期刊文献+
共找到36篇文章
< 1 2 >
每页显示 20 50 100
Ontology mapping approach based on set & relation theory and OCL 被引量:1
1
作者 钱鹏飞 张申生 刘英华 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第4期498-504,共7页
An ontology mapping approach based on set & relation theory and OCL is introduced,then an ontology mapping meta-model is established which is composed of ontology related elements,mapping related elements and defi... An ontology mapping approach based on set & relation theory and OCL is introduced,then an ontology mapping meta-model is established which is composed of ontology related elements,mapping related elements and definition rule related elements.This ontology mapping meta-model can be regarded as a unified mechanism to realize different kinds of ontology mappings.The powerful computation capability of set and relation theory and the flexible expressive capability of OCL can be used in the computation of ontology mapping meta-model to realize the unified mapping among different ontology models.Based on the mapping meta-model,a general mapping management framework is developed to provide a common mapping storage mechanism,some mapping APIs and mapping rule APIs. 展开更多
关键词 ONTOLOGY mapping meta-model set and relation theory OCL mapping management
在线阅读 下载PDF
Combining ODM and OCL in ontology verification 被引量:1
2
作者 钱鹏飞 王英林 张申生 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第5期723-729,共7页
In order to automatically find and conveniently rectify the structural conflicts appearing in a new ontology model version after a series of ontology evolution,we propose an ontology model verification approach,in whi... In order to automatically find and conveniently rectify the structural conflicts appearing in a new ontology model version after a series of ontology evolution,we propose an ontology model verification approach,in which the object constraint language (OCL) and an ontology definition meta-model (ODM) are used to complete the ontology verification.The ODM is composed of the ontology related elements and the definition rule related elements.The OCL is employed to describe the elements in the ontology definition meta-model:OCL extension for the ontology related elements,and OCL extension for the ontological design patterns.All of the above OCL rules will describe the constraint relationships between ontology elements.Associated with an example,the application of the ontology model verification approach based on OCL and ODM is introduced.Consequently,the conflicts happened in the ontology changing and evolution can be easily verified and rectified through this approach. 展开更多
关键词 ontology verification OCL: ODM ontological desian oattern
在线阅读 下载PDF
Generalized multi-layered granulations and approximations based on neighborhood systems under incomplete information systems
3
作者 何明 冯博琴 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第2期205-208,共4页
A generalized multi-layered granulation structure used by neighborhood systems is proposed. With granulated views, the concepts of approximations under incomplete information systems are studied, which are represented... A generalized multi-layered granulation structure used by neighborhood systems is proposed. With granulated views, the concepts of approximations under incomplete information systems are studied, which are represented by covering of the universe. With respect to different levels of granulations, a pair of lower and upper approximations is defined and an approximation structure is investigated, which lead to a more general approximation structure. The generalized multi-layered granulation structure provides a basis of the proposed framework of granular computing. Using this framework, the interesting and useful results about information granulation and approximation reasoning can be obtained. This paper presents some useful explorations about the incomplete information systems from information views. 展开更多
关键词 rough set APPROXIMATIONS neighborhood systems granular computing
在线阅读 下载PDF
The specification and analysis of network embedded system
4
作者 张冠华 张连华 白英彩 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第4期434-439,共6页
This paper proposes a formal method which is used to model and analyze network devices such as touters. It is based on an algebraic process called “ACSR-VP”, which enhances the original CCS algebraic process by inco... This paper proposes a formal method which is used to model and analyze network devices such as touters. It is based on an algebraic process called “ACSR-VP”, which enhances the original CCS algebraic process by incorporating the notions of time, resource requirements, dynamic prioritization, and synchronization. Therefore, although there are many formal methods to analyze the timed concurrency system, ACSR-VP, due to its prominent features, is best fit for analysis of a resource bounded real-time system. This paper extends ACSR-VP to EACSR-VP, which is more adaptive to the features of network devices and specializes in analyzing this kind of embedded system. EACSR-VP adds the notion of n-way communication which allows more than two processes to participate in synchronization. It also enhances value-passing capabilities which make for more flexible specifications. Finally, specifications, verification and analysis methods with EACSR-VP are introduced by a case study of router with multiple input queues. 展开更多
