期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
三个加法问题
1
作者 Г.,СА 袁作兴 《中南工学院科技通讯》 1995年第2期53-58,共6页
关键词 周期函数 渐近公式 加法问题
下载PDF
数量特征敏感问题加法模型分层二阶段抽样样本大小研究及其应用 被引量:3
2
作者 周云华 高歌 +2 位作者 濮翔科 傅颖 施佳琛 《中国卫生统计》 CSCD 北大核心 2014年第1期45-48,共4页
【提要】目的为敏感问题复杂抽样调查提供科学的样本大小估计公式。方法使用哥西不等式、求条件极小值点等方法,从数学上推导出样本大小计算公式。对北京市男男性行为人群进行了预调查,为计算正式调查的样本大小估计出相关统计量的数... 【提要】目的为敏感问题复杂抽样调查提供科学的样本大小估计公式。方法使用哥西不等式、求条件极小值点等方法,从数学上推导出样本大小计算公式。对北京市男男性行为人群进行了预调查,为计算正式调查的样本大小估计出相关统计量的数值。结果对敏感问题加法模型分层二阶段抽样,推导出在限定抽样误差的值使调查费用达到最小和限定调查费用的值使抽样误差达到最小时所需的样本大小估计公式;在北京市男男性行为人群正式调查中,在限定抽样误差V(μ^-)的值V=0.0105使调查费用达到最小,第一层(15~29岁)需抽取的区县数n11=7(个),平均每个区县需抽取的男男性行为者人数为n21^-=115人;第二层(30~49岁)需抽取的区县数n12=7(个),平均每个区县需抽取的男男性行为者人数为n22^-=107人。结论本文提供的数量特征敏感问题加法模型分层二阶段抽样调查样本大小估计公式,具有较大的理论意义和实际应用价值。 展开更多
关键词 敏感问题加法模型 男男性行为 分层二阶段抽样 样本大小
下载PDF
在数学问题中渗透关系教学——以“20以内数的整理和复习”一课为例
3
作者 何冬青 《数学教学通讯》 2017年第7期62-63,共2页
数学核心素养之一是培养学生的提问能力,本文以“20以内数的整理和复习”一课为例,引导学生在课堂对同一个数不同形式的表征、讨论数与数之间的关系、提出加法和减法的问题、思考式与式之间的关系,从而更好地培养学生的数感。
关键词 20以内加减法 加法问题 减法问题 复习整理 核心素养
下载PDF
一道竞赛题的讨论和推广
4
作者 肖雯 倪达庆 《中学教研(数学版)》 2000年第9期27-31,共5页
关键词 中学 数学竞赛题 三位数加法问题 解题方法
下载PDF
On the Acceleration Problem of q-Bernstein Polynomials 被引量:1
5
作者 YUN Lian-ying XIANG Xue-yan WANG Hui 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2008年第2期252-259,共8页
In this paper, we investigate not only the acceleration problem of the q-Bernstein polynomials Bn(f, q; x) to B∞ (f, q; x) but also the convergence of their iterated Boolean sum. Using the methods of exact estima... In this paper, we investigate not only the acceleration problem of the q-Bernstein polynomials Bn(f, q; x) to B∞ (f, q; x) but also the convergence of their iterated Boolean sum. Using the methods of exact estimate and theories of modulus of smoothness, we get the respective estimates of the convergence rate, which suggest that q-Bernstein polynomials have the similar answer with the classical Bernstein polynomials to these two problems. 展开更多
关键词 q-Bernstein polynomial ACCELERATION iterated Boolean sum convergence rate
下载PDF
A Parallel Quantum Algorithm for the Satisfiability Problem 被引量:1
6
作者 LIU Wen-Zhang ZHANG Jing-Fu LONG Gui-Lu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第3期629-630,共2页
In this paper we present a classical parallel quantum algorithm for the satisfiability problem. We have exploited the classical parallelism of quantum algorithms developed in [G.L. Long and L. Xiao, Phys. Rev. A 69 (... In this paper we present a classical parallel quantum algorithm for the satisfiability problem. We have exploited the classical parallelism of quantum algorithms developed in [G.L. Long and L. Xiao, Phys. Rev. A 69 (2004) 052303], so that additional acceleration can be gained by using classical parallelism. The quantum algorithm first estimates the number of solutions using the quantum counting algorithm, and then by using the quantum searching algorithm, the explicit solutions are found. 展开更多
关键词 satisfiability problem quantum search algorithm long algorithm
下载PDF
A DIGITAL SIGNATURE-BASED VISUAL CRYPTOGRAPHY SCHEME FOR IMAGE DISCRIMINATION AND MANAGEMENT 被引量:1
7
作者 Han Yanyan Hu Yupu He Wencai 《Journal of Electronics(China)》 2009年第5期631-636,共6页
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat... Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect. 展开更多
关键词 Visual cryptography Digital signature Time-stamp
下载PDF
Fast multipole accelerated boundary element method for the Helmholtz equation in acoustic scattering problems 被引量:2
8
作者 LI ShanDe GAO GuiBing +2 位作者 HUANG QiBai LIU WeiQi CHEN Jun 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第8期1405-1410,共6页
We apply the fast multipole method (FMM) accelerated boundary element method (BEM) for the three-dimensional (3D) Helmholtz equation, and as a result, large-scale acoustic scattering problems involving 400000 elements... We apply the fast multipole method (FMM) accelerated boundary element method (BEM) for the three-dimensional (3D) Helmholtz equation, and as a result, large-scale acoustic scattering problems involving 400000 elements are solved efficiently. This is an extension of the fast multipole BEM for two-dimensional (2D) acoustic problems developed by authors recently. Some new improvements are obtained. In this new technique, the improved Burton-Miller formulation is employed to over-come non-uniqueness difficulties in the conventional BEM for exterior acoustic problems. The computational efficiency is further improved by adopting the FMM and the block diagonal preconditioner used in the generalized minimum residual method (GMRES) iterative solver to solve the system matrix equation. Numerical results clearly demonstrate the complete reliability and efficiency of the proposed algorithm. It is potentially useful for solving large-scale engineering acoustic scattering problems. 展开更多
关键词 fast multipole method boundary element method Helmholtz equation acoustic scattering problems.
