期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
基于电网智能调度控制D5000系统的全逻辑控制功能及应用研究 被引量:3
1
作者 陈思旭 范宇航 +1 位作者 宋璟 李奥 《机电信息》 2023年第3期46-49,共4页
对当下加强电网数字化管控的必要性进行了分析,探讨了目前D5000系统遥控功能在及时性、准确性、可靠性等方面存在的问题,从而提出批量遥控功能诊断工具的技术方案,并从程序运行、功能实现、逻辑原理及实施效果等方面,对该程序的研发、... 对当下加强电网数字化管控的必要性进行了分析,探讨了目前D5000系统遥控功能在及时性、准确性、可靠性等方面存在的问题,从而提出批量遥控功能诊断工具的技术方案,并从程序运行、功能实现、逻辑原理及实施效果等方面,对该程序的研发、部署、测试、运行等各个环节进行了详细阐述,可实现D5000系统遥控操作的化零为整,提高电网调度监控的及时性,对全面提高用户用电可靠性、提升优质服务水平起到了关键的指导作用。 展开更多
关键词 调度自动化 智能 D5000系统 全逻辑 控制
下载PDF
从普遍性逻辑到非全逻辑的转换及其困境——兼论齐泽克对唯物主义物质观的批评及其不足
2
作者 孔明安 谭勇 《学术界》 CSSCI 北大核心 2022年第2期121-129,共9页
唯物主义反映论认为一切皆物质,意识不过是物质的反映或映象。但这一全称的普遍性命题是否成立呢?对此,当代西方马克思主义学者齐泽克从不同视角回答了这个问题。马克思在《神圣家族》中运用例外逻辑肯定了物质的运动特性,齐泽克则从精... 唯物主义反映论认为一切皆物质,意识不过是物质的反映或映象。但这一全称的普遍性命题是否成立呢?对此,当代西方马克思主义学者齐泽克从不同视角回答了这个问题。马克思在《神圣家族》中运用例外逻辑肯定了物质的运动特性,齐泽克则从精神分析的性化公式分析了列宁《唯物主义和经验批判主义》中物质定义的不足并给予补充。在此基础上,齐泽克借用马克思和黑格尔的辩证法,将精神分析的非全逻辑引入唯物主义反映论,并指出了“一切皆物质”的命题没有为意识留下足够的空间,否定了意识的“能动性”。齐泽克的这一理论努力与马克思早期极为相似,它从精神分析和黑格尔辩证法的视野出发,充分强调了主体的能动性和能动实践,这是值得肯定的。与此同时,我们也要看到,列宁《唯物主义和经验批判主义》中的物质观是为了当时革命论战的需要而提出的,它虽然有其明显的理论不足,但在后来的《哲学笔记》中得到了纠正和补充。齐泽克在批评“一切皆物质”的同时,也存在着过分强调思维和意识的“能动性”偏颇,具有明显的唯心主义之嫌,这是我们必须审慎对待和批判的。 展开更多
关键词 唯物主义反映论 全逻辑 例外逻辑 分裂
下载PDF
理论逻辑与全生命周期逻辑的交互与协调:备战奥运信息情报新范式的构建 被引量:1
3
作者 张婕 钟诚 王慧琳 《山东体育科技》 2022年第5期14-18,共5页
以信息情报驱动竞技体育高质量发展的理论逻辑和全生命周期逻辑为基础,实现两者的交互与协调,通过多元主体协同备战,将科学化训练体系贯穿备战工作全过程作为备战竞争情报的战略思路,以信息科技团队建设、多源数据信息融合的信息收集范... 以信息情报驱动竞技体育高质量发展的理论逻辑和全生命周期逻辑为基础,实现两者的交互与协调,通过多元主体协同备战,将科学化训练体系贯穿备战工作全过程作为备战竞争情报的战略思路,以信息科技团队建设、多源数据信息融合的信息收集范式、复合型团队服务为运行与保障机制,强化备战信息情报的核心内容,构建备战竞争情报体系。 展开更多
关键词 理论逻辑 生命周期逻辑 备战奥运 信息情报
下载PDF
基于全景数字仿真的变电站一键顺控测试技术 被引量:2
4
作者 张骥 张红梅 +2 位作者 邵华 郑紫尧 李亮玉 《高电压技术》 EI CAS CSCD 北大核心 2023年第S01期128-134,共7页
针对当前一键顺控系统在变电站工程中部署后不能有效开展测试工作的问题,提出一种基于全景数字仿真技术的一键顺控测试方法,通过数字化模拟仿真方式替代变电站实际一、二次设备,基于专业图谱完成实例化顺控操作票,实现针对一键顺控的设... 针对当前一键顺控系统在变电站工程中部署后不能有效开展测试工作的问题,提出一种基于全景数字仿真技术的一键顺控测试方法,通过数字化模拟仿真方式替代变电站实际一、二次设备,基于专业图谱完成实例化顺控操作票,实现针对一键顺控的设备态配置库、操作票配置库、操作流程、防误逻辑、双重判据等的全逻辑测试任务。通过现场应用,设计的系统实现了对一键顺控系统全部配置的可视化操作,为一键顺控系统的测试、验收工作提供高效、可靠的技术方法,保证一键顺控技术安全可靠的应用到变电站工程中。 展开更多
关键词 一键顺控 数字仿真 知识图谱 全逻辑测试 顺控操作票
下载PDF
基于修正ANT逻辑高速树形32 BitCarry Lookahead加法器 被引量:1
5
作者 吴艳 罗岚 《电子器件》 EI CAS 2006年第2期553-556,560,共5页
一种用修正全NMOS管逻辑(ANT)实现的树形结构高速32bitcarryLookahead加法器,使用两相时钟动态CMOS逻辑、修正不反向ANT逻辑和二进制树形结构实现。该加法器运用0.25μm工艺,文中给出了修正ANT逻辑中所有晶体管的宽长尺寸和仿真结果,最... 一种用修正全NMOS管逻辑(ANT)实现的树形结构高速32bitcarryLookahead加法器,使用两相时钟动态CMOS逻辑、修正不反向ANT逻辑和二进制树形结构实现。该加法器运用0.25μm工艺,文中给出了修正ANT逻辑中所有晶体管的宽长尺寸和仿真结果,最高工作频率为2GHz,计算结果在3.5个时钟周期后有效。 展开更多
关键词 树形 32位carry look ahead adder(CLA) NMOS管逻辑(ANT)
下载PDF
The Logical Properties of Filters of Lattice Implication Algebra 被引量:3
6
作者 王伟 徐扬 宋振明 《Chinese Quarterly Journal of Mathematics》 CSCD 2001年第3期8-13,共6页
