期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Using the multi-living agent concept to investigate complex information systems 被引量:2
1
作者 WANG Yue TAO Ran LI BingZhao 《Science in China(Series F)》 2009年第1期1-17,共17页
In this paper, we propose the multi-living agent (MLA) concept based on the of analysis the characteristics of complex information systems, especially those systems that require multi-functional operations under str... In this paper, we propose the multi-living agent (MLA) concept based on the of analysis the characteristics of complex information systems, especially those systems that require multi-functional operations under strict restraint strong countermeasures (SRSC) environment. First, we investigate the representation of the livelihood of the system under the SRSC conditions, and obtain the basic dynamical presentation of the MLA from the profile of the system's function. Next, we propose the concept of the living self-organization based on the self-organization profile of the system, and derive a Two-Set model of the living self-organization mechanism. Further, based on the above results, we present a basic construction model of MLA-based information systems in the field of information security and countermeasures. A three-level negotiation-coordination mechanism is also derived. Finally, we present two practical examples to show how to use the MLA concept to analyze and study real complex information systems. In our opinion, the proposal of the MLA will bridge the gap between the research of the application and the basic application level of science. It provides the principle research methods and the supporting theories for the construction and analysis of complex information systems in the information security and countermeasures field. 展开更多
关键词 complex information system multi-living-agent (MLA) self-organization mechanism negotiation-coordination model SWARM
原文传递
Aggregation operators and CRITIC-VIKOR method for confidence complex q-rung orthopair normal fuzzy information and their applications
2
作者 Tahir Mahmood Zeeshan Ali Muhammad Naeem 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第1期40-63,共24页
Supply chain management is an essential part of an organisation's sustainable programme.Understanding the concentration of natural environment,public,and economic influence and feasibility of your suppliers and pu... Supply chain management is an essential part of an organisation's sustainable programme.Understanding the concentration of natural environment,public,and economic influence and feasibility of your suppliers and purchasers is becoming progressively familiar as all industries are moving towards a massive sustainable potential.To handle such sort of developments in supply chain management the involvement of fuzzy settings and their generalisations is playing an important role.Keeping in mind this role,the aim of this study is to analyse the role and involvement of complex q-rung orthopair normal fuzzy(CQRONF)information in supply chain management.The major impact of this theory is to analyse the notion of confidence CQRONF weighted averaging,confidence CQRONF ordered weighted averaging,confidence CQRONF hybrid averaging,confidence CQRONF weighted geometric,confidence CQRONF ordered weighted geometric,confidence CQRONF hybrid geometric operators and try to diagnose various properties and results.Furthermore,with the help of the CRITIC and VIKOR models,we diagnosed the novel theory of the CQRONF-CRITIC-VIKOR model to check the sensitivity analysis of the initiated method.Moreover,in the availability of diagnosed operators,we constructed a multi-attribute decision-making tool for finding a beneficial sustainable supplier to handle complex dilemmas.Finally,the initiated operator's efficiency is proved by comparative analysis. 展开更多
关键词 averaging/geometric aggregation operators complex q-rung orthopair normal fuzzy information confidence levels strategic decision-making methods
下载PDF
Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems
3
