidney-yang deficiency,osteoporosis with kidney-yang deficiency+YGW and osteoporosis with kidney-yang deficiency+ALN groups.Except for the control group,osteoporosis was induced by the removal of bilateral ovaries.After 12 weeks,rats with osteoporosis in the kidney-yang deficiency group had kidney-yang deficiency syndrome triggered by hydrocortisone for 14 days.Rats were treated with YGW or ALN for 12 weeks.The weights of rats were recorded.Hematoxylin-eosin staining staining was used to observe pathological changes in bone trabeculae,liver,spleen,and kidneys of rats.Depletion of the growth plate cartilage of rats in different groups was observed by safranine-O staining.The expression of osteoclast key indices(ACP)and osteoblast key indices(ALP)in the bone tissue of rats in the different groups was observed by immunohistochemical staining.The expression of bone resorption-related indicators(TRAP and NXT-1),bone formation-related indicators(BALP,BGP,and P1NP),and major indicators of kidney-yang deficiency(ACTH,T3,T4,cAMP,and cGMP)were observed using an ELISA detection kit.The expression levels of the main indices of liver function(ALT and AST)were detected in different groups.Results:The differences between the osteoporosis with kidney-yang deficiency group and osteoporosis group were that the weight of rats and the expression of ACTH,T3,T4,and cAMP decreased significantly,and the expression of cGMP increased in the osteoporosis with kidney-yang deficiency group.Moreover,both YGW and ALN effectively improved the symptoms of osteoporosis,including the injury of bone trabeculae and growth plates,as well as the expression of bone metabolism-related indicators.However,unlike ALN,YGW simultaneously ameliorated the expression of key indicators of kidney-yang deficiency and prevented weight loss in rats.In addition,YGW caused no obvious damage to the liver,spleen,or kidney,whereas ALN led to liver cirrhosis.Conclusion:The results reveal that YGW plays a crucial part in osteoporosis with kidney-yang deficiency,increases bone mineral density,and improves bone metabolism indicators,and is safe and efficient for the efficacy of osteoporosis with kidney-yang deficiency.YGW might have a better therapeutic effect on osteoporosis in patients with kidney-yang deficiency.Therefore,alendronate should be used cautiously in patients with osteoporosis and poor liver function. 展开更多
关键词 OSTEOPOROSIS kidney-yang deficiency You-Gui-Wan ALENDRONATE
下载PDF
Properties of Flare Events on M Stars from LAMOST Spectral Survey Based on Kepler and TESS Light Curves
2
作者 Gang Meng Li-Yun Zhang +7 位作者 Tianhao Su Zilu Yang Xianming LHan Prabhakar Misra Liu Long Qingfeng Pi Zhongzhong Zhu Linyan Jiang 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2023年第5期1-18,共18页
A catalog of M stars has been published from the Large Sky Area Multi-Object Fiber Spectroscopic Telescope data release 7(LAMOST DR7).We cross-matched the LAMOST M catalog with Kepler,Kepler 2(K2)and Transiting Exopla... A catalog of M stars has been published from the Large Sky Area Multi-Object Fiber Spectroscopic Telescope data release 7(LAMOST DR7).We cross-matched the LAMOST M catalog with Kepler,Kepler 2(K2)and Transiting Exoplanet Survey Satellite(TESS)surveys.We obtained the light curves from the Kepler and TESS surveys.We detected 20,047 flare events from 4053 M stars and calculated their durations,amplitudes,and energies.We analyzed the distribution of the flare durations and energies.The distributions of flare duration for Kepler,K2 and TESS peak are at 3–3.5 hr,4–6 hr and 1–1.5 hr,respectively.This may be the result of the different cadences for the three data sets.The highest regions of the flare energies of Kepler,K2 and TESS are 32–32.5,32–32.5 and31–31.5 erg in Log format,respectively.A linear relationship between flare duration and energy emerges from our analysis.The ratio of flare duration to total observational time is approximately 0.2%–0.3%for the Kepler,K2 and TESS surveys.The occurrence rate of a star with a flare event increases from the M0 to M4 subtypes.We also determined the spatial distribution of the flare rate of M stars in the Milky Way.It seems that the flare rate decreases as the vertical height increases.The power index of the flare energies is in the region of 1.53–2.32,which is similar to previous result for solar type star(2.0).Further,we examined the relationship between the flare amplitude and chromospheric intensity.The flare activity increases rapidly with the increase in the HαEW at the lower values(less approximately 2?)and it increases slowly at the higher values. 展开更多