In this paper, we discuss some propertie s of lattice implication algebra and difine the transitivity of implication in a set, we show the transitivity of implication and the substitution Theorem hold i n filters. S... In this paper, we discuss some propertie s of lattice implication algebra and difine the transitivity of implication in a set, we show the transitivity of implication and the substitution Theorem hold i n filters. So every filter of lattice implication algebra satisfies the Syllogis m and substitution Theorem of propositional logic. 展开更多
关键词 lattice implication algebra FILTER TRANSITIVITY
下载PDF
基于铁磁金属纳米点接触结构的全金属逻辑电路
7
作者 杨海方 徐鹏 +3 位作者 唐令 李俊杰 夏钶 顾长志 《物理》 CAS 北大核心 2008年第10期691-696,共6页
电流在铁磁金属中可以用来驱动磁畴壁,从而可以进行信息的读写.然而,具体如何在器件中实现并不清楚.文章作者利用纳米加工技术制作出铁磁金属纳米点接触结构和逻辑电路,并对纳米结构中畴壁的输运性质和逻辑电路特性进行了研究.发现了铁... 电流在铁磁金属中可以用来驱动磁畴壁,从而可以进行信息的读写.然而,具体如何在器件中实现并不清楚.文章作者利用纳米加工技术制作出铁磁金属纳米点接触结构和逻辑电路,并对纳米结构中畴壁的输运性质和逻辑电路特性进行了研究.发现了铁磁纳米点接触结构在电流驱动下存在的高阻态及低阻态,通过设计不同形状的点接触结构,用电学测量方法验证了畴壁在自旋极化电流作用下的移动方向与电流方向的关系.并基于电流控制点接触电阻变化的结果,制作出能够实现逻辑"非"功能的全金属逻辑电路,实现了电路的电信号驱动和利用电信号的检测功能. 展开更多
关键词 畴壁电阻 自旋电子输运 纳米点接触 金属逻辑电路
原文传递
新型铁水称重轨轨道衡 被引量:1
8
作者 靳向丽 焦俊平 阎仕安 《河北冶金》 2000年第1期24-26,49,共4页
介绍了铁水称重轨轨道衡的特点、结构、安装调试及校准方法。
关键词 轨道衡 动态称重 模拟逻辑判别 铁水罐车
下载PDF
A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY 被引量:13
9
作者 Zhao Dongmei Wang Changguang Ma Jianfeng 《Journal of Electronics(China)》 2007年第3期428-432,共5页
The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method ... The core of network security is the risk assessment. In this letter,a risk assessment method is introduced to estimate the wireless network security. The method,which combines Analytic Hier-archy Process (AHP) method and fuzzy logical method,is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself. The risk as-sessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method. Finally,the important degree is calculated by AHP method. By comparing the important degree of each factor,the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation. 展开更多
关键词 Wireless network Risk assessment Analytic Hierarchy Process (AHP) method Fuzzy logical method
下载PDF
Chaotic system and QR factorization based robust digital image watermarking algorithm 被引量:9
10
作者 宋伟 侯建军 +1 位作者 李赵红 黄亮 《Journal of Central South University》 SCIE EI CAS 2011年第1期116-124,共9页
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si... In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented. 展开更多
关键词 digital watermarking QR factorization pseudorandom circular chain logistic mapping
下载PDF
5G背景下城域承载网演进思路探讨 被引量:4
11
作者 王亦炜 《电信技术》 2017年第8期9-11,16,共4页
简要介绍5G的典型业务和关键能力指标,阐述5G对于城域承载网的需求,初步提出城域承载网应对5G组网的一些思路。
关键词 5G应用场景 关键能力指标体系 统一承载 光网逻辑分层
下载PDF
The design and implementation of web mining in web sites security 被引量:2
12
作者 LI Jian, ZHANG Guo-yin , GU Guo-chang, LI Jian-li College of Computer Science and Technology, Harbin Engineering University, Harbin 150001China 《Journal of Marine Science and Application》 2003年第1期81-86,共6页
The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illeg... The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency. 展开更多
关键词 data mining web log mining web sites security density-based clustering
下载PDF
