首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 90 毫秒
1.
有效的链路层的复激活算法可以提高语义系统的检错性能。传统方法采用自适应模式匹配方法实现语义系统的跨层链路复激活,当检错码冗余数据块随机放置时,不能有效实现语义检错。提出一种基于检错码静默补偿的跨层链路复激活算法,构建语义系统网络控制模型,设计检错码编码数据块放置方法,提出检错码静默补偿机制并实现跨层链路复激活算法改进。实验结果表明,采用该算法能有效实现语义系统检错码跨层链路激活,谱峰复激活搜索明显,任务执行精度提高17%,算法在语义网通信编码设计等领域具有较好的应用价值。  相似文献   

2.
通过对语义网中的检错码加密设计提高网络用户的文本隐私保护能力。传统方法采用多元线性回归分析的检错码加密算法,由于检错码自身的数据扰乱导致加密性能不好。提出一种基于混叠谱跨层补偿的语义网检错码深度加密算法,对特征数据进行预处理,形成符合特征关联的输入数据形式,进行混叠谱跨层补偿。对不同特征的数据进行混叠谱跨层补偿挖掘处理,形成特征判决规则库,基于CSBDLP公钥加密协议进行多元线性回归隐私保护,得到语义网检错码加密协议密文矩阵,实现了基于混叠谱跨层补偿的语义网检错码深度加密算法改进,提高了检错码加密的深度和数据容量。仿真结果表明,该算法具有较好的语义网检错码加密性能,加密深度较高,深度越深,解密所需要花费的时间越长,从而保证了算法的加密优越性能,研究成果将在语义网构建和数据加密及隐私保护中具有重要的应用价值。  相似文献   

3.
研究多源语义特征分层数据库中的大数据聚类方法,实现数据的分类识别。多源语义特征分层数据库中由于路由冲突,在链路负载较大的情况下,不能有效实现对大数据语义特征的并行搜索。提出一种基于增广链同态解析的链路分流方法避免路由冲突,实现增广链修复下大数据并行搜索聚类。构建大数据聚类的语义相似度融合模型,基于跨层链路分流算法实现增广链路分流,进行语义本体模型构建,选择采用高阶贝塞尔函数累积量作为增广链修复检验统计量,确定节点数据包的置信度,确立置信区间,在进行缓冲区溢出修复时,进行功率谱幅度特征提取,实现大数据的并行搜索聚类,进行语义本体模型构建,为离群点新建一个簇,依次对每个文档的主题词集进行处理,将每个主题词自动添加入形式背景的属性集中,采用并行搜索算法实现对语义大数据的优化聚类算法改进。仿真结果表明,采用该算法进行大数据聚类,契合度较高,误分率较低,性能优越。  相似文献   

4.
在路由冲突协议下难以实现对语义检索任务的嵌入式调度,在路由冲突协议设计和网络协议识别中,由于语义检索码在链路负载导致网络通信效率低下,为了提高语义检索任务的调度能力,避免路由冲突,提出一种基于语义相似度融合的Linux嵌入式任务调度算法。通过语义相似度特征模型构建,易于实现语义检索的嵌入式任务调度和路由信息分流。对每组语义相似度特征进行特征融合,得到Linux嵌入式分流矩阵向量长度,进行特征分解,得到样本协方差,实现算法改进。仿真结果得出,算法具有较高的吞吐率和召回率,执行效率较高,检索精度优越,有效提高了语义检索嵌入式任务调度的运行效率。在语义系统构建和检索优化设计中具有较好的应用前景。  相似文献   

5.
随着Web数据库技术的发展,需要对云数据进行索引管理,提高Web数据库访问能力。传统方法采用高斯边缘化路径控制方法进行索引,在无法及时获知Web云数据的先验语义特征信息时,索引精度不高。提出一种基于自适应特征映射的云数据管理索引算法。构建云数据管理模型,提取云数据自适应特征,采用语义相似度特征分析方法实现特征映射,采用一维搜索方法进行峰值搜索,初始化数据库索引起始时间点,设置语义高斯边缘化索引复激活函数,对本层链路和跨层链路进行均衡处理,达到云数据管理和优化索引的目的。仿真结果表明,采用该算法能有效提高云数据管理索引精度,提高云数据的准确调度和访问能力。  相似文献   