原文传递
ON APPROXIMATION OF MAX n/2-UNCUT PROBLEM 被引量:1
9
作者 XU Dachuan(Institute of Applied Mathematics, Academy of Mathematics and Systems Sciences, Chinese. Academy of Sciences, Beijing 100080, China) 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2003年第2期260-267,共8页
Using outward rotations, we obtain an approximation algorithm for MAXn/2-UNCUT problem, i.e., partitioning the vertices of a weighted graph into two blocks of equalcardinality such that the total weight of edges that ... Using outward rotations, we obtain an approximation algorithm for MAXn/2-UNCUT problem, i.e., partitioning the vertices of a weighted graph into two blocks of equalcardinality such that the total weight of edges that do not cross the cut is maximized. In manyinteresting cases, the algorithm performs better than the algorithms of Ye and of Halperin andZwick. The main tool used to obtain this result is semidefinite programming. 展开更多
关键词 approximation algorithm MAX n/2-UXCUT problem semidefinite programming approximation ratio
原文传递
A decomposition approach to job-shop scheduling problem with discretely controllable processing times 被引量:2
10
作者 NIU GangGang SUN ShuDong +1 位作者 LAFON Pascal YANG HongAn 《Science China(Technological Sciences)》 SCIE EI CAS 2011年第5期1240-1248,共9页
Job-shop scheduling problem with discretely controllable processing times (JSP-DCPT) is modeled based on the disjunctive graph, and the formulation of JSP-DCPT is presented. A three-step decomposition approach is prop... Job-shop scheduling problem with discretely controllable processing times (JSP-DCPT) is modeled based on the disjunctive graph, and the formulation of JSP-DCPT is presented. A three-step decomposition approach is proposed so that JSP-DCPT can be handled by solving a job-shop scheduling problem (JSP) and a series of discrete time-cost tradeoff problems. To simplify the decomposition approach, the time-cost phase plane is introduced to describe tradeoffs of the discrete time-cost tradeoff problem, and an extreme mode-based set dominant theory is elaborated so that an upper bound is determined to cut discrete time-cost tradeoff problems generated by using the proposed decomposition approach. An extreme mode-based set dominant decomposition algorithm (EMSDDA) is then proposed. Experimental simulations for instance JSPDCPT_FT10, which is designed based on a JSP benchmark FT10, demonstrate the effectiveness of the proposed theory and the decomposition approach. 展开更多
关键词 job-shop scheduling discretely controllable processing times time-cost tradeoff DECOMPOSITION
原文传递
A WEIGHTED PRODUCT METHOD FOR BIDDING STRATEGIES IN MULTI-ATTRIBUTE AUCTIONS 被引量:3
11
作者 Mingxi WANG Shulin LIU +1 位作者 Shouyang WANG Kin Keung LAI 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2010年第1期194-208,共15页
To eliminate computational problems involved in evaluating multi-attribute bids with differentmeasures,this article first normalizes each individual component of a bid,and then makes use ofthe weighted product method ... To eliminate computational problems involved in evaluating multi-attribute bids with differentmeasures,this article first normalizes each individual component of a bid,and then makes use ofthe weighted product method to present a new scoring function that converts each bid into a score.Twokinds of multi-attribute auction models are introduced in terms of scoring rules and bidding objectivefunctions.Equilibrium bidding strategies,procurer's revenue comparisons and optimal auction designare characterized in these two models.Finally,this article discusses some improvement of robustnessof our models,with respect to the assumptions. 展开更多
关键词 Bidding strategy multi-attribute auctions weighted product method winner determination protocol.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部