关键词 STARS activity-stars flare-stars LOW-MASS
下载PDF
Network Garment Style Design System with Remote Information Access and Auto-Connecting Technology
3
作者 钱素琴 董爱华 《Journal of Donghua University(English Edition)》 EI CAS 2007年第1期112-117,共6页
A Network Garment Style Design System (NGSDS) is proposed to enable the remote style structure drawing design of garment. After the development of the system structure based on network that consists of client end and ... A Network Garment Style Design System (NGSDS) is proposed to enable the remote style structure drawing design of garment. After the development of the system structure based on network that consists of client end and server end at two remote places, a multi-layer part database based on Oracle platform is presented to store information of different parts of garment style. With the acquirement of remote design data at server end using Http technology, the style design is ultimately implemented at the client end using Auto-connecting algorithms. One empirical example is given to show the implementation of the NGSDS. 展开更多
关键词 网络服装设计系统 远程信息访问 计算机辅助服装设计 自动联机技术
下载PDF
Regional distribution of wheat yield and chemical fertilizer requirements in China 被引量:5
4
作者 XU Xin-peng HE Ping +7 位作者 CHUAN Li-min LIU Xiao-yan LIU Ying-xia ZHANG Jia-jia HUANG Xiao-meng QIU Shao-jun ZHAO Shi-cheng ZHOU Wei 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2021年第10期2772-2780,共9页
Quantification of currently attainable yield and fertilizer requirements can provide detailed information for assessing the food supply capacity and offer data support for agricultural decision-making.Datasets from a ... Quantification of currently attainable yield and fertilizer requirements can provide detailed information for assessing the food supply capacity and offer data support for agricultural decision-making.Datasets from a total of 5408 field experiments were collected from 2000 to 2015 across the major wheat production regions in China to analyze the spatial distribution of wheat yield,the soil nutrient supply capacity(represented by relative yield,defined as the ratio of the yield under the omission of one of nitrogen(N),phosphorus(P)and potassium(K)to the yield under the full NPK fertilizer application),and N,P and K fertilizer requirements by combining the kriging interpolation method with the Nutrient Expert Decision Support System for Wheat.The results indicated that the average attainable yield was 6.4 t ha^(−1),with a coefficient of variation(CV)of 24.9% across all sites.The yields in North-central China(NCC)and the northern part of the Middle and Lower reaches of the Yangtze River(MLYR)were generally higher than 7 t ha^(−1),whereas the yields in Southwest China(SWC),Northeast China(NEC),and the eastern part of Northwest China(NWC)were usually less than 6 t ha^(−1).The precentage of area having a relative yield above 0.70,0.85,and 0.85 for N,P,and K fertilizers accounted for 52.3,74.7,and 95.9%,respectively.Variation existed in N,P,and K fertilizer requirements,with a CV of 24.8,23.9,and 29.9%,respectively,across all sites.More fertilizer was needed in NCC and the northern part of the MLYR than in other regions.The average fertilizer requirement was 162,72,and 57 kg ha^(−1) for N,P2O5,and K2O fertilizers,respectively,across all sites.The incorporation of the spatial variation of attainable yield and fertilizer requirements into wheat production practices would benefit sustainable wheat production and environmental safety. 展开更多
关键词 WHEAT attainable yield fertilizer requirements nutrient expert system spatial variation
下载PDF
Effect of cold stratification on the temperature range for germination of Pinus koraiensis
5
作者 Yuan Song Xinghuan Li +2 位作者 Mingyi Zhang Guowei Xia Chao Xiong 《Journal of Forestry Research》 SCIE CAS CSCD 2023年第1期221-231,共11页
