期刊文献+
共找到50篇文章
< 1 2 3 >
每页显示 20 50 100
归纳法在小学数学教学中的应用例谈——以“加法交换律和结合律”教学为例 被引量:1
1
作者 张松涛 《试题与研究(教学论坛)》 2017年第31期49-50,共2页
数学思想方法在小学数学教学中有着 很重要的意义.在教学中,老师要有目的、有意识地 进行渗透,为学生自主学习数学提供方法.归纳推理 在小学阶段运用得比较多,所以在教学中要教给学 生归纳推理的一般步骤,使其掌握并学会运用.
关键词 归纳法 应戶
下载PDF
Methods of vendor managed inventory control in supply chain management 被引量:3
2
作者 蒋振盈 于海生 +1 位作者 彭禄斌 赵林度 《Journal of Southeast University(English Edition)》 EI CAS 2003年第4期405-409,共5页
By inducing the typical inventory control problem - the bullwhip effect, this paper presents vendor managed inventory (VMI) control methods on the basis of traditional methods of inventory management methods, construc... By inducing the typical inventory control problem - the bullwhip effect, this paper presents vendor managed inventory (VMI) control methods on the basis of traditional methods of inventory management methods, constructs a VMI mathematics model, and analyzes the influence of VMI on inventory cost and channel profit. Finally, a special case is studied to verify that VMI is an effective supply chain strategy that can not only increase channel profit of supplier and customer but also improve full channel coordination, thereby reducing the bullwhip effect. 展开更多
关键词 supply chain management inventory control vendor managed inventory bullwhip effect
下载PDF
Modeling and Characterizing Internet Backbone Traffic 被引量:2
3
作者 Yang Jie He Yang +1 位作者 Lin Ping Cheng Gang 《China Communications》 SCIE CSCD 2010年第5期49-56,共8页
With enormous growth of the number of Internet users and appearance of new applications, characterization of Internet traffic has attracted more and more attention and has become one of the major challenging issues in... With enormous growth of the number of Internet users and appearance of new applications, characterization of Internet traffic has attracted more and more attention and has become one of the major challenging issues in telecommunication network over the past few years. In this paper, we study the network traffic pattern of the aggregate traffic and of specific application traffic, especially the popular applications such as P2P, VoIP that contribute most network traffic. Our study verified that majority Internet backbone traffic is contributed by a small portion of users and a power function can be used to approximate the contribution of each user to the overall traffic. We show that P2P applications are the dominant traffic contributor in current Internet Backbone of China. In addition, we selectively present the traffic pattern of different applications in detail. 展开更多
关键词 traffic characterization MEASUREMENT traffic pattern BEHAVIOR flow statistical characteristics
下载PDF
NOVEL ADAPTIVE MULTIUSER DETECTIONALGORITHM BASED ON WAVELET TRANSFORM 被引量:1
4
作者 ZHANGXiao-fei XUDa-zhuan YANGBei 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2004年第2期141-146,共6页
The wavelet transform-based adaptive multiuser detection algorithm is presented. The novel adaptive multiuser detection algorithm uses the wavelet transform for the preprocessing, and wavelet-transformed signal uses L... The wavelet transform-based adaptive multiuser detection algorithm is presented. The novel adaptive multiuser detection algorithm uses the wavelet transform for the preprocessing, and wavelet-transformed signal uses LMS algorithm to implement the adaptive multiuser detection. The algorithm makes use of wavelet transform to divide the wavelet space, which shows that the wavelet transform has a better decorrelation ability and leads to better convergence. White noise can be wiped off under the wavelet transform according to different characteristics of signal and white noise under the wavelet transform. Theoretical analyses and simulations demonstrate that the algorithm converges faster than the conventional adaptive multiuser detection algorithm, and has the better performance. Simulation results reveal that the algorithm convergence relates to the wavelet base, and show that the algorithm convergence gets better with the increasing of regularity for the same series of the wavelet base. Finally the algorithm shows that it can be easily implemented. 展开更多
关键词 multiuser detection wavelet transform multi-resolution analyses multi-access interference (MAI) adaptive multiuser detection
下载PDF
Flexibility of MIP Technology 被引量:9
5
作者 Tang Jinlian Gong Jianhong Xu Youhao 《China Petroleum Processing & Petrochemical Technology》 SCIE CAS 2015年第3期39-43,共5页
The flexibility of MIP technology to meet market demand is mainly introduced in this study. Their commercial application and technical principle are analyzed too. The MIP technology with wide feed adaptability can for... The flexibility of MIP technology to meet market demand is mainly introduced in this study. Their commercial application and technical principle are analyzed too. The MIP technology with wide feed adaptability can form a good combination with other technologies. The MIP technology has been applied extensively in China. Based on this platform, the CGP, MIP-LTG and MIP-DCR technologies have been developed, which can further improve the flexibility of MIP technology. Based on its novel reaction control technique with a sole sequential two-zone riser, the MIP users can easily switch to different operating modes between producing either more clean gasoline and propylene or diesel through changing the catalysts and varying the operating conditions. That offers MIP users with enough production flexibility and a rational production arrangement to meet the market demand. The MIP-DCR technology with less dry gas and coke yields can provide a more flexible operating mode since the catalysts to oil ratio has become an independent variable. 展开更多
