期刊文献+
共找到28篇文章
< 1 2 >
每页显示 20 50 100
信息不全面与金融风险 被引量:1
1
作者 汪红 《山东金融》 1999年第5期28-29,共2页
国民经济的持续、稳定、协调发展需要一个良好稳定的金融环境。一个低风险、高效率的金融体制会对经济发展产生强大的推动力。然而由于我国金融体制改革的滞后及周边经济环境的影响,金融业已成为风险的承担者。金融业的高风险已对其自... 国民经济的持续、稳定、协调发展需要一个良好稳定的金融环境。一个低风险、高效率的金融体制会对经济发展产生强大的推动力。然而由于我国金融体制改革的滞后及周边经济环境的影响,金融业已成为风险的承担者。金融业的高风险已对其自身发展和国民经济运行构成威胁,防范... 展开更多
关键词 金融风险 金融机构 信息不全 借款企业 信息劣势 信息经济学 信息混淆 逆向选择 预测与判断 企业制度
下载PDF
试论监管信息不全与金融监管的有效性
2
作者 许观俊 陈荣琼 《广西金融研究》 1999年第8期41-45,共5页
金融监管是金融监管当局依法运用各种措施和手段,按照既定的标准对所有金融机构从市场准入、业务活动、经营状况、行为规范到市场退出全过程所进行的连续、统一、规范化的监督与管理.其主要功能是保证金融体系的安全与稳定.在我国经济... 金融监管是金融监管当局依法运用各种措施和手段,按照既定的标准对所有金融机构从市场准入、业务活动、经营状况、行为规范到市场退出全过程所进行的连续、统一、规范化的监督与管理.其主要功能是保证金融体系的安全与稳定.在我国经济转轨时期,金融运行中出现诸多问题,个别金融机构面临支付危机或被迫退出金融市场,社会各界便有了“监管失灵”的议论.认为“ 展开更多
关键词 金融监管 监管信息不全 对策
下载PDF
信息不全情况下的机械零部件可靠性优化设计
3
作者 程润泽 贺向东 +2 位作者 马琳 包云龙 刘艳秋 《机械设计与研究》 CSCD 北大核心 2024年第1期43-45,共3页
基于最大熵原理以及可靠性优化设计理论,本文提出了信息不全情况的机械零部件可靠性优化设计方法,该方法可以解决信息不全情况下的可靠性优化设计问题。将该方法应用于汽车后桥的设计中,以证明其有效性和可行性。结果表明,该方法能够在... 基于最大熵原理以及可靠性优化设计理论,本文提出了信息不全情况的机械零部件可靠性优化设计方法,该方法可以解决信息不全情况下的可靠性优化设计问题。将该方法应用于汽车后桥的设计中,以证明其有效性和可行性。结果表明,该方法能够在信息不全情况下准确、有效地找到可靠和优化的设计。 展开更多
关键词 机械零部件 信息不全情况 最大熵 可靠性优化设计
原文传递
工艺安全分析在油田生产中的应用分析
4
作者 马驰 《石油石化物资采购》 2024年第14期169-171,共3页
本文主要探讨了工艺安全分析在油田生产中存在的问题以及相应的优化方案。在不同工艺安全分析方法比较的基础上,分析了工艺安全分析在油田生产应用中的问题,包括方法单一、人员经验不足、工艺安全信息不全、分析范围不全面以及组织方式... 本文主要探讨了工艺安全分析在油田生产中存在的问题以及相应的优化方案。在不同工艺安全分析方法比较的基础上,分析了工艺安全分析在油田生产应用中的问题,包括方法单一、人员经验不足、工艺安全信息不全、分析范围不全面以及组织方式有待完善等方面。针对这些问题,提出了相应的优化方案,包括根据项目选择适当的分析方法、保证分析人员素质以及完善工艺安全信息等。未来,工艺安全分析应更多结合数字化工具和平台,并且加强跨学科的合作,以期构建一个更全面的工艺安全分析体系。 展开更多
关键词 工艺 分析 油田 信息不全 分析方法
下载PDF
“全息”观念与古汉语教学
5
作者 孟广道 《古汉语研究》 CSSCI 北大核心 1990年第2期96-96,共1页
所谓全息,即完全信息。如视觉靠光信号进行通信,光信号包括振幅和位相两种信息。一般照相只接收和处理振幅信息,因而是平面的。当发现这种失真是由于信息不全所致时,便产生了完全信息的思想,匈牙利科学家加波据此发明了能摄立体照片的... 所谓全息,即完全信息。如视觉靠光信号进行通信,光信号包括振幅和位相两种信息。一般照相只接收和处理振幅信息,因而是平面的。当发现这种失真是由于信息不全所致时,便产生了完全信息的思想,匈牙利科学家加波据此发明了能摄立体照片的全息照相术。从此全息概念引入许多科学领域,并取得了突破性的成就,可见它在认识上和实践上的意义了。 展开更多
关键词 古汉语教学 信息 天宝 地灵 光信号 繁体字 信息不全 只接收 行通信 振幅和
下载PDF
萍乡市物价局部署价格信息工作
6
作者 彭如 肖富成 《价格月刊》 1983年第8期8-10,共3页
价格信息及预测工作是物价部门的一件基础工作,做好这件工作,对减少工作中的盲目性,搞好国民经济的综合平衡,提高经济效益,具有重要意义。当前,价格信息不全、不准、不及时,与物价工作的要求极不适应,这种状况亟待改进。我们希望各级物... 价格信息及预测工作是物价部门的一件基础工作,做好这件工作,对减少工作中的盲目性,搞好国民经济的综合平衡,提高经济效益,具有重要意义。当前,价格信息不全、不准、不及时,与物价工作的要求极不适应,这种状况亟待改进。我们希望各级物价部门都要象萍乡市物价局那样,结合本地实际情况,本着首先开展,然后在开展中完善的原则,尽快地把全省价格信息网建立起来。 展开更多
关键词 价格信息工作 市物价局 提高经济效益 物价部门 萍乡 基础工作 综合平衡 信息不全 物价工作 国民经济
下载PDF
财经信息管理
7
作者 郑士贵 《管理观察》 1995年第3期5-5,共1页
关键词 财经信息 信息管理 伪造文件 规范和标准 经济动机 信息不全 财政状况 财政资源 人力资源 组织机构
下载PDF
基于故障可观性的输电线路故障定位方法 被引量:12
8
作者 姜臻 苗世洪 刘沛 《电力系统保护与控制》 EI CSCD 北大核心 2016年第15期1-9,共9页
广泛研究的基于WAMS的故障定位算法都基于理想化的量测条件,这使得它们在实际应用中受到限制。为了使电网在信息不全条件下(如极端气候、通信故障等)提供可靠的故障定位方案,提出了一种基于故障可观性的输电线路故障定位方法。该方法采... 广泛研究的基于WAMS的故障定位算法都基于理想化的量测条件,这使得它们在实际应用中受到限制。为了使电网在信息不全条件下(如极端气候、通信故障等)提供可靠的故障定位方案,提出了一种基于故障可观性的输电线路故障定位方法。该方法采用分布参数输电线路模型,可以更准确地考虑分布电容电流对故障定位精度的影响;算法性能优异,且不受故障初始相位角、负荷及故障路径阻抗的影响;仅需要相量测量单元(PMU)的暂态数据信号,无需系统阻抗等其他信息;算法没有迭代过程,计算速度快。诸多仿真分析验证了该方法的有效性和鲁棒性。 展开更多
关键词 故障定位 故障可观性模型 分布参数 信息不全条件 故障路径阻抗
下载PDF
商业企业经营中的问题分析
9
作者 周脉伏 王家传 《山东农业大学学报(社会科学版)》 1999年第2期31-32,共2页
商业作为联结生产和消费的中间环节,其经营状况在目前我国有效需求不足的宏观经济环境中,对于刺激消费、推动经济增长,具有十分重要的意义。然而,许多商场在经营中存在不少问题,从而导致市场环境恶化、资源配置低效、经济效益下降... 商业作为联结生产和消费的中间环节,其经营状况在目前我国有效需求不足的宏观经济环境中,对于刺激消费、推动经济增长,具有十分重要的意义。然而,许多商场在经营中存在不少问题,从而导致市场环境恶化、资源配置低效、经济效益下降。主要表现为:市场进入盲目;攀比购物环境;向消费者传递信息不当;对企业文化理解肤浅;缺乏对顾客提供售前、售中、售后全过程的服务。除对以上问题分析外,本文还粗略地提出了一些对策。 展开更多
关键词 盲目进入 定位趋同 信息不全
下载PDF
报刊广告作用之一:减少消费风险
10
作者 熊海泉 《新闻前哨》 1996年第5期47-47,共1页
随着科学技术的进步,市场商品供应日益增多丰裕,许多新产品随着新技术、新工艺的应用快速走入家庭。面临着来自商品世界的冲击,消费者渐感局促,手足无措,在购买决策时,受到自身知识经历经验的限制,所承担的风险也就愈来愈多。人们迫切... 随着科学技术的进步,市场商品供应日益增多丰裕,许多新产品随着新技术、新工艺的应用快速走入家庭。面临着来自商品世界的冲击,消费者渐感局促,手足无措,在购买决策时,受到自身知识经历经验的限制,所承担的风险也就愈来愈多。人们迫切希望能从这种被动的局势中解脱出来,科学正确地把握市场,以减轻因决策失误给自己带来的损失。 在现实生活中,消费者固定的购买力用于市场购买消费,或多或少地总要承担一定的抉择损失,这种抉择损失或后果就是我们所述的消费风险。 展开更多
关键词 报刊广告 消费者 不确定性预测 消费风险 信息不全 风险水平 科学技术 购买决策 身体风险 新产品
下载PDF
Iterative Learning Control With Incomplete Information: A Survey 被引量:12
