期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
中国非政府组织参与灾难性危机管理面临的困境及解决方案探析 被引量:5
1
作者 黄飞凯 《当代社科视野》 2010年第4期8-11,共4页
近年来,中国的灾难性危机事件频发,在应对危机事件的过程中,政府单方力量显得不足,难以应对巨大的公共需求,因而非政府组织发挥了越来越重要的作用。然而非政府组织实际参与危机管理过程所发挥的作用并不理想,在制度层面、非政府组织自... 近年来,中国的灾难性危机事件频发,在应对危机事件的过程中,政府单方力量显得不足,难以应对巨大的公共需求,因而非政府组织发挥了越来越重要的作用。然而非政府组织实际参与危机管理过程所发挥的作用并不理想,在制度层面、非政府组织自身、社会对非政府组织的认同、政府组织与非政府组织之间的合作等方面还存在诸多问题。克服这些问题,完善危机管理体系,充分发挥非政府组织在灾难性危机管理中的作用意义重大。 展开更多
关键词 非政府组织 危机管理 困境解 决方案
下载PDF
互动式营销型呼叫中心——OKI CTstage P&S公司客户服务中心解决方案
2
《电子商务世界》 2004年第4期52-53,共2页
关键词 互动式营销型呼叫中心 OKICTstageP &S公司 客户服务中心解 决方案 ACD功能 主动外呼
下载PDF
Multi-attribute decision-making based on subjective and objective integrated eigenvector method 被引量:12
3
作者 龚艳冰 陈森发 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期144-147,共4页
An integrated approach is proposed to investigate the fuzzy multi-attribute decision-making (MADM) problems, where subjective preferences are expressed by a pairwise comparison matrix on the relative weights of attr... An integrated approach is proposed to investigate the fuzzy multi-attribute decision-making (MADM) problems, where subjective preferences are expressed by a pairwise comparison matrix on the relative weights of attributes and objective information is expressed by a decision matrix. An eigenvector method integrated the subjective fuzzy preference matrix and objective information is proposed. Two linear programming models based on subjective and objective information are introduced to assess the relative importance weights of attributes in an MADM problem. The simple additive weighting method is utilized to aggregate the decision information, and then all the alternatives are ranked. Finally, a numerical example is given to show the feasibility and effectiveness of the method. The result shows that it is easier than other methods of integrating subjective and objective information. 展开更多
关键词 multi-attribute decision-making eigenvector method alternative ranking
下载PDF
Method based on fuzzy linguistic scale and FIOWGA operator for decision-making problems 被引量:3
4
作者 徐泽水 达庆利 《Journal of Southeast University(English Edition)》 EI CAS 2003年第1期88-91,共4页
In this paper, we present a fuzzy linguistic scale, which is characterized by triangular fuzzy numbers on [1/9, 9], for the comparison between two alternatives, and introduce a possibility degree formula for comparing... In this paper, we present a fuzzy linguistic scale, which is characterized by triangular fuzzy numbers on [1/9, 9], for the comparison between two alternatives, and introduce a possibility degree formula for comparing triangular fuzzy numbers. We utilize the fuzzy linguistic scale to construct a linguistic preference matrix, and propose a fuzzy induced ordered weighted geometric averaging (FIOWGA) operator to aggregate linguistic preference information. A method based on the fuzzy linguistic scale and FIOWGA operator for decision-making problems is presented. Finally, an illustrative example is given to verify the developed method and to demonstrate its feasibility and effectiveness. 展开更多
关键词 fuzzy linguistic scale triangular fuzzy numbers FIOWGA operator
下载PDF
有线电视分配网安全用电的思考
5
作者 梁勇 《视听》 2010年第4期59-60,共2页
在有线电视网络传输分配网中,各种有源器件必不可少,日常工作中常发现漏电、导电现象,容易导致用电安全事故,本文对有线电视分配网用电方面出现漏电、导电现象的起因作了分析,并提出解决办法。
关键词 有线电视 分配网 用电安全 起因 决方案
下载PDF
Toward an RSU-unavailable Lightweight Certificateless Key Agreement Scheme for VANETs 被引量:5
6
作者 SONG Jun HE Chunjiao +2 位作者 ZHANG Lei TANG Shanyu ZHANG Huanguo 《China Communications》 SCIE CSCD 2014年第9期93-103,共11页
Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks con... Vehicle ad-hoc networks have developed rapidly these years,whose security and privacy issues are always concerned widely.In spite of a remarkable research on their security solutions,but in which there still lacks considerations on how to secure vehicleto-vehicle communications,particularly when infrastructure is unavailable.In this paper,we propose a lightweight certificateless and oneround key agreement scheme without pairing,and further prove the security of the proposed scheme in the random oracle model.The proposed scheme is expected to not only resist known attacks with less computation cost,but also as an efficient way to relieve the workload of vehicle-to-vehicle authentication,especially in no available infrastructure circumstance.A comprehensive evaluation,including security analysis,efficiency analysis and simulation evaluation,is presented to confirm the security and feasibility of the proposed scheme. 展开更多
关键词 vehicle ad-hoc network securityand privacy lightweight authentication certificateless key agreement
下载PDF
Mineral processing plant location using the analytic hierarchy process——a case study:the Sangan iron ore mine(phase 1) 被引量:18
7
作者 SAFARI Mohsen ATAEI Mohammad +1 位作者 KHALOKAKAIE Reza KARAMOZIAN Mohammad 《Mining Science and Technology》 EI CAS 2010年第5期691-695,共5页
