首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
基于最新的实验评价和模型计算的核结构数据, 组建了一个更新的核结构数据库(NSDB), 目前,该数据库包括稳定同位素的丰度和原子质量, 原子核基态和分离激发态的性质, 及原子核的变形、半径及其它性质等三部分的数据.  相似文献   

2.
戚斌 《应用声学》2016,24(12):45-45
通过对数据库的存储结构优化设计,提高数据库的吞吐量。传统方法采用存储节点校验数据适应度分区的数据库存储模型,数据库中存在重复冗余数据,不能自适应滤除,导致数据存储开销较大。提出了一种基于分布结构自适应筛选的数据库存储优化模型,首先进行数据库的存储机制和分布式数据结构分析,采用相空间重构方法进行存储空间的结构分布重组,采用分布结构自适应筛选方法对提取的数据信息流进行重复冗余数据滤波处理,改善数据在数据库存储空间中的结构分布,实现数据库存储优化。仿真结果表明,采用改进的方法进行数据库构建,能提高数据库存储吞吐量,降低数据存储开销,提高数据库的访问和调度性能,展示较好的应用价值。  相似文献   

3.
李自清 《应用声学》2017,25(5):184-187, 191
在互联网飞速发展的今天,Web 技术与数据库技术的结合越来越紧密,所以保护数据库的安全成为了信息安全十分重要的一环。在网络环境下,应采用什么样的机制来为用户提供对数据的产生、存储和访问,以及如何有效地保证其中的数据安全性,就成为迫切需要研究的课题。加密技术对数据库中存储的高度敏感机密性数据,起着越来越重要的作用,是防止数据库中的数据在存储和传输中失密的有效手段,所以完全可以用于模型。为了保护互联网中的敏感数据,提出了数据库中敏感数据的加密模型,基于对数据库敏感数据的分析、数据分类,通过加密引擎、密钥管理、失效密钥处理,将用户敏感数据形成密文存储在数据库之中。这样即使是数据库管理员也无法轻易获取用户敏感信息,在因为攻击等问题造成的数据泄露之后也可以减少系统损失,最大限度保证数据库中数据的安全性。实验结果表明该模型可以有效保护数据库中敏感数据安全。  相似文献   

4.
根据点光源和线光源基本模型与光线追迹理论,借助前台开发工具(Visual Basic6.0)和后台开发工具(Microsoft Office Access)开发了一套照明专用CAD软件。该软件既能成功模拟光线追迹,又能借助后台数据库进行光源模型选取、典型结构选取和打印报表等。可满足光学设计人员的需求。  相似文献   

5.
杨小龙  谭学治  关凯 《物理学报》2015,64(10):108403-108403
针对认知无线电网络中认知用户广义传输时间的优化问题, 提出了一种基于抢占式续传优先权M/G/m排队理论的频谱切换模型. 在该排队模型中, 为了最小化认知用户广义传输时间, 采用混合排队-并列式服务的排队方式. 在此基础上, 深入分析多个认知用户、多个授权信道、多次频谱切换条件下认知用户信道使用情况, 从而推导出广义传输时间表达式. 最后探讨了该模型下自适应频谱切换策略. 仿真结果表明, 相比于已有的频谱切换模型, 该模型不仅能够更加完整地描述认知用户频谱切换行为, 而且使得认知用户传输时延更小, 广义传输时间更短. 此外, 认知无线电网络允许的认知用户服务强度增加, 能够容纳的认知用户数量增多. 因此, 该模型提升了认知用户频谱切换的性能, 更好地实现了认知用户与授权用户的频谱共享.  相似文献   

6.
在大型差异数据库中,假设入侵特征存在较大的伪装,将难以形成入侵判断的依据,无法建立入侵路径恢复模型。提出基于敏感性数据挖掘方法的大型差异数据库中入侵路径恢复方法模型。利用主成分分析方法搜索大型差异数据路中的入侵路径,为模型的建立提供准确的数据基础,利用敏感性数据挖掘方法能够检测到入侵路径的特征,从而能够建立准确的入侵路径模型。实验结果表明,利用改进方法进行大型差异数据库中入侵路径恢复,能够提高恢复的准确性,从而保证大型差异数据库的安全。  相似文献   

7.
应用面向对象的软件开发理念开发了基于近红外光谱的土壤参数快速分析系统。系统设计了SOIL类,SOIL类的实例化对象即为具有某种特定类型、特定物理性质以及光谱特性的土壤样本。系统主要包括文件操作、光谱预处理、样品分析、建模和验证以及样品测定等子功能。系统首先接收土壤标定样本集的目标参数及光谱数据文件,并对其进行各种预处理,将处理结果显示在终端,并将建立的模型保存在模型数据库。系统通过预测土壤参数界面读取模型数据库中保存的各种模型及其参数,并将读入的待测样本光谱信息代入选定的模型,从而实现土壤参数分析功能。系统采取Visual C++ 6.0和Matlab 7.0协同完成功能开发,并采用Access XP来建立和管理模型数据库。  相似文献   