11
作者 Dong Shen Senior Member IEEE 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第5期885-901,共17页
Abstract--This paper conducts a survey on iterative learn- ing control (ILC) with incomplete information and associated control system design, which is a frontier of the ILC field. The incomplete information, includ... Abstract--This paper conducts a survey on iterative learn- ing control (ILC) with incomplete information and associated control system design, which is a frontier of the ILC field. The incomplete information, including passive and active types, can cause data loss or fragment due to various factors. Passive incomplete information refers to incomplete data and information caused by practical system limitations during data collection, storage, transmission, and processing, such as data dropouts, delays, disordering, and limited transmission bandwidth. Active incomplete information refers to incomplete data and information caused by man-made reduction of data quantity and quality on the premise that the given objective is satisfied, such as sampling and quantization. This survey emphasizes two aspects: the first one is how to guarantee good learning performance and tracking performance with passive incomplete data, and the second is how to balance the control performance index and data demand by active means. The promising research directions along this topic are also addressed, where data robustness is highly emphasized. This survey is expected to improve understanding of the restrictive relationship and trade-off between incomplete data and tracking performance, quantitatively, and promote further developments of ILC theory. Index Terms--Data dropout, data robustness, incomplete in- formation, iterative learning controi(ILC), quantized control, sampled control, varying lengths. 展开更多
关键词 Data dropout data robustness incomplete information iterative learning control(ILC) quantized control sampled control varying lengths
下载PDF
Mining association rules in incomplete information systems 被引量:2
12
作者 罗可 王丽丽 童小娇 《Journal of Central South University of Technology》 EI 2008年第5期733-737,共5页
Based on the rough set theory which is a powerful tool in dealing with vagueness and uncertainty, an algorithm to mine association rules in incomplete information systems was presented and the support and confidence w... Based on the rough set theory which is a powerful tool in dealing with vagueness and uncertainty, an algorithm to mine association rules in incomplete information systems was presented and the support and confidence were redefined. The algorithm can mine the association rules with decision attributes directly without processing missing values. Using the incomplete dataset Mushroom from UCI machine learning repository, the new algorithm was compared with the classical association rules mining algorithm based on Apriori from the number of rules extracted, testing accuracy and execution time. The experiment results show that the new algorithm has advantages of short execution time and high accuracy. 展开更多
关键词 association rules rough sets prediction support prediction confidence incomplete information system
下载PDF
A Decision Model Based on Grey Rough Sets Integration with Incomplete Information 被引量:5
13
作者 HOU Ya-lin LUO Dang 《Chinese Quarterly Journal of Mathematics》 CSCD 2009年第1期151-158,共8页
