期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
基于技术分析指标组合的程序化交易模型研究 被引量:3
1
作者 刘伟 沈春根 《经济数学》 2015年第3期87-92,共6页
程序化交易的兴起对技术分析方法的发展提供了新机遇,利用常见技术分析指标,建立基于指标组合的交易策略,并从统计分析角度讨论了交易策略的理论基础,最后通过实证分析验证了该策略的稳定表现和可观收益,以期为程序化交易模型研究提供... 程序化交易的兴起对技术分析方法的发展提供了新机遇,利用常见技术分析指标,建立基于指标组合的交易策略,并从统计分析角度讨论了交易策略的理论基础,最后通过实证分析验证了该策略的稳定表现和可观收益,以期为程序化交易模型研究提供新思路. 展开更多
关键词 程序化交易模型 MACD指标 KDJ指标 平稳性检验
下载PDF
如何培养学生形成“程序化”的计算习惯
2
作者 孙朝霞 《教师》 2015年第11期36-37,共2页
本文从解读新课标对运算能力的要求入手,解释寻求合理简洁的运算途径的内涵,从运算技能形成的四个阶段阐述培养学生形成"程序化"的计算习惯的必要性,通过举例说明培养学生形成"程序化"的计算习惯的具体做法。
关键词 运算能力 程序化模型 计算习惯
下载PDF
A Practice Guide of Software Aging Prediction in a Web Server Based on Machine Learning 被引量:3
3
作者 Yongquan Yan Ping Guo 《China Communications》 SCIE CSCD 2016年第6期225-235,共11页
In the past two decades, software aging has been studied by both academic and industry communities. Many scholars focused on analytical methods or time series to model software aging process. While machine learning ha... In the past two decades, software aging has been studied by both academic and industry communities. Many scholars focused on analytical methods or time series to model software aging process. While machine learning has been shown as a very promising technique in application to forecast software state: normal or aging. In this paper, we proposed a method which can give practice guide to forecast software aging using machine learning algorithm. Firstly, we collected data from a running commercial web server and preprocessed these data. Secondly, feature selection algorithm was applied to find a subset of model parameters set. Thirdly, time series model was used to predict values of selected parameters in advance. Fourthly, some machine learning algorithms were used to model software aging process and to predict software aging. Fifthly, we used sensitivity analysis to analyze how heavily outcomes changed following input variables change. In the last, we applied our method to an IIS web server. Through analysis of the experiment results, we find that our proposed method can predict software aging in the early stage of system development life cycle. 展开更多
关键词 software aging software rejuvenation machine learning web server
下载PDF
Study on ReactiveAdsorption Desulfurization of Model Gasoline on Ni/ZnO-HY Adsorbent 被引量:5
4
作者 Huang Huan Salissou M.Nour +2 位作者 Yi Dezhi Meng Xuan Shi Li 《China Petroleum Processing & Petrochemical Technology》 SCIE CAS 2013年第3期57-64,共8页
The reactive adsorption desulfurization of model gasoline was carried out on Ni/ZnO-HY adsorbent.The Ni/ZnO-HY adsorbent was characterized by N2adsorption-desorption test(BET),X-ray diffractometry(XRD),and temperature... The reactive adsorption desulfurization of model gasoline was carried out on Ni/ZnO-HY adsorbent.The Ni/ZnO-HY adsorbent was characterized by N2adsorption-desorption test(BET),X-ray diffractometry(XRD),and temperature-programmed reduction(TPR)analysis.The test results have demonstrated that HY-zeolite is a feasible support for Ni/ZnO components used in reactive adsorption desulfurization.The results of XRD and TPR analyses showed that most of nickel element was present as Ni2+species with only a small part existing as Ni3+species,and the Ni2+species had interactions with HY-zeolite.Under the conditions of this study,which specified a 50% ratio of HY-zeolite in the adsorbent,a Zn/Ni molar ratio of 10,and a reduction temperature of 400℃,the Ni/ZnO-HY adsorbent showed the best desulfurization performance.The sulfur capacity of Ni/ZnO-HY adsorbent could be recovered to 92.19% of the fresh one after being subjected to regeneration at 500℃,and could be maintained at 82.17% of the fresh one after 5 regeneration cycles. 展开更多
关键词 DESULFURIZATION reactive adsorption S-Zorb Ni/ZnO HY-zeolite
下载PDF
Confidential Procedure Model:a Method for Quantifying Confidentiality Leakage 被引量:1
5
作者 Zhang Yong Li Xiangxue +2 位作者 Zhou Yuan Li Zhibin Qian Haifeng 《China Communications》 SCIE CSCD 2012年第11期117-126,共10页
In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality lo... In this paper, we propose a theoretical-information Confidential Procedure Model (CPM) to quantify confidentiality (or information leakage). The advantages of the CPM model include the following: 1) confidentiality loss is formalized as a dynamic procedure, instead of a static function, and described via the "waterfall" diagram; 2) confidentiality loss is quantified in a relative manner, i.e., taken as a quantitative metric, the ratio of the conditional entropy being reserved after observing the entropy of the original full confidential information; 3) the optimal attacks including exhaustive attacks as well as all possible attacks that have (or have not even) been discovered, are taken into account when defining the novel concept of the confidential degree. To elucidate the proposed model, we analyze the information leakage in side-channel attacks and the anonymity of DC-net in a quantitative manner. 展开更多