作者 Jinxin Zuo Yueming Lu +4 位作者 Hui Gao Tong Peng Ziyv Guo Tong An Enjie Liu 《Computers, Materials & Continua》 SCIE EI 2021年第8期2579-2595,共17页
With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQ... With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly,with the support of asset identification and topology data,we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs. 展开更多
关键词 complex heterogeneous information system security-critical component threat attack tree information security quantitative evaluation
下载PDF
Agile Scheduling for MES in a Complex Information Environment 被引量:1
4
作者 LIShu-xia RAOYun-qing ZHANGChao-yong 《Computer Aided Drafting,Design and Manufacturing》 2005年第1期52-58,共7页
关键词 agile scheduling MES complex information game theoretic model
下载PDF
Research on Extraction Method of Surface Information Based on Multi-Feature Combination Such as Fractal Texture
5
作者 Zhen Chen Yiyang Zheng 《Journal of Geoscience and Environment Protection》 2023年第10期50-66,共17页
Because of the developed economy and lush vegetation in southern China, the following obstacles or difficulties exist in remote sensing land surface classification: 1) Diverse surface composition types;2) Undulating t... Because of the developed economy and lush vegetation in southern China, the following obstacles or difficulties exist in remote sensing land surface classification: 1) Diverse surface composition types;2) Undulating terrains;3) Small fragmented land;4) Indistinguishable shadows of surface objects. It is our top priority to clarify how to use the concept of big data (Data mining technology) and various new technologies and methods to make complex surface remote sensing information extraction technology develop in the direction of automation, refinement and intelligence. In order to achieve the above research objectives, the paper takes the Gaofen-2 satellite data produced in China as the data source, and takes the complex surface remote sensing information extraction technology as the research object, and intelligently analyzes the remote sensing information of complex surface on the basis of completing the data collection and preprocessing. The specific extraction methods are as follows: 1) extraction research on fractal texture features of Brownian motion;2) extraction research on color features;3) extraction research on vegetation index;4) research on vectors and corresponding classification. In this paper, fractal texture features, color features, vegetation features and spectral features of remote sensing images are combined to form a combination feature vector, which improves the dimension of features, and the feature vector improves the difference of remote sensing features, and it is more conducive to the classification of remote sensing features, and thus it improves the classification accuracy of remote sensing images. It is suitable for remote sensing information extraction of complex surface in southern China. This method can be extended to complex surface area in the future. 展开更多
关键词 complex Surface Remote Sensing information Extraction Remote Sensing Land Classification Transfer Learning Brownian Motion Fractal Texture
下载PDF
虑及技术系统复杂性的基层核化安全策略
6
作者 沈志刚 《工业安全与环保》 2023年第1期72-75,共4页
针对工业生产体系的基层班组安全压力难以缓解,梳理安全管理现状提出主要问题,结合安全复杂学理论,以简化的发电厂汽轮机EH油压保护工艺单元为例,剖析维修作业过程的多种风险涌现机制,阐明了基层班组技术系统的安全复杂性,明确了传统安... 针对工业生产体系的基层班组安全压力难以缓解,梳理安全管理现状提出主要问题,结合安全复杂学理论,以简化的发电厂汽轮机EH油压保护工艺单元为例,剖析维修作业过程的多种风险涌现机制,阐明了基层班组技术系统的安全复杂性,明确了传统安全管理模式应对安全风险涌现的不足。提出基于技术系统时空风险公式的核化安全策略,罗列了4种风险成分的主要应对策略,阐述了在班组层面的关联化、信息化手段,分析了企业整合班组策略的作用点与总体步骤,并为安全信息化技术指出新的开发方向。 展开更多
关键词 基层班组 技术系统 风险涌现 安全复杂性 核化安全策略 信息化
下载PDF
略论我国信息化建设系统的性质、要素及相互作用方式 被引量:3
7
作者 罗伟其 刘永清 《系统工程与电子技术》 EI CSCD 1999年第7期17-19,共3页
信息化建设是一个开放的复杂巨系统。以系统工程方法对信息化建设系统的性质、要素及其相互作用方式进行了分析。
关键词 工程信息系统 信息资源规划 中国 信息化建设
下载PDF
基于复杂适应系统理论的信息化条件下政治动员 被引量:1
8
作者 余远来 《海军工程大学学报(综合版)》 2014年第1期12-15,共4页
信息化条件下政治动员是一个复杂适应系统,呈现出动员主体多元化、动员对象全域化、动员节奏快速化、军民界限模糊化等特点,与外部信息环境的影响、互动体现得更为深刻明显。文中基于复杂适应系统理论,通过对信息化条件下政治动员的自... 信息化条件下政治动员是一个复杂适应系统,呈现出动员主体多元化、动员对象全域化、动员节奏快速化、军民界限模糊化等特点,与外部信息环境的影响、互动体现得更为深刻明显。文中基于复杂适应系统理论,通过对信息化条件下政治动员的自适应性模型分析,提出了加强信息化条件下政治动员能力建设的几点对策。 展开更多