Germination at low spring temperatures may offer a competitive advantage for the growth and survival of plant species inhabiting temperate forest ecosystems.Pinus koraiensis is a dominant species in temperate forests ... Germination at low spring temperatures may offer a competitive advantage for the growth and survival of plant species inhabiting temperate forest ecosystems.Pinus koraiensis is a dominant species in temperate forests of northeastern China.Its seeds exhibit primary morphophysiological dormancy following dispersal in autumn,limiting natural or artificial regeneration:direct seeding and planting seedlings in spring.The aim of this study was to determine the optimum cold stratification temperature that induces germination to increase towards lower temperatures.Seeds from two populations(Changbaishan and Liangshui)were cold stratified at 0,5 and 10℃.Germination to incubation temperatures(10/5,20/10,25/15 and 30/20℃;14/10 h day/night)were determined after 2 and 4 weeks,and 5.5 and6.5 months of cold stratification.After 5.5 months,approximately 68-91%of seeds from both populations germinated at incubation temperatures of 25/15℃and 30/20℃,regardless of cold stratification temperatures.When the cold stratification temperature was reduced to 0℃and the period increased to 6.5 months,germination at 10/5℃significantly improved,reaching 37%and 64%for the Changbaishan and Liangshui populations,respectively.After 6.5 months of cold stratification,there was a significant linear regression between cold stratification temperatures and germination at10/5℃.The range in temperatures allowing for germination gradually expanded to include lower temperatures with decreasing cold stratification temperatures from 10 to 5℃and further to 0℃. 展开更多
关键词 Cold Stratification temperatures Pinus koraiensis Seed germination Germination temperature range
下载PDF
A VLIW Architecture Stream Cryptographic Processor for Information Security 被引量:4
6
作者 Longmei Nan Xuan Yang +4 位作者 Xiaoyang Zeng Wei Li Yiran Du Zibin Dai Lin Chen 《China Communications》 SCIE CSCD 2019年第6期185-199,共15页
As an important branch of information security algorithms,the efficient and flexible implementation of stream ciphers is vital.Existing implementation methods,such as FPGA,GPP and ASIC,provide a good support,but they ... As an important branch of information security algorithms,the efficient and flexible implementation of stream ciphers is vital.Existing implementation methods,such as FPGA,GPP and ASIC,provide a good support,but they could not achieve a better tradeoff between high speed processing and high flexibility.ASIC has fast processing speed,but its flexibility is poor,GPP has high flexibility,but the processing speed is slow,FPGA has high flexibility and processing speed,but the resource utilization is very low.This paper studies a stream cryptographic processor which can efficiently and flexibly implement a variety of stream cipher algorithms.By analyzing the structure model,processing characteristics and storage characteristics of stream ciphers,a reconfigurable stream cryptographic processor with special instructions based on VLIW is presented,which has separate/cluster storage structure and is oriented to stream cipher operations.The proposed instruction structure can effectively support stream cipher processing with multiple data bit widths,parallelism among stream cipher processing with different data bit widths,and parallelism among branch control and stream cipher processing with high instruction level parallelism;the designed separate/clustered special bit registers and general register heaps,key register heaps can satisfy cryptographic requirements.So the proposed processor not only flexibly accomplishes the combination of multiple basic stream cipher operations to finish stream cipher algorithms.It has been implemented with 0.18μm CMOS technology,the test results show that the frequency can reach 200 MHz,and power consumption is 310 mw.Ten kinds of stream ciphers were realized in the processor.The key stream generation throughput of Grain-80,W7,MICKEY,ACHTERBAHN and Shrink algorithm is 100 Mbps,66.67 Mbps,66.67 Mbps,50 Mbps and 800 Mbps,respectively.The test result shows that the processor presented can achieve good tradeoff between high performance and flexibility of stream ciphers. 展开更多
关键词 STREAM CIPHER VLIW architecture PROCESSOR RECONFIGURABLE application-specific instruction-set
下载PDF
Security Defence Policy Selection Method Using the Incomplete Information Game Model 被引量:2
7