关键词 Formal method process algebra network devices MODELING
在线阅读 下载PDF
A real-time fault-tolerant scheduling algorithm with low dependability cost in on-board computer system
5
作者 王培东 魏振华 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第3期361-364,共4页
To make the on-board computer system more dependable and real-time in a satellite, an algorithm of the fault-tolerant scheduling in the on-board computer system with high priority recovery is proposed in this paper. T... To make the on-board computer system more dependable and real-time in a satellite, an algorithm of the fault-tolerant scheduling in the on-board computer system with high priority recovery is proposed in this paper. This algorithm can schedule the on-board fault-tolerant tasks in real time. Due to the use of dependability cost, the overhead of scheduling the fault-tolerant tasks can be reduced. The mechanism of the high priority recovery will improve the response to recovery tasks. The fault-tolerant scheduling model is presented simulation results validate the correctness and feasibility of the proposed algorithm. 展开更多
关键词 on-board computer system fault-tolerant scheduling dependability cost PRIORITY
在线阅读 下载PDF
Research on a randomized real-valued negative selection algorithm
6
作者 张凤斌 王胜文 郝忠孝 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第6期745-747,共3页
A real-valued negative selection algorithm with good mathematical foundation is presented to solve some of the drawbacks of previous approach. Specifically, it can produce a good estimate of the optimal number of dete... A real-valued negative selection algorithm with good mathematical foundation is presented to solve some of the drawbacks of previous approach. Specifically, it can produce a good estimate of the optimal number of detectors needed to cover the non-self space, and the maximization of the non-self coverage is done through an optimization algorithm with proven convergence properties. Experiments are performed to validate the assumptions made while designing the algorithm and to evaluate its performance. 展开更多
关键词 intrusion detection immune systems negative selection algorithm
在线阅读 下载PDF
Design and implementation of a large-scale multi-class text classifier
7
作者 于水 张亮 马范援 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第6期690-695,共6页
Although, researchers in the ATC field have done a wide range of work based on SVM, almost all existing approaches utilize an empirical model of selection algorithms. Their attempts to model automatic selection in pra... Although, researchers in the ATC field have done a wide range of work based on SVM, almost all existing approaches utilize an empirical model of selection algorithms. Their attempts to model automatic selection in practical, large-scale, text classification systems have been limited. In this paper, we propose a new model selection algorithm that utilizes the DDAG learning architecture. This architecture derives a new large-scale text classifier with very good performance. Experimental results show that the proposed algorithm has good efficiency and the necessary generalization capability while handling large-scale multi-class text classification tasks. 展开更多
关键词 model selection DAGSVM automatic text classification
在线阅读 下载PDF
Scale invariant features extraction for stereo vision 被引量:4
8
作者 Liu Li Peng Fuyuan +1 位作者 Tian Yani Wan Yaping 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第1期50-54,共5页
Stable local feature detection is a fundamental component of many stereo vision problems such as 3-D reconstruction, object localization, and object tracking. A robust method for extracting scale-invariant feature poi... Stable local feature detection is a fundamental component of many stereo vision problems such as 3-D reconstruction, object localization, and object tracking. A robust method for extracting scale-invariant feature points is presented. First, the Harris corners in three-level pyramid are extracted. Then, the points detected at the highest level of the pyramid are correctly propagated to the lower level by pyramid based scale invariant (PBSI) method. The corners detected repeatedly in different levels are chosen as final feature points. Finally, the characteristic scale is obtained based on maximum entropy method. The experimental results show that the algorithm has low computation cost, strong antinoise capability, and excellent performance in the presence of significant scale changes. 展开更多
关键词 pyramid matching scale invariant Harris corners characteristics scale.