An efficient scalable key management scheme for secure group communication
13
作者 张骏 谷大武 +1 位作者 马范援 白英彩 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期607-612,共6页
Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle ... Several muhicast key management schemes such as those proposed by Wallner et al and Wong et al are based on a multilevel, logical hierarchy (or tree) of key-encrypting keys. When used in conjunction with a reliahle muhicast infrastructure, this approach results in a highly efficient key update mechanism in which the number of muhicast messages transmitted upon a membership update is proportional to the depth of the tree, which is logarithmic to the size of the secure muhicast group. But this is based on the hypothesis that the tree is maintained in a balanced manner. This paper proposes a scalable rekeying scheme---link-tree structure for implementing secure group communication. Theoretical calculation and experimentation show that this scheme has better performance than the tree structure and the star structure, and at the same time still keep the link-tree structure balanced. 展开更多
关键词 group security key management rekey
下载PDF
Determinants of Food Security in Selected Agro-pastoral Communities of Somali and Oromia Regions, Ethiopia 被引量:1
14
作者 Kwadwo Asenso-Okyere Daniel Ayalew Mekonnen Elias Zerfu 《Journal of Food Science and Engineering》 2013年第9期453-471,共19页
In spite of receiving a significant amount of food aid, achieving food security has been a major problem in Ethiopia. The claim is evidenced from the 2010 Global Hunger Index where the country fared dismally, coming o... In spite of receiving a significant amount of food aid, achieving food security has been a major problem in Ethiopia. The claim is evidenced from the 2010 Global Hunger Index where the country fared dismally, coming only fourth from the bottom. There are several factors attributing to this problem of food insecurity in a country like Ethiopia which depends highly on agriculture and allied activities. Some of the factors can be linked to low food production and productivity thereby leading to pervasive poverty. In order to assess these factors, the study was conducted on some selected members of agro-pastoral communities of Somali and Oromia regions in Ethiopia. Using availability of food in the household for the last one month as a proxy for food security, the estimated results of a logistic regression model indicated that the most significant factors affecting household food security are educational level of the spouse and that of the household head, size of farm land, availability of household assets including livestock, peace and security. The paper suggests some leads to how these amenities and resources can be provided to household members as they endeavor to reduce food insecurity. 展开更多
关键词 Household food security HUNGER food availability agro-pastoral Ethiopia.
