In this article,the authors discuss the optimal conditions of the linear fractionalprogramming problem and prove that a locally optional solution is a globally optional solution and the locally optimal solution can be...In this article,the authors discuss the optimal conditions of the linear fractionalprogramming problem and prove that a locally optional solution is a globally optional solution and the locally optimal solution can be attained at a basic feasible solution withconstraint condition.展开更多
This paper proposes a new coordination method for multi-robot system.The state space for a multi-robot system is constructed according to the task requirements and system characteristics.Reachable statefor the system ...This paper proposes a new coordination method for multi-robot system.The state space for a multi-robot system is constructed according to the task requirements and system characteristics.Reachable statefor the system is constrained by the system s internal and external constraints,under which the task isexecutable if there exists a state transition trajectory from the initial to the goal state in its state space.Ifthe task is realizable,the feasible or the optimal strategy for task execution could then be investigated inthe state space.Otherwise,the task could be modified to be realizable via adjusting system s configura-tions and/or task constraints,which provides critical guidance for system reconstructions.This con-tributes to the designing and planning of the robotic tasks.Experiments of multi-robot formation movementare conducted to show the validity of the proposed method.展开更多
The objective of this paper is to study the influence of repeated variable action on long-term behavior of concrete structural elements using quasi-permanent combination of actions, for the assessment of long-term eff...The objective of this paper is to study the influence of repeated variable action on long-term behavior of concrete structural elements using quasi-permanent combination of actions, for the assessment of long-term effects (e.g., effects due to creep and shrinkage in concrete structures), as it is proposed in Eurocodes. Extensive experimental program and analytical research using model B3 and AAEM (age adjusted effective modulus) method was performed in order to define quasi-permanent factor ψ2, for two specific loading histories. These loading histories were consist of long-term permanent action "G" and repeated variable action "Q". The variable load was applied in cycles of loading/unloading for 24 h and 48 h in period of 400 days appropriately for one series of concrete elements. 24 reinforced concrete beams, dimensions 150 mm × 280 mm × 3,000 mm, were tested. Twelve beams were made of concrete class C30/37 and 12 of concrete class C60/75.展开更多
This article questions the reliability of the amount of revenue recognized in the percentage of completion (POC) method of revenue recognition in construction industry and recommends a new method based on the progre...This article questions the reliability of the amount of revenue recognized in the percentage of completion (POC) method of revenue recognition in construction industry and recommends a new method based on the progress billing which is more reliable. The most commonly used method of revenue recognition in the construction industry is the percentage of completion method (POC), where the revenue is recognized on the basis of the percentage of work completed. The calculation of percentage of work completed is made on the basis of the cost incurred for the contract work during the financial period and the cost required for completion of the work as estimated by the contractor. Here, the acceptance of the product by the buyer (contractee) is not involved in recognizing the revenue. The reliability of the amount of revenue and its collectability can be assured only when the buyer accepts the product. The approval of the progress bill by the contractee is needed to assure the reliability and collectability and it must be the event that triggers the recognition of revenue.展开更多
Behavior-based malware analysis is an important technique for automatically analyzing and detecting malware, and it has received considerable attention from both academic and industrial communities. By considering how...Behavior-based malware analysis is an important technique for automatically analyzing and detecting malware, and it has received considerable attention from both academic and industrial communities. By considering how malware behaves, we can tackle the malware obfuscation problem, which cannot be processed by traditional static analysis approaches, and we can also derive the as-built behavior specifications and cover the entire behavior space of the malware samples. Although there have been several works focusing on malware behavior analysis, such research is far from mature, and no overviews have been put forward to date to investigate current developments and challenges. In this paper, we conduct a survey on malware behavior description and analysis considering three aspects: malware behavior description, behavior analysis methods, and visualization techniques. First, existing behavior data types and emerging techniques for malware behavior description are explored, especially the goals, prin- ciples, characteristics, and classifications of behavior analysis techniques proposed in the existing approaches. Second, the in- adequacies and challenges in malware behavior analysis are summarized from different perspectives. Finally, several possible directions are discussed for future research.展开更多
基金Supported by the Natural Science Foundation of Henan Province(0511012000 0511013600) Supported by the Science Foundation for Pure Research of Natural Science of the Education Department of Henan Province(200512950001)
文摘In this article,the authors discuss the optimal conditions of the linear fractionalprogramming problem and prove that a locally optional solution is a globally optional solution and the locally optimal solution can be attained at a basic feasible solution withconstraint condition.
