期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
赣语宜丰话"约数(量)"的表示方式 被引量:2
1
作者 邵宜 《韶关学院学报》 2004年第11期95-99,共5页
"约数(量)"的表达是普遍的语言现象。现代汉语"约数(量)"的表达呈现出方言的复杂性,不同的方言在格式和功能上表现出差异。赣语宜丰话"约数(量)"的表示方式体现出一定的特色,在表示"约数(量)"... "约数(量)"的表达是普遍的语言现象。现代汉语"约数(量)"的表达呈现出方言的复杂性,不同的方言在格式和功能上表现出差异。赣语宜丰话"约数(量)"的表示方式体现出一定的特色,在表示"约数(量)"的同时还有小称的附加功能。这种现象在其他的汉语方言里也有程度不等的表现。 展开更多
关键词 赣语 宜丰话 约数() 小称
下载PDF
Seed Shadow of Quercus liaotungensis in a Broad-leaved Forest in Dongling Mountain 被引量:20
2
作者 王巍 马克平 刘灿然 《Acta Botanica Sinica》 CSCD 2000年第2期195-202,共8页
The seed shadow of oak ( Quercus liaotungensis Koidz.) was investigated in a broad_leaved deciduous forest in Dongling Mountain in 1997. The seed rain patterns under oak tree crown for three out of four oak trees fit... The seed shadow of oak ( Quercus liaotungensis Koidz.) was investigated in a broad_leaved deciduous forest in Dongling Mountain in 1997. The seed rain patterns under oak tree crown for three out of four oak trees fit quadratic distribution, with high coefficients of determination. For each of the four trees selected in this study the seed rain size estimated from the viable acorns collected from the traps deployed under the crown was low, ranging from 26 to 259. For each of the four oak trees, the average density of the seed rain under oak tree crown ranged from 0.76 to 7.26 seeds/m 2. The average seed rain density estimated from the acorns in the traps deployed randomly in the field was 1.57 seeds/m 2. After all viable acorns fell, the acorn ground density estimated from the acorns in the quadrats was 0.13 seeds/m 2, but no viable acorns were found on the ground under the tree crown of the four oak trees, although the area under the crown was over 5 folds than the area of the combined quadrats. These results indicated that a large number of acorns was removed or predated by vertebrates once the acorns fell on the ground and acorns predation was more intensive in the sites directly under the parent trees than the sites away from the parent trees; this supports the distance_dependent hypothesis. Of the total acorns of all four oak trees, the viable acorns only accounted for 18.1%, and 17.8% for acorns infected by insect larvae, 12.1% for immature acorns, 3.6% for decayed acorns, and the acorns predated by rodent directly in the crown was the highest, accounting for 48.4%. The proportion of acorns predated by animals including vertebrates and invertebrates amounts up to 78.3%, indicating that acorn predation by animals is a limiting factor affecting acorn survival before seed dispersal. The sustained time of viable acorn fall ranged from September 8 to October 3 for the four oak trees, with the peak between 16th and 26th September. The number of acorns was not significantly different among the four directions around the trunk base. 展开更多
关键词 seed shadow Quercus liaotungensis seed fate
下载PDF
Reasoning complexity for extended fuzzy description logic with qualifying number restriction
3
作者 陆建江 李言辉 +2 位作者 张亚非 周波 康达周 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期236-240,共5页
To solve the extended fuzzy description logic with qualifying number restriction (EFALCQ) reasoning problems, EFALCQ is discretely simulated by description logic with qualifying number restriction (ALCQ), and ALCQ... To solve the extended fuzzy description logic with qualifying number restriction (EFALCQ) reasoning problems, EFALCQ is discretely simulated by description logic with qualifying number restriction (ALCQ), and ALCQ reasoning results are reused to prove the complexity of EFALCQ reasoning problems. The ALCQ simulation method for the consistency of EFALCQ is proposed. This method reduces EFALCQ satisfiability into EFALCQ consistency, and uses EFALCQ satisfiability to discretely simulate EFALCQ satdomain. It is proved that the reasoning complexity for EFALCQ satisfiability, consistency and sat-domain is PSPACE-complete. 展开更多