关键词 MIP technology feed adaptability good combination operation flexibility multiple operation modes reductionof dry gas and coke
下载PDF
Resource Allocation and User Association for HTTP Adaptive Streaming in Heterogeneous Cellular Networks with Small Cells 被引量:3
6
作者 Jiang Liu 《China Communications》 SCIE CSCD 2016年第9期1-11,共11页
Video streaming,especially hypertext transfer protocol based(HTTP) adaptive streaming(HAS) of video,has been expected to be a dominant application over mobile networks in the near future,which brings huge challenge fo... Video streaming,especially hypertext transfer protocol based(HTTP) adaptive streaming(HAS) of video,has been expected to be a dominant application over mobile networks in the near future,which brings huge challenge for the mobile networks.Although some works have been done for video streaming delivery in heterogeneous cellular networks,most of them focus on the video streaming scheduling or the caching strategy design.The problem of joint user association and rate allocation to maximize the system utility while satisfying the requirement of the quality of experience of users is largely ignored.In this paper,the problem of joint user association and rate allocation for HTTP adaptive streaming in heterogeneous cellular networks is studied,we model the optimization problem as a mixed integer programming problem.And to reduce the computational complexity,an optimal rate allocation using the Lagrangian dual method under the assumption of knowing user association for BSs is first solved.Then we use the many-to-one matching model to analyze the user association problem,and the joint user association and rate allocation based on the distributed greedy matching algorithm is proposed.Finally,extensive simulation results are illustrated to demonstrate the performance of the proposed scheme. 展开更多
关键词 heterogeneous cellular networks user association rate allocation http adaptive streaming matching algorithm
下载PDF
User Identification Based on Multiple Attribute Decision Making in Social Networks 被引量:4
7
作者 叶娜 张银亮 +3 位作者 董丽丽 边根庆 Enjie LIU Gordon J.Clapworthy 《China Communications》 SCIE CSCD 2013年第12期37-49,共13页
Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network.... Social networks are becoming increasingly popular and influential,and users are frequently registered on multiple networks simultaneously,in many cases leaving large quantities of personal information on each network.There is also a trend towards the personalization of web applications;to do this,the applications need to acquire information about the particular user.To maximise the use of the various sets of user information distributed on the web,this paper proposes a method to support the reuse and sharing of user profiles by different applications,and is based on user profile integration.To realize this goal,the initial task is user identification,and this forms the focus of the current paper.A new user identification method based on Multiple Attribute Decision Making(MADM) is described in which a subjective weight-directed objective weighting,which is obtained from the Similarity Weight method,is proposed to determine the relative weights of the common properties.Attribute Synthetic Evaluation is used to determine the equivalence of users.Experimental results show that the method is both feasible and effective despite the incompleteness of the candidate user dataset. 展开更多
关键词 weighted algorithm fuzzy match-ing cooperative communication network con-vergence heterogeneous networks
下载PDF
Empirical Study on Customer Satisfaction Influencing Factors of Industry Application Products Based on Experiential Level Theory 被引量:1
8
作者 Lili Tong Xiaoge Hou Xiaowen Li 《China Communications》 SCIE CSCD 2016年第11期260-268,共9页
The rapid development of industry application products has greatly influenced society. It has become essential for some telecommunication companies to focus on customer satisfaction with industrial products used by th... The rapid development of industry application products has greatly influenced society. It has become essential for some telecommunication companies to focus on customer satisfaction with industrial products used by the government and enterprise customers. Following the review of a previous study of customer satisfaction and with the help of experiential level theory,this article attempts to establish a Satisfaction Factors Model for researching customer satisfaction with industry applications. We chose a product named "Mobile Monitor" and investigated the emotional satisfaction of 127 users and company leaders from different walks of life,and showed that 7 of the product's features affected the customers' overall emotional satisfaction. Lastly,this paper points out management implications of this application based on quantitative results. It presents a preliminary exploration program for customer satisfaction research in this specific field. The empirical research on a specific product based on experimental level theory may serve as a reference for other companies that desire to carry out similar surveys in future. 展开更多
