期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
论BBS的法律管制制度 被引量:29
1
作者 王迁 《法律科学(西北政法大学学报)》 CSSCI 北大核心 1999年第1期76-82,共7页
BBS作为新型的信息交流场所,对它的法律管制已成为法学研究的重要课题。此文分析了BBS在运作机制上与传统传媒的区别,回顾了美国的司法和立法实践,提出BBS法律管制的对象应是BBS经营者。应当建立起一种新型的BBS法律... BBS作为新型的信息交流场所,对它的法律管制已成为法学研究的重要课题。此文分析了BBS在运作机制上与传统传媒的区别,回顾了美国的司法和立法实践,提出BBS法律管制的对象应是BBS经营者。应当建立起一种新型的BBS法律管制机制,其核心是要求BBS经营者在用户信件发表后的一段“合理时间”内,以“表面合理标准” 展开更多
关键词 电子公告系统 计算机网络法 法律责任 BBS
在线阅读 下载PDF
Modeling of Intelligent Integrated Network Management System Using Object Oriented Approach *
2
作者 费翔 罗军舟 +1 位作者 顾冠群 吴介一 《Journal of Southeast University(English Edition)》 EI CAS 1998年第1期3-7,共5页
The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficien... The concept of intelligent integrated network management (IINM) is briefly introduced. In order to analyze, design and implement IINM successfully, object oriented approach is testified to be an effective and efficient way. In this paper, object oriented technique is applied to the structural model of IINM system, The Domain object class and the MU object class are used to represent the manager and the managed resources. Especially, NM IA is introduced which is a special object class with intelligent behaviors to manage the resources efficiently. 展开更多
关键词 object oriented approach computer communication network network management
在线阅读 下载PDF
A reliable routing algorithm based on fuzzy Petri net in mobile ad hoc networks 被引量:2
3
作者 胡志刚 马好 +1 位作者 王国军 廖麟 《Journal of Central South University of Technology》 EI 2005年第6期714-719,共6页
A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structure... A novel reliable routing algorithm in mobile ad hoc networks using fuzzy Petri net with its reasoning mechanism was proposed to increase the reliability during the routing selection. The algorithm allows the structured representation of network topology, which has a fuzzy reasoning mechanism for finding the routing sprouting tree from the source node to the destination node in the mobile ad boc environment. Finally, by comparing the degree of reliability in the routing sprouting tree, the most reliable route can be computed. The algorithm not only offers the local reliability between each neighboring node, but also provides global reliability for the whole selected route. The algorithm can be applied to most existing on-demand routing protocols, and the simulation results show that the routing reliability is increased by more than 80% when applying the proposed algorithm to the ad hoc on demand distance vector routing protocol. 展开更多
关键词 mobile ad hoe network fuzzy Petri net certainty factor ad hoc on demand distance vector routing algorithm
在线阅读 下载PDF
Web Page Watermarking for Tamper-Proof 被引量:2
4
作者 赵启军 卢宏涛 蒋晓华 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第3期280-284,共5页
This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after e... This paper proposed a watermarking algorithm for tamper-proof of web pages. For a web page, it generates a watermark consisting of a sequence of Space and Tab. The wa termark is then embedded into the web page after each word and each line. When a watermarked web page is tampered, the extracted watermark can detect and locate the modifications to the web page. Besides, the framework of watermarked Web Server system was given. Compared with traditional digital signature methods, this watermarking method is more transparent in that there is no necessary to detach the watermark before displaying web pages. The e xperimental results show that the proposed scheme is an effective tool for tamper-proof of web pages. 展开更多
关键词 web page WATERMARKING hypertext markup language(HTML) tamper-proof
在线阅读 下载PDF
Improving Centralized Path Calculation Based on Graph Compression 被引量:1
5
作者 Zhenglian Li Lixin Ji +1 位作者 Ruiyang Huang Shuxin Liu 《China Communications》 SCIE CSCD 2018年第6期120-124,共5页
Shortest-path calculation on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks(SDN),since SDN con... Shortest-path calculation on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks(SDN),since SDN controllers need to centralizedly perform a shortest-path query for every flow,usually on large-scale network. Unfortunately,one of the challenges is that current algorithms will become incalculable as the network size increases. Therefore, inspired by the compression graph in the field of compute visualization,we propose an efficient shortest path algorithm by compressing the original big network graph into a small one, but the important graph properties used to calculate path is reserved. We implement a centralized version of our approach in SDN-enabled network,and the evaluations validate the improvement compared with the well-known algorithms. 展开更多