关键词 extended fuzzy description logic qualifying number restriction reasoning complexity
下载PDF
DIMENSIONALITY REDUCTION BASED ON SVM AND LDA,AND ITS APPLICATION TO CLASSIFICATION TECHNIQUE 被引量:1
4
作者 杨波 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期306-312,共7页
Some dimensionality reduction (DR) approaches based on support vector machine (SVM) are proposed. But the acquirement of the projection matrix in these approaches only considers the between-class margin based on S... Some dimensionality reduction (DR) approaches based on support vector machine (SVM) are proposed. But the acquirement of the projection matrix in these approaches only considers the between-class margin based on SVM while ignoring the within-class information in data. This paper presents a new DR approach, call- ed the dimensionality reduction based on SVM and LDA (DRSL). DRSL considers the between-class margins from SVM and LDA, and the within-class compactness from LDA to obtain the projection matrix. As a result, DRSL can realize the combination of the between-class and within-class information and fit the between-class and within-class structures in data. Hence, the obtained projection matrix increases the generalization ability of subsequent classification techniques. Experiments applied to classification techniques show the effectiveness of the proposed method. 展开更多
关键词 classification information pattern recognition dimensionality reduction (DR) support vectormachine (SVM) linear discriminant analysis (LDA)
下载PDF
3D electrical resistivity inversion using prior spatial shape constraints 被引量:8
5
作者 李术才 聂利超 +4 位作者 刘斌 宋杰 刘征宇 苏茂鑫 徐磊 《Applied Geophysics》 SCIE CSCD 2013年第4期361-372,510,共13页
To minimize the number of solutions in 3D resistivity inversion, an inherent problem in inversion, the amount of data considered have to be large and prior constraints need to be applied. Geological and geophysical da... To minimize the number of solutions in 3D resistivity inversion, an inherent problem in inversion, the amount of data considered have to be large and prior constraints need to be applied. Geological and geophysical data regarding the extent of a geological anomaly are important prior information. We propose the use of shape constraints in 3D electrical resistivity inversion, Three weighted orthogonal vectors (a normal and two tangent vectors) were used to control the resistivity differences at the boundaries of the anomaly. The spatial shape of the anomaly and the constraints on the boundaries of the anomaly are thus established. We incorporated the spatial shape constraints in the objective function of the 3D resistivity inversion and constructed the 3D resistivity inversion equation with spatial shape constraints. Subsequently, we used numerical modeling based on prior spatial shape data to constrain the direction vectors and weights of the 3D resistivity inversion. We established a reasonable range between the direction vectors and weights, and verified the feasibility and effectiveness of using spatial shape prior constraints in reducing excessive structures and the number of solutions. We applied the prior spatially shape-constrained inversion method to locate the aquifer at the Guangzhou subway. The spatial shape constraints were taken from ground penetrating radar data. The inversion results for the location and shape of the aquifer agree well with drilling data, and the number of inversion solutions is significantly reduced. 展开更多
关键词 electrical resistivity INVERSION prior spatial constraints direction vector GEOPHYSICS geotechnical engineering.
