期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
供应链管理面向复杂性——供应链的CAS特性揭示
1
作者 白少布 薛恒新 《经济师》 2006年第9期215-216,共2页
文章根据CAS基本理论以及聚集主体的聚集特性提出了供应链作为CAS的基本要素,揭示了基本要素在供应链中的作用。各节点企业共同获利是供应链管理的目的,基于CAS特性阐述了相应的供应链管理策略,为供应链管理问题的研究提供了新的方法和... 文章根据CAS基本理论以及聚集主体的聚集特性提出了供应链作为CAS的基本要素,揭示了基本要素在供应链中的作用。各节点企业共同获利是供应链管理的目的,基于CAS特性阐述了相应的供应链管理策略,为供应链管理问题的研究提供了新的方法和思路。 展开更多
关键词 供应链管理 复杂适应系统复杂性 聚集特性 管理策略
下载PDF
复杂性视网膜脱离患者行玻璃体切割术的围手术期护理 被引量:6
2
作者 周扣红 刘小娟 《临床合理用药杂志》 2012年第2期10-11,共2页
视网膜脱离是眼科常见的致盲性眼底疾病之一,及早发现并治疗能最大限度保留视功能.玻璃体切割合并硅油或膨胀气体(C3F8)填充术是目前治疗复杂性视网膜脱离最主要的方法,现将我院行玻璃体切割合并硅油或C3F8填充术治疗的视网膜脱离患... 视网膜脱离是眼科常见的致盲性眼底疾病之一,及早发现并治疗能最大限度保留视功能.玻璃体切割合并硅油或膨胀气体(C3F8)填充术是目前治疗复杂性视网膜脱离最主要的方法,现将我院行玻璃体切割合并硅油或C3F8填充术治疗的视网膜脱离患者30例(30眼)的护理体会总结如下. 展开更多
关键词 复杂性视网膜脱离 复杂性 玻璃体切割术 护理
下载PDF
企业复杂性成本浅析
3
作者 董黛 《经贸实践》 2016年第14期138-,共1页
复杂性成本可以说是个很新的概念,国内对于复杂性成本的研究也并不多。但在企业发展的大环境下我认为对复杂性成本的研究还是很有必要的。我们知道复杂性成本是"大企业增长悖论"的根源之一,如果对复杂性成本的产生、识别、衡... 复杂性成本可以说是个很新的概念,国内对于复杂性成本的研究也并不多。但在企业发展的大环境下我认为对复杂性成本的研究还是很有必要的。我们知道复杂性成本是"大企业增长悖论"的根源之一,如果对复杂性成本的产生、识别、衡量能有充分的认识,我们就可以对"大企业增长悖论"进行一定的解释;如果能衡量企业或企业业务中复杂性总成本有多少以及可消除的复杂性成本有多少,我们就可以对企业的业务及其流程等进行优化,从而节约控制成本,这也是现代企业发展的趋势.本文从复杂性理论说起,综合阅读的文献,阐述自己对复杂性成本进行的简单理解。 展开更多
关键词 复杂性成本复杂性理论“烧鹅仔”控制成本
下载PDF
《复杂系统与复杂性科学》2019年第16卷总目次
4
《复杂系统与复杂性科学》 EI CSCD 2019年第4期90-93,共4页
关键词 多智能体系统 复杂系统 复杂系统与复杂性科学》 演化博弈 复杂性科学
下载PDF
寻求多边形链顶点凸壳的算法 被引量:8
5
作者 周培德 刘建 王立权 《北京理工大学学报》 EI CAS CSCD 北大核心 2003年第1期75-77,共3页
提出一种计算简单多边形链顶点凸壳的算法 ,基本思想是分段计算 ,在每段的计算中 ,先分 4种不同情况计算出边链 L1 ,然后利用一种技巧将 L1 上的部分顶点排列成顶点角递增序列 ,构成边链 L2 ,最后对 L2 进行倒查 ,删去非凸壳顶点 ,剩下... 提出一种计算简单多边形链顶点凸壳的算法 ,基本思想是分段计算 ,在每段的计算中 ,先分 4种不同情况计算出边链 L1 ,然后利用一种技巧将 L1 上的部分顶点排列成顶点角递增序列 ,构成边链 L2 ,最后对 L2 进行倒查 ,删去非凸壳顶点 ,剩下的点即凸壳顶点 .该算法不仅易于实现 ,而且其时间复杂性是线性的 . 展开更多
关键词 顶点 凸壳 简单多边形链 算法设计 复杂复杂性 计算几何 顶点角递增序列
下载PDF
“复杂系统与复杂性科学”论坛纪要 被引量:1
6
《中国基础科学》 2000年第1期45-46,共2页
1999年8月4日至6日国家自然科学基金委政策局会同信息科学部、生命科学部等学部组织国内30所高等院校、研究所的从事管理科学、生命科学、信息科学、计算机科学、地球科学、化学科学、工程与材料科学、数理科学等方面的近50位专家,按照... 1999年8月4日至6日国家自然科学基金委政策局会同信息科学部、生命科学部等学部组织国内30所高等院校、研究所的从事管理科学、生命科学、信息科学、计算机科学、地球科学、化学科学、工程与材料科学、数理科学等方面的近50位专家,按照优先资助领域遴选要面向21世纪,立足国情,“统观全局, 展开更多
关键词 复杂系统与复杂性科学 中国 科学研究
原文传递
THE SOLUTION OF K-L PROBLEM 被引量:1
7
作者 吕义忠 高晓波 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2000年第1期1-3,共3页
A central problem in the study of complexity is the measure of nonuniform complexity classes. BPPP/poly has been proved by Aldman, and EXPSPACEP/poly by Kannan. We propose the definition of approximate acceptance with... A central problem in the study of complexity is the measure of nonuniform complexity classes. BPPP/poly has been proved by Aldman, and EXPSPACEP/poly by Kannan. We propose the definition of approximate acceptance with which we discuss the nonuniform complexity of the K sized complete subgraph problem. The method of modal theory is used and the K sized complete subgraph problemP/poly, co NPP/poly and NPP/poly is proved. This paper solves the Karp Lipton′s open problem: “NPP/poly?” 展开更多
关键词 computational complexity nonuniform complexity model theory approximate acceptance P/poly
下载PDF
Structural Complexity Analysis of Information Systems Based on Petri Nets 被引量:3
8
作者 王景光 甘仞初 《Journal of Beijing Institute of Technology》 EI CAS 1999年第4期416-423,共8页