关键词 graph representation path compression shortest path
在线阅读 下载PDF
An Efficient Algorithm for Discovering Co-occurrence Concepts Through Pathfinder Paradigm 被引量:1
6
作者 杜志典 WANG James 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期153-156,160,共5页
The Pathfinder paradigm has been used in generating and analyzing graph models that support clustering similar concepts and minimum-cost paths to provide an associative network structure within a domain. The co-occurr... The Pathfinder paradigm has been used in generating and analyzing graph models that support clustering similar concepts and minimum-cost paths to provide an associative network structure within a domain. The co-occurrence pathfinder network ( CPFN ) extends the traditional pathfinder paradigm so that co-occurring concepts can be calculated at each sampling time. Existing algorithms take O(n(s)) time to calculate the pathfinder network (PFN) at each sampling time for a non-completed input graph of a CPFN (r = ∞, q = n - 1), where n is the number of nodes in the input graph, r is the Minkowski exponent and q is the maximum number of links considered in finding a minimum cost path between vertices. To reduce the complexity of calculating the CPFN, we propose a greedy based algorithm, MEC(G) algorithm, which takes shortcuts to avoid unnecessary steps in the existing algorithms, to correctly calculate a CPFN (r = ∞, q= n - 1) in O(klogk) time where k is the number of edges of the input graph. Our example demonstrates the efficiency and correctness of the proposed MEC(G) algorithm, confirming our mathematic analysis on this algorithm. 展开更多
关键词 PATHFINDER CPFN co-occurrence.
在线阅读 下载PDF
A neurofuzzy system based on rough set theory and genetic algorithm 被引量:1
7
作者 罗健旭 邵惠鹤 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第3期278-282,共5页
This paper presents a hybrid soft computing modeling approach for a neurofuzzy system based on rough set theory and the genetic algorithms (NFRSGA). The fundamental problem of a neurofuzzy system is that when the inpu... This paper presents a hybrid soft computing modeling approach for a neurofuzzy system based on rough set theory and the genetic algorithms (NFRSGA). The fundamental problem of a neurofuzzy system is that when the input dimension increases, the fuzzy rule base increases exponentially. This leads to a huge infrastructure network which results in slow convergence. To solve this problem, rough set theory is used to obtain the reductive rules, which are used as fuzzy rules of the fuzzy system. The number of rules decrease, and each rule does not need all the conditional attribute values. This results in a reduced, or not fully connected, neural network. The structure of the neural network is relatively small and thus the weights to be trained decrease. The genetic algorithm is used to search the optimal discretization of the continuous attributes. The NFRSGA approach has been applied in the practical application of building a soft sensor model for estimating the freezing point of the light diesel fuel in a Fluid Catalytic Cracking Unit (FCCU), and satisfying results are obtained. 展开更多
关键词 soft computing neurofuzzy system rough set genetic algorithm
在线阅读 下载PDF
Model of Land Suitability Evaluation Based on Computational Intelligence 被引量:4
8
作者 JIAO Limin LIU Yaolin 《Geo-Spatial Information Science》 2007年第2期151-156,共6页
A novel model of land suitability evaluation is built based on computational intelligence (CI). A fuzzy neural network (FNN) is constructed by the integration of fuzzy logic and artificial neural network (ANN). The st... A novel model of land suitability evaluation is built based on computational intelligence (CI). A fuzzy neural network (FNN) is constructed by the integration of fuzzy logic and artificial neural network (ANN). The structure and process of this network is clear. Fuzzy rules (knowledge) are expressed in the model explicitly, and can be self-adjusted by learning from samples. Genetic algorithm (GA) is employed as the learning algorithm to train the network, and makes the training of the model efficient. This model is a self-learning and self-adaptive system with a rule set revised by training. 展开更多