Locating the mineral processing plant near a mine is the most important parameter that affects the whole process.Many factors,and their preferences,should be considered in this stage.The factors include economical,geo... Locating the mineral processing plant near a mine is the most important parameter that affects the whole process.Many factors,and their preferences,should be considered in this stage.The factors include economical,geological,technical,environmental and tectonic parameters.A multi-criteria decision making method is necessary to rank the alternatives.In this paper we describe how plant location is selected by using the Analytic Hierarchy Process(AHP).This method,with eight criteria,was used to select a location for the mineral processing plant at the Sangan iron ore mine(phase 1).Three alternatives for the processing plant were evaluated.The main criteria were distance from the mine,access to heavy machinery transport,the amount of excavation required for grading,bed mixture capacity,belt conveyor length,distance from the tailing dam,distance from the waste dumps and surface water diversion requirements.Finally,the alternatives were ranked and the best location was proposed. 展开更多
关键词 mineral processing multi-criteria decision making Sangan iron ore mine AHP
下载PDF
Unbiased Estimation Formula of Unit Weight Standard Deviation in Regularization Solution 被引量:1
8
作者 SHENYunzhong LIUDajie 《Geo-Spatial Information Science》 2004年第3期210-213,共4页
Regularization method is an effective method for solving ill\|posed equation. In this paper the unbiased estimation formula of unit weight standard deviation in the regularization solution is derived and the formula i... Regularization method is an effective method for solving ill\|posed equation. In this paper the unbiased estimation formula of unit weight standard deviation in the regularization solution is derived and the formula is verified with numerical case of 1 000 sample data by use of the typical ill\|posed equation, i.e. the Fredholm integration equation of the first kind. 展开更多
关键词 regularization solution unit weight standard deviation unbiased estimation
下载PDF
Research on internet traffic classification techniques using supervised machine learning 被引量:1
9
作者 李君 Zhang Shunyi +1 位作者 Wang Pan Li Cuilian 《High Technology Letters》 EI CAS 2009年第4期369-377,共9页
Interact traffic classification is vital to the areas of network operation and management. Traditional classification methods such as port mapping and payload analysis are becoming increasingly difficult as newly emer... Interact traffic classification is vital to the areas of network operation and management. Traditional classification methods such as port mapping and payload analysis are becoming increasingly difficult as newly emerged applications (e. g. Peer-to-Peer) using dynamic port numbers, masquerading techniques and encryption to avoid detection. This paper presents a machine learning (ML) based traffic classifica- tion scheme, which offers solutions to a variety of network activities and provides a platform of performance evaluation for the classifiers. The impact of dataset size, feature selection, number of application types and ML algorithm selection on classification performance is analyzed and demonstrated by the following experiments: (1) The genetic algorithm based feature selection can dramatically reduce the cost without diminishing classification accuracy. (2) The chosen ML algorithms can achieve high classification accuracy. Particularly, REPTree and C4.5 outperform the other ML algorithms when computational complexity and accuracy are both taken into account. (3) Larger dataset and fewer application types would result in better classification accuracy. Finally, early detection with only several initial packets is proposed for real-time network activity and it is proved to be feasible according to the preliminary results. 展开更多
关键词 supervised machine learning traffic classification feature selection genetic algorithm (GA)
下载PDF
On the Correct Meaning of Words in Non-literary Translation
10
作者 金源 《International English Education Research》 2014年第6期73-74,共2页
The work of translators are not always perfect, however, many of them will inevitably contain elements of misunderstanding. Of course, most of those misunderstandings are by the reason of misapprehending the correct m... The work of translators are not always perfect, however, many of them will inevitably contain elements of misunderstanding. Of course, most of those misunderstandings are by the reason of misapprehending the correct meaning of words, especially in the field of non-literary tanslation. My purpose is rather to show translators -- and, by extension, others who are learning English -- how to recognize the accurate message of words in a first draft and how to revise them so as to eliminate those incorrect translated texts. 展开更多
关键词 non-literary translation correct understanding of words cross--cultural communication resolvent.