基金Supported by the National Natural Science Foundation for Distinguished Young Scholars Abroad (No. 60428303)
文摘This paper proposes a new coordination method for multi-robot system.The state space for a multi-robot system is constructed according to the task requirements and system characteristics.Reachable statefor the system is constrained by the system s internal and external constraints,under which the task isexecutable if there exists a state transition trajectory from the initial to the goal state in its state space.Ifthe task is realizable,the feasible or the optimal strategy for task execution could then be investigated inthe state space.Otherwise,the task could be modified to be realizable via adjusting system s configura-tions and/or task constraints,which provides critical guidance for system reconstructions.This con-tributes to the designing and planning of the robotic tasks.Experiments of multi-robot formation movementare conducted to show the validity of the proposed method.
文摘The objective of this paper is to study the influence of repeated variable action on long-term behavior of concrete structural elements using quasi-permanent combination of actions, for the assessment of long-term effects (e.g., effects due to creep and shrinkage in concrete structures), as it is proposed in Eurocodes. Extensive experimental program and analytical research using model B3 and AAEM (age adjusted effective modulus) method was performed in order to define quasi-permanent factor ψ2, for two specific loading histories. These loading histories were consist of long-term permanent action "G" and repeated variable action "Q". The variable load was applied in cycles of loading/unloading for 24 h and 48 h in period of 400 days appropriately for one series of concrete elements. 24 reinforced concrete beams, dimensions 150 mm × 280 mm × 3,000 mm, were tested. Twelve beams were made of concrete class C30/37 and 12 of concrete class C60/75.
文摘This article questions the reliability of the amount of revenue recognized in the percentage of completion (POC) method of revenue recognition in construction industry and recommends a new method based on the progress billing which is more reliable. The most commonly used method of revenue recognition in the construction industry is the percentage of completion method (POC), where the revenue is recognized on the basis of the percentage of work completed. The calculation of percentage of work completed is made on the basis of the cost incurred for the contract work during the financial period and the cost required for completion of the work as estimated by the contractor. Here, the acceptance of the product by the buyer (contractee) is not involved in recognizing the revenue. The reliability of the amount of revenue and its collectability can be assured only when the buyer accepts the product. The approval of the progress bill by the contractee is needed to assure the reliability and collectability and it must be the event that triggers the recognition of revenue.
基金Project supported by the National Natural Science Foundation of China(No.61472437)
文摘Behavior-based malware analysis is an important technique for automatically analyzing and detecting malware, and it has received considerable attention from both academic and industrial communities. By considering how malware behaves, we can tackle the malware obfuscation problem, which cannot be processed by traditional static analysis approaches, and we can also derive the as-built behavior specifications and cover the entire behavior space of the malware samples. Although there have been several works focusing on malware behavior analysis, such research is far from mature, and no overviews have been put forward to date to investigate current developments and challenges. In this paper, we conduct a survey on malware behavior description and analysis considering three aspects: malware behavior description, behavior analysis methods, and visualization techniques. First, existing behavior data types and emerging techniques for malware behavior description are explored, especially the goals, prin- ciples, characteristics, and classifications of behavior analysis techniques proposed in the existing approaches. Second, the in- adequacies and challenges in malware behavior analysis are summarized from different perspectives. Finally, several possible directions are discussed for future research.