关键词 CONFIDENTIALITY quantitative analysis perfect secrecy side-channel attack ANONYMITY
下载PDF
Development and Optimization of an Alternative Methodology for Detection of Milk Adulteration by Water 被引量:2
6
作者 Wesley William Gongalves Nascimento Marcone Augusto Leal de Oliveira1 +3 位作者 Marcone Augusto Leal de Oliveira Marco Antonio Moreira Furtado Virgilio de Carvalho dos Anjos Maria Jose Valenzuela Bell 《Journal of Food Science and Engineering》 2013年第7期363-370,共8页
This paper presents a process which allows the determination of milk adulteration by water. Considering the limitations of the reference method (cryoscopy), the proposed methodology matches electrical conductivity a... This paper presents a process which allows the determination of milk adulteration by water. Considering the limitations of the reference method (cryoscopy), the proposed methodology matches electrical conductivity and cryoscopy index measurements. Based on statistical procedures, a linear descriptive model is achieved to quantify adulteration of milk with water. It is also shown that electrical conductivity measurements allow the detection of adulteration with water and sodium chloride. 展开更多
关键词 MILK electrical conductivity cryoscopy ADULTERATION water.
下载PDF
Immune modelling and programming of a mobile robot demo
7
作者 龚涛 蔡自兴 贺汉根 《Journal of Central South University of Technology》 EI 2006年第6期694-698,共5页
An artificial immune system was modelled with self/non-self selection to overcome abnormity in a mobile robot demo. The immune modelling includes the innate immune modelling and the adaptive immune modelling. The self... An artificial immune system was modelled with self/non-self selection to overcome abnormity in a mobile robot demo. The immune modelling includes the innate immune modelling and the adaptive immune modelling. The self/non-self selection includes detection and recognition, and the self/non-self detection is based on the normal model of the demo. After the detection, the non-self recognition is based on learning unknown non-self for the adaptive immunization. The learning was designed on the neural network or on the learning mechanism from examples. The last step is elimination of all the non-self and failover of the demo. The immunization of the mobile robot demo is programmed with Java to test effectiveness of the approach. Some worms infected the mobile robot demo, and caused the abnormity. The results of the immunization simulations show that the immune program can detect 100% worms, recognize all known Worms and most unknown worms, and eliminate the worms. Moreover, the damaged files of the mobile robot demo can all be repaired through the normal model and immunization. Therefore, the immune modelling of the mobile robot demo is effective and programmable in some anti-worms and abnormity detection applications. 展开更多
关键词 artificial immune system normal model mobile robot WORMS
下载PDF
Research on the Application Security Isolation Model
8
作者 Gong Lei Zhao Yong Liao Jianhua 《China Communications》 SCIE CSCD 2010年第6期153-156,共4页
Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the desi... Typical isolation models are studied and a New Application Security Isolation model called NASI is proposed, which is based on trusted computing technology and least privilege principle. This paper introduces the design ideas of NASI, gives out formal description and safety analysis for the model, and finally describes the implementation of prototype system based on NASI. 展开更多
关键词 application isolation security model application security protection
下载PDF
A PENALTY FUNCTION METHOD FOR SOLVING ILL-POSED BILEVEL PROGRAMMING PROBLEM VIA WEIGHTED SUMMATION 被引量:2
9
作者 JIA Shihui WAN Zhongping 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2013年第6期1019-1027,共9页
For ill-posed bilevel programming problem,the optimistic solution is always the best decision for the upper level but it is not always the best choice for both levels if the authors consider the model's satisfacto... For ill-posed bilevel programming problem,the optimistic solution is always the best decision for the upper level but it is not always the best choice for both levels if the authors consider the model's satisfactory degree in application.To acquire a more satisfying solution than the optimistic one to realize the two levels' most profits,this paper considers both levels' satisfactory degree and constructs a minimization problem of the two objective functions by weighted summation.Then,using the duality gap of the lower level as the penalty function,the authors transfer these two levels problem to a single one and propose a corresponding algorithm.Finally,the authors give an example to show a more satisfying solution than the optimistic solution can be achieved by this algorithm. 展开更多
关键词 Bilevel programming duality gap penalty function satisfactory degree weighted sum-mation.