Aim To present a quantitative method for structural complexity analysis and evaluation of information systems. Methods Based on Petri net modeling and analysis techniques and with the aid of mathematical tools in ge... Aim To present a quantitative method for structural complexity analysis and evaluation of information systems. Methods Based on Petri net modeling and analysis techniques and with the aid of mathematical tools in general net theory(GNT), a quantitative method for structure description and analysis of information systems was introduced. Results The structural complexity index and two related factors, i.e. element complexity factor and connection complexity factor were defined, and the relations between them and the parameters of the Petri net based model of the system were derived. Application example was presented. Conclusion The proposed method provides a theoretical basis for quantitative analysis and evaluation of the structural complexity and can be applied in the general planning and design processes of the information systems. 展开更多
关键词 information system Petri Nets structural complexity element complexity factor connection complexity factor
下载PDF
A Concise Joint Transmit/Receive Antenna Selection Algorithm 被引量:4
9
作者 王俊岭 Ana Isabel Pérez-Neira 高梅国 《China Communications》 SCIE CSCD 2013年第3期91-99,共9页
For reducing the computational complexity of the problem of joint transmit and receive antenna selection in Multiple-Input-Multiple-Output (MIMO) systems, we present a concise joint transmit/receive antenna selection ... For reducing the computational complexity of the problem of joint transmit and receive antenna selection in Multiple-Input-Multiple-Output (MIMO) systems, we present a concise joint transmit/receive antenna selection algorithm. Using a novel partition of the channel matrix, we drive a concise formula. This formula enables us to augment the channel matrix in such a way that the computational complexity of the greedy Joint Transmit/Receive Antenna Selection (JTRAS) algorithm is reduced by a factor of 4n L , where n L is the number of selected antennas. A decoupled version of the proposed algorithm is also proposed to further improve the efficiency of the JTRAS algorithm, with some capacity degradation as a tradeoff. The computational complexity and the performance of the proposed approaches are evaluated mathematically and verified by computer simulations. The results have shown that the proposed joint antenna selection algorithm maintains the capacity perormance of the JTRAS algorithm while its computational complexity is only 1/4n L of that of the JTRAS algorithm. The decoupled version of the proposed algorithm further reduces the computational complexity of the joint antenna selection and has better performance than other decoupling-based algorithms when the selected antenna subset is small as compared to the total number of antennas. 展开更多
关键词 MIMO systems antenna selection channel capacity
下载PDF
En-route Sector Complexity Control Strategies in Air Traffic Management 被引量:4
10
作者 WANG Hongyong DONG Zhenzhen +1 位作者 DENG Taotao SONG Ziqi 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2021年第6期901-913,共13页
