期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
An Efficient Approach for Tree Digital Image Segmentation
1
作者 ChengLei SongTieying 《Forestry Studies in China》 CAS 2004年第3期43-49,共7页
This paper proposes an improved method to segment tree image based on color and texture feature and amends the segmented result by mathematical morphology. The crown and trunk of one tree have been successfully segmen... This paper proposes an improved method to segment tree image based on color and texture feature and amends the segmented result by mathematical morphology. The crown and trunk of one tree have been successfully segmented and the experimental result is deemed effective. The authors conclude that building a standard data base for a range of species, featuring color and texture is a necessary condition and constitutes the essential groundwork for tree image segmentation in order to insure its quality. 展开更多
关键词 stereo vision tree image image segmentation TEXTURE mathematical morphology
下载PDF
ESeal Calculus: A Secure Mobile Calculus
2
作者 PengRong UuPing 《Wuhan University Journal of Natural Sciences》 CAS 2003年第03A期786-790,共5页
The ESeal Calculus is a secure mobile calculus based on Seal Calculus. By using open\|channels, ESeal Calculus makes it possible to communicate between any two arbitrary seals with some secure restrictions. It improve... The ESeal Calculus is a secure mobile calculus based on Seal Calculus. By using open\|channels, ESeal Calculus makes it possible to communicate between any two arbitrary seals with some secure restrictions. It improves the expression ability and efficiency of Seal calculus without losing security. 展开更多
关键词 Seal calculus SECURITY CHANNEL
下载PDF
One Method of How to Reserve or Abandon and Understand the Exception Rule
3
作者 ZhouYing YangBingru 《工程科学(英文版)》 2004年第3期79-84,共6页
As a special subject in the research on information diffusion mechanism in knowledge discovery field, the author presents a new method on deciding to reserve or abandon and understanding the Exception Rule, which is t... As a special subject in the research on information diffusion mechanism in knowledge discovery field, the author presents a new method on deciding to reserve or abandon and understanding the Exception Rule, which is to analyze the changing trend of three parameters(the support, confidence and LS),combining with the analysis of the historical changing trend of the support of the former and latter part of the Rule, in order to receive the acceptable rule and help users to fully understand them, and use them appropriately. This research has a significant effect on the post-disposal of knowledge discovery and its realizability and practicability. 展开更多
关键词 知识发现 特殊规则 信息融合 支持系统 信任模型 LS
下载PDF
Fault-Tolerant Scheduling for Real-Time Embedded Control Systems 被引量:15
4
作者 Chun-HuaYang GeertDeconinck Wei-HuaGui 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第2期191-202,共12页
With the increasing complexity of industrial application, an embedded control system (ECS) requires processing a number of hard real-time tasks and needs fault-tolerance to assure high reliability. Considering the cha... With the increasing complexity of industrial application, an embedded control system (ECS) requires processing a number of hard real-time tasks and needs fault-tolerance to assure high reliability. Considering the characteristics of real-time tasks in ECS, an integrated algorithm is proposed to schedule real-time tasks and to guarantee that all real-time tasks are completed before their deadlines even in the presence of faults. Based on the nonpreemptive critical-section protocol (NCSP), this paper analyzes the blocking time introduced by resource conflicts of relevancy tasks in fault-tolerant multiprocessor systems. An extended schedulability condition is presented to check the assignment feasibility of a given task to a processor. A primary/backup approach and on-line replacement of failed processors are used to tolerate processor failures. The analysis reveals that the integrated algorithm bounds the blocking time, requires limited overhead on the number of processors, and still assures good processor utilization. This is also demonstrated by simulation results. Both analysis and simulation show the effectiveness of the proposed algorithm in ECS. 展开更多
关键词 embedded control system real-time task scheduling FAULT-TOLERANCE relevancy task blocking time
原文传递
RESEARCH ON FRAMEWORK OF RAPIDLY RECONFIGURABLE INFORMATION SYSTEM
5
作者 LiXurong DingQiulin XuHuanliang 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2002年第1期103-107,共5页