In this paper, for multiple attribute decision-making problem in which attribute values are interval grey numbers and some of them are null values, a decision model based on grey rough sets integration with incomplete... In this paper, for multiple attribute decision-making problem in which attribute values are interval grey numbers and some of them are null values, a decision model based on grey rough sets integration with incomplete information is proposed. We put forward incidence degree coefficient formula for grey interval, by information entropy theory and analysis technique, the method and principle is presented to fill up null values. We also establish the method of grey interval incidence cluster. Because grey system theory and Rough set theory are complementary each other, decision table with preference information is obtained by the result of grey incidence cluster. An algorithm for inducing decision rules based on rough set theory and the dominance relationship is presented. In some extent, this algorithm can deal with decision-making problem in which the attribute values are interval grey numbers and some of them are null values. Contrasted with classical model of cluster decision-making, the algorithm has an advantage of flexibility and compatibility to new information. 展开更多
关键词 grey system theory rough set incidence cluster interval grey number entropy null value
下载PDF
Extension of information entropy-based measures in incomplete information systems
14
作者 李仁璞 黄道 高茂庭 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期544-550,共7页
It is helpful for people to understand the essence of rough set theory to study the concepts and operations of rough set theory from its information view. In this paper we address knowledge expression and knowledge re... It is helpful for people to understand the essence of rough set theory to study the concepts and operations of rough set theory from its information view. In this paper we address knowledge expression and knowledge reduction in incomplete infolvnation systems from the information view of rough set theory. First, by extending information entropy-based measures in complete information systems, two new measures of incomplete entropy and incomplete conditional entropy are presented for incomplete information systems. And then, based on these measures the problem of knowledge reduction in incomplete information systems is analyzed and the reduct definitions in incomplete information system and incomplete decision table are proposed respectively. Finally, the reduct definitions based on incomplete entropy and the reduct definitions based on similarity relation are compared. Two equivalent relationships between them are proved by theorems and an in equivalent relationship between them is illustrated by an example. The work of this paper extends the research of rough set theory from information view to incomplete information systems and establishes the theoretical basis for seeking efficient algorithm of knowledge acquisition in incomplete information systems. 展开更多
关键词 rough set theory information entropy incomplete information system knowledge reduction
下载PDF
Energy Efficient Switch Policy for Small Cells 被引量:1
15
作者 GAN Xiaoying WANG Luyang +4 位作者 FENG Xinxin LIU Jing YU Hui ZHANG Zhizhong LIU Haitao 《China Communications》 SCIE CSCD 2015年第1期78-88,共11页
Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,espe... Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,especially when there is an nonnegligible start-up energy cost.To this end,by observing the variety of user number,we focus on the design of a switch policy which minimize the cumulative energy consumption.A given user transmission rate is guaranteed and the capability of SBSs are limited as well.According to the knowledge on user number variety,we classify the energy consumption problem into two cases.In complete information case,to minimize the cumulative energy consumption,an offline solution is proposed according to critical segments.A heuristic algorithm for incomplete information case(HAIIC) is proposed by tracking the difference of cumulative energy consumption.The upper bound of the Energy Consumption Ratio(ECR) for HAIIC is derived as well.In addition,a practical Q-learning based probabilistic policy is proposed.Simulation results show that the proposed HAIIC algorithm is able to save energy efficiently. 展开更多