在线阅读 下载PDF
Impact of small-world topologies on broadcasting for wireless sensor networks 被引量:2
9
作者 Jiang Nan Yang Shuqun +1 位作者 Zhou Liang Ding Qiulin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第1期192-196,共5页
Broadcasting is an important operation and been widely used in wireless sensor networks (WSNs). These networks are power constrained as nodes operate with limited battery power. Wireless sensor networks are spatial ... Broadcasting is an important operation and been widely used in wireless sensor networks (WSNs). These networks are power constrained as nodes operate with limited battery power. Wireless sensor networks are spatial graphs that have much more clustered and much high path-length characteristics. After considering energy- efficient broadcasting in such networks, by combining the small-world characteristic of WSNs and the properties of ant algorithm to quickly identify an optimal path, small-world power-aware broadcast algorithm is introduced and evaluated. Given different densities of network, simulation results show that our algorithm significantly improves life of networks and also reduces communication distances and power consumption. 展开更多
关键词 small world ant colony algorithm BROADCASTING wireless sensor networks.
在线阅读 下载PDF
Detection of text in images using SUSAN edge detector 被引量:2
10
作者 毛文革 张田文 王力 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第1期34-40,共7页
Text embedded in images is one of many important cues for indexing and retrieval of images and videos. In the paper, we present a novel method of detecting text aligned either horizontally or vertically, in which a py... Text embedded in images is one of many important cues for indexing and retrieval of images and videos. In the paper, we present a novel method of detecting text aligned either horizontally or vertically, in which a pyramid structure is used to represent an image and the features of the text are extracted using SUSAN edge detector. Text regions at each level of the pyramid are identified according to the autocorrelation analysis. New techniques are introduced to split the text regions into basic ones and merge them into text lines. By evaluating the method on a set of images, we obtain a very good performance of text detection. 展开更多
关键词 text detection SUSAN edge detector point of interest projection profile split and merge
在线阅读 下载PDF
A role based coordination model in agent systems 被引量:2
11
作者 张亚英 尤晋元 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期555-561,共7页
Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents ne... Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents need interaction and communication to achieve their overall goal. Coordination technologies for the Internet typically are concerned with enabling interaction among agents and helping them cooperate with each other. At the same time, access control should also be considered to constrain interaction to make it harmless. Access control should be regarded as the security counterpart of coordination. At present, the combination of coordination and access control remains an open problem. Thus, we propose a role Dased coordination model with policy enforcement in agent application systems. In this model, coordination is combined with access control so as to fully characterize the interactions in agent systems. A set of agents interacting with each other for a common global system task constitutes a coordination group. Role based access control is applied in this model to prevent unauthorized accesses. Coordination policy is enforced in a distributed manner so that the model can be applied to the open distributed systems such as Internet. An Internet online auction system is presented as a case study to illustrate the proposed coordination model and finally the performance analysis of the model is introduced. 展开更多
关键词 COORDINATION ROLE access control policy enforcement
在线阅读 下载PDF
Community discovery method with uncertainty measure of overlapping nodes based on topological potential 被引量:1
12
作者 张健沛 李泓波 +3 位作者 杨静 白劲波 初妍 张乐君 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第2期16-22,共7页
Community discovery of complex networks,esp.of social networks,has been a hotly debated topic in academic circles in recent years.Since actual networks usually contain some overlapping nodes that are difficult to assi... Community discovery of complex networks,esp.of social networks,has been a hotly debated topic in academic circles in recent years.Since actual networks usually contain some overlapping nodes that are difficult to assign to a certain community,overlapping community discovery is under great demand in practical applications.However,at present network community discovery is mainly done by non-overlapping community discovery methods,overlapping discovery methods are not common.In this context,an overlapping community discovery method is proposed hereby based on topological potential and specific algorithms are also provided.This method not only considers the spread of the uncertainty of community identity of the overlapping nodes in the network,but also realizes a quantified representation,i.e.,uncertainty measure,of the community identity of the overlapping nodes.The experiment results show that this method yields the results that are consistent with those by the classic methods and are more reasonable. 展开更多