Along with the rapid development of air traffic, the contradiction between conventional air traffic management(ATM)and the increasingly complex air traffic situations is more severe,which essentially reduces the opera... Along with the rapid development of air traffic, the contradiction between conventional air traffic management(ATM)and the increasingly complex air traffic situations is more severe,which essentially reduces the operational efficiency of air transport systems. Thus,objectively measuring the air traffic situation complexity becomes a concern in the field of ATM. Most existing studies focus on air traffic complexity assessment,and rarely on the scientific guidance of complex traffic situations. According to the projected time of aircraft arriving at the target sector boundary,we formulated two control strategies to reduce the air traffic complexity. The strategy of entry time optimization was applied to the controllable flights in the adjacent upstream sectors. In contrast,the strategy of flying dynamic speed optimization was applied to the flights in the target sector. During the process of solving complexity control models,we introduced a physical programming method. We transformed the multi-objective optimization problem involving complexity and delay to single-objective optimization problems by designing different preference function. Actual data validated the two complexity control strategies can eliminate the high-complexity situations in reality. The control strategy based on the entry time optimization was more efficient than that based on the speed dynamic optimization. A basic framework for studying air traffic complexity management was preliminarily established. Our findings will help the implementation of a complexity-based ATM. 展开更多
关键词 air traffic management(ATM) air traffic situation air traffic control complexity-based management traffic complexity
下载PDF
VOICE ACTIVITY DETECTION UNDER RAYLEIGH DISTRIBUTION 被引量:1
11
作者 Li Yu Chen Jianming Tan Hongzhou 《Journal of Electronics(China)》 2009年第4期552-556,共5页
This paper presents an improved Voice Activity Detection (VAD) algorithm which uses the Signal-to-Noise Ratio (SNR) measure. We assume that noise Power Spectral Density (PSD) in each spectral bin follows a Rayle... This paper presents an improved Voice Activity Detection (VAD) algorithm which uses the Signal-to-Noise Ratio (SNR) measure. We assume that noise Power Spectral Density (PSD) in each spectral bin follows a Rayleigh distribution. Rayleigh distributions with its asymmetric tail characteristics give a better description of the noise PSD distribution than Gaussian distribution. Under this asstlmption, a new threshold updating expression is derived. Since the analytical integral of the false alarm probability, the threshold updating expression can be represented without the inverse complementary error function and low computational complexity is achieved in our system. Experimental results show that the proposed VAD outperforms or at least is comparable with the VAD scheme presented by Davis under several noise environments and has a lower computational complexity. 展开更多
关键词 Statistical Voice Activity Detection (VAD) Threshold update Rayleigh distribution Computational complexity
下载PDF
“确定性”终结了,科学何处去?