关键词 land suitability evaluation computational intelligence fuzzy neural network genetic algorithm
在线阅读 下载PDF
Quality of service estimation based on maximum bottleneck algorithm for domain aggregation in backbone networks
9
作者 汪洋 《Journal of Chongqing University》 CAS 2007年第4期265-272,共8页
This paper investigates the routing among autonomous systems (ASs) with quality of service (QoS) requirements. To avoid the intractability of the problem, abstract QoS capability must be informed among ASs, because th... This paper investigates the routing among autonomous systems (ASs) with quality of service (QoS) requirements. To avoid the intractability of the problem, abstract QoS capability must be informed among ASs, because the routhing which constrained QoS has been proved to be nondeterministic polynomial-time (NP) hard even inside an AS. This paper employs the modified Dijkstra algorithm to compute the maximum bottleneck bandwidth inside an AS. This approach lays a basis for the AS-level switching capability on which interdomain advertisement can be performed. Furthermore, the paper models the aggregated traffic in backbone network with fractional Brownian motion (FBM), and by integrating along the time axis in short intervals, a good estimation of the distribution of queue length in the next short intervals can be obtained. The proposed advertisement mechanism can be easily implemented with the current interdomain routing protocols. Numerical study indicates that the presented scheme is effective and feasible. 展开更多
关键词 quality of service bottleneck bandwidth interdomain fractional Brownian motion domain aggregation
在线阅读 下载PDF
Monotone routing in multirate rearrangeable log_d (N,m,p) network
10
作者 汪洋 黄光明 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期555-559,共5页
The construction of multirate rearrangeable network has long been an interesting problem. Of many results published, all were achieved on 3-stage Clos network. The monotone routing algorithm proposed by Hu et al.(2001... The construction of multirate rearrangeable network has long been an interesting problem. Of many results published, all were achieved on 3-stage Clos network. The monotone routing algorithm proposed by Hu et al.(2001) was also first applied to 3-stage Clos network. In this work, we adopt this algorithm and apply it to logd(N,m,p) networks. We first analyze the properties of logd(N,m,p) networks. Then we use monotone algorithm in logd(N,0,p) network. Furthermore we extend the result to construct multirate rearrangeable networks based on logd(N,m,p) network (1≤m≤n?1). 展开更多
关键词 Rearrangeable MULTIRATE Monotone routing logd(N M p)
在线阅读 下载PDF
Research on High Resolution Satellite Image Classification Algorithm based on Convolution Neural Network 被引量:2
11
作者 Gaiping He 《International Journal of Technology Management》 2016年第9期53-55,共3页
Artifi cial neural network is a kind of artificial intelligence method to simulate the function of human brain, and deep learning technology can establish a depth network model with hierarchical structure on the basis... Artifi cial neural network is a kind of artificial intelligence method to simulate the function of human brain, and deep learning technology can establish a depth network model with hierarchical structure on the basis of artificial neural network. Deep learning brings new development direction to artificial neural network. Convolution neural network is a new artificial neural network method, which combines artificial neural network and deep learning technology, and this new neural network is widely used in many fields of computer vision. Modern image recognition algorithm requires classifi cation system to adapt to different types of tasks, and deep network and convolution neural network is a hot research topic in neural networks. According to the characteristics of satellite digital image, we use the convolution neural network to classify the image, which combines texture features with spectral features. The experimental results show that the convolution neural network algorithm can effectively classify the image. 展开更多
关键词 High Resolution Satellite Image Classification Convolution Neural Network Clustering Algorithm.