下载PDF
Lie Symmetrical Hojman Conserved Quantity of Relativistic Mechanical System 被引量:1
6
作者 FANGJian-Hui PENGYong YANXiang-Hong 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第6期1053-1055,共3页
In this paper, we study the Lie symmetrical Hojman conserved quantity of a relativistic mechanical system under general infinitesimal transformations of groups in which the time parameter is variable. The determining ... In this paper, we study the Lie symmetrical Hojman conserved quantity of a relativistic mechanical system under general infinitesimal transformations of groups in which the time parameter is variable. The determining equation of Lie symmetry of the system is established. The theorem of the Lie symmetrical Hojman conserved quantity of the system is presented. The above results are generalization to Hojman's conclusions, in which the time parameter is not variable and the system is non-relativistic. An example is given to illustrate the application of the results in the last. 展开更多
关键词 relativistic mechanical system lie symmetry hojman conserved quantity
下载PDF
Energy-Aware Scheduling Scheme Using Workload-Aware Consolidation Technique in Cloud Data Centres 被引量:2
7
作者 黎红友 王江勇 +2 位作者 彭舰 王俊峰 刘唐 《China Communications》 SCIE CSCD 2013年第12期114-124,共11页
To reduce energy consumption in cloud data centres,in this paper,we propose two algorithms called the Energy-aware Scheduling algorithm using Workload-aware Consolidation Technique(ESWCT) and the Energyaware Live Migr... To reduce energy consumption in cloud data centres,in this paper,we propose two algorithms called the Energy-aware Scheduling algorithm using Workload-aware Consolidation Technique(ESWCT) and the Energyaware Live Migration algorithm using Workload-aware Consolidation Technique(ELMWCT).As opposed to traditional energy-aware scheduling algorithms,which often focus on only one-dimensional resource,the two algorithms are based on the fact that multiple resources(such as CPU,memory and network bandwidth)are shared by users concurrently in cloud data centres and heterogeneous workloads have different resource consumption characteristics.Both algorithms investigate the problem of consolidating heterogeneous workloads.They try to execute all Virtual Machines(VMs) with the minimum amount of Physical Machines(PMs),and then power off unused physical servers to reduce power consumption.Simulation results show that both algorithms efficiently utilise the resources in cloud data centres,and the multidimensional resources have good balanced utilizations,which demonstrate their promising energy saving capability. 展开更多
关键词 energy-aware scheduling hetero-geneous workloads workload-aware consoli-dation cloud data centres
下载PDF
Another Approach to Multiobjective Programming Problems with V-invex Functions 被引量:1
8
作者 LIUSan-ming FENGEn-min LIXiao-shen 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2005年第1期101-110,共10页
In this paper, optimality conditions for multiobjective programming problems having V-invex objective and constraint functions are considered. An equivalent multiobjective programming problem is constructed by a modif... In this paper, optimality conditions for multiobjective programming problems having V-invex objective and constraint functions are considered. An equivalent multiobjective programming problem is constructed by a modification of the objective function.Furthermore, a (α, η)-Lagrange function is introduced for a constructed multiobjective programming problem, and a new type of saddle point is introduced. Some results for the new type of saddle point are given. 展开更多
关键词 efficient solution V-invex function vector valued saddle point multiobjective programming vector valued η)-Lagrange function
下载PDF
A topology optimization method based on element independent nodal density 被引量:2
9
作者 易继军 曾韬 +1 位作者 荣见华 李艳梅 《Journal of Central South University》 SCIE EI CAS 2014年第2期558-566,共9页
A methodology for topology optimization based on element independent nodal density(EIND) is developed.Nodal densities are implemented as the design variables and interpolated onto element space to determine the densit... A methodology for topology optimization based on element independent nodal density(EIND) is developed.Nodal densities are implemented as the design variables and interpolated onto element space to determine the density of any point with Shepard interpolation function.The influence of the diameter of interpolation is discussed which shows good robustness.The new approach is demonstrated on the minimum volume problem subjected to a displacement constraint.The rational approximation for material properties(RAMP) method and a dual programming optimization algorithm are used to penalize the intermediate density point to achieve nearly 0-1 solutions.Solutions are shown to meet stability,mesh dependence or non-checkerboard patterns of topology optimization without additional constraints.Finally,the computational efficiency is greatly improved by multithread parallel computing with OpenMP. 展开更多
关键词 topology optimization element independent nodal density Shepard interpolation parallel computation
下载PDF
Mean Ergodic Theorems in Jordan Banach Weak Algebras
10
作者 Panagiotis N. Koumantos Panaiotis K. Pavlakos 《Journal of Mathematics and System Science》 2013年第3期146-149,共4页
The purpose of this paper is to study mean ergodic theorems concerning continuous or positive operators taking values in Jordan-Banach weak algebras and Jordan C*-algebras, making use the topological and order struct... The purpose of this paper is to study mean ergodic theorems concerning continuous or positive operators taking values in Jordan-Banach weak algebras and Jordan C*-algebras, making use the topological and order structures of the corresponding spaces. The results are obtained applying or extending previous classical results and methods of Ayupov, Carath6odory, Cohen, Eberlein, Kakutani and Yosida. Moreover, this results can be applied to continious or positive operators appearing in diffusion theory, quantum mechanics and quantum 13robabilitv theory. 展开更多
关键词 Jordan Banach weak algebras Krein spaces mean ergodic operators.
