期刊文献+
共找到257篇文章
< 1 2 13 >
每页显示 20 50 100
A Study of Triangle Inequality Violations in Social Network Clustering
1
作者 Sanjit Kumar Saha Tapashi Gosswami 《Journal of Computer and Communications》 2024年第1期67-76,共10页
Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie... Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters. 展开更多
关键词 CLUSTERING Triangle Inequality violations Traditional Clustering Graph Clustering
下载PDF
Investigating the factors affecting traffic violations based on electronic enforcement data:A case study in Shangyu,China 被引量:1
2
作者 Fan Haoxuan Ren Gang +1 位作者 Li Haojie Ma Jingfeng 《Journal of Southeast University(English Edition)》 EI CAS 2021年第2期227-236,共10页
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e... To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety. 展开更多
关键词 traffic violations road traffic safety electronic enforcement data multinomial logistic regression influencing factors
下载PDF
Using Excel to Explore the Effects of Assumption Violations on One-Way Analysis of Variance (ANOVA) Statistical Procedures
3
作者 William Laverty Ivan Kelly 《Open Journal of Statistics》 2019年第4期458-469,共12页
To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violation... To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program. 展开更多
关键词 EXCEL One-Way ANOVA ASSUMPTION violations T-DISTRIBUTION CAUCHY Distribution
下载PDF
How Kieffer Density Matrix Formalism Aids Different Initial Time Steps, Leading to Lorentz Violations, and Breakup of Primordial Black Holes for GW Generation
4
作者 Andrew Beckwith 《Journal of High Energy Physics, Gravitation and Cosmology》 2021年第4期1315-1327,共13页
A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early u... A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document. 展开更多
关键词 Kieffer Density Matrix Initial Time Lorentz violations Black Holes
下载PDF
SVR-Miner:Mining Security Validation Rules and Detecting Violations in Large Software 被引量:1
5
作者 梁彬 谢素斌 +2 位作者 石文昌 梁朝晖 陈红 《China Communications》 SCIE CSCD 2011年第4期84-98,共15页
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p... For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently. 展开更多
关键词 static analysis data mining automated validation rules extraction automated violation detection
下载PDF
Topo semantic constraint-violations in spatial database
6
作者 凯龙 李香 +1 位作者 刘宏伟 杨孝宗 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期506-512,共7页
Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this res... Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems. 展开更多
关键词 topo-semantic constraint rule constraint violation spatial object spatial database R-TREE GIS
下载PDF
Adaptive Runtime Monitoring of Service Level Agreement Violations in Cloud Computing
7
作者 Sami Ullah Khan Babar Nazir +3 位作者 Muhammad Hanif Akhtar Ali Sardar Alam Usman Habib 《Computers, Materials & Continua》 SCIE EI 2022年第6期4199-4220,共22页
The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to... The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies. 展开更多
关键词 Energy consumption penalty calculation proactive resource allocation service level agreement(SLA)monitoring SLA violation detection
下载PDF
On Island Constraints and Violations'
8
作者 LIN Hui MENG Fan-mao 《Journal of Literature and Art Studies》 2018年第1期146-152,共7页
There are some grammatical rules of pure syntactic restrictions on grammar rules of operation, a complex one of which is the fronting, i.e., extraction from the island. This paper centers on the "island" that is the... There are some grammatical rules of pure syntactic restrictions on grammar rules of operation, a complex one of which is the fronting, i.e., extraction from the island. This paper centers on the "island" that is the terminology in syntactic theory, and mainly focuses on the definition, the types and the analyses of the "island" 展开更多
关键词 ISLAND TOPICALIZATION CONSTRAINTS VIOLATION
下载PDF
Comparison of Environmental Law Violations and Accounting Abuses by Russian Enterprises
9
作者 Vladimir Glinskiy Michael Alekseev Lyudmila Serga 《Journal of Business Administration Research》 2019年第2期8-12,共5页
Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research ... Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting. 展开更多
关键词 Sustainable development Ecological law VIOLATION FINANCIAL REPORTING misstatements
下载PDF
Electrodynamics with violations of Lorentz and U(1)gauge symmetries and their Hamiltonian structures
10
作者 杨秀鹏 李瀑飞 朱涛 《Chinese Physics C》 SCIE CAS CSCD 2024年第6期45-57,共13页