关键词 信息化条件下 政治动员 复杂适应系统理论
下载PDF
企业信息化工程评价体系研究:需求、困境和解决思路
9
作者 李清 陈禹六 《制造业自动化》 北大核心 2006年第6期1-6,57,共7页
信息化带动工业化是我国大力倡导的走新型工业化道路的基本方针,国家、地方和企业在信息化领域投入了大量的人力和物力。信息化所涉及的首先是技术问题,但是与其他技术不同,它牵涉了大量的管理要素,并且由于它的系统特性和集成特性,信... 信息化带动工业化是我国大力倡导的走新型工业化道路的基本方针,国家、地方和企业在信息化领域投入了大量的人力和物力。信息化所涉及的首先是技术问题,但是与其他技术不同,它牵涉了大量的管理要素,并且由于它的系统特性和集成特性,信息化本身在企业内部属支撑性工程,如何评价其建设效果是一个保证信息化工作顺利推进、产生实效的问题,同时又是非常难于提供完整解决方案的问题。本文在讨论信息化工程的特性基础上,回顾了信息化工程评价技术的研究轨迹,指明了该研究及其工程实践面临的困境,为信息化评价体系、技术和方法的进一步研究提供了推进的思路。 展开更多
关键词 复杂系统 性能 测量 平价体系 信息化
下载PDF
Using object-based analysis to derive surface complexity information for improved filtering of airborne laser scanning data 被引量:2
10
作者 Menglong YAN Thomas BLASCHKE +4 位作者 Hongzhao TANG Chenchao XIAO Xian SUN Daobing ZHANG Kun FU 《Frontiers of Earth Science》 SCIE CAS CSCD 2017年第1期11-19,共9页
Airborne laser scanning (ALS) is a technique used to obtain Digital Surface Models (DSM) and Digital Terrain Models (DTM) efficiently, and filtering is the key procedure used to derive DTM from point clouds. Gen... Airborne laser scanning (ALS) is a technique used to obtain Digital Surface Models (DSM) and Digital Terrain Models (DTM) efficiently, and filtering is the key procedure used to derive DTM from point clouds. Generating seed points is an initial step for most filtering algorithms, whereas existing algorithms usually define a regular window size to generate seed points. This may lead to an inadequate density of seed points, and further introduce error type I, especially in steep terrain and forested areas. In this study, we propose the use of object- based analysis to derive surface complexity information from ALS datasets, which can then be used to improve seed point generation. We assume that an area is complex if it is composed of many small objects, with no buildings within the area. Using these assumptions, we propose and implement a new segmentation algorithm based on a grid index, which we call the Edge and Slope Restricted Region Growing (ESRGG) algorithm. Surface complexity information is obtained by statistical analysis of the number of objects derived by segmentation in each area. Then, for complex areas, a smaller window size is defined to generate seed points. Experimental results show that the proposed algorithm could greatly improve the filtering results in complex areas, especially in steep terrain and forested areas. 展开更多
关键词 airborne laser scanning object-based analysis surface complexity information filtering algorithm
原文传递
Exploiting global information in complex network repair processes 被引量:1
11
作者 Tianyu WANG Jun ZHANG Sebastian WANDELT 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2017年第3期1086-1100,共15页
Robustness of complex networks has been studied for decades,with a particular focus on network attack.Research on network repair,on the other hand,has been conducted only very lately,given the even higher complexity a... Robustness of complex networks has been studied for decades,with a particular focus on network attack.Research on network repair,on the other hand,has been conducted only very lately,given the even higher complexity and absence of an effective evaluation metric.A recently proposed network repair strategy is self-healing,which aims to repair networks for larger components at a low cost only with local information.In this paper,we discuss the effectiveness and efficiency of self-healing,which limits network repair to be a multi-objective optimization problem and makes it difficult to measure its optimality.This leads us to a new network repair evaluation metric.Since the time complexity of the computation is very high,we devise a greedy ranking strategy.Evaluations on both real-world and random networks show the effectiveness of our new metric and repair strategy.Our study contributes to optimal network repair algorithms and provides a gold standard for future studies on network repair. 展开更多
关键词 complex network Global information Greedy ranking Optimality Self-healing
原文传递