关键词 experiential level theory industry application products "mobile monitor" customer satisfaction
下载PDF
Understanding the YouTube Partners and Their Data: Measurement and Analysis 被引量:2
9
作者 CHENG Xu Fatourechi Mehrdad +2 位作者 MA Xiaoqiang ZHANG Cong LIU Jiangchuan 《China Communications》 SCIE CSCD 2014年第12期26-34,共9页
User generated content,e.g.,from YouTube,the most popular online video sharing site,is one of the major sources of today's big data and it is crucial to understand their inherent characteristics.Recently,YouTube h... User generated content,e.g.,from YouTube,the most popular online video sharing site,is one of the major sources of today's big data and it is crucial to understand their inherent characteristics.Recently,YouTube has started working with content providers(known as YouTube partners) to promote the users' watching and sharing activities.The substantial benefit is to further augment its service and monetize more videos,which is crucial to both YouTube and its partners,as well as to other providers of relevant services.In this paper,our main contribution is to analyze the massive amounts of video data from a YouTube partner's view.We make effective use of Insight,a new analytics service of YouTube that offers simple data analysis for partners.To provide the practical guidance from the raw Insight data,we enable more complex investigations for the inherent features that affect the popularity of the videos.Our findings facilitate YouTube partners to re-design current video publishing strategies,having more opportunities to attract more views. 展开更多
关键词 YouTube partners video popularity viewing behaviour user engagement
下载PDF
CSI-Model-Based Research on Factors Affecting Rate Satisfaction of Government and Corporate CustomersTaking Special-Line Products as an Example 被引量:1
10
作者 LI Xiaowen TONG Lili +1 位作者 HU Zuohao HOU Xiaoge 《China Communications》 SCIE CSCD 2015年第8期183-189,共7页
The rate satisfaction of government and corporate customers,to which telecom companies pay special attention,is an important part of the overall satisfaction of the market segment.Focusing on specialline products and ... The rate satisfaction of government and corporate customers,to which telecom companies pay special attention,is an important part of the overall satisfaction of the market segment.Focusing on specialline products and based on interview with experts and literature review,this article builds an effect model comprising four factors affecting the major government and corporate customers' satisfaction with the rate,including cost performance,discount degree,rate communication and bill composition.Besides,employing AMOS and other analytical tools,it reveals significant positive effects of the aforementioned four factors on the customer's rate satisfaction,and arranges them in sequence according to the path coefficient of each influence.Based on quantified results,this article proposes management recommendations to improve the rate satisfaction,providing basis for research on the overall rate satisfaction optimization of government and corporate customers. 展开更多
关键词 CSI model rate satisfaction government and corporate customers affectingfactors
下载PDF
Supply chain network equilibrium model with capacity constraints
11
作者 刘宁 周晶 《Journal of Southeast University(English Edition)》 EI CAS 2007年第S1期83-88,共6页
The supply chain network with capacity constraints of manufacturers and retailers is considered.The linkage between supply chain network equilibrium and transportation network equilibrium is investigated.By analyzing ... The supply chain network with capacity constraints of manufacturers and retailers is considered.The linkage between supply chain network equilibrium and transportation network equilibrium is investigated.By analyzing the relationships among the manufacturers,retailers and consumers in the supply chain network and their own decisions concerning maximum profits,a combined variational inequality for the supply chain network equilibrium mode is proposed.Then an equivalent supernetwork of the supply chain network is constructed by adding additional links which denote the producing of manufactures and the handling of retailers.By the supernetwork,the supply chain network equilibrium model can be reformulated as a transportation network equilibrium model.Equivalent mathematical programming is,therefore,obtained based on the principle of a Wardrop user equilibrium.The corresponding Lagrange multiplier of the capacity constraints can be explained as the extra cost of marginal production when capacity is exceeded.A numerical example is given to illustrate the rationality of the model and the validity of the results. 展开更多