作者 ZHANG Hengwei YU Dingkun +2 位作者 WANG Jindong HAN Jihong WANG Na 《China Communications》 SCIE CSCD 2015年第S2期123-131,共9页
Nowadays, the network defence policy selection using game model of incomplete information ignores the type of the defender, which quantifies cost simply, resulting in unreasonable defence policies selection. Aiming at... Nowadays, the network defence policy selection using game model of incomplete information ignores the type of the defender, which quantifies cost simply, resulting in unreasonable defence policies selection. Aiming at the problem, we use Bayesian game theory to model the active defence policy selection. We take the types of both the attacker and the defender into consideration. Besides, the traditional quantization method is enhanced. Then, we calculate the equilibrium of static Bayesian game. Based on the analysis of the equilibrium, we select the optimal defence policy through the prediction for attackers' actions. The paper calculates the defence effectiveness of defence policies and provides a defence policies selection algorithm. Ultimately, we present an example to verify the effectiveness of the method and model proposed in the paper. 展开更多
关键词 GAME INCOMPLETE information POLICY SELECTION active DEFENCE
下载PDF
Luminescence of Co-doped SrTiO_3:Pr^(3+) 被引量:3
8
作者 LIU Wen WANG Xue-wen YUN Jiang-ni ZHAO Li-li 《Semiconductor Photonics and Technology》 CAS 2008年第4期254-258,共5页
The SrTiO3∶Pr3+ material,co-doped with monovalent Li+,divalent Mg2+,and trivalent Al3+ was prepared by a new sol-gel method. The phase and crystallinity of the synthesized materials were investigated by powder X-ray ... The SrTiO3∶Pr3+ material,co-doped with monovalent Li+,divalent Mg2+,and trivalent Al3+ was prepared by a new sol-gel method. The phase and crystallinity of the synthesized materials were investigated by powder X-ray diffraction(XRD) and scanning electron microcopy(SEM). Among the co-doped ion,Al3+ incorporation caused the least lattice change and had the best crystallinity. Photoluminescence spectra were taken to investigate the luminescence characteristics. We observed a red luminescence change of SrTiO3∶Pr3+ after being co-doped,and a best enhancement on the red luminescence with the trivalent Al3+ was observed. The present results indicated that the charge defect associated with Al3+ has led to charge compensation of Pr+Sr and also implied that the charge defects(usually the second dopant ions replacing the A or B sites in the lattice) which are closer to Pr+Sr contribute more to the red luminescence enhancement. 展开更多
关键词 SRTIO3 红色发光体 电荷补偿 掺杂物
下载PDF
Successive defects asymmetric simple exclusion processes with particles of arbitrary size
9
作者 蔡九菊 肖松 +1 位作者 王若翚 刘飞 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第12期5097-5102,共6页
This paper uses various mean-field approaches and the Monte Carlo simulation to calculate asymmetric simple exclusion processes with particles of arbitrary size in the successive defects system.In this system,the hopp... This paper uses various mean-field approaches and the Monte Carlo simulation to calculate asymmetric simple exclusion processes with particles of arbitrary size in the successive defects system.In this system,the hopping probability p (p < 1) and the size d of particles are not constant.Through theoretical calculation and computer simulation,it obtains the exact theoretical results and finds that the theoretical results are in agreement with the computer simulation.These results are helpful in analysing the effect of traffic with different hopping probabilities p and sizes d of particle. 展开更多
关键词 不对称 缺陷 计算机模拟仿真 粒子系统 微粒 模拟计算 蒙特卡罗 交通影响
原文传递
A Cloud-Assisted Malware Detection and Suppression Framework for Wireless Multimedia System in IoT Based on Dynamic Differential Game
10
作者 Weiwei Zhou Bin Yu 《China Communications》 SCIE CSCD 2018年第2期209-223,共15页