8.
补偿中子测井受到环境温度的影响,利用数值模拟计算来进行修正,但目前的理论计算程序MCNP缺乏水的精细温度相关的热中子散射数据库。为了解决蒙特卡罗模拟热中子散射S(α,β)模型只能求解特定温度条件下中子输运问题的局限性,基于热中子散射的S(α,β)原理,采用内插法得到不同温度下水的频谱分布、振动;在最新的ENDFB-VII.1数据库上,利用NJOY99程序制作了ACE格式的轻水热中子散射截面数据库。利用系列次临界基准题对数据的准确性进行了验证,不同数据库之间的计算结果及基准题的结果符合得很好。自制的数据应用于测井仪器中的温度效应修正,取得了较好的效果。  相似文献   

9.
基于数据库化学结构搜索和机器学习快速筛选特定功能材料是近年的研究热点. 本文建立了基于MYSQL的高性能化学结构数据库,即MYDB. 数据库利用新的检索算法收集和存储了超过16万个金属有机框架材料,可以实现了高效检索和推荐. 测试结果显示MYDB能够在百万数量级的材料中实现快速高效的关键词搜索,并对相似结构提供实时推荐. 结合机器学习方法和材料数据库,训练了气体吸附模型,以确定一定热力学条件下金属有机框架材料对氩气和氢气的吸附能力. 结合MYDB数据库和机器学习算法训练出的模型能够支持大规模、低成本且方便快捷的结构筛选,从而推进计算材料研究领域中特定功能材料的发现.  相似文献   

10.
建立起锂球壳模型,用三个不同的聚变评价中子数据库--FENDL2.1、FENDL3.0和JEFF3.2分别进行了中子输运模拟,比较了三个数据库的模拟结果。再对水冷增殖包层分别建立一维中子学模型和三维中子学模型,进行中子输运模拟。分析模拟结果表明,选择FENDL3.0作为水冷增殖包层三维中子学模拟的数据库;水冷增殖包层一维中子学模拟优先考虑柱壳模型模拟;水冷氚增殖包层的三维中子学模拟所得氚增殖率TBR能满足氚自持要求;而且外包层的TBR贡献是主要的。  相似文献   

11.
Public key encryption supporting equality test (PKEwET) schemes, because of their special function, have good applications in many fields, such as in cloud computing services, blockchain, and the Internet of Things. The original PKEwET has no authorization function. Subsequently, many PKEwET schemes have been proposed with the ability to perform authorization against various application scenarios. However, these schemes are incapable of traceability to the ciphertexts. In this paper, the ability of tracing to the ciphertexts is introduced into a PKEwET scheme. For the ciphertexts, the presented scheme supports not only the equality test, but also has the function of traceability. Meanwhile, the security of the proposed scheme is revealed by a game between an adversary and a simulator, and it achieves a desirable level of security. Depending on the attacker’s privileges, it can resist OW-CCA security against an adversary with a trapdoor, and can resist IND-CCA security against an adversary without a trapdoor. Finally, the performance of the presented scheme is discussed.  相似文献   

12.
A counterfactual quantum certificate authorization protocol was proposed recently (Shenoy et al., Phys. Rev. A 89, 052307 (20)), in which a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. However, this protocol requires a classical authenticated channel between Bob and Charlie to prevent possible attacks from the third party Alice, which is in conflict with the task of certificate authorization in the sense that Bob and Charlie can establish an unconditionally-secure key by a quantum key distribution protocol if there is a classical authenticated channel between them and hence securely transact with each other even without the assistance of the third party Alice.  相似文献   

13.
This paper investigates cognitive single-group multicast secure beamforming (SGMC-SBF) in multicast scenario where an eavesdropper who acts as a regular user seeks to intercept the multicast service without authorization. This study emphasizes that the transmitter iteratively learns the eavesdropper’s spatial correlation matrix from the accumulated binary feedback on received signal-to-noise-ratio. In each iteration, the transmitter learns the eavesdropper’s spatial correlation matrix based on the historical beamformings and the historical binary feedback information, which is then used to design the optimal beamforming that will be used to learn eavesdropper’s spatial correlation matrix in the next iteration. Without loss of generality, it is assumed that the transmitter knows instantaneous channel state information (CSI) of the legitimate users (LCSI), but not the instantaneous or statistical CSI of the eavesdropper (ECSI). For comparison, we also established the corresponding genie-aided SGMC-SBF with perfect ECSI and two traditional robust schemes with erroneous and statistical ECSI, respectively. The numerical results verify that the proposed cognitive SGMC-SBF are feasible solutions that provide excellent performance.  相似文献   

14.
In this paper, an online banking system has been built. Based on quantum cryptography communication, this system is proved unconditional secure. Two sets of GHZ states are applied, which can ensure the safety of purchase and payment, respectively. In another word, three trading participants in each triplet state group form an interdependent and interactive relationship. In the meantime, trading authorization and blind signature is introduced by means of controllable quantum teleportation. Thus, an effective monitor is practiced on the premise that the privacy of trading partners is guaranteed. If there is a dispute or deceptive behavior, the system will find out the deceiver immediately according to the relationship mentioned above.  相似文献   