在线阅读 下载PDF
Collaborative work model based on peer-to-peer network
12
作者 JIANG Jian-zhong FU Li ZHANG Xuan-peng XU Chuan-yun 《Journal of Chongqing University》 CAS 2007年第2期130-134,共5页
In this paper, we incorporated peer-to-peer (P2P) concept with agent technology and put forward a collaborative work model based on peer-to-peer network (P2PCWM) after investigating into business demands of modern ent... In this paper, we incorporated peer-to-peer (P2P) concept with agent technology and put forward a collaborative work model based on peer-to-peer network (P2PCWM) after investigating into business demands of modern enterprises and problems prevailing in mainstream collaborative work systems based on central server. Theoretically, the P2PCWM can effectively overcome the problems in a conventional system with a central server and meet the practical demands of modern businesses. It is distinguished from other systems by its features of equality, openness, promptness, fairness, expandability and convenience. 展开更多
关键词 modern team COLLABORATION AGENT PEER-TO-PEER dynamic project network
在线阅读 下载PDF
An efficient shortest path approach for social networks based on community structure 被引量:2
13
作者 Maoguo Gong Guanjun Li +2 位作者 Zhao Wang Lijia Ma Dayong Tian 《CAAI Transactions on Intelligence Technology》 2016年第1期114-123,共10页
Finding the shortest path (SP) in a large-scale network analysis between any two nodes is a tough but very significant task. The SP can help us to analyze the information spreading performance and research the laten... Finding the shortest path (SP) in a large-scale network analysis between any two nodes is a tough but very significant task. The SP can help us to analyze the information spreading performance and research the latent relationship in the weighted social network, and so on. As the size of the social network increases, the traditional SP algorithms have poor performance and there is not a suitable algorithm for weighted social network. Some features of the network analysis are beneficial to solve this problem, and community structure ignored by the traditional methods is one of the most important features. In this paper, we propose a shortest path algorithm based on community detection (SPCD) by integrating community detection algorithm with traditional search methods. SPCD constructs a community graph by using community structure to narrow the searching scope. The algorithm presented improves the time efficiency and maintains the accuracy scale of the SR Experimental results on five real-world networks demonstrate the effectiveness of the proposed methods for the SP problem. 展开更多
关键词 Shortest path Community structure Weighted social network
在线阅读 下载PDF
EEG classification based on probabilistic neural network with supervised learning in brain computer interface 被引量:1
14
作者 吴婷 Yan Guozheng +1 位作者 Yang Banghua Sun Hong 《High Technology Letters》 EI CAS 2009年第4期384-387,共4页
Aiming at the topic of electroencephalogram (EEG) pattern recognition in brain computer interface (BCI), a classification method based on probabilistic neural network (PNN) with supervised learning is presented ... Aiming at the topic of electroencephalogram (EEG) pattern recognition in brain computer interface (BCI), a classification method based on probabilistic neural network (PNN) with supervised learning is presented in this paper. It applies the recognition rate of training samples to the learning progress of network parameters. The learning vector quantization is employed to group training samples and the Genetic algorithm (GA) is used for training the network' s smoothing parameters and hidden central vector for detemlining hidden neurons. Utilizing the standard dataset I (a) of BCI Competition 2003 and comparing with other classification methods, the experiment results show that the best performance of pattern recognition Js got in this way, and the classification accuracy can reach to 93.8%, which improves over 5% compared with the best result (88.7 % ) of the competition. This technology provides an effective way to EEG classification in practical system of BCI. 展开更多
关键词 Probabilistic neural network (PNN) supervised learning brain computer interface (BCI) electroencephalogram (EEG)
在线阅读 下载PDF
Development Status and Countermeasures of the Computer- aided English Teaching
15
作者 Jun Su 《International Journal of Technology Management》 2013年第3期31-33,共3页
Learning English requires an English environment, but it is impossible for us to communicate with the English speaking people face-to-face frequently, Computer network can he said to narrow the distance between people... Learning English requires an English environment, but it is impossible for us to communicate with the English speaking people face-to-face frequently, Computer network can he said to narrow the distance between people from the space, turn the world into a global village, and provide people in the world with more and more convenient opporttmities. The use of computer-aided English teaching can make up for the deficiencies of the traditional English teaching methods, which will greatly improve English teaching. In this paper, in view of the perspective of psycholinguistics to analyze common English pod cast, network language and foreign learning phenomenon. 展开更多
关键词 COUNTERMEASURES Computer-aided English Teaching English environment
在线阅读 下载PDF
Finding Recently Frequent Items over Online Data Streams
16
作者 尹志武 黄上腾 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期53-56,共4页
In this paper, a new algorithm HCOUNT + is proposed to find frequent items over data stream based on the HCOUNT algorithm. The new algorithm adopts aided measures to improve the precision of HCOUNT greatly. In additi... In this paper, a new algorithm HCOUNT + is proposed to find frequent items over data stream based on the HCOUNT algorithm. The new algorithm adopts aided measures to improve the precision of HCOUNT greatly. In addition,HCOUNT + is introduced to time critical applications and a novel sliding windows-based algorithm SL-HCOUNT + is proposed to mine the most frequent items occurring recently.This algorithm uses limited memory (nB · (1 +α) · e/ε·In(-M/lnρ)(α〈1) counters), requires constant processing time per packet (only (1+α) · ln(-M/lnρ(α〈1)) counters are updated), makes only one pass over the streaming data,and is shown to work well in the experimental results. 展开更多
关键词 frequent items data streams HCOUNT.