下载PDF
Optimal Transmission Behaviour Policies of Secondary Users in Proactive-Optimization Cognitive Radio Networks 被引量:2
11
作者 司鹏搏 于非 +1 位作者 王慧琪 张延华 《China Communications》 SCIE CSCD 2013年第8期1-17,共17页
In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intell... In Cognitive Radio(CR)networks,there is a common assumption that secondary devices always obey commands and are under full control.However,this assumption may become unrealistic for future CR networks with more intelligent,sophisticated and autonomous devices.Imperfect spectrum sensing and illegal behaviour of secondary users can result in harmful interference to primary users.In this paper,we propose a novel concept of Proactive-Optimization CR(POCR)networks,in which highly intelligent secondary users always try to proactively consider potentially harmful interference when making their behaviour decision.Furthermore,we propose an optimal transmission behaviour decision scheme for secondary users in POCR networks considering the possible harmful interference and penalties from primary users.Specifically,we formulate the system as a Partially-Observable Markov Decision Process(POMDP)problem.With this formulation,a low-complexity dynamic programming framework is presented to obtain the optimal behaviour policy.Extensive simulation results are presented to illustrate the significant performance improvement of the proposed scheme compared with the existing one that ignores the proactive-optimization of secondary users. 展开更多
关键词 CR proactive-optimization user behaviour POMDP
下载PDF
New and More General Rational Formal Solutions to (2+1)-Dimensional Toda System
12
作者 BAI Cheng-Lin 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第5X期881-884,共4页
With the aid of computerized symbolic computation and Riccati equation rational expansion approach, some new and more general rational formal solutions to (2+1)-dimensional Toda system are obtained. The method used... With the aid of computerized symbolic computation and Riccati equation rational expansion approach, some new and more general rational formal solutions to (2+1)-dimensional Toda system are obtained. The method used here can also be applied to solve other nonlinear differential-difference equation or equations. 展开更多
关键词 Riccati equation rational expansion approach (2+1)-dimensional Toda system rational formal solutions
下载PDF
A simple theoretical approach for analysis of slide-toe-toppling failure
13
作者 Hassan Sarfaraz 《Journal of Central South University》 SCIE EI CAS CSCD 2020年第9期2745-2753,共9页
A prevalent kind of failure of rock slopes is toppling instability.In secondary toppling failures,these instabilities are stimulated through some external factors.A type of secondary toppling failure is"slide-toe... A prevalent kind of failure of rock slopes is toppling instability.In secondary toppling failures,these instabilities are stimulated through some external factors.A type of secondary toppling failure is"slide-toe-toppling failure".In this instability,the upper and toe parts of the slope have the potential of sliding and toppling failures,respectively.This failure has been investigated by an analytical method and experimental tests.In the present study,at first,the literature review of toppling failure is presented.Then a simple theoretical solution is suggested for evaluating this failure.The recommended method is compared with the approach of AMINI et al through a typical example and three physical models.The results indicate that the proposed method is in good agreement with the results of AMINI et al’s approach and experimental models.Therefore,this suggested methodology can be applied to examining the stability of slide-toe-toppling failure. 展开更多
关键词 rock slopes slope stability slide-toe-toppling theoretical solution
下载PDF
Research on the adjustment model of ventilation characteristic parameters based on integrated method of circuit and path
14
作者 Ting-gui JIA Shu-gang WANG +1 位作者 Guo-na QU Jian LIU 《Journal of Coal Science & Engineering(China)》 2013年第1期33-37,共5页
Ventilation characteristic parameters are the base of ventilation network solution; however, they are apt to be affected by operating errors, reading errors, airflow stability, and other factors, and it is difficult t... Ventilation characteristic parameters are the base of ventilation network solution; however, they are apt to be affected by operating errors, reading errors, airflow stability, and other factors, and it is difficult to obtain accurate results. In order to check the ventilation characteristic parameters of mines more accurately, the integrated method of circuit and path is adopted to overcome the drawbacks caused by the traditional path method or circuit method in the digital debugging process of ventilation system, which can improve the large local error or the inconsistency between the airflow direction and the actual situation caused by inaccuracy of the ventilation characteristic parameters or checking in the ventilation network solution. The results show that this method can effectively reduce the local error and prevent the pseudo-airflow reversal phenomenon; in addition, the solution results are consistent with the actual situation of mines, and the effect is obvious. 展开更多