As a novel dynamic network service infrastructure, Internet of Things(Io T) has gained remarkable popularity with obvious superiorities in the interoperability and real-time communication. Despite of the convenience i... As a novel dynamic network service infrastructure, Internet of Things(Io T) has gained remarkable popularity with obvious superiorities in the interoperability and real-time communication. Despite of the convenience in collecting information to provide the decision basis for the users, the vulnerability of embedded sensor nodes in multimedia devices makes the malware propagation a growing serious problem, which would harm the security of devices and their users financially and physically in wireless multimedia system(WMS). Therefore, many researches related to the malware propagation and suppression have been proposed to protect the topology and system security of wireless multimedia network. In these studies, the epidemic model is of great significance to the analysis of malware propagation. Considering the cloud and state transition of sensor nodes, a cloud-assisted model for malware detection and the dynamic differential game against malware propagation are proposed in this paper. Firstly, a SVM based malware detection model is constructed with the data sharing at the security platform in the cloud. Then the number of malware-infected nodes with physical infectivity to susceptible nodes is calculated precisely based on the attributes of WMS transmission. Then the statetransition among WMS devices is defined by the modified epidemic model. Furthermore, a dynamic differential game and target cost function are successively derived for the Nash equilibrium between malware and WMS system. On this basis, a saddle-point malware detection and suppression algorithm is presented depending on the modified epidemic model and the computation of optimal strategies. Numerical results and comparisons show that the proposed algorithm can increase the utility of WMS efficiently and effectively. 展开更多
关键词 无线多媒体网络 多媒体系统 恶意软件 游戏 微分 传感器节点 多媒体设备 流行模型
下载PDF
Method Based on Time Randomization to Resist Fault Sensitivity Analysis
11
作者 Yingjian Yan Jijun Xu +2 位作者 Shoucheng Wang Zhong Wang Min Liu 《Journal of Beijing Institute of Technology》 EI CAS 2017年第3期411-417,共7页
A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random numb... A fault sensitivity analysis(FSA)-resistance model based on time randomization is proposed.The randomization unit is composed of two parts,namely the configurable register array(R-A)and the decoder(chiefly random number generator,RNG).In this way,registers chosen can be either valid or invalid depending on the configuration information generated by the decoder.Thus,the fault sensitivity information can be confusing.Meanwhile,based on this model,a defensive scheme is designed to resist both fault sensitivity analysis(FSA)and differential power analysis(DPA).This scheme is verified with our experiments. 展开更多
关键词 block cipher time randomization fault sensitivity analysis(FSA) differential power analysis
下载PDF
Efficient Activation Method of Hardware Trojan Based on Greedy Algorithm
12
作者 Yingjian Yan Xin Chuan 《Journal of Beijing Institute of Technology》 EI CAS 2018年第2期230-236,共7页
To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorith... To generate test vector sets that can efficiently activate hardware Trojans and improve probability of the hardware Trojan activation,an efficient hardware Trojan activation method is proposed based on greedy algorithm for combinatorial hardware Trojans. Based on the greedy algorithm and the recursive construction method in the combination test,the method formulates appropriate and useful greedy strategy and generates test vector sets with different combinatorial correlation coefficients to activate hardware Trojans in target circuits. The experiment was carried out based on advanced encryption standard( AES) hardware encryption circuit,different combinatorial hardware Trojans were implanted in AES as target circuits,the experiment of detecting hardware Trojans in target circuits was performed by applying the proposed method and different combinatorial hardware Trojans in target circuits were activated successfully many times in the experiment. The experimental results showthat the test vector sets generated using the proposed method could effectively activate combinatorial hardware Trojans,improve the probability of the hardware Trojan being activated,and also be applied to practice. 展开更多
关键词 hardware Trojan logic detection combinatorial correlation coefficient test vectors
下载PDF
Geospacial information utilized under the access control strategy
13
作者 田捷 《Journal of Chongqing University》 CAS 2007年第4期256-264,共9页
This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authori... This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated. 展开更多