This study aims to investigate Lorentz/U(1)gauge symmetry-breaking electrodynamics in the framework of the standard-model extension and analyze the Hamiltonian structure for the theory with a specific dimension of Lor... This study aims to investigate Lorentz/U(1)gauge symmetry-breaking electrodynamics in the framework of the standard-model extension and analyze the Hamiltonian structure for the theory with a specific dimension of Lorentz breaking operators.For this purpose,we consider a general quadratic action of the modified electrodynamics with Lorentz/gauge-breaking operators and calculate the number of independent components of the operators at different dimensions in gauge invariance and breaking.With this general action,we then analyze how Lorentz/gauge symmetry-breaking can change the Hamiltonian structure of the theories by considering Lorentz/gauge-breaking operators with dimension as examples.We show that the Lorentz-breaking operators with gauge invariance do not change the classes of the theory constrains and the number of physical degrees of freedom of the standard Maxwell electrodynamics.When U(1)gauge symmetry-breaking operators are present,the theories generally lack a first-class constraint and have one additional physical degree of freedom compared to the standard Maxwell electrodynamics. 展开更多
关键词 standard model extension ELECTRODYNAMICS Lorentz violations
原文传递
Addressing Japan’s disposal of nuclear-contaminated water from the perspective of international human rights law
11
作者 Yen-Chiang Chang Xiaonan Zhao 《Chinese Journal of Population,Resources and Environment》 2024年第1期1-9,共9页
The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente... The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard. 展开更多
关键词 Fukushima nuclearcontaminated water Crimes against humanity Remedy for violations of human rights Right to environment Right to life
下载PDF
Determination of Liability for Violation of “Sexual Autonomy” and Compensation for Mental Damages
12
作者 姚邢 JIANG Lin(Translated) 《The Journal of Human Rights》 2024年第2期347-372,共26页
At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of dispute... At the legislative level in China,there has been insufficient theoretical preparation to explicitly include“sexual autonomy”within the scope of general personality rights.In handling the increasing number of disputes related to violations of“sexual autonomy,”judicial biases have emerged during the trial process when courts determine the attribute of the right to“sexual autonomy.”This situation necessitates a clear legal analysis of the concept and attributes of“sexual autonomy”to establish its essential attribute as a personality right,and,from the perspective of legal doctrine,enable the justification of the right to“sexual autonomy”as either a general personality right or other personality interests,thereby providing theoretical support for courts to“adjudicate according to law.”By delineating and categorizing instances of violations of“sexual autonomy,”the constitutive elements and fundamental characteristics of such violations can be clarified.By examining the legal norms governing civil litigation and civil litigation associated with criminal cases concerning violations of“sexual autonomy,”the responsibility determination,remedies,and existing regulatory loopholes regarding violations of“sexual autonomy,”especially in cases involving both criminal and civil matters,can be defined.Based on this foundation,the legal basis,determination mechanism,and compensation standards for claiming compensation for mental damages resulting from violations of“sexual autonomy”can be elucidated. 展开更多
关键词 sexual autonomy personality rights violations liability investigation
下载PDF
AI-Based Helmet Violation Detection for Traffic Management System
13
作者 Yahia Said YahyaAlassaf +5 位作者 Refka Ghodhbani Yazan Ahmad Alsariera Taoufik Saidani Olfa Ben Rhaiem Mohamad Khaled Makhdoum Manel Hleili 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期733-749,共17页
Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledgin... Enhancing road safety globally is imperative,especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations.Acknowledging the critical role of helmets in rider protection,this paper presents an innovative approach to helmet violation detection using deep learning methodologies.The primary innovation involves the adaptation of the PerspectiveNet architecture,transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone,aimed at bolstering detection capabilities.Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset(IDD)for training and validation,the system demonstrates exceptional performance,achieving an impressive detection accuracy of 95.2%,surpassing existing benchmarks.Furthermore,the optimized PerspectiveNet model showcases reduced computational complexity,marking a significant stride in real-time helmet violation detection for enhanced traffic management and road safety measures. 展开更多
关键词 Non-helmet use detection traffic violation SAFETY deep learning optimized PerspectiveNet
下载PDF
The Equation for the CP Violating Phase for Quarks: The Rule for the Sum of Quark Oscillation Probabilities
14
作者 Zoran B. Todorovic 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1835-1865,共31页
By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an... By applying the rules for the sum of quark oscillation probabilities for the original CKM matrix and for Wolfenstein’s parameterization, equations were derived in which the CP violating phase for quarks appears as an unknown quantity. Quark oscillations occur in spaces that are on the femtometer scale and they are unmeasurable from the point of view of experiments. However, the consequence of those oscillations is the CP violating phase for quarks, which is measured through unitary triangles in Wolfenstein’s parameterization. Through the mathematical model presented in this paper, the equation in Wolfenstein’s parameterization was derived, the root of which is consistent with measurements in today’s quark physics. 展开更多
关键词 QUARKS CKM Matrix PMNS Matrix Wolfenstein Parameterization CP Violation Phase Jarlskog Invariant
下载PDF
Fermions: Spin, Hidden Variables, Violation of Bell’s Inequality and Quantum Entanglement
15
作者 Doron Kwiat 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第4期1613-1627,共15页
Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s co... Using real fields instead of complex ones, it was recently claimed, that all fermions are made of pairs of coupled fields (strings) with an internal tension related to mutual attraction forces, related to Planck’s constant. Quantum mechanics is described with real fields and real operators. Schrodinger and Dirac equations then are solved. The solution to Dirac equation gives four, real, 2-vectors solutions ψ1=(U1D1)ψ2=(U2D2)ψ3=(U3D3)ψ4=(U4D4)where (ψ1,ψ4) are coupled via linear combinations to yield spin-up and spin-down fermions. Likewise, (ψ2,ψ3) are coupled via linear combinations to represent spin-up and spin-down anti-fermions. For an incoming entangled pair of fermions, the combined solution is Ψin=c1ψ1+c4ψ4where c1and c4are some hidden variables. By applying a magnetic field in +Z and +x the theoretical results of a triple Stern-Gerlach experiment are predicted correctly. Then, by repeating Bell’s and Mermin Gedanken experiment with three magnetic filters σθ, at three different inclination angles θ, the violation of Bell’s inequality is proven. It is shown that all fermions are in a mixed state of spins and the ratio between spin-up to spin-down depends on the hidden variables. 展开更多
关键词 FERMIONS SPIN Hidden Variables Bell’s Inequality Violation Spin Entanglement
下载PDF
Testing noncommutative spacetimes and violations of the Pauli Exclusion Principle through underground experiments
16
作者 Andrea Addazi Pierluigi Belli +1 位作者 Rita Bernabei Antonino Marcianò 《Chinese Physics C》 SCIE CAS CSCD 2018年第9期79-86,共8页
We propose to deploy limits that arise from different tests of the Pauli Exclusion Principle: i) to provide theories of quantum gravity with experimental guidance; ii) to distinguish, among the plethora of possible... We propose to deploy limits that arise from different tests of the Pauli Exclusion Principle: i) to provide theories of quantum gravity with experimental guidance; ii) to distinguish, among the plethora of possible models, the ones that are already ruled out by current data; iii) to direct future attempts to be in accordance with experimental constraints. We first review experimental bounds on nuclear processes forbidden by the Pauli Exclusion Principle,which have been derived by several experimental collaborations making use of various detector materials. Distinct features of the experimental devices entail sensitivities on the constraints hitherto achieved that may