关键词 path method circuit method ventilation network adjustment model ventilation characteristic parameter
下载PDF
Managing High Volume Data for Network Attack Detection Using Real-Time Flow Filtering
15
作者 Abhrajit Ghosh Yitzchak M. Gottlieb +5 位作者 Aditya Naidu Akshay Vashist Alexander Poylisher Ayumu Kubota Yukiko Sawaya Akira Yamada 《China Communications》 SCIE CSCD 2013年第3期56-66,共11页
In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to hi... In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to high volume data feeds that are common in large Tier-1 ISP networks and providing rich, timely information on observed attacks. It is a software solution that is designed to run on off-the-shelf hardware platforms and incorporates a scalable data processing architecture along with lightweight analysis algorithms that make it suitable for deployment in large networks. RTFF also makes use of state of the art machine learning algorithms to construct attack models that can be used to detect as well as predict attacks. 展开更多
关键词 network security intrusion detection SCALING
下载PDF
Adaptable Processing: Stage Development
16
作者 Dumitru Todoroi 《Journal of Literature and Art Studies》 2013年第5期305-311,共7页
The development and evolution of Microsoft Office and Microsoft Windows shells are based in general on the special methodology of software creation and implementation such as macros, subroutine, custom commands, and s... The development and evolution of Microsoft Office and Microsoft Windows shells are based in general on the special methodology of software creation and implementation such as macros, subroutine, custom commands, and specialized features. Microsoft Office for Mac has for long been criticized for its lack of support of Unicode and BiDi languages, notably Arabic and Hebrew. This has not changed in the Office 2008 version. Microsoft Office 2010 (also called Office 2010 and Office 14) is the current version of the Microsoft Office productivity suite for Microsoft Windows, and the successor to Microsoft Office 2007. With Office 2010, users are in control, getting things done and producing amazing results however and wherever they work best. Ms Office 2010 is the last version of Microsoft Office with support for Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 due to Office 2013 requiring Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, or Windows RT. Adaptive hardware (Ugurdag, 2006) reflects the capability of a system to maintain or improve its performance in the context of internal or external changes. Adaptation at hardware levels increases the system capabilities beyond what is possible with software-only solutions. Algorithms, techniques, and their implementation in hardware are developed over a diverse variety of applications. The methodology of the On-Off-Line adaptable processors (Todoroi & Micusha, 2012) support development of adaptable software and hardware. Automatic creation of the Off-Line adaptable processors are proved. Development of the On-Line and On-Off-Line adaptable processors based on Off-Line processing creation method is proposed (Todoroi, Micu^a, & Todoroi, 2009; Todoroi, 2008a, 2008b) 展开更多
关键词 ADAPTABILITY ADAPTIVE PROCESSOR LANGUAGE adaptable processor adaptive hardware adaptable software
下载PDF
The Hospital Assessment Tool: An Integrated Solution to Evaluate and Reduce Solid Medical Waste
17
作者 M. Franchetti A. Kumar 《Journal of Environmental Science and Engineering》 2010年第7期67-75,共9页
The Hospital Assessment Tool (HAT) is an assessment technique that provides technical support to the healthcare industry for accessing solid waste generation, selecting products, and work practices to eliminate or r... The Hospital Assessment Tool (HAT) is an assessment technique that provides technical support to the healthcare industry for accessing solid waste generation, selecting products, and work practices to eliminate or reduce environmental hazards and solid waste, and to maintain quality patient care. Since 2007, this tool has been applied as part of an innovative partnership between the Lucas County Solid Waste Management District and College of Engineering of the University of Toledo. The purpose of this paper is to provide a complete overview and framework of this program and the HAT so that other institutions may learn from it and adopt similar concepts to help reduce solid waste generation and improve economic conditions in their regions. A focus of this paper is a discussion of a case study that details the process and results of an assessment conducted at a large hospital in Northwest, Ohio, USA. Also, included in this paper is a discussion of the project's background, a comparison to similar project's between colleges and government agencies, and results and benefits of the program, and an overview of the opportunities and barriers to this type of research. The project demonstrates that through a cooperative effort and a creative alliance, businesses, governments, universities, and industries can work together to improve environmental quality, reduce waste, and improve profitability. The project also educates college students through practical, real-world environmental work experience and trains them to become future environmental leaders 展开更多
关键词 Medical waste assessment tools environment.