12
作者 崔东明 宋君修 《东南大学学报(哲学社会科学版)》 CSSCI 2020年第6期41-48,152,共9页
以普利高津等人为代表的从事复杂性研究的科学家通过论述牛顿力学研究范式在新兴的关于复杂性的研究领域失去效用,"宣告"牛顿力学机械决定论意义下的"确定性"的终结。同时,他们也在寻求新的"确定性"。相... 以普利高津等人为代表的从事复杂性研究的科学家通过论述牛顿力学研究范式在新兴的关于复杂性的研究领域失去效用,"宣告"牛顿力学机械决定论意义下的"确定性"的终结。同时,他们也在寻求新的"确定性"。相比于牛顿力学通过把握孤立静态的个体对象轨道运动规律来寻求"确定性",复杂性研究则尝试以群体组成的开放系统为对象,依据组分间的能量和信息传递关系以及组分个体的行为,通过揭示系统整体状态的产生、变化、生成机制和演化规律来寻找新的"确定性"。无论是牛顿力学,还是新兴的复杂性研究,所代表的都只是科学发展的一个阶段。无论是机械决定论意义下的"确定性",还是复杂性研究所赋予新内涵的"确定性",所能指涉的范围都是有限的。随着科学的发展,"确定性"的具体内涵与科学理论一道更新、演化,但人们对"确定性"的寻求却始终不变。"确定性"作为科学的永恒追求,与科学始终相伴相随。 展开更多
关键词 经典科学 系统科学 复杂性研究/复杂性科学
下载PDF
Complexity scalable control algorithm for intra coding in H.264 under energy constraints
13
作者 Gao Xuejun Lam Kin Man +1 位作者 ZhuoLi ShenLansun 《High Technology Letters》 EI CAS 2010年第3期274-279,共6页
In this paper, the complexity of intra coding is first analyzed so as to achieve a weight of complexity measurement for each intra mode. Then, a new complexity scalable control algorithm for intra coding in H. 264 is ... In this paper, the complexity of intra coding is first analyzed so as to achieve a weight of complexity measurement for each intra mode. Then, a new complexity scalable control algorithm for intra coding in H. 264 is proposed, based on the rearrangement of the order of candidate modes and an efficient complexity allocation and control (CAAC) scheme at the macroblock (MB) level. The candidate modes of each MB are rearranged according to the local-edge information. Experimental results show that our proposed algorithm can make an appropriate cut-off point of the candidate modes sequence adaptively according to the current energy condition of a mobile device, so as to adjust the complexity at any level while maximizing the video quality, which can prolong the operational lifetime of the battery with minimum degradation in video quality. 展开更多
关键词 complexity scalable control complexity allocation rearrangement of candidate modes intra coding H. 264 energy constraints
下载PDF
Research of Software Complexity Metrics with Security Indicator
14
作者 付剑晶 王珂 《Journal of Donghua University(English Edition)》 EI CAS 2011年第5期460-464,共5页
Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security o... Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security of the protected software. However, there are some researchers evaluating the security of the proposed protect techniques directly by the traditional complexity metrics, which is not suffident. In order to better reflect security from software complexity, a multi-factor complexity metric based on control flow graph (CFG) is proposed, and the corresponding calculating procedures are presented in detail. Moreover, complexity density models are constructed to indicate the strength of software resisting reverse engineering and code analysis. Instance analysis shows that the proposed method is simple and practical, and can more objectively reflect software security from the perspective of the complexity. 展开更多
关键词 complexity metric software protection complexity density control flow graph
下载PDF
Layered heuristic algorithm for multiple restriction routes
15
作者 戴伏生 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2010年第1期95-100,共6页
A layered algorithm by bidirectional searching is proposed in this paper to solve the problem that it is difficult and time consuming to reach an optimal solution of the route search with multiple parameter restrictio... A layered algorithm by bidirectional searching is proposed in this paper to solve the problem that it is difficult and time consuming to reach an optimal solution of the route search with multiple parameter restrictions for good quality of service. Firstly, a set of reachable paths to each intermediate node from the source node and the sink node based on adjacent matrix transformation are calculated respectively. Then a temporal optimal path is selected by adopting the proposed heuristic method according to a non-linear cost function. When the total number of the accumulated nodes by bidirectional searching reaches n-2, the paths from two directions to an intermediate node should be combined and several paths via different nodes from the source node to the sink node can be obtained, then an optimal path in the whole set of paths can be taken as the output route. Some simulation examples are included to show the effectiveness and efficiency of the proposed method. In addition, the proposed algorithm can be implemented with parallel computation and thus, the new algorithm has better performance in time complexity than other algorithms. Mathematical analysis indicates that the maximum complexity in time, based on parallel computation, is the same as the polynomial complexity of O(kn2-3kn+k), and some simulation results are shown to support this analysis. 展开更多