15.
The transmission of digital medical information is affected by data compression, noise, scaling, labeling, and other factors. At the same time, medical data may be illegally copied and maliciously tampered with without authorization. Therefore, the copyright protection and integrity authentication of medical information are worthy of attention. In this paper, based on the wavelet packet and energy entropy, a new method of medical image authentication is designed. The proposed method uses the sliding window to measure the energy of the detail information. In the time–frequency data distribution, the local details of the data are mined. The complexity of energy is quantitatively described to highlight the valuable information. Based on the energy weight, the local energy entropy is constructed and normalized. The adjusted entropy value is used as the feature vector of the authentication information. A series of experiments show that the authentication method has good robustness against shearing attacks, median filtering, contrast enhancement, brightness enhancement, salt-and-pepper noise, Gaussian noise, multiplicative noise, image rotation, scaling attacks, sharpening, JPEG compression, and other attacks.  相似文献   

16.
An encrypted holographic scheme with a compact alignment system for a phase key is proposed. Alignment for a phase key is performed by a holographic correlator. A filter in the correlator system contains the phase information used for encryption. Thus, it can be used to check the authorization of the phase key. Owing to the shift-invariant property of the holographic correlator, the location of the correlation peak is highly related to the alignment of the phase key. Therefore, the phase key can be repositioned on the desired location by searching for the specific position of the correlation peak. With the help of the correlator, alignment of the phase key can be done in 1 min. Experimental results using a correlator system in support of our proposed idea are demonstrated as well.  相似文献   

17.
Aparna Gupta 《Physica A》2011,390(20):3524-3540
This paper presents and calibrates an individual’s stochastic health evolution model. In this health evolution model, the uncertainty of health incidents is described by a stochastic process with a finite number of possible outcomes. We construct a comprehensive health status index (HSI) to describe an individual’s health status, as well as a health risk factor system (RFS) to classify individuals into different risk groups. Based on the maximum likelihood estimation (MLE) method and the method of nonlinear least squares fitting, model calibration is formulated in terms of two mixed-integer nonlinear optimization problems. Using the National Health Interview Survey (NHIS) data, the model is calibrated for specific risk groups. Longitudinal data from the Health and Retirement Study (HRS) is used to validate the calibrated model, which displays good validation properties. The end goal of this paper is to provide a model and methodology, whose output can serve as a crucial component of decision support for strategic planning of health related financing and risk management.  相似文献   

18.
本文针对非侵入性射频热疗的SAR场及瞬态温度分布进行建模和数值模拟计算。采用了能正确反映电磁波在生物组织中衰减的电磁场模型。在温度场模拟中考虑了血液灌流项随组织温度变化和肿瘤区低血液灌流的特点,这些措施使模拟计算结果更加符合临床实际。还对射频热疗电磁能量分布和温度分布的特点及其影响因素等作了细致的分析和讨论。  相似文献   

19.
吕红亮  张义门  张玉明 《中国物理》2004,13(7):1100-1103
Based on 4H-SiC material parameters, three different analytical expressions are used to characterize the electron mobility as the function of electric field. The first model is based on simple saturation of the steady-state drift velocity with electric field (conventional three-parameter model for silicon). The second GaAs-based mobility model partially reflects the peak velocity in high electric fields. The third multi-parameter model proposed in this paper is more realistic since it well reproduces the drift velocity-field characteristics obtained by Monte Carlo calculations, revealing the peak drift velocity with subsequent saturation at higher electric fields. Thus, the drift velocity model presented in this paper is much better for device simulation. In this paper, the influence of mobility model on DC characteristics of 4H-SiC MESFET is calculated and the better accordance with the experimental results is presented with multi-parameter model.  相似文献   

20.
紫外可见多波长透射光谱包含了细菌微生物对光的吸收和前向散射等信息,能反映细菌细胞的组分、大小以及形态等特征,具有细菌种属的特异性,可应用于细菌微生物的快速种类鉴别。以水体中常见细菌微生物为研究对象,实验测量了大肠埃希氏菌、金黄色葡萄球菌、鼠伤寒沙门氏菌以及肺炎克雷伯菌的紫外可见多波长透射光谱,简要分析了不同种类细菌微生物的多波长透射光谱特征;研究了透射光谱与支持向量机多向量分析方法相结合的水体细菌微生物快速识别方法,利用基于网格搜索法的训练集内部交叉验证获取建模所需最佳惩罚因子C和核函数参数g,根据最优参数和LibSVM一对一多分类法建立细菌快速分类鉴别模型。利用不同株实验细菌的透射光谱作为测试集对所建模型进行识别正确率的验证,结果表明,所建立的快速分类鉴别模型可以对选取的大肠埃希氏菌、金黄色葡萄球菌、鼠伤寒沙门氏菌以及肺炎克雷伯菌进行快速种类识别,识别正确率为100%;分类鉴别模型对不同大肠杆菌亚种的测试集识别正确率为100%,证明该模型对细菌属间鉴别具有较好的稳定性。不仅可为饮用水源细菌微生物的快速识别预警提供方法,而且可在生物医学方面作为细菌微生物鉴别的一种简便、快速、准确的手段。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号