differ from one another by several orders of magnitude. We show that with choices of these limits, well-known examples of flat noncommutative space-time instantiations of quantum gravity can be heavily constrained, and eventually ruled out.We devote particular attention to the analysis of the κ-Minkowski and θ-Minkowski noncommutative spacetimes.These are deeply connected to some scenarios in string theory, loop quantum gravity, and noncommutative geometry.We emphasize that the severe constraints on these quantum spacetimes, although they cannot rule out theories of top-down quantum gravity to which they are connected in various ways, provide a powerful limitation for those models. Focus on this will be necessary in the future. 展开更多
关键词 non-commutative space-times tests of violations of the Pauli Exclusion Principle theta-Minkowski kappa-Minkowski
原文传递
Violations of Chinese Sovereignty Not Allowed
17
《Beijing Review》 2009年第29期17-17,共1页
关键词 violations of Chinese Sovereignty Not Allowed
原文传递
Detailed Rules on the Punishment of the Violations of the Laws and Legislation in Finance
18
《中国外汇》 1999年第3期65-65,共1页
关键词 LAWS Detailed Rules on the Punishment of the violations of the Laws and Legislation in Finance
原文传递
Are academic independent directors punished more severely when they engage in violations? 被引量:5
19
作者 Yi Quan Sihai Li 《China Journal of Accounting Research》 2017年第1期71-86,共16页
We use a sample of Chinese A-share listed companies from 2003 to 2013 to explore the reputation damage and overflow effect of academic independent directors who have received supervisory punishment. We find that when ... We use a sample of Chinese A-share listed companies from 2003 to 2013 to explore the reputation damage and overflow effect of academic independent directors who have received supervisory punishment. We find that when companies violate information disclosure rules, the market punishes academic independent directors more severely than nonacademic independent directors for these violations. Furthermore, companies employing punished academic directors face greater declines in their stock price than companies employing punished nonacademic independent directors during a relatively short window before or after the punishment is announced. The punishment of academic independent directors influences the employment of other scholars in the same field and results in a negative overflow effect. This study provides evidence of the market's differential reactions to independent directors with different backgrounds; the findings reflect the double-edged sword of one individual's reputation on organizations. 展开更多
关键词 Academic independent directors Violation behavior Reputation punishment Overflow effect
原文传递
Optimal transmission switching to eliminate voltage violations during light-load periods using decomposition approach 被引量:4
20
作者 Boshi ZHAO Zechun HU +2 位作者 Qian ZHOU Hongcai ZHANG Yonghua SONG 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2019年第2期297-308,共12页
With the rapid load increase in some countries such as China, power grids are becoming more strongly interconnected, and the differences between peak and valley loads are also increasing. As a result, some bulk power ... With the rapid load increase in some countries such as China, power grids are becoming more strongly interconnected, and the differences between peak and valley loads are also increasing. As a result, some bulk power systems are facing high voltage limit violations during light-load periods. This paper proposes to utilize transmission switching(TS) to eliminate voltage violations. The TS problem is formed as a mixed-integer nonlinear program(MINLP) with AC power flow constraints and binary variables. The proposed MINLP problem is non-deterministic polynomial hard.To efficiently solve the problem, a decomposition approach is developed. This approach decomposes the original problem into a mixedinteger linear programming master problem and an AC optimal power flow slave problem that is used to check the AC feasibility. Prevention of islanding is also taken into consideration to ensure the feasibility of the TS results.The modified IEEE 39-bus and IEEE 57-bus test systems are used to demonstrate the applicability and effectiveness of the proposed method. 展开更多
关键词 Transmission switching VOLTAGE VIOLATION OPTIMAL power flow DECOMPOSITION APPROACH Mixedinteger programming
原文传递
上一页 1 2 13 下一页 到第
使用帮助 返回顶部