关键词 计算机技术 控制方法 程序 编程语言
下载PDF
Implementation of a weblog extraction system with an improved template extraction technique
14
作者 E CHANG 《Chinese Journal of Library and Information Science》 2013年第1期52-63,共12页
Purpose:The objectives of this study are to explore an effective technique to extract information from weblogs and develop an experimental system to extract structured information as much as possible with this techniq... Purpose:The objectives of this study are to explore an effective technique to extract information from weblogs and develop an experimental system to extract structured information as much as possible with this technique.The system will lay a foundation for evaluation,analysis,retrieval,and utilization of the extracted information.Design/methodology/approach:An improved template extraction technique was proposed.Separate templates designed for extracting blog entry titles,posts and their comments were established,and structured information was extracted online step by step.A dozen of data items,such as the entry titles,posts and their commenters and comments,the numbers of views,and the numbers of citations were extracted from eight major Chinese blog websites,including Sina,Sohu and Bokee.Findings:Results showed that the average accuracy of the experimental extraction system reached 94.6%.Because the online and multi-threading extraction technique was adopted,the speed of extraction was improved with the average speed of 15 pages per second without considering the network delay.In addition,entries posted by Ajax technology can be extracted successfully.Research limitations:As the templates need to be established in advance,this extraction technique can be effectively applied to a limited range of blog websites.In addition,the stability of the extraction templates was affected by the source code of the blog pages.Practical implications:This paper has studied and established a blog page extraction system,which can be used to extract structured data,preserve and update the data,and facilitate the collection,study and utilization of the blog resources,especially academic blog resources.Originality/value:This modified template extraction technique outperforms the Web page downloaders and the specialized blog page downloaders with structured and comprehensive data extraction. 展开更多
关键词 Weblog(Blog) Web information EXTRACTION EXTRACTION
原文传递
Cooperation Mechanism Design in Cloud Manufacturing Under Information Asymmetry
15
作者 Haidong Yu Qihua Tian 《国际计算机前沿大会会议论文集》 2018年第1期37-37,共1页
下载PDF
A two-step weighted least-squares method for joint estimation of source and sensor locations: A general framework 被引量:8
16
作者 Ding WANG Jiexin YIN +2 位作者 Tao TANG Ruirui LIU Zhidong WU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2019年第2期417-443,共27页
It is well known that the Two-step Weighted Least-Squares(TWLS) is a widely used method for source localization and sensor position refinement. For this reason, we propose a unified framework of the TWLS method for jo... It is well known that the Two-step Weighted Least-Squares(TWLS) is a widely used method for source localization and sensor position refinement. For this reason, we propose a unified framework of the TWLS method for joint estimation of multiple disjoint sources and sensor locations in this paper. Unlike some existing works, the presented method is based on more general measurement model, and therefore it can be applied to many different localization scenarios.Besides, it does not have the initialization and local convergence problem. The closed-form expression for the covariance matrix of the proposed TWLS estimator is also derived by exploiting the first-order perturbation analysis. Moreover, the estimation accuracy of the TWLS method is shown analytically to achieve the Cramér-Rao Bound(CRB) before the threshold effect takes place. The theoretical analysis is also performed in a common mathematical framework, rather than aiming at some specific signal metrics. Finally, two numerical experiments are performed to support the theoretical development in this paper. 展开更多
关键词 Cramér-Rao Bound(CRB) DISJOINT sources General framework Performance analysis Sensor position refinement SOURCE localization WEIGHTED LEAST-SQUARES
原文传递
