期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
单主体认知逻辑的研究——全知性和真知性
1
作者 许涤非 《湘潭师范学院学报(社会科学版)》 2003年第2期10-15,共6页
我们在《二重命题逻辑系统BT4 》基础上 ,继续研究单主体认知的主观全知性和主观真知性 ,并且讨论主观全知性、主观真知性。
关键词 《二重命题逻辑系统BT4》 单主体认知 全知性 知性 认知逻辑 广义模态逻辑
下载PDF
Cooperative Jamming for Enhancing Security of Cognitive Radio Networks with Multiple Primary Users 被引量:3
2
作者 Xiaofeng Feng Xinbo Gao Ru Zong 《China Communications》 SCIE CSCD 2017年第7期93-107,共15页
In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single... In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation. 展开更多
关键词 cognitive radio networks cooperative jamming physical layer security spectrum sharing stackelberg game
下载PDF
SECURE STEGANOGRAPHY BASED ON BINARY PARTICLE SWARM OPTIMIZATION 被引量:2
3
作者 Guo Yanqing Kong Xiangwei You Xingang 《Journal of Electronics(China)》 2009年第2期285-288,共4页
The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,deve... The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,developing secure steganography is formulated as solving a constrained IP(Integer Programming) problem,which takes the relative entropy of cover and stego distributions as the objective function.Furthermore,a novel method is introduced based on BPSO(Binary Particle Swarm Optimization) for achieving the optimal solution of this programming problem.Experimental results show that the proposed method can achieve excellent performance on preserving neighboring co-occurrence features for JPEG steganography. 展开更多
关键词 Secure steganography Integer Programming(IP) Binary Particle Swarm Optimization(BPSO)
下载PDF
A Knowledge Management Framework of the Information Technology-Based Approach for Improving Occupational Safety Training of Young Workers
4
作者 Irena Hejduk Waldemar Karwowski 《Chinese Business Review》 2016年第1期42-47,共6页
This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of ... This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of explicit and tacit knowledge in the field of vocational occupational safety and health (OSH) training. This project identifies three specific research steps for the development of the knowledge management framework of the information technology-based approach for improving occupational safety training of young workers, including: (1) the development of the conceptual model of the flow of explicit knowledge of OSH; (2) evaluation of the effectiveness of formal and explicit knowledge sources for OSH and training methods using these sources in the context of attitudes towards health and safety at work; and (3) verification of the proposed model of vocational training with the use of combined explicit and hidden knowledge. The proposed framework includes consideration of the effectiveness of the formal and informal sources of safety knowledge. A mapping from the formal sources of explicit knowledge about the occupational safety to expected attitudes (hidden knowledge) towards OSH outcomes, including emotional, cognitive, and behavioral aspects has been used. The above framework should help to improve the system of vocational training for young workers in Poland. 展开更多
关键词 knowledge management occupational safety education and training young workers
下载PDF
ADRs and Children: Knowledge and Methodological Standard in PASS (Post Authorization Safety Studies)
5
作者 Ettore Napoleone Cristiana Scasserra 《Journal of Pharmacy and Pharmacology》 2017年第6期314-322,共9页
PhV (pharmacovigilance) knowledge has the outcome of being inadequate in particular due to the lack of instruction. Pediatricians have to face the realization that over-the-counter medicines increments the peril of ... PhV (pharmacovigilance) knowledge has the outcome of being inadequate in particular due to the lack of instruction. Pediatricians have to face the realization that over-the-counter medicines increments the peril of ADRs (adverse drug reactions) has become a public health concern. The purpose of this article is to disseminate knowledge of the PhV and to highlight the cultural and organizational difficulties for its implementation. The objectives of promoting the organization of specific training courses and research projects aimed at: (1) to foster the culture of iatrogenic disease in pediatrics; (2) to improve the appropriateness of prescribing drugs in children; (3) to enco.urage spontaneous reporting of ADRs in children; (4) to involve Pediatricians in PASS (post-authorization safety studies) according to GCP, GVP and ENCEPP Code of Conduct. An up to date proposal of PhV, a procedure of preparation improves the productivity of creating novel informative reports which can be utilized for a benefit/risk scrutiny making strides in medicine prescription. In this context, FP-MCRN (family paediatficians-medicines for children research network) established with the aim of developing competence, infrastructure and education for paediatric clinical trials, plays a crucial role in paediatric PhV, through an improvement of PhV training, a correct research methodology and very strong relationship with the families. The initial necessity is cultural, implementing culture of iatrogenic illnesses and a watchful evaluation of the importance of PASS by FPs (family pediatricians). Participation in clinical trials that generates a precise database administered by FPs together with follow-up outcomes becomes relevant and vital for a scrupulous and accurate assessment of ADRs. PASS can foresee on one hand training and information regarding the proper use of drugs in children and possible iatrogenic pathologies caused by their improper use, the other to constitute a territorial survey in the prescriptive appropriateness and safety of pediatric drugs aimed at evaluating the risk-benefit balance on usage. 展开更多
关键词 CHILDREN adverse drug reactions OFF-LABEL PHARMACOVIGILANCE post-marketing clinical studies.