下载PDF
Optimization of the Tracking Mechanism for a PV String
18
作者 Irina-Nicoleta Tatu t Catalin Alexandru 《Journal of Mechanics Engineering and Automation》 2011年第3期211-216,共6页
The paper presents researches on increasing the energetic & economic efficiency of the photovoltaic (PV) conversion by designing and optimizing a dual-axis tracking mechanism that simultaneously changes the positio... The paper presents researches on increasing the energetic & economic efficiency of the photovoltaic (PV) conversion by designing and optimizing a dual-axis tracking mechanism that simultaneously changes the position of the modules using two motor sources. The driving source for the daily motion is a rotary motor, while the elevation motion is performed with a linear actuator. The main task in optimizing the tracking mechanism is to maximize the energetic gain by increasing the solar input and minimizing the energy consumption for tracking. The design strategy aims to identify the optimum angular field for the daily motion, as well as the optimum actuating time in the step-by-step motion. The study is made by developing the virtual prototype of the tracking mechanism, in the mechatronic concept. The virtual prototyping platform includes the following software solutions: CATIA (Computer Aided Tri-Dimensional Interface Application)--to create the solid model, which contains information about the mass & inertia properties of the parts, ADAMS (Automatic Dynamic Analysis of Mechanical Systems)/View--to model the mechanical structure of the solar tracker, and EASY5 & ADAMS/Controls-for the control system design. 展开更多
关键词 PV (photovoltaic) string tracking mechanism control system virtual prototype OPTIMIZATION
下载PDF
Rationality of escalating commitment in information systems project management: An inter-disciplinary perspective
19
作者 Dmitriy V. Chulkov 《Chinese Business Review》 2010年第7期48-57,共10页
Escalation of commitment has been linked to losses in information systems (IS) projects. Understanding the nature and the rationality of escalation allows the firm to promote optimal project management practices. Th... Escalation of commitment has been linked to losses in information systems (IS) projects. Understanding the nature and the rationality of escalation allows the firm to promote optimal project management practices. This study takes an inter-disciplinary approach and draws on research from economics and management to create a model of irrational escalation and a model of rational escalation. The forces that contribute to irrational escalation include the responsibility of the same manager for both the project selection and project continuation decisions that create proneness to self-justification, the potential for negative framing of decision options due to large sunk costs, the proximity of project completion and the presence of organizational inertia. Identifying these irrational escalation factors helps design appropriate de-escalation techniques. The rational escalation model draws on the real option theory and the bandit process theory to identify conditions when project continuation is justified by the value of information and the value of flexibility that the firm receives from continuing the project. 展开更多
关键词 project management project termination escalation of commitment management information systems INCENTIVES
下载PDF
Design and Implementation of Security Solution for Computer Network
20
作者 Lihui SONG Haicun ZHAO 《International Journal of Technology Management》 2015年第5期75-78,共4页
This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, ... This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, desktop system security, virus protection, identity authentication, access control, information encryption, message integrity check, non-repudiation, security audit, intrusion detection, vulnerability scanning, electromagnetic leakage emission protection, security management and other security technology and management measures, the purpose is to establish a complete, multi-level three-dimensional, network security defense system. 展开更多
关键词 Network security FIREWALL Intrusion detection Security audit
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部