Changes and reconfiguration of information systems(ISs)are two kernel concepts of rapidil reconfigurable in-formation system(RRIS).It is the abilitise to evolve with changes that make RRIS superior to the traditional ... Changes and reconfiguration of information systems(ISs)are two kernel concepts of rapidil reconfigurable in-formation system(RRIS).It is the abilitise to evolve with changes that make RRIS superior to the traditional ISs.Hierarchical architecture of RRIS is put forward.And then a component-based framework of RRIS is discussed including its building and designing in detail. 展开更多
关键词 SOFTWARE reconfiguaration design pattern COMPONENT-BASED SOFTWARE architecture SOFTWARE FRAMEWORK RRIS 软件结构 设计方式 软件重构 软件框架 快速可重构信息系统
下载PDF
2-D MULTIRATE ALGORITHMS FOR EFFICIENT IMPLEMENTATION OF EDGE DETECTION 被引量:1
6
作者 ChenKen WangPing 《Journal of Electronics(China)》 2005年第4期395-402,共8页
Edge detection is a fundamental issue in image analysis. This paper proposes multirate algorithms for efficient implementation of edge detector, and a design example is illustrated.The multirate (decimation and/or int... Edge detection is a fundamental issue in image analysis. This paper proposes multirate algorithms for efficient implementation of edge detector, and a design example is illustrated.The multirate (decimation and/or interpolation) signal processing algorithms can achieve considerable savings in computation and storage. The proposed algorithms result in mapping relations of their z-transfer functions between non-multirate and multirate mathematical expressions in terms of time-varying coefficient instead of traditional polyphase decomposition counterparts.The mapping properties can be readily utilized to efficiently analyze and synthesize multirate edge detection filters. The Very high-speed Hardware Description Language (VHDL) simulation results verify efficiency of the algorithms for real-time Field Programmable Gate-Array (FPGA)implementation. 展开更多
关键词 Image processing Multi-dimensional filters Multirate signal processing Decimation filters Interpolation filters Image edge detector
下载PDF
Synthetic Intelligent Fault Diagnosis Technology for Complex Process 被引量:1
7
作者 刘晓颖 GuiWeihua 《High Technology Letters》 EI CAS 2002年第2期72-75,共4页
A fault diagnosis method of knowledge based fuzzy neural network is proposed for complex process, which is hard to develop practical mathematical model. Fault detection is performed through a knowledge based system, w... A fault diagnosis method of knowledge based fuzzy neural network is proposed for complex process, which is hard to develop practical mathematical model. Fault detection is performed through a knowledge based system, where fault detection heuristic rules have been generated from deep and shallow knowledge of the process. The fuzzy neural network performs the fault diagnosis task. This method does not need practical mathematical models of objects, so it is a strong implement for complex process. 展开更多
关键词 fault detection fault diagnosis knowledge based system fuzzy neural network
下载PDF
部分K值逻辑函数中准完备集之最小覆盖的一些结果
8
作者 Ren-RenLiu Song-QiaoChen +1 位作者 Jian-ErChen ShuLi 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期100-101,共2页
多值逻辑是计算机科学与技术的一个重要分支。目前的计算机结构和计算机程序大多基于二值逻辑,但由于多值逻辑有着许多独特的功能和广阔的应用前景,随着计算机科学与技术的不断进步,多值逻辑得到了前所未有的发展。
关键词 最小覆盖 多值逻辑 计算机科学与技术 逻辑函数 计算机程序 功能 分支 K值
原文传递
Demodulator for Chaotic Secure Communication Based on Proportional-integral Feedback Design
9
作者 邹润民 YangTao 《High Technology Letters》 EI CAS 2002年第3期67-71,共5页
A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parame... A scheme of chaotic secure communication based on the parameter modulation and the inversion of a chaotic dynamical system is analyzed. According to this scheme, information signal is modulated by a bifurcation parameter of the transmitter, which is in chaotic state. In the receiver, a proportional integral feedback demodulator is used to demodulate the information signal, which only uses the available synchronizing error as well as stateness of receiver. The purpose of this demodulator is proposed to overcome the influence of differentiation operation, nonlinear part and singularities in chaotic system. Numerical simulation is proposed to show the effectiveness of this demodulator. 展开更多
关键词 chaotic secure communication PI demodulator chaotic synchronization parameter modulation
下载PDF
一种用于嵌入式控制系统的实时任务容错调度算法
10
作者 Chun-HuaYang GeertDeconinck Wei-HuaGui 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期85-85,共1页
嵌入式系统应用于自动控制领域时,往往对实时性和可靠性要求严格,如飞行控制、汽车自动刹车等,如果响应不及时,可能产生灾难性后果。随着应用对象复杂性的增加,嵌入式控制系统ECS(Embedded Control System)通常由多处理机构成,包... 嵌入式系统应用于自动控制领域时,往往对实时性和可靠性要求严格,如飞行控制、汽车自动刹车等,如果响应不及时,可能产生灾难性后果。随着应用对象复杂性的增加,嵌入式控制系统ECS(Embedded Control System)通常由多处理机构成,包含一组实时任务。 展开更多
关键词 实时任务 嵌入式控制系统 容错 调度算法 多处理机 嵌入式系统 实时性 System) 增加 总目标
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部