关键词 supply chain networks SUPERNETWORK Wardrop user equilibrium
下载PDF
Threshold Effects in the Capital Account Liberalization and Foreign Direct Investment Relationship 被引量:1
12
作者 Gammoudi Mouna Cherif Mondher 《Chinese Business Review》 2014年第9期562-577,共16页
This paper examines how capital account liberalization (CAL) affects foreign direct investment (FDI) inflows. Authors use a dynamic panel model encompassing 14 Middle East countries over the period from 1985 to 20... This paper examines how capital account liberalization (CAL) affects foreign direct investment (FDI) inflows. Authors use a dynamic panel model encompassing 14 Middle East countries over the period from 1985 to 2009. The findings suggest that countries that are able to reap the benefits of the capital openness policy satisfy certain threshold conditions regarding the level of financial development and institutional quality. Thus to promote FDI, governments in this region should develop a set of policies that not only focus on financial openness, but also on the improvement of the financial system and legal institutions. 展开更多
关键词 capital account liberalization (CAL) foreign direct investment (FDI) institutional quality system GMM estimator
下载PDF
Remote-Controlled Ambidextrous Robot Hand Concept
13
作者 Emre Akyurek Alexandre Dilly Fabrice Jourdan Zhu Liu Souraneel Chattoraj Itziar Berruezo Juandeaburre Michel Heinrich Leonid Paramonov Peter Turner Stelarc Tatiana Kalganova 《Computer Technology and Application》 2013年第11期569-574,共6页
In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients su... In the development of robotic limbs, the side of members is of importance to define the shape of artificial limbs and the range of movements. It is mainly significant tbr biomedical applications concerning patients suffering arms or legs injuries, fn this paper, the concept of an ambidextrous design lbr robot hands is introduced. The fingers can curl in one xvay or another, to imitate either a right hand or a left hand. The advantages and inconveniences of different models have been investigated to optimise the range and the maximum force applied by fingers. Besides, a remote control interthce is integrated to the system, allowing both to send comrnands through internet and to display a video streaming of the ambidextrous hand as feedback. Therefore, a robotic prosthesis could be used for the first time in telerehabilitation. The main application areas targeted are physiotherapy alter strokes or management of phantom pains/br amputees by/earning to control the ambidextrous hand. A client application is also accessible on Facehook social network, making the robotic limb easily reachable for the patients. Additionally the ambidextrous hand can be used tbr robotics research as well as artistic performances. 展开更多
关键词 Robot hand pneumatic muscles remote platform video streaming TELEREHABILITATION hand recognition
下载PDF
BLIND ADAPTIVE MULTIUSER DETECTION BASED ON A CONSTRAINED MMSE CRITERION 被引量:1
14
作者 TianLibin ChenFangjiong WeiGang 《Journal of Electronics(China)》 2004年第4期328-331,共4页
The proposed blind adaptive multiuser detector utilizes the signature waveform and time information of the desired user. With each received sample vector, the proposed algorithm updates the detector and gives the symb... The proposed blind adaptive multiuser detector utilizes the signature waveform and time information of the desired user. With each received sample vector, the proposed algorithm updates the detector and gives the symbol estimate in the current time slot. Such property facilitates it to track time-varying channels. 展开更多
关键词 Spread spectrum communication Fading channel Adaptive signal processing
下载PDF
Privacy-Preserving Relative Location Based Services for Mobile Users 被引量:4
15
作者 Fei Ning Zhuang Yi +2 位作者 GU Jingjing Cao Jiannong Yang Liang 《China Communications》 SCIE CSCD 2015年第5期152-161,共10页
Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data an... Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends. 展开更多
关键词 relative location privacy-preserv-ing CYFS
下载PDF
A Novel Stochastic Blind Adaptive Multiuser Detector for CDMA Systems
16
作者 吕平宝 XieJianying YinZhiming 《High Technology Letters》 EI CAS 2003年第2期61-64,共4页
Blind adaptive multiuser detector has become a research hotspot in recent years due to a number of advantages, but many blind adaptive algorithms involve low convergence rate. This paper presents a novel stochastic bl... Blind adaptive multiuser detector has become a research hotspot in recent years due to a number of advantages, but many blind adaptive algorithms involve low convergence rate. This paper presents a novel stochastic blind adaptive multiuser detector without requiring training sequences, which needs only two system parameters: the signature sequence of the desired user i, s i and the variance of the additive white Gaussian noise (AWGN),σ 2. Simulation results show that by reasonably choosing time varying step size, the proposed detector can not only improve the convergence rate, but also reduce the limiting NSE (Normalized Squared Error) values, so it can effectively increase the performance of the system. 展开更多