关键词 SOCIAL NETWORK complex NETWORK OVERLAPPING COMMUNITY discovery uncertainty measure TOPOLOGICAL potential
在线阅读 下载PDF
A self region based real-valued negative selection algorithm 被引量:1
13
作者 张凤斌 王大伟 王胜文 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第6期851-855,共5页
Point-wise negative selection algorithms,which generate their detector sets based on point of self data,have lower training efficiency and detection rate.To solve this problem,a self region based real-valued negative ... Point-wise negative selection algorithms,which generate their detector sets based on point of self data,have lower training efficiency and detection rate.To solve this problem,a self region based real-valued negative selection algorithm is presented.In this new approach,the continuous self region is defined by the collection of self data,the partial training takes place at the training stage according to both the radius of self region and the cosine distance between gravity of the self region and detector candidate,and variable detectors in the self region are deployed.The algorithm is tested using the triangle shape of self region in the 2-D complement space and KDD CUP 1999 data set.Results show that,more information can be provided when the training self points are used together as a whole,and compared with the point-wise negative selection algorithm,the new approach can improve the training efficiency of system and the detection rate significantly. 展开更多
关键词 artificial immune real-valued negative selection cluster analysis self region partial training
在线阅读 下载PDF
A Heuristic Method of Scalar Multiplication of Elliptic Curve over OEF 被引量:1
14
作者 刘铎 罗平 戴一奇 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期177-183,共7页
Elliptic curve cryptosystem is the focus of public key cryptology nowadays, for it has many advantages RSA lacks. This paper introduced a new heuristic algorithm on computing multiple scalar multiplications of a given... Elliptic curve cryptosystem is the focus of public key cryptology nowadays, for it has many advantages RSA lacks. This paper introduced a new heuristic algorithm on computing multiple scalar multiplications of a given point. Based on this algorithm, a new method of computing scalar multiplication of elliptic curve over optimal extension field (OEF) using Frobenius map was presented. The new method is more efficient than the traditional ones. In the last part of this paper, the comparison was given in the end. 展开更多
关键词 CRYPTOLOGY elliptic curve optimal extension field FROBENIUS
在线阅读 下载PDF
Scan matching using line segment relationships for map-based localization of mobile robot 被引量:1
15
作者 葛坤峰 陈卫东 +1 位作者 王景川 冉宇瑶 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第6期757-762,共6页
A new scan matching method for mobile robot localization is presented, which takes line segment as the feature and matches the real scans in the given reference map by relationships of the directional-defined line seg... A new scan matching method for mobile robot localization is presented, which takes line segment as the feature and matches the real scans in the given reference map by relationships of the directional-defined line segments. The alignment was done by hierarchically identifying the multiple relationships and the result was recorded in a correspondence matrix, where the best match is defined and selected for localization. It is indicated that the searching algorithm of the best match can find the ambiguities and get rid of them. This method with less computational cost works well in occluded environment, and can correct the error in pose estimation without the need for the estimation itself. The efficiency, accuracy and robustness of this method were verified by experiments of localization in an occluded environment and a long-distance indoor navigation. 展开更多
关键词 scan matching laser range finder map-based localization mobile robot
在线阅读 下载PDF
Configurable ontology mapping based on multi-feature 被引量:1
16
作者 钱鹏飞 王英林 张申生 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第6期781-788,共8页
A configurable ontology mapping approach based on different kinds of concept feature information is introduced in this paper. In this approach, ontology concept feature information is classified as five kinds, which r... A configurable ontology mapping approach based on different kinds of concept feature information is introduced in this paper. In this approach, ontology concept feature information is classified as five kinds, which respectively corresponds to five kinds of concept similarity computation methods. Many existing ontology mapping approaches have adopted the multi-feature reasoning, whereas not all feature information can be com- puted in the real ontology mapping and only fractional feature information needs to be selected in the mapping computation. Consequently a eonfigurable ontology mapping model is introduced, which is composed of CMT model, SMT model and related transformation model. Through the configurable model, users can conveniently select the most suitable features and configure the suitable weights. Simultaneously, a related 3-step ontology mapping approach is also introduced. Associated with the traditional name and instance learner-based ontology mapping approach, this approach is evaluated by an ontology mapping application example. 展开更多