关键词 communication network quality of service routing routing algorithm route with multiple restrictions
下载PDF
High accuracy nonconforming finite elements for fourth order problems 被引量:5
16
作者 WANG Ming ZU PengHe ZHANG Shuo 《Science China Mathematics》 SCIE 2012年第10期2183-2192,共10页
The approach of nonconforming finite element method admits users to solve the partial differential equations with lower complexity,but the accuracy is usually low.In this paper,we present a family of highaccuracy nonc... The approach of nonconforming finite element method admits users to solve the partial differential equations with lower complexity,but the accuracy is usually low.In this paper,we present a family of highaccuracy nonconforming finite element methods for fourth order problems in arbitrary dimensions.The finite element methods are given in a unified way with respect to the dimension.This is an effort to reveal the balance between the accuracy and the complexity of finite element methods. 展开更多
关键词 fourth order problem nonconforming finite element high accuracy arbitrary dimensions
原文传递
FCSR PERIODIC MULTISEQUENCES WITH MAXIMAL JOINT N-ADIC COMPLEXITY AND LARGE k-ERROR JOINT N-ADIC COMPLEXITY OVER Z/(N)
17
作者 LI Fulin HU Honggang ZHU Shixin 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2014年第2期370-381,共12页
Complexity measures for keystream multisequences over Z/(N) play a crucial role in designing good stream cipher systems. This correspondence shows a general upper bound on k-error joint N-adic complexity of periodic m... Complexity measures for keystream multisequences over Z/(N) play a crucial role in designing good stream cipher systems. This correspondence shows a general upper bound on k-error joint N-adic complexity of periodic multisequences over Z/(N), and establishes the existence of periodic N-adic multisequences over Z/(N) which simultaneously possess maximal joint N-adic complexity and large k-error joint N-adic complexity. Under some conditions the overwhelming majority of all T-periodic N-adic multisequences over Z/(N) with maximal joint N-adic complexity logN(NT- 1)have a k-error joint N-adic complexity close to logN(NT- 1). 展开更多
关键词 Cryptography N-adic numbers joint N-adie complexity k-error joint N-adic complexity stream cipher.
原文传递
Greedy Algorithm Computing Minkowski Reduced Lattice Bases with Quadratic Bit Complexity of Input Vectors
18
作者 Hao CHEN Liqing XU 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 2011年第6期857-862,共6页
The authors present an algorithm which is a modilication of the Nguyen-Stenle greedy reduction algorithm due to Nguyen and Stehle in 2009. This algorithm can be used to compute the Minkowski reduced lattice bases for ... The authors present an algorithm which is a modilication of the Nguyen-Stenle greedy reduction algorithm due to Nguyen and Stehle in 2009. This algorithm can be used to compute the Minkowski reduced lattice bases for arbitrary rank lattices with quadratic bit complexity on the size of the input vectors. The total bit complexity of the algorithm is O(n^2·(4n!)^n·(n!/2^n)^n/2·(4/3)^n(n-1)/2).log^2 A)where n is the rank of the lattice and A is maximal norm of the input base vectors. This is an O(log^2 A) algorithm which can be used to compute Minkowski reduced bases for the fixed rank lattices. A time complexity n!. 3n(log A)^O(1) algorithm which can be used to compute the successive minima with the help of the dual Hermite-Korkin-Zolotarev base was given by Blomer in 2000 and improved to the time complexity n!- (log A)^O(1) by Micciancio in 2008. The algorithm in this paper is more suitable for computing the Minkowski reduced bases of low rank lattices with very large base vector sizes. 展开更多
关键词 LATTICE Successive minima Minkowski reduced bases Greedy reduction
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部