关键词 CDMA blind adaptive multiuser detector time varying step size convergence rate
下载PDF
A Variation Account of Divergent Thinking
17
作者 Leonid Dorfman Vera Gassimova 《Journal of Literature and Art Studies》 2017年第8期1039-1053,共15页
A variation account was applied to divergent thinking accommodated as a kind of creative thinking. To provide control (contrast) condition the variation account was applied to psychometric intelligence. Guilford's ... A variation account was applied to divergent thinking accommodated as a kind of creative thinking. To provide control (contrast) condition the variation account was applied to psychometric intelligence. Guilford's (1956, 1967, 1988) theory of divergent-----convergent thinking served the background of our study. The main premise was that creative variation represents "thought trials" with diverse ways to find a solution to the problem. Task demands and the respective creative problem solving reveal advantageous sources that suggest the variation. Probably, uncertainty, information search, and finding alternatives extracted from memory precede, entail and provide variety of seeking, as well. A principal hypothesis to be tested was that divergent thinking enables its variation rather than intelligence does that to its variation. As predicted, the divergent thinking and its variation were related. Compared to uncreative, creative persons were characterized by larger variation. Apart from the mathematical intelligence, other kinds of intelligence and their variation did not correlate. Mainly, the data obtained, thus, lend support to the claimed hypothesis. 展开更多
关键词 VARIATION CREATIVITY divergent thinking INTELLIGENCE SCATTERING
下载PDF
HYBRID INTERFERENCE CANCELLATION SCHEME FOR BLIND MULTIUSER DETECTION IN MULTIPATH FADING CHANNELS
18
作者 FuHaiyang ZhaoChunming 《Journal of Electronics(China)》 2002年第1期43-49,共7页
This paper introduces and analyzes a detection scheme for adaptive suppression of Multiuser Access Interference (MAI) and MultiPath Distortion (MPD) for mobile station of DS/CDMA system. The proposed detection scheme ... This paper introduces and analyzes a detection scheme for adaptive suppression of Multiuser Access Interference (MAI) and MultiPath Distortion (MPD) for mobile station of DS/CDMA system. The proposed detection scheme may amount to a RAKE receiver structure,wherein each branch is considered as a linear multiuser filter designed under a Linear Constrained Minimum Variance (LCMV) optimization strategy to suppress MAI, followed by a proper combining rule to suppress MPD. The adaptive blind multiuser detecting and optimum combining of the proposed receiver are realized, based on the Least-Mean-Square (LMS) algorithm and an adaptive vector tracking algorithm respectively. Finally, the feasibility of the above two algorithms is proved by the numerical results provided by computer simulation. 展开更多
关键词 Blind adaptive multiuser detection RAKE receiver Matrix projection Adaptive vector tracking
下载PDF
User Behaviors Analysis in Website Identification Registration 被引量:1
19
作者 甘曈 林福宏 +2 位作者 陈常嘉 郭宇春 郑毅 《China Communications》 SCIE CSCD 2013年第3期76-81,共6页
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S... Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords. 展开更多
关键词 user behaviors website identifi- cation COMPLEXITY CORRELATION PREFERENCE
下载PDF
Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation 被引量:2
20
作者 Wu Qiuxin Zhang Miao 《China Communications》 SCIE CSCD 2012年第9期22-40,共19页
Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the app... Attribute revocation is inevitable and al- so important for Attribute-Based Encryption (ABE) in practice. However, little attention has been paid to this issue, and it retrains one of the rmin obsta-cles for the application of ABE. Most of existing ABE schemes support attribute revocation work under indirect revocation model such that all the users' private keys will be affected when the revo-cation events occur. Though some ABE schemes have realized revocation under direct revocation model such that the revocation list is embedded in the ciphertext and none of the users' private keys will be affected by revocation, they mostly focused on the user revocation that revokes the user's whole attributes, or they can only be proven to be selectively secure. In this paper, we first define a model of adaptively secure ABE supporting the at- tribute revocation under direct revocation model. Then we propose a Key-Policy ABE (KP-ABE) scheme and a Ciphertext-Policy ABE (CP-ABE) scheme on composite order bilinear groups. Finally, we prove our schemes to be adaptively secure by employing the methodology of dual system eno cryption. 展开更多
关键词 ABE direct revocation model attributerevocation adaptive security dual system encryp-tion access structure
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部