在线阅读 下载PDF
Multi-agent reinforcement learning using modular neural network Q-learning algorithms
17
作者 杨银贤 《Journal of Chongqing University》 CAS 2005年第1期50-54,共5页
Reinforcement learning is an excellent approach which is used in artificial intelligence,automatic control, etc. However, ordinary reinforcement learning algorithm, such as Q-learning with lookup table cannot cope wit... Reinforcement learning is an excellent approach which is used in artificial intelligence,automatic control, etc. However, ordinary reinforcement learning algorithm, such as Q-learning with lookup table cannot cope with extremely complex and dynamic environment due to the huge state space. To reduce the state space, modular neural network Q-learning algorithm is proposed, which combines Q-learning algorithm with neural network and module method. Forward feedback neural network, Elman neural network and radius-basis neural network are separately employed to construct such algorithm. It is revealed that Elman neural network Q-learning algorithm has the best performance under the condition that the same neural network training method, i.e. gradient descent error back-propagation algorithm is applied. 展开更多
关键词 reinforcement learning Q-LEARNING neural network artificial intelligence
在线阅读 下载PDF
Research on the Causes and Coping Strategies of the Land Subsidence Caused by the Tunnel Construction Projects
18
作者 Chena Kana 《International Journal of Technology Management》 2015年第11期26-28,共3页
In this paper, we conduct research on the causes and coping strategies of the land subsidence caused by the tunnel construction projects. We analyze the issues from the following of the perspectives. (1) Analysis me... In this paper, we conduct research on the causes and coping strategies of the land subsidence caused by the tunnel construction projects. We analyze the issues from the following of the perspectives. (1) Analysis method. To solve large scale system of the development of computer hardware and the numerical calculation method, we use the basic analysis to deal with it. (2) The empirical of methods. Ground motion is usually leads to the basic development of the inclined tunnel surface vertical displacement, the result of the movement process can turn to a settling tank. (3) Machine learning based approaches. In one of biggest difficulties when using neural network method is to obtain all possible parameters related to ground subsidence, we use the machine learning model to handle the challenge. In the final part, we show prospect for the future research, we will combine more numerical analysis tools to optimize the current methodology. 展开更多
关键词 Land Subsidence Tunnel Construction Causes and Coping Strategies Modelling.
在线阅读 下载PDF
Preschoolers' Learning Disabilities Assessment: New Perspectives in Computerized Clinical Tools
19
作者 Eugenia I. Toki Victoria Zakopoulou Jenny Pange 《Sino-US English Teaching》 2014年第6期401-410,共10页
This study looks into new perspectives in preschoolers' assessment of being at risk for learning disabilities. Precisely, two innovative assessment approaches are examined in order to reveal new research perspectives... This study looks into new perspectives in preschoolers' assessment of being at risk for learning disabilities. Precisely, two innovative assessment approaches are examined in order to reveal new research perspectives. The first tool, a traditional approach, is the "Early Dyslexia Identification Test" and the second tool, a computerized approach, is an lnternet based Speech Pathology Diagnostic Expert System named "APLo". Both evaluate the sectors of phonological awareness, memory, psychomotor development, pre-writing and pre-reading skills in Greek. The findings o f the current study formulate three directions: (1) the complementary of speech language and learning disorders as a systemic approach, (2) the diagnosis of suspicious factors and compatibilities of learning disabilities even at the preschool age, and (3) the application of alternative methods of assessment aiming for a multidimentional approach with the combined prospect and potential of web tools in the early diagnosis and intervention in learning disabilities. 展开更多
关键词 computer-based assessment tools E-ASSESSMENT learning disabilities Greek language PRESCHOOLERS
在线阅读 下载PDF
Researches On The Network Security Evaluation Method Based Bn BP Neural Network
20
作者 Zhang Yibin Yan Zequan 《International Journal of Technology Management》 2014年第9期93-95,共3页
This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluat... This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments. 展开更多
关键词 BP neural network network security MODEL EVALUATION
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部