原文传递
A modified PANS model for computations of unsteady turbulence cavitating flows 被引量:12
10
作者 HU ChangLi WANG GuoYu +1 位作者 CHEN GuangHao HUANG Biao 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第10期1967-1976,共10页
A modification to the PANS(partially averaged Navier-Stokes) model is proposed to simulate unsteady cavitating flows. In the model, the parameter fk is modified to vary as a function of the ratios between the water de... A modification to the PANS(partially averaged Navier-Stokes) model is proposed to simulate unsteady cavitating flows. In the model, the parameter fk is modified to vary as a function of the ratios between the water density and the mixture density in the local flows. The objective of this study is to validate the modified model and further understand the interaction between turbulence and cavitation around a Clark-Y hydrofoil. The comparisons between the numerical and experiment results show that the modified model can be improved to predict the cavity evolution, vortex shedding frequency and the lift force fluctuating in time fairly well, as it can effectively modulate the eddy viscosity in the cavitating region and various levels of physical turbulent fluctuations are resolved. In addition, from the computational results, it is proved that cavitation phenomenon physically influences the turbulent level, especially by the vortex shedding behaviors. Also, the mean u-velocity profiles demonstrate that the attached cavity thickness can alter the local turbulent shear layer. 展开更多
关键词 turbulence model PANS unsteady cavitating flows surrogate model
原文传递
On the Kahler-Ricci Flow on Projective Manifolds of General Type 被引量:5
11
作者 Gang TIAN Zhou ZHANG 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 2006年第2期179-192,共14页
This note concerns the global existence and convergence of the solution for Kahler-Ricci flow equation when the canonical class, Kx, is numerically effective and big. We clarify some known results regarding this flow ... This note concerns the global existence and convergence of the solution for Kahler-Ricci flow equation when the canonical class, Kx, is numerically effective and big. We clarify some known results regarding this flow on projective manifolds of general type and also show some new observations and refined results. 展开更多
关键词 Geometric evolution equations Minimal model program
原文传递
Bayesian Reliability Assessment and Degradation Modeling with Calibrations and Random Failure Threshold 被引量:4
12
作者 黄金波 孔德景 崔利荣 《Journal of Shanghai Jiaotong university(Science)》 EI 2016年第4期478-483,共6页
A degradation model with a random failure threshold is presented for the assessment of reliability by the Bayesian approach. This model is different from others in that the degradation process is proceeding under pre-... A degradation model with a random failure threshold is presented for the assessment of reliability by the Bayesian approach. This model is different from others in that the degradation process is proceeding under pre-specified periodical calibrations. And here a random threshold distribution instead of a constant threshold which is difficult to determine in practice is used. The system reliability is defined as the probability that the degradation signals do not exceed the random threshold. Based on the posterior distribution estimates of degradation performance, two models for Bayesian reliability assessments are presented in terms of the degradation performance and the distribution of random failure threshold. The methods proposed in this paper are very useful and practical for multi-stage system with uncertain failure threshold. This study perfects the degradation modeling approaches and plays an important role in the remaining useful life estimation and maintenance decision making. 展开更多
关键词 Bayesian method reliability assessment degradation modeling CALIBRATIONS random failure thresh-old multi-stage system
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部