下载PDF
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles 被引量:1
6
作者 LIANG Wei RUAN Zhiqiang +1 位作者 TANG Mingdong LI Peng 《China Communications》 SCIE CSCD 2016年第2期121-129,共9页
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are ... Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms. 展开更多
关键词 wireless vehicle network datacollection protocol network sensing chain self'-adaptive sensing sensing distance threshold.
下载PDF
High-Gain Approach Based Full-Order Observers for Linear Systems with Unknown Inputs
7
作者 韩冬 刘俊 《Transactions of Tianjin University》 EI CAS 2016年第2期164-173,共10页
In this paper, a full-order observer which can be fully decoupled from the unknown inputs as the conventional full-order observer does is designed by using auxiliary outputs, but the requirement of the matching condit... In this paper, a full-order observer which can be fully decoupled from the unknown inputs as the conventional full-order observer does is designed by using auxiliary outputs, but the requirement of the matching condition is removed. The procedure of calculating the parameter matrices of the full-order observer is also presented. Compared with the existing auxiliary outputs based sliding-mode observers, the designed observer has a simpler design procedure, which is systematic and does not involve solving linear matrix inequalities. The simulation results show that the proposed method is effective. 展开更多
关键词 full-order observer high-gain approach observer matching condition unknown input
下载PDF
Development of an Expert Model to Assess Falls from Height Hazards in Construction Sites
8
作者 Carlo Argiolas Alessandro Carbonari Emanuela Quaquero 《Journal of Civil Engineering and Architecture》 2014年第5期517-528,共12页
This paper reports on the current state of an ongoing research project which is aimed at implementing intelligent models for hardly predictable hazard scenarios identification in construction sites. As any programmati... This paper reports on the current state of an ongoing research project which is aimed at implementing intelligent models for hardly predictable hazard scenarios identification in construction sites. As any programmatic actions cannot deal with the unpredictable nature of many risk dynamics, an attempt to improve the current approach for safety management in the construction industry will be presented in this paper. To this aim, the features offered by Bayesian networks have been exploited. The present research has led to the definition of a probabilistic model using elicitation techniques from subjective knowledge. This model, which might be meant as a reliable knowledge map about accident dynamics, showed that a relevant part of occurrences fall in the "hardly predictable hazards" category, which cannot be warded off by programmatic safety measures. Hence, more effort turned out to be needed in order to manage those hardly predictable hazardous scenarios. Consequently, further developments of this research project will focus on a real time monitoring system for the identification of unpredictable hazardous events in construction. 展开更多
关键词 Health and safety management risk assessment Bayesian networks job sites.
下载PDF
Contrast study on cognitive function with MRI and positron emission tomography imaging in transient global amnesia
9
作者 贾建军 王鲁宁 +1 位作者 尹岭 汤洪川 《Chinese Medical Journal》 SCIE CAS CSCD 2002年第9期1321-1323,146,共3页
OBJECTIVE: To study cognitive function and cerebral metabolic changes in patients with transient global amnesia (TGA). METHODS: Three patients with TGA were given mini-mental state examination (MMSE), revised Wechsler... OBJECTIVE: To study cognitive function and cerebral metabolic changes in patients with transient global amnesia (TGA). METHODS: Three patients with TGA were given mini-mental state examination (MMSE), revised Wechsler memory scale (WMS-R) examination and magnetic resonance imaging (MRI) scans after they had been diagnosed as TGA. Using (18)F labelled deoxyglucose as tracer, patients were given a positron emission tomography (PET) examination at different periods during recovery. RESULTS: No obvious abnormality was found in MMSE and MRI scans in the three patients. However, WMS-R examination and cerebral PET imaging displayed cognitive dysfunction of varying degrees and low metabolism in local areas related to memory in 2 of 3 patients. CONCLUSIONS: In TGA patients, cognitive function and cerebral metabolic levels are closely correlated with duration of symptoms. It is necessary to stop the TGA attack as quickly as possible early time. 展开更多
关键词 COGNITION Magnetic Resonance Imaging Tomography Emission-Computed Aged Amnesia Transient Global Female Humans Male Middle Aged
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部