下载PDF
微处理机电子轨道衡的防雷设施
15
作者 叶英凯 《吉林建材》 1994年第3期47-48,共2页
微处理机电子轨道衡的防雷设施叶英凯锦西水泥厂当前微机的应用相当广泛,许多部门都在大量使用各种类型的微机用以执行自动控制、计量、统计、存储资料等工作,并愈来愈体现出其极大的优越性和方便性。因此,倍受人们的普遍欢迎。但在... 微处理机电子轨道衡的防雷设施叶英凯锦西水泥厂当前微机的应用相当广泛,许多部门都在大量使用各种类型的微机用以执行自动控制、计量、统计、存储资料等工作,并愈来愈体现出其极大的优越性和方便性。因此,倍受人们的普遍欢迎。但在使用中有一个不容忽视的问题应当引起... 展开更多
关键词 电子轨道衡 微处理 防雷技术 防雷设施 感应雷 集成电路 模拟逻辑判别 电源系统 保安器 直击雷
下载PDF
Restraint Usage Characteristics and Other Factors Associated with Safety of Children Involved in Motor Vehicle Crashes
16
作者 Sunanda Dissanayake Niranga Amarasingha 《Journal of Civil Engineering and Architecture》 2016年第1期81-95,共15页
Involvement in road traffic crashes as vehicle occupants is a leading cause of death and serious injury among children. The objective of this study was to investigate crash severity factors and child safety restraint ... Involvement in road traffic crashes as vehicle occupants is a leading cause of death and serious injury among children. The objective of this study was to investigate crash severity factors and child safety restraint use characteristics in order to identify effective countermeasures to increase children's highway safety. Characteristics and percentages of restraint use among child passengers aged 4-13 years were examined using highway crash data from Kansas. The association between restraint use, injury severity and characteristics of children involved in crashes were investigated using OR (odds ratios) and a logistic regression model, which was used to identify risk factors. Results showed that children, who were unrestrained, were seated in the front seat, traveling with drunk drivers and on rural roads, and traveling during nighttime was more vulnerable to severe injury in the case of motor vehicle crashes. The most frequent contributing causes related to crashes involving children included driver's inattention while driving, failure to yield right-of-way, driving too fast, wet roads and animals in the road. Based on identified critical factors, general countermeasure ideas to improve children's traffic safety were suggested, including age-appropriate and size-appropriate seat belt restraints and having children seated in the rear seat. Parents and children must gain better education regarding these safety measures in order to increase child safety on the road. 展开更多
关键词 Child safety child restraint use severity model logistic regression model crash data analysis.
下载PDF
Underdetermination, Multiplicity, and Mathematical Logic
17
作者 Salim Rashid 《Journal of Philosophy Study》 2013年第2期113-122,共10页
Whether a collection of scientific data can be explained only by a unique theory or whether such data can be equally explained by multiple theories is one of the more contested issues in the history and philosophy of ... Whether a collection of scientific data can be explained only by a unique theory or whether such data can be equally explained by multiple theories is one of the more contested issues in the history and philosophy of science. This paper argues that the case for multiple explanations is strengthened by the widespread failure of models in mathematical logic to be unique, i.e., categorical. Science is taken to require replicable and explicit public knowledge; this necessitates an unambiguous language for its transmission. Mathematics has been chosen as the vehicle to transmit scientific knowledge, both because of its "unreasonable effectiveness" and because of its unambiguous nature, hence the vogue of axiomatic systems. But mathematical logic tells us that axiomatic systems need not refer to uniquely defined real structures. Hence what is accepted as science may be only one of several possibilities. 展开更多
关键词 UNDERDETERMINATION LOGIC CATEGORICITY "saving the appearances"
下载PDF
Fully Integrated Machine Control for Ultra Precision Machining
18
《Journal of Mechanics Engineering and Automation》 2013年第8期465-472,共8页
To meet the demands for highly advanced components with ultra precise contour accuracy and optical surface quality arising in the fields of photonics and optics, automotive, medical applications and biotechnology, con... To meet the demands for highly advanced components with ultra precise contour accuracy and optical surface quality arising in the fields of photonics and optics, automotive, medical applications and biotechnology, consumer electronics and renewable energy, more advanced production machines and processes have to be developed. As the complexity of machine tools rises steadily, the automation of manufacture increases rapidly, processes become more integrated and cycle times have to be reduced significantly, challenges of engineering efficient machine tools with respect to these demands expand every day. Especially the manufacture of freeform geometries with non-continuous and asymmetric surfaces requires advanced diamond machining strategies involving highly dynamic axes movements with a high bandwidth and position accuracy. Ultra precision lathes additionally equipped with Slow Tool and Fast Tool systems can be regarded as state-of-the-art machines achieving the objectives of high quality optical components. The mechanical design of such ultra precision machine tools as well as the mechanical integration of additional highly dynamic axes are very well understood today. In contrast to that, neither advanced control strategies for ultra precision