A New Method for Measurement and Reduction of Software Complexity
12
作者 施银盾 徐拾义 《Tsinghua Science and Technology》 SCIE EI CAS 2007年第S1期212-216,共5页
This paper develops an improved structural software complexity metrics named information flow complexity which is closely related to the reliability of software. Together with the three software complexity metrics, th... This paper develops an improved structural software complexity metrics named information flow complexity which is closely related to the reliability of software. Together with the three software complexity metrics, the total software complexity is measured and some rules to reduce the complexity are presented in the paper. To illustrate and explain the process of measurement and reduction of software complexity, several examples and experiments are given. It is proposed that software complexity metrics can be measured earlier in software development and can provide substantial information of software systems whose reliabil- ity can be modeled and used in the determination of initial parameter estimation. 展开更多
关键词 software complexity metrics information flow complexity software reliability
原文传递
动态运行复杂体系档案信息化管理问题与对策——青岛大学材料学科实训平台 被引量:2
13
作者 杨淑静 丛海林 杨超 《化学教育(中英文)》 CAS 北大核心 2023年第4期115-121,共7页
档案信息化管理对于保障产科教融合协同育人实训平台动态复杂体系的正常运行和实训教学的有效实施具有重要意义。以青岛大学材料学科实训平台为例研究了实训平台动态运行复杂体系档案信息化管理存在的问题与对策。结果显示:实训平台动... 档案信息化管理对于保障产科教融合协同育人实训平台动态复杂体系的正常运行和实训教学的有效实施具有重要意义。以青岛大学材料学科实训平台为例研究了实训平台动态运行复杂体系档案信息化管理存在的问题与对策。结果显示:实训平台动态复杂体系实现档案信息化管理存在档案信息组成元素的复杂性、档案信息收集与整理的多样性和时效性、对档案信息管理机制的强依赖性等问题;实现实训平台动态复杂体系档案信息化管理的对策有:准确梳理复杂体系各档案元素之间的关系、设计合理的档案信息管理系统、科学构建服务于实训教学的档案管理机制。 展开更多
关键词 复杂体系 动态运行 档案 信息化 管理机制
原文传递
信息化建设的总体规划探讨 被引量:13
14
作者 罗伟其 刘永清 《系统工程理论与实践》 EI CSCD 北大核心 2000年第3期33-38,共6页
信息化建设是一个开放性的复杂巨系统 .宏观规划是信息化建设的关键 。
关键词 信息化建设 总体规划 信息产业 系统工程
原文传递
A Comparative Analysis on Weibo and Twitter 被引量:2
15
作者 Wentao Han Xiaowei Zhu +3 位作者 Ziyan Zhu Wenguang Chen Weimin Zheng Jianguo Lu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期1-16,共16页
Weibo is the Twitter counterpart in China that has attracted hundreds of millions of users. We crawled an almost complete Weibo user network that contains 222 million users and 27 billion links in 2013. This paper ana... Weibo is the Twitter counterpart in China that has attracted hundreds of millions of users. We crawled an almost complete Weibo user network that contains 222 million users and 27 billion links in 2013. This paper analyzes the structural properties of this network, and compares it with a Twitter user network. The topological properties we studied include the degree distributions, connected components, distance distributions, reciprocity,clustering coefficient, Page Rank centrality, and degree assortativity. We find that Weibo users have a higher diversity index, higher Gini index, but a lower reciprocity and clustering coefficient for most of the nodes. A surprising observation is that the reciprocity of Weibo is only about a quarter of the reciprocity of the Twitter user network. We also show that Weibo adoption rate correlates with economic development positively, and Weibo network can be used to quantify the connections between provinces and regions in China. In particular, point-wise mutual information is shown to be accurate in quantifying the strength of connections. We developed an interactive analyzing software framework for this study, and released the data and code online. 展开更多
关键词 Weibo Twitter online social network complex network mutual information
原文传递
The Concept and Operations of Blind Number
16
作者 PANG Yan jun, LIU Kai di, ZHANG Bo wenHebei Institute of Architectural Science & Technology, Handan 056038, China 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2001年第1期34-37,共4页
:This paper gives the definition and operations of blind number, and discusses its operationproperties. Blind number is a mathematical tool to express and deal with complex information with severalkinds of uncertainty.
关键词 single information complex information blind number
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部