期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
两种交易模式下共享劳动力平台的定价策略
1
作者 管舒涵 盛健超 杜少甫 《中国科学技术大学学报》 CAS CSCD 北大核心 2021年第5期419-430,共12页
随着互联网信息技术的快速发展,共享劳动力平台在促进社会人力资源的有效利用中起着关键性作用.目前市场上存在的共享劳动力平台有多种交易模式,且每种交易模式下的定价策略不同.在考虑劳动者的服务能力异质性后,分别构建了共享劳动力... 随着互联网信息技术的快速发展,共享劳动力平台在促进社会人力资源的有效利用中起着关键性作用.目前市场上存在的共享劳动力平台有多种交易模式,且每种交易模式下的定价策略不同.在考虑劳动者的服务能力异质性后,分别构建了共享劳动力平台在买方定价策略和劳动者定价策略的利润函数,主要研究了劳动力平台在竞标模式下的最优定价策略.研究结果表明,当低类型劳动者提供的服务与买方的任务需求不匹配度接近高类型劳动者的时,劳动者定价策略对平台更有利,而当低类型劳动者的任务匹配度远低于高类型劳动者的时,平台的定价策略选择取决于买方对任务完成的满意程度.另外,还比较了计件模式与竞标模式,发现在劳动者定价策略下,平台在竞标模式下的利润并不总是优于计件模式. 展开更多
关键词 共享劳动力 竞标模式 计件模式 买方定价策略 劳动者定价策略
下载PDF
农业银行工资分配模式研究(上)
2
作者 刘永功 《农村金融与市场经济》 2002年第1期46-48,共3页
农业银行的工资分配,属于国民收入再分配的范畴。它是农业银行费用资源配置中的一项非常重要的内容。它配置得如何,即工资采取何种方式或模式进行分配。
关键词 农业银行 工资分配 计时模式 计件模式 工资结构 评介
下载PDF
A new semi-fragile watermarking algorithm for image authentication 被引量:1
3
作者 韩德志 《Journal of Chongqing University》 CAS 2005年第1期41-46,共6页
This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional con... This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place. 展开更多
关键词 AUTHENTICATION semi-fragile watermarking FRAGILITY wavelet transform
下载PDF
Study on LQR control algorithm using superelement model 被引量:3
4
作者 XU Qiang CHEN Jian-yun +2 位作者 LI Jing YUAN Chen-yang ZHAO Chun-feng 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第9期2429-2442,共14页
The conventional linear quadratic regulator(LQR) control algorithm is one of the most popular active control algorithms.One important issue for LQR control algorithm is the reduction of structure's degrees of free... The conventional linear quadratic regulator(LQR) control algorithm is one of the most popular active control algorithms.One important issue for LQR control algorithm is the reduction of structure's degrees of freedom(DOF). In this work, an LQR control algorithm with superelement model is intended to solve this issue leading to the fact that LQR control algorithm can be used in large finite element(FE) model for structure. In proposed model, the Craig-Bampton(C-B) method, which is one of the component mode syntheses(CMS), is used to establish superelement modeling to reduce structure's DOF and applied to LQR control algorithm to calculate Kalman gain matrix and obtain control forces. And then, the control forces are applied to original structure to simulate the responses of structure by vibration control. And some examples are given. The results show the computational efficiency of proposed model using synthesized models is higher than that of the classical method of LQR control when the DOF of structure is large. And the accuracy of proposed model is well. Meanwhile, the results show that the proposed control has more effects of vibration absorption on the ground structures than underground structures. 展开更多
关键词 linear quadratic regulator (LQR) control algorithm component mode synthesis (CMS) Craig-Bampton (C-B) method superelement vibration control
下载PDF
Groundwork for True XML-based Security Pattern Languages
5
作者 TAWFIQ S.M.Barhoom 张申生 《Journal of Donghua University(English Edition)》 EI CAS 2005年第1期120-123,共4页
A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organ... A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language. 展开更多
关键词 security pattern XML security security patterns language template.
下载PDF
Evaluation and improvement of wastewater treatment plant performance using BioWin 被引量:1
6
作者 OLEYIBLO Oloche James 操家顺 +3 位作者 冯骞 王淦 薛朝霞 方芳 《Chinese Journal of Oceanology and Limnology》 SCIE CAS CSCD 2015年第2期468-476,共9页
In this study,the activated sludge model implemented in the BioWin software was validated against full-scale wastewater treatment plant data. Only two stoichiometric parameters(Y p /acetic and the heterotrophic yield(... In this study,the activated sludge model implemented in the BioWin software was validated against full-scale wastewater treatment plant data. Only two stoichiometric parameters(Y p /acetic and the heterotrophic yield(Y H)) required calibration. The value 0.42 was used for Yp /acetic in this study,while the default value of the BioWin software is 0.49,making it comparable with the default values of the corresponding parameter(yield of phosphorus release to substrate uptake(YPO4)) used in ASM2,ASM2 d,and ASM3 P,respectively. Three scenarios were evaluated to improve the performance of the wastewater treatment plant,the possibility of wasting sludge from either the aeration tank or the secondary clarifier,the construction of a new oxidation ditch,and the construction of an equalization tank. The results suggest that construction of a new oxidation ditch or an equalization tank for the wastewater treatment plant is not necessary. However,sludge should be wasted from the aeration tank during wet weather to reduce the solids loading of the clarifiers and avoid effluent violations. Therefore,it is recommended that the design of wastewater treatment plants(WWTPs) should include flexibility to operate the plants in various modes. This is helpful in selection of the appropriate operating mode when necessary,resulting in substantial reductions in operating costs. 展开更多
关键词 activated sludge aeration tank equalization tank secondary clarifier wet weather
下载PDF
DESIGN METHODOLOGY OF NETWORKED SOFTWARE EVOLUTION GROWTH BASED ON SOFTWARE PATTERNS 被引量:24
7
作者 Keqing HE Rong PENG +3 位作者 Jing LIU Fei HE Peng LIANG Bing LI 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2006年第2期157-181,共25页
Recently, some new characteristics of complex networks attract the attentions of scientist, in different fields, and lead to many kinds of emerging research directions. So far, most of the researcl work has been limit... Recently, some new characteristics of complex networks attract the attentions of scientist, in different fields, and lead to many kinds of emerging research directions. So far, most of the researcl work has been limited in discovery of complex network characteristics by structure analysis in large-scale software systems. This paper presents the theoretical basis, design method, algorithms and experiment results of the research. It firstly emphasizes the significance of design method of evolution growth for network topology of Object Oriented (OO) software systems, and argues that the selection and modulation of network models with various topology characteristics will bring un-ignorable effect on the process, of design and implementation of OO software systems. Then we analyze the similar discipline of "negation of negation and compromise" between the evolution of network models with different topology characteristics and the development of software modelling methods. According to the analysis of the growth features of software patterns, we propose an object-oriented software network evolution growth method and its algorithms in succession. In addition, we also propose the parameter systems for OO software system metrics based on complex network theory. Based on these parameter systems, it can analyze the features of various nodes, links and local-world, modulate the network topology and guide the software metrics. All these can be helpful to the detailed design, implementation and performance analysis. Finally, we focus on the application of the evolution algorithms and demonstrate it by a case study. Comparing the results from our early experiments with methodologies in empirical software engineering, we believe that the proposed software engineering design method is a computational software engineering approach based on complex network theory. We argue that this method should be greatly beneficial for the design, implementation, modulation and metrics of functionality, structure and performance in large-scale OO software complex system. 展开更多
关键词 Complex networks evolution growth design method growth characteristics of software patterns networked software OO software network types and modulation of preferential attachment.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部