关键词 heterogeneous network small cell switch policy Q-LEARNING
下载PDF
Joint Energy-Efficient Power Allocation and Beamforming Design for mm Wave-NOMA System with Imperfect CSI 被引量:1
16
作者 CAI Jiali YU Xiangbin +1 位作者 XU Fangcheng WANG Guangying 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第S01期115-121,共7页
The joint power allocation(PA)and beamforming(BF)design problem is studied to maximize the energy efficiency of a two-user downlink millimeter-wave system with non-orthogonal multiple access under imperfect channel st... The joint power allocation(PA)and beamforming(BF)design problem is studied to maximize the energy efficiency of a two-user downlink millimeter-wave system with non-orthogonal multiple access under imperfect channel state information(CSI).By means of block coordinate descent,convex-concave procedure,and successive convex approximate,we propose a suboptimal joint PA and BF design scheme to address this non-convex problem.Simulation results verify that the proposed joint PA and BF design scheme is more effective when compared to some existing schemes. 展开更多
关键词 energy efficiency millimeter wave non-orthogonal multiple access(NOMA) imperfect channel state information
下载PDF
A Bayesian Theory of Games: An Analysis of Strategic Interactions with Statistical Decision Theoretic Foundation 被引量:2
17
作者 Jimmy Teng 《Journal of Mathematics and System Science》 2012年第3期145-155,共11页
This paper introduces a new game theoretic equilibrium which is based upon the Bayesian subjective view of probability, BEIC (Bayesian equilibrium iterative conjectures). It requires players to make predictions, sta... This paper introduces a new game theoretic equilibrium which is based upon the Bayesian subjective view of probability, BEIC (Bayesian equilibrium iterative conjectures). It requires players to make predictions, starting from first order uninformative predictive distribution functions (or conjectures) and keep updating with statistical decision theoretic and game theoretic reasoning until a convergence of conjectures is achieved. Information known by the players such as the reaction functions are thereby incorporated into their higher order conjectures and help to determine the convergent conjectures and the equilibrium. In a BEIC, conjectures are consistent with the equilibrium or equilibriums they supported and so rationality is achieved for actions, strategies and conjectures. The BEIC approach is capable of analyzing a larger set of games than current Nash Equilibrium based games theory, including games with inaccurate observations, games with unstable equilibrium and games with double or multiple sided incomplete information games. On the other hand, for the set of games analyzed by the current games theory, it generates far lesser equilibriums and normally generates only a unique equilibrium. It treats games with complete and perfect information as special cases of games with incomplete information and noisy observation whereby the variance of the prior distribution function on type and the variance of the observation noise term tend to zero. Consequently, there is the issue of indeterminacy in statistical inference and decision making in these games as the equilibrium solution depends on which variances tends to zero first. It therefore identifies equilibriums in these games that have so far eluded the classical theory of games. Finally, it also resolves inconsistencies in equilibrium results by different solution concepts in current games theory such as that between Nash Equilibrium and iterative elimination of dominated strategies and that between Perfect Bayesian Equilibrium and backward induction (Subgame Perfect Equilibrium). 展开更多
关键词 New equilibrium concept iterative conjectures CONVERGENCE Bayesian decision theory Schelling point.