下载PDF
Indecomposable modules of the intermediate series over W(a,b) 被引量:3
11
作者 SU YuCai XU Ying YUE XiaoQing 《Science China Mathematics》 SCIE 2014年第2期275-291,共17页
For any complex parameters a and b,W(a,b)is the Lie algebra with basis{Li,Wi|i∈Z}and relations[Li,Lj]=(j i)Li+j,[Li,Wj]=(a+j+bi)Wi+j,[Wi,Wj]=0.In this paper,indecomposable modules of the intermediate series over W(a,... For any complex parameters a and b,W(a,b)is the Lie algebra with basis{Li,Wi|i∈Z}and relations[Li,Lj]=(j i)Li+j,[Li,Wj]=(a+j+bi)Wi+j,[Wi,Wj]=0.In this paper,indecomposable modules of the intermediate series over W(a,b)are classified.It is also proved that an irreducible Harish-Chandra W(a,b)-module is either a highest/lowest weight module or a uniformly bounded module.Furthermore,if a∈/Q,an irreducible weight W(a,b)-module is simply a Vir-module with trivial actions of Wk’s. 展开更多
关键词 the algebra W(a b) the Virasoro algebra modules of the intermediate series
原文传递
CONSTRUCTION OF INDECOMPOSABLEDEFINITE HERMITIAN FORMS 被引量:2
12
作者 ZHU FUZU (Department ofMathematics, East China Normal University Shanghai 200062,China) 《Chinese Annals of Mathematics,Series B》 SCIE CSCD 1994年第3期349-360,共12页
This Paper gives a method to construct indecomposable positive definite integral Hermitianforman imnginary quadratic field Q with gin discriminant and g。n rank.It is shown that for ally natural numbers n and a, there... This Paper gives a method to construct indecomposable positive definite integral Hermitianforman imnginary quadratic field Q with gin discriminant and g。n rank.It is shown that for ally natural numbers n and a, there are n-ary Indecomposable positivedefinite intopal Herlllltian lattices over Q(resp. Q)with discriminant a, exceptfor four(resp. one) exceptions. In these exceptional cases there are no lattices with the desiredproperties. 展开更多
关键词 Indecomposable lattice(form) Minimum of a lattice(form) Minimal、ctor Irreduclble vector.