6.
需要对语义主题树特征进行聚类算法设计,提高对语义特征的搜索和语义泛化能力。传统的语义特征聚类算法采用基于本体映射的语义特征聚类算法,建立异构的本体模型之间的语义等价映射关系,导致聚类性能和语义泛化能力不好。提出一种基于语义覆盖度融合的I/O映射聚类算法,利用领域知识和模式匹配,建立本体之间语义映射关系,考虑三种与语义信息相关的学习知识,得到语义相似度函数,利用统计TF-IDF的方法计算词语的特征权值,通过语义主题树特征匹配,实现搜索引擎的覆盖度I/O映射聚类改进。仿真实验表明,采用该算法能提高对语义的覆盖度融合能力,具有更好的数据聚类性能,较好地完成语义映射任务,语义信息检索查准率提高为98.7%。  相似文献   

7.
数据库的索引路径优化选择是实现对Deep Web数据库的深度访问和安全访问的关键。传统方法中对Deep Web数据库的路径选择采用关键字搜索方法,根据关键字罗列出所有可能复合信息的数据,当出现歧义特征时,数据索引准确度不高。提出一种基于语义高斯边缘化的数据库索引路径选择方法。构建Deep Web数据库的特征模型,计算节点与关键词的匹配度,得到高斯边缘化路径控制目标函数,把语义相似度分解为用户查询意图的相关性指向函数,实现高斯边缘化路径控制。将数据库的预测控制指令输入序列进行变量耦合加权,与邻阶跨层链路进行均衡处理,设置语义高斯边缘化索引复激活函数,提高对数据库的索引性能,实现路径优选。仿真结果表明,该算法能提高数据库的查准率,减少查询时间,实现对Deep Web数据库高效安全访问。  相似文献   

8.
针对向量空间模型中语义缺失问题,将语义词典(知网)应用到文本分类的过程中以提高文本分类的准确度。对于中文文本中的一词多义现象,提出改进的词汇语义相似度计算方法,通过词义排歧选取义项进行词语的相似度计算,将相似度大于阈值的词语进行聚类,对文本特征向量进行降维,给出基于语义的文本分类算法,并对该算法进行实验分析。结果表明,该算法可有效提高中文文本分类效果。  相似文献   

9.
提出一种基于串行编码的办公自动化电子文档的文本加密方法,提高保密性能。构建电子文档加密的数据结构模型,对加密数据特征进行密钥构建和特征分析,采用串行译码方法进行数据加密改进,结果表明,该法对电子文档加密性能较好,误码率低于传统算法。  相似文献   

10.
在网络安全预测监护模型设计中,需要对网络安全监护信息进行数据融合和特征优选,以提高对变异特征的识别能力。传统方法中,采用蚁群算法进行监护信息特征优化融合进化和链路模型设计,算法无法实现相邻簇头之间的信息素融合,特征优化效果不好。针对这一问题,提出蚁群链运动多层博弈的网络监护信息融合特征优选算法,构建多层博弈网络监护数据样本驱动空间权矩阵模型,引入粗糙集理论,对蚁群引导的粗糙集前馈补偿网络进行动态博弈,实现网络安全监护数据的预测控制目标函数最佳寻优。构建多层博弈网络监护系统模型,得到蚁群链运动的监护信息数据状态跟踪模型,实现网络安全监护信息的融合特征优选改进。仿真实验表明,该算法能有效提高对异常信息的监护和检测能力,有较高的特征优选品质,展示了本文算法在对网络安全监护中的优越性能。  相似文献   

11.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

12.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

15.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

16.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号