下载PDF
Security analysis of access control model in hybrid cloud based on security entropy 被引量:2
18
作者 车天伟 Ma Jianfeng +1 位作者 Li Na Wang Chao 《High Technology Letters》 EI CAS 2015年第2期200-204,共5页
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put... To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud. 展开更多
关键词 hybrid cloud security entropy classificatory access control model directly unauthorized access right about access indirectly unauthorized access
下载PDF
Intrusion Detection Model Based on Incomplete Information Ga me in Wireless Mesh Networks 被引量:1
19
作者 Chen Jing Du Ruiying +2 位作者 Yu Fajiang Zheng Minghui Zhang Huanguo 《China Communications》 SCIE CSCD 2012年第10期23-32,共10页
Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the sec... Wireless Mesh Networks (WMNs) have many applications in homes, schools, enterprises, and public places because of their useful characteristics, such as high bandwidth, high speed, and wide coverage. However, the security of wireless mesh networks is a precondition for practical use. Intrusion detection is pivotal for increasing network security. Considering the energy limitations in wireless mesh networks, we adopt two types of nodes: Heavy Intrusion Detection Node (HIDN) and Light Intrusion Detection Node (LIDN). To conserve energy, the LIDN detects abnorrml behavior according to probability, while the HIDN, which has sufficient energy, is always operational. In practice, it is very difficult to acquire accurate information regarding attackers. We propose an intrusion detection model based on the incomplete inforrmtion game (ID-IIG). The ID-IIG utilizes the Harsanyi transformation and Bayesian Nash equilibrium to select the best strategies of defenders, although the exact attack probability is unknown. Thus, it can effectively direct the deployment of defenders. Through experiments, we analyze the perforrmnce of ID-IIG and verify the existence and attainability of the Bayesian Nash equilibrium. 展开更多
关键词 game theory intrusion detection model WMNS
下载PDF
Ethical Perspective on Turkish Environmental Impact Assessment for Nuclear Energy
20
作者 Hayrettin Kilic 《Journal of Environmental Science and Engineering(B)》 2016年第6期314-322,共9页
In 2013, The Turkish Ministry of Environment and Urban Planning issued four thousand pages of a cut and paste Environmental Impact Assessment (EIA) report for the Akkuyu nuclear power plant and nuclear fuel fabricat... In 2013, The Turkish Ministry of Environment and Urban Planning issued four thousand pages of a cut and paste Environmental Impact Assessment (EIA) report for the Akkuyu nuclear power plant and nuclear fuel fabrication complex project located on Turkey's Mediterranean coastline, in the Mersin providence, which will be built on a build-own-operate basis by Russian company Rosatom. Numerous complaints have already been filed against the EIA, challenging the scientific integrity of the report on the following grounds: misrepresentation of failure to specify the radioactive inventory and of projected releases into the environment, omitting tritium and carbon-14; incomplete information about the toxic chemicals which will be injected into the cooling system throughout the nuclear complex; misleading information about the cooling water's temporal and chemical effects on marine life; lack of details on an emergency evacuation plan; lack of a comprehensive nuclear waste management plan; unspecified insurance coverage for the nuclear complex, noncompliance with third party liability requirements. Coupled with these complaints are allegations that signatures on some sensitive reports contained or referred to have been falsified. 展开更多
关键词 Turkish Nuclear Energy Project Environmental Impact Assessment.
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部