关键词 ontology mapping CONFIGURABLE concept feature
在线阅读 下载PDF
Recognition of vertical vowel graphemes of Korean characters based on combination of vowel graphemes
17
作者 崔荣一 洪炳熔 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2002年第3期302-306,共5页
Korean characters consist of 2 dimensional distributed consonantal and vowel graphemes. The purpose of reducing the 2 dimensional characteristics of Korean characters to linear arrangements at early stage of character... Korean characters consist of 2 dimensional distributed consonantal and vowel graphemes. The purpose of reducing the 2 dimensional characteristics of Korean characters to linear arrangements at early stage of character recognition is to decrease the complexity of following recognition task. By defining the identification codes for the vowel graphemes of Korean characters, the rules for combination of vowel graphemes are established, and a recognition algorithm based on the rules for combination of vowel graphemes, is therefore proposed for vertical vowel graphemes. The algorithm has been proved feasilbe through demonstrating simulations. 展开更多
关键词 KOREAN character RECOGNITION identification codes of VOWEL graphemes COMBINATION rules of vowelgraphemes RECOGNITION algorithm for VERTICAL VOWEL graphemes
在线阅读 下载PDF
INFORMATION-CENTRIC NETWORKING
18
作者 BI Jun Luca Muscariello ZHANG Beichuan 《China Communications》 SCIE CSCD 2015年第7期I0002-I0003,共2页
Information-Centric Networking(ICN)is an emerging direction in Future Internet architecture research,gaining significant tractions among academia and industry.Aiming to replace the conventional host-to-host communicat... Information-Centric Networking(ICN)is an emerging direction in Future Internet architecture research,gaining significant tractions among academia and industry.Aiming to replace the conventional host-to-host communication model by a data-centric model,ICN treats data content as the first class entity in network architecture. 展开更多
关键词 网络体系结构 通信模型 应用程序开发 信息中心 数据内容 内容分发 ICN 牵引力
在线阅读 下载PDF
Study on cipher propertys of constant weight codes
19
作者 Lin Bogang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期458-461,共4页
Constant weight code is an important error-correcting control code in communications. Basic structure of constant weight codes for some arriving at Johnson bound, A(n, 2u, w), is presented. Some correlative property... Constant weight code is an important error-correcting control code in communications. Basic structure of constant weight codes for some arriving at Johnson bound, A(n, 2u, w), is presented. Some correlative propertys of the codes, the solution of arriving at Johnson bound, and the results on the couple constant code and some constant weight codes are discussed. The conclusion is verified through four examples. 展开更多
关键词 constant weight code Johnson bound couple relation boundary property combination cipher.
在线阅读 下载PDF
Network community identification method based on individual-centered theory
20
作者 李泓波 白劲波 +1 位作者 初妍 张乐君 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第2期23-28,共6页
The studies show that numerous complex networks have clustering effect.It is an indispensable step to identify node clusters in network,namely community,in which nodes are closely related,and in many applications such... The studies show that numerous complex networks have clustering effect.It is an indispensable step to identify node clusters in network,namely community,in which nodes are closely related,and in many applications such as identification of ringleaders in anti-criminal and anti-terrorist network,efficient storage of data in Wireless Sensor Network(WSN).At present,most of community identification methods still require the specifications of the number or the scale of community by user and still can not handle overlapping nodes.In an attempt to solve these problems,a network community identification method based on utility value is proposed,which is a function of each node's clustering coefficient and degree.This method makes use of individual-centered theory for reference and can automatically determine the number of communities.In addition,this method is an overlapping community identification method in nature.It is shown through contrastive experiments that this method is more efficient than other methods based on individual-centered theory when they control the same amount of information.Finally,a research direction is proposed for network community identification method based on the individual-centered theory. 展开更多
关键词 complex network individual-centered THEORY COMMUNITY identification OVERLAPPING COMMUNITY UTILITY VALUE
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部