原文传递
Integral closure of a quartic extension
13
作者 TAN ShengLi XIE DaJun 《Science China Mathematics》 SCIE CSCD 2015年第3期553-564,共12页
Let R be a Noetherian unique factorization domain such that 2 and 3 are units,and let A=R[α]be a quartic extension over R by adding a rootαof an irreducible quartic polynomial p(z)=z4+az2+bz+c over R.We will compute... Let R be a Noetherian unique factorization domain such that 2 and 3 are units,and let A=R[α]be a quartic extension over R by adding a rootαof an irreducible quartic polynomial p(z)=z4+az2+bz+c over R.We will compute explicitly the integral closure of A in its fraction field,which is based on a proper factorization of the coefficients and the algebraic invariants of p(z).In fact,we get the factorization by resolving the singularities of a plane curve defined by z4+a(x)z2+b(x)z+c(x)=0.The integral closure is expressed as a syzygy module and the syzygy equations are given explicitly.We compute also the ramifications of the integral closure over R. 展开更多
关键词 algebraic invariants quartic extension integral closure DISCRIMINANT SYZYGY
原文传递
New Similarity Reduction Solutions for the(2+1)-Dimensional Nizhnik-Novikov-Veselov Equation 被引量:1
14
作者 智红燕 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第3期263-267,共5页
In this paper,some new formal similarity reduction solutions for the(2+1)-dimensional Nizhnik-Novikov-Veselov equation are derived.Firstly,we derive the similarity reduction of the NNV equation with the optimal system... In this paper,some new formal similarity reduction solutions for the(2+1)-dimensional Nizhnik-Novikov-Veselov equation are derived.Firstly,we derive the similarity reduction of the NNV equation with the optimal system of the admitted one-dimensional subalgebras.Secondly,by analyzing the reduced equation,three types of similarity solutions are derived,such as multi-soliton like solutions,variable separations solutions,and KdV type solutions. 展开更多
关键词 similarity reduction solution (2+1)-dimensional Nizknik-Novikov-Veselov equation multi-solitonlike solution
原文传递
Efficient Numerical Algorithm on Irreducible Multiparty Correlations
15
作者 周端陆 《Communications in Theoretical Physics》 SCIE CAS CSCD 2014年第2期187-190,共4页
We develop a numerical algorithm to calculate the degrees of irreducible multiparty correlations for an arbitrary multipartite quantum state, which is efficient for any quantum state of up to five qubits in my persona... We develop a numerical algorithm to calculate the degrees of irreducible multiparty correlations for an arbitrary multipartite quantum state, which is efficient for any quantum state of up to five qubits in my personal computer. We demonstrate the power of the algorithm by the explicit calculations of the degrees of irreducible multiparty correlations in the 4-qubit GHZ state, the Smolin state, and the 5-qubit W state. This development takes a crucial step towards practical applications of irreducible multiparty correlations in real quantum many-body physics. 展开更多
关键词 ENTANGLEMENT quantum nonlocality ENTROPY
原文传递
Probabilistic steady-state and dynamic security assessment of power transmission system 被引量:14
16
作者 LIU YanLi YU YiXin 《Science China(Technological Sciences)》 SCIE EI CAS 2013年第5期1198-1207,共10页
Two-level system model based probabilistic steady-state and dynamic security assessment model is introduced in this paper.Uncertainties of nodal power injection caused by wind power and load demand,steady-state and dy... Two-level system model based probabilistic steady-state and dynamic security assessment model is introduced in this paper.Uncertainties of nodal power injection caused by wind power and load demand,steady-state and dynamic security constraints and transitions between system configurations in terms of failure rate and repair rate are considered in the model.Time to insecurity is used as security index.The probability distribution of time to insecurity can be obtained by solving a linear vector differential equation.The coefficients of the differential equation are expressed in terms of configuration transition rates and security transition probabilities.The model is implemented in complex system successfully for the first time by using the following effective measures:firstly,calculating configuration transition rates effectively based on component state transition rate matrix and system configuration array;secondly,calculating the probability of random nodal power injection belonging to security region effectively according to practical parts of critical boundaries of security region represented by hyper-planes;thirdly,locating non-zero elements of coefficient matrix and then implementing sparse storage of coefficient matrix effectively;finally,calculating security region off-line for on-line use.Results of probabilistic security assessment can be used to conduct operators to analyze system security effectively and take preventive control.Test results on New England 10-generators and 39-buses power system verify the reasonableness and effectiveness of the method. 展开更多
关键词 power transmission system probabilistic security assessment time to insecurity security region uncertainties of windpower and load demand
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部