machining nor the control integration of additional Fast Tool systems have been sufficiently developed yet. Considering a complex machine setup as a mechatronic system, it becomes obvious that enhancements to further increase the achievable form accuracy and surface quality and at the same time decrease cycle times and error sensitivity can only be accomplished by innovative, integrated control systems. At the Fraunhofer Institute for Production Technology IPT a novel, fully integrated control approach has been developed to overcome the drawbacks of state-of-the-art machine controls for ultra precision processes. Current control systems are often realized as decentralized solutions consisting of various computational hardware components for setpoint generation, machine control, HMI (human machine interface), Slow Tool control and Fast Tool control. While implementing such a distributed control strategy, many disadvantages arise in terms of complex communication interfaces, discontinuous safety structures, synchronization of cycle times and the machining accuracy as a whole. The novel control approach has been developed as a fully integrated machine control including standard CNC (computer numerical control) and PLC (programmable logic controller) functionality, advanced setpoint generation methods, an extended HMI as well as an FPGA (field programmable gate array)-based controller for a voice coil driven Slow Tool and a piezo driven Fast Tool axis. As the new control system has been implemented as a fully integrated platform using digital communication via EtherCAT, a continuous safety strategy could be realized, the error sensitivity and EMC susceptibility could be significantly decreased and the overall process accuracy from setpoint generation over path interpolation to axes movements could be enhanced. The novel control at the same time offers additional possibilities of automation, process integration, online data acquisition and evaluation as well as error compensation methods. 展开更多
关键词 Ultra precision machining fully integrated control highly dynamic axes FPGA EtherCAT.
下载PDF
SPECIAL ISSUE: GLOBALIZATION AND CONTEMPORARY CHINESE CULTURAL CONSTRUCTION:Logic and trends in cultural globalization and the reconstruction of modern Chinese culture 被引量:1
19
作者 Yang Shengping 《Social Sciences in China》 2008年第4期185-194,共10页
Within cultural globalization there exist two distinct approaches, each with its built-in logic: the logic of a globalized culture promoted by one country and that of a globalized culture defined by many countries on... Within cultural globalization there exist two distinct approaches, each with its built-in logic: the logic of a globalized culture promoted by one country and that of a globalized culture defined by many countries on the basis of consultations and exchanges on an equal footing. As a result of the present unequal world economic and political order, the former has become the keynote of the process of cultural globalization. Establishing a flee and equal globalized culture requires the guidance of socialist ideology to change the unjust global economic and political order. Globalized culture is neither homogeneous nor heterogeneous; it is a diversified unified whole or a unity within diversity. 展开更多
关键词 cultural globalization globalized culture dualistic logic unity within diversity
原文传递
The Global Governance of Terrorism: An Assessment of Different Regimes 被引量:1
20
作者 Zeng Xianghong Kang Xiaoni 《Social Sciences in China》 2019年第1期100-126,共27页
Breakthroughs in the global governance of terrorism depend mainly on the development on the part of the international community of thorough and effective mechanisms.At present,global governance targets terrorism via f... Breakthroughs in the global governance of terrorism depend mainly on the development on the part of the international community of thorough and effective mechanisms.At present,global governance targets terrorism via four regimes:hegemonic governance;governance by international organizations;hybrid governance;and coordinated governance by major powers.These strategies have made a contribution to counter-terrorism,but they do have shortcomings.We start with the judgment that governance entities should adhere to the logic of consequences,the logic of appropriateness,the logic of emotion and the logic of habitus,and on this basis make a preliminary assessment of the global governance of terrorism.Present terrorism governance regimes tend to be based on the thinking of the logic of consequences with only partial implementation of the logic of appropriateness and no use,so far,of counterterrorism measures based on the logic of emotion and the logic of habitus.To address both the symptoms and root causes of terrorism,international society should encourage governance strategies that implement counter-terrorism measures based on the four types of logic above and should promote coordination and cooperation based on this platform.In this course,China could promote a more significant role in global terrorism governance for such counter-terrorism platforms as the United Nations,including the Security Council,and the Shanghai Cooperation Organization. 展开更多
关键词 TERRORISM global governance governance regime behavioral logic counterterrorism measures
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部