排序方式: 共有28条查询结果,搜索用时 78 毫秒
1.
2.
3.
非线性时间序列的替代数据检验方法研究 总被引:9,自引:1,他引:9
目前,替代数据方法已逐渐成为时间序列的非线性成分检验中广为采用的一种方法。但对于具有同原始数据的均值和方差的线性相关高斯过程的零假设,通常产生相应替代数据的FT(FourierTransform)算法不能很好地重构原始数据的Fourier频谱。本文对替代数据方法进行了研究,提出了一种改进的FT算法,使得替代数据既具有原始数据的均值和方差,又具有原始数据的Fourier频谱。利用Gauss数据和logistic方程产生的混沌时间序列数据,证明本文提出的改进算法是可行的,所产生的替代数据是合适的。 相似文献
4.
近日,《中共人民共和国电子签名法》和与之配套的《电子认证服务管理办法》同步施行。《电子签名法》及配套规律规章的颁布实施,为我国电子商务和电子政务的健康发展创造了良好的法律环境。 相似文献
5.
作为国际级工业计算机领域的主要设计者和制造者-艾讯科技(AX10MTEK)在刚结束不久的世界第二大计算机展览会——台北国际计算机展COMPUTEX TAIPEI上独领风骚,一系列研发创新产品拔得头筹。现在,国内观众也将有机会到现场体验艾讯科技带来的科技魅力了! 相似文献
6.
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. 相似文献
7.
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio sections.Taking use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio segments.Then,it extracts the audio profile,i.e.the zero-watermark,according to the relative size of energies of consecutive fragments.The experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness. 相似文献
8.
9.
浅析EPON技术的网络实现模式 总被引:1,自引:0,他引:1
随着光纤接人的进一步发展,FTTC/B向FTTH/O演进是必然趋势;光纤接入网络将成为城域网/SS与家庭网关/IAD之间的主要载体。EPON作为新一代光网络接人技术,是实现FTTH/O的主要技术之一。文章简要论述了EPON网络系统和工作原理,重点论述EPON技术在网络中实现的方式,并指出了网络实现中存在的问题,最后,提出EPON技术网络发展前景。 相似文献
10.