A Reconfigurable Block Cryptographic Processor Based on VLIW Architecture 被引量:11
17
作者 LI Wei ZENG Xiaoyang +2 位作者 NAN Longmei CHEN Tao DAI Zibin 《China Communications》 SCIE CSCD 2016年第1期91-99,共9页
An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the... An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the broad range of support.However,these methods could not achieve a good tradeoff between high-speed processing and flexibility.In this paper,we present a reconfigurable VLIW processor architecture targeted at block cipher processing,analyze basic operations and storage characteristics,and propose the multi-cluster register-file structure for block ciphers.As for the same operation element of block ciphers,we adopt reconfigurable technology for multiple cryptographic processing units and interconnection scheme.The proposed processor not only flexibly accomplishes the combination of multiple basic cryptographic operations,but also realizes dynamic configuration for cryptographic processing units.It has been implemented with0.18μm CMOS technology,the test results show that the frequency can reach 350 MHz.and power consumption is 420 mw.Ten kinds of block and hash ciphers were realized in the processor.The encryption throughput of AES,DES,IDEA,and SHA-1 algorithm is1554 Mbps,448Mbps,785 Mbps,and 424 Mbps respectively,the test result shows that our processor's encryption performance is significantly higher than other designs. 展开更多
关键词 分组密码算法 密码处理器 可重构技术 VLIW 体系结构 SHA-1算法 加密处理 CMOS工艺
下载PDF
Application of biomonitoring and support vector machine in water quality assessment 被引量:3
18
作者 Yue LIAO Jian-yu XU Zhu-wei WANG 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE CAS CSCD 2012年第4期327-334,共8页
The behavior of schools of zebrafish(Danio rerio) was studied in acute toxicity environments.Behavioral features were extracted and a method for water quality assessment using support vector machine(SVM) was de-velope... The behavior of schools of zebrafish(Danio rerio) was studied in acute toxicity environments.Behavioral features were extracted and a method for water quality assessment using support vector machine(SVM) was de-veloped.The behavioral parameters of fish were recorded and analyzed during one hour in an environment of a 24-h half-lethal concentration(LC50) of a pollutant.The data were used to develop a method to evaluate water quality,so as to give an early indication of toxicity.Four kinds of metal ions(Cu2+,Hg2+,Cr6+,and Cd2+) were used for toxicity testing.To enhance the efficiency and accuracy of assessment,a method combining SVM and a genetic algorithm(GA) was used.The results showed that the average prediction accuracy of the method was over 80% and the time cost was acceptable.The method gave satisfactory results for a variety of metal pollutants,demonstrating that this is an effec-tive approach to the classification of water quality. 展开更多
关键词 支持向量机 水质评价 生物监测 金属污染物 应用 水质评估 行为参数 急性毒性
原文传递
The Translation Invariant Contourlet-like Transform for Image Denoising 被引量:3
19
作者 LIAN Qiu-Sheng CHEN Shu-Zhen 《自动化学报》 EI CSCD 北大核心 2009年第5期505-508,共4页
关键词 滤波技术 滤波器 图像 降噪
下载PDF
Optimal Active Defence Using Dynamic Multi-Stage Signalling Game 被引量:2
20
作者 ZHANG Hengwei LI Tao +1 位作者 WANG Jindong HAN Jihong 《China Communications》 SCIE CSCD 2015年第S2期114-122,共9页
Nowadays, security defence of network uses the game theory, which mostly applies complete information game model or even the static game model. To get closer to the actual network and defend actively, we propose a net... Nowadays, security defence of network uses the game theory, which mostly applies complete information game model or even the static game model. To get closer to the actual network and defend actively, we propose a network attack-defence game model by using signalling game, which is modelled in the way of dynamic and incomplete information. We improve the traditional attack-defence strategies quantization method to meet the needs of the network signalling game model. Moreover, we give the calculation of the game equilibrium and analyse the optimal defence scheme. Finally, we analyse and verify effectiveness of the model and method through a simulation experiment. 展开更多
关键词 active DEFENCE DYNAMIC INCOMPLETE information MULTI-